CCNA Quiz 1

CCNA QUIZ 1

CONGRATULATIONS!

YOU HAVE COMPLETED CCNA QUIZ 1.

YOU HAVE %%SCORE%% TRUE ANSWERS OUT OF %%TOTAL%% QUESTIONS.

YOUR SCORE IS %%PERCENTAGE%%.

%%RATING%%

Your answers are highlighted below.
Question 1
Which ones are FTP port numbers?
A
20
B
25
C
32
D
21
E
15
Question 2
.... is simply the technical term for a network name.
A
Router-ID
B
VLAN-ID
C
WID
D
SSID
E
WLAN-ID
Question 3
What does a PC broadcast to learn an unknown MAC address?
A
ICMP Reply
B
ARP Request
C
ARP Reply
D
ICMP Request
E
None of Them
Question 4
Which of the following protocols is used to eliminate Layer 2 loops?
A
OSPF
B
IP
C
STP
D
VTP
E
ARP
Question 5
How can we turn to Privileged mode from Interface configuration mode on Cisco routers?
A
Ctrl-Z
B
Ctrl-Alt-Del
C
Esc
D
Ctrl-A
E
Ctrl-P
Question 6
How to enable syslog on cisco routers?
A
start logging
B
logging start
C
run logging
D
logging run
E
logging on
Question 7
IPv6 Link Local Addresses can be configured in two ways. Auto-Address Configuration and Manual Configuration.
A
False
B
True
Question 8
For a Class C IPv4 Address, how many usable hosts are there by default?
A
254
B
255
C
64516
D
65536
E
32768
Question 9
Which ones are the main characteristic of the REST?
A
Scalable
B
Lightweight
C
Flexible
D
All of them
E
Platform-agnostic
Question 10
Which ones are the Wireless SEcurity Protocols?
A
All of them
B
WPA3 (Wi-Fi Protected Access 3)
C
WPA (Wi-Fi Protected Access)
D
WEP (Wired Equivalent Privacy)
E
WPA2 (Wi-Fi Protected Access 2)
Question 11
Which Artificial Intelligence type is used to create unique content?
Question 12
With which mode access point can connect to another access point as a client?
A
Client Mode
B
Sniffer Mode
C
SE-Connect Mode
D
Rogue Detector Mode
E
Local Mode
Question 13
Which ones are the benefits of Network Automation? (Select Three)
A
Reduced Operation Costs
B
Higher Up Times
C
More Staff Need
D
Increased Business Agility
E
Higher Errors
Question 14
Which Artificial Intelligence type is used to create unique content?
Question 15
If there are centralized WLAN Controllers in each site and Access Points that are connected to this WLC, this is ...
A
Classic Wireless Network Design
B
Flexconnect Wireless Network Design
C
Centralized Wireless Network Design
D
None of them
E
SD-Access Wireless Network Design
Question 16
A VLAN trunked link belong to which VLAN by Default?
A
All VLANs
B
VLAN 0
C
VLAN 1
D
None of Them
E
VLAN 10
Question 17
How to enable DHCP Snooping on Cisco devices?
A
enable snooping
B
run snooping
C
dhcp snooping start
D
ip dhcp snooping
E
ruın dhcp snooping
Question 18
QoS .... is the mechanism that is used during a Traffic Exceed. The Exceed Traffic is buffered and with a little delay, it is sent again.
A
Traffic Monitoring
B
Traffic Shaping
C
Traffic Selecting
D
Traffic Policing
E
Traffic Determining
Question 19
Which one of the following is used to build Switching Table?
A
MAC addresses
B
Destination IP
C
Source IP
D
All of Them
E
Source MAC
Question 20
Which ones are related to RADIUS? (Select three)
A
Bidirectional CHAP
B
UDP Port 1812,1645
C
TCP Port 49
D
Unidirectional CHAP
E
Combined AAA
Question 21
Which Cisco command shows OSPF neighbor adjacencies?
A
debug ip ospf neighbor
B
show ip ospf neighbor
C
show ip ospf
D
show protocols
E
show ip ospf database
Question 22
Neighbour Discovery Protocols work on ....
A
Layer 5
B
Layer 3
C
Layer 1
D
Layer 2
E
Layer 4
Question 23
Which ones are three important QoS Enemies?
A
Jitter
B
Delay
C
Packet Check
D
CIR
E
Packet Loss
Question 24
Dynamic ARP Inspection (DAI) uses Trust states for interfaces. Which ones are these two trust states?
A
Passive
B
Active
C
Inabled
D
Trusted
E
Untrusted
Question 25
IP is a Connectionless Protocol.
A
True
B
False
Question 26
DSCP bits are ... bits.
A
2
B
4
C
5
D
3
E
6
Question 27
.... and ... are the Southbound Interface API, that provide the communication of SDN Controller and SDN Data Plane devices.
A
Netconf
B
REST
C
Open Flow
D
All of them
E
SNMP
Question 28
Which ones are two main types of Site to Site VPN?
A
Extranet Based VPN
B
Intranet Based VPN
C
Included Based VPN
D
Internet Based VPN
E
Excluded Based VPN
Question 29
How to open debug for nat?
A
debug start nat
B
debug nat stats
C
run nat
D
debug ip nat
E
start nat
Question 30
What is the broadcast address for a Class C address of 192.168.145.0 with default Subnet Mask?
A
192.168.145.255
B
192.168.145.1
C
192.168.145.254
D
192.168.0.0
E
192.168.145.0
Question 31
Which ones are some of the Denial of Service Attacks? (Select three)
A
Smurfing
B
ARP Spoofing
C
TCP SYN Flood Attack
D
DNS Spoofing
E
Ping of Death
Question 32
Which of the following are Fast Ethernet technologies?
A
1000BASE-F
B
100BASE2
C
100BASE-5
D
100BASE-FX
E
100BASE-TX
Question 33
Which ones are  the protocols used between WLC and LWAP? (Select Two)
A
LLDP
B
CAPWAP
C
ICMP
D
CDP
E
LWAPP
Question 34
.... is the attack type in which routing table is manuplated by attackers.
A
Replay Attack
B
Ping of Death
C
Session Hijacking
D
DNS Spoofing
E
Rerouting
Question 35
Which one is a Distance Vector Protocol?
A
IS-IS
B
RIP
C
EIGRP
D
OSPF
E
BGP
Question 36
Which ones are true about TCP & UDP?
A
TCP is slower than UDP.
B
TCP is a secure protocol UDP is not secure.
C
There is no error checking mechanism in UDP.
D
UDP has guaranteed trasmission.
E
TCP has 8 bits header.
Once you are finished, click the button below. Any items you have not completed will be marked incorrect. Get Results
There are 36 questions to complete.