CCNA Quiz 1

CCNA QUIZ 1

CONGRATULATIONS!

YOU HAVE COMPLETED CCNA QUIZ 1.

YOU HAVE %%SCORE%% TRUE ANSWERS OUT OF %%TOTAL%% QUESTIONS.

YOUR SCORE IS %%PERCENTAGE%%.

%%RATING%%

Your answers are highlighted below.
Question 1
If there are centralized WLAN Controllers in each site and Access Points that are connected to this WLC, this is ...
A
Centralized Wireless Network Design
B
Classic Wireless Network Design
C
None of them
D
Flexconnect Wireless Network Design
E
SD-Access Wireless Network Design
Question 2
Which of the following protocols is used to eliminate Layer 2 loops?
A
IP
B
STP
C
VTP
D
ARP
E
OSPF
Question 3
IP is a Connectionless Protocol.
A
True
B
False
Question 4
How to enable DHCP Snooping on Cisco devices?
A
ip dhcp snooping
B
dhcp snooping start
C
ruın dhcp snooping
D
run snooping
E
enable snooping
Question 5
Which ones are true about TCP & UDP?
A
TCP is slower than UDP.
B
There is no error checking mechanism in UDP.
C
TCP has 8 bits header.
D
UDP has guaranteed trasmission.
E
TCP is a secure protocol UDP is not secure.
Question 6
What does a PC broadcast to learn an unknown MAC address?
A
ARP Request
B
ICMP Reply
C
None of Them
D
ARP Reply
E
ICMP Request
Question 7
Which ones are related to RADIUS? (Select three)
A
Unidirectional CHAP
B
TCP Port 49
C
Combined AAA
D
Bidirectional CHAP
E
UDP Port 1812,1645
Question 8
Which ones are the main characteristic of the REST?
A
Platform-agnostic
B
All of them
C
Lightweight
D
Flexible
E
Scalable
Question 9
Which Cisco command shows OSPF neighbor adjacencies?
A
show ip ospf database
B
show protocols
C
debug ip ospf neighbor
D
show ip ospf
E
show ip ospf neighbor
Question 10
IPv6 Link Local Addresses can be configured in two ways. Auto-Address Configuration and Manual Configuration.
A
False
B
True
Question 11
.... is the attack type in which routing table is manuplated by attackers.
A
DNS Spoofing
B
Rerouting
C
Session Hijacking
D
Replay Attack
E
Ping of Death
Question 12
What is the broadcast address for a Class C address of 192.168.145.0 with default Subnet Mask?
A
192.168.145.1
B
192.168.145.254
C
192.168.0.0
D
192.168.145.255
E
192.168.145.0
Question 13
Which ones are FTP port numbers?
A
32
B
20
C
15
D
25
E
21
Question 14
.... is simply the technical term for a network name.
A
SSID
B
Router-ID
C
WID
D
WLAN-ID
E
VLAN-ID
Question 15
Which Artificial Intelligence type is used to create unique content?
Question 16
.... and ... are the Southbound Interface API, that provide the communication of SDN Controller and SDN Data Plane devices.
A
All of them
B
Netconf
C
REST
D
SNMP
E
Open Flow
Question 17
With which mode access point can connect to another access point as a client?
A
Rogue Detector Mode
B
Client Mode
C
Sniffer Mode
D
Local Mode
E
SE-Connect Mode
Question 18
Which ones are  the protocols used between WLC and LWAP? (Select Two)
A
CDP
B
ICMP
C
LWAPP
D
LLDP
E
CAPWAP
Question 19
Dynamic ARP Inspection (DAI) uses Trust states for interfaces. Which ones are these two trust states?
A
Active
B
Untrusted
C
Trusted
D
Inabled
E
Passive
Question 20
Which ones are some of the Denial of Service Attacks? (Select three)
A
DNS Spoofing
B
Smurfing
C
Ping of Death
D
ARP Spoofing
E
TCP SYN Flood Attack
Question 21
How to open debug for nat?
A
debug start nat
B
run nat
C
debug ip nat
D
debug nat stats
E
start nat
Question 22
DSCP bits are ... bits.
A
6
B
4
C
2
D
3
E
5
Question 23
Which ones are the benefits of Network Automation? (Select Three)
A
Higher Up Times
B
More Staff Need
C
Increased Business Agility
D
Higher Errors
E
Reduced Operation Costs
Question 24
Which one of the following is used to build Switching Table?
A
Source IP
B
All of Them
C
Source MAC
D
Destination IP
E
MAC addresses
Question 25
How to enable syslog on cisco routers?
A
logging on
B
run logging
C
start logging
D
logging run
E
logging start
Question 26
Which Artificial Intelligence type is used to create unique content?
Question 27
Neighbour Discovery Protocols work on ....
A
Layer 3
B
Layer 2
C
Layer 4
D
Layer 5
E
Layer 1
Question 28
Which ones are two main types of Site to Site VPN?
A
Intranet Based VPN
B
Included Based VPN
C
Extranet Based VPN
D
Excluded Based VPN
E
Internet Based VPN
Question 29
How can we turn to Privileged mode from Interface configuration mode on Cisco routers?
A
Ctrl-Z
B
Ctrl-Alt-Del
C
Esc
D
Ctrl-P
E
Ctrl-A
Question 30
A VLAN trunked link belong to which VLAN by Default?
A
All VLANs
B
VLAN 1
C
VLAN 10
D
None of Them
E
VLAN 0
Question 31
For a Class C IPv4 Address, how many usable hosts are there by default?
A
65536
B
64516
C
254
D
255
E
32768
Question 32
Which ones are the Wireless SEcurity Protocols?
A
All of them
B
WPA3 (Wi-Fi Protected Access 3)
C
WEP (Wired Equivalent Privacy)
D
WPA2 (Wi-Fi Protected Access 2)
E
WPA (Wi-Fi Protected Access)
Question 33
Which one is a Distance Vector Protocol?
A
EIGRP
B
RIP
C
OSPF
D
BGP
E
IS-IS
Question 34
Which ones are three important QoS Enemies?
A
Delay
B
Packet Loss
C
Jitter
D
Packet Check
E
CIR
Question 35
QoS .... is the mechanism that is used during a Traffic Exceed. The Exceed Traffic is buffered and with a little delay, it is sent again.
A
Traffic Determining
B
Traffic Policing
C
Traffic Monitoring
D
Traffic Selecting
E
Traffic Shaping
Question 36
Which of the following are Fast Ethernet technologies?
A
100BASE-5
B
100BASE-FX
C
1000BASE-F
D
100BASE2
E
100BASE-TX
Once you are finished, click the button below. Any items you have not completed will be marked incorrect. Get Results
There are 36 questions to complete.