CCNA Quiz 1

CCNA QUIZ 1

CONGRATULATIONS!

YOU HAVE COMPLETED CCNA QUIZ 1.

YOU HAVE %%SCORE%% TRUE ANSWERS OUT OF %%TOTAL%% QUESTIONS.

YOUR SCORE IS %%PERCENTAGE%%.

%%RATING%%

Your answers are highlighted below.
Question 1
Which one is a Distance Vector Protocol?
A
EIGRP
B
OSPF
C
RIP
D
IS-IS
E
BGP
Question 2
How to enable syslog on cisco routers?
A
logging start
B
logging on
C
logging run
D
start logging
E
run logging
Question 3
Which ones are the main characteristic of the REST?
A
Scalable
B
Flexible
C
Lightweight
D
All of them
E
Platform-agnostic
Question 4
Which ones are the benefits of Network Automation? (Select Three)
A
More Staff Need
B
Higher Up Times
C
Higher Errors
D
Increased Business Agility
E
Reduced Operation Costs
Question 5
IPv6 Link Local Addresses can be configured in two ways. Auto-Address Configuration and Manual Configuration.
A
True
B
False
Question 6
For a Class C IPv4 Address, how many usable hosts are there by default?
A
64516
B
65536
C
254
D
32768
E
255
Question 7
What is the broadcast address for a Class C address of 192.168.145.0 with default Subnet Mask?
A
192.168.0.0
B
192.168.145.254
C
192.168.145.1
D
192.168.145.0
E
192.168.145.255
Question 8
How can we turn to Privileged mode from Interface configuration mode on Cisco routers?
A
Ctrl-Z
B
Esc
C
Ctrl-P
D
Ctrl-A
E
Ctrl-Alt-Del
Question 9
Which Artificial Intelligence type is used to create unique content?
Question 10
Which ones are some of the Denial of Service Attacks? (Select three)
A
DNS Spoofing
B
TCP SYN Flood Attack
C
Smurfing
D
ARP Spoofing
E
Ping of Death
Question 11
With which mode access point can connect to another access point as a client?
A
Sniffer Mode
B
Rogue Detector Mode
C
Local Mode
D
SE-Connect Mode
E
Client Mode
Question 12
Which ones are FTP port numbers?
A
25
B
20
C
21
D
15
E
32
Question 13
.... is the attack type in which routing table is manuplated by attackers.
A
Rerouting
B
Session Hijacking
C
DNS Spoofing
D
Ping of Death
E
Replay Attack
Question 14
Which Artificial Intelligence type is used to create unique content?
Question 15
How to enable DHCP Snooping on Cisco devices?
A
run snooping
B
ruın dhcp snooping
C
dhcp snooping start
D
enable snooping
E
ip dhcp snooping
Question 16
Dynamic ARP Inspection (DAI) uses Trust states for interfaces. Which ones are these two trust states?
A
Untrusted
B
Passive
C
Active
D
Trusted
E
Inabled
Question 17
DSCP bits are ... bits.
A
5
B
3
C
6
D
4
E
2
Question 18
Which ones are related to RADIUS? (Select three)
A
Unidirectional CHAP
B
Combined AAA
C
TCP Port 49
D
UDP Port 1812,1645
E
Bidirectional CHAP
Question 19
How to open debug for nat?
A
debug nat stats
B
debug ip nat
C
run nat
D
start nat
E
debug start nat
Question 20
Which of the following are Fast Ethernet technologies?
A
100BASE-FX
B
100BASE-TX
C
100BASE2
D
100BASE-5
E
1000BASE-F
Question 21
What does a PC broadcast to learn an unknown MAC address?
A
ICMP Reply
B
ARP Reply
C
ICMP Request
D
None of Them
E
ARP Request
Question 22
Which ones are two main types of Site to Site VPN?
A
Extranet Based VPN
B
Intranet Based VPN
C
Included Based VPN
D
Excluded Based VPN
E
Internet Based VPN
Question 23
.... is simply the technical term for a network name.
A
WID
B
VLAN-ID
C
WLAN-ID
D
Router-ID
E
SSID
Question 24
Neighbour Discovery Protocols work on ....
A
Layer 4
B
Layer 2
C
Layer 5
D
Layer 1
E
Layer 3
Question 25
.... and ... are the Southbound Interface API, that provide the communication of SDN Controller and SDN Data Plane devices.
A
REST
B
All of them
C
SNMP
D
Open Flow
E
Netconf
Question 26
Which ones are three important QoS Enemies?
A
Packet Loss
B
Delay
C
Jitter
D
CIR
E
Packet Check
Question 27
IP is a Connectionless Protocol.
A
False
B
True
Question 28
Which of the following protocols is used to eliminate Layer 2 loops?
A
OSPF
B
ARP
C
STP
D
VTP
E
IP
Question 29
Which Cisco command shows OSPF neighbor adjacencies?
A
show protocols
B
show ip ospf
C
debug ip ospf neighbor
D
show ip ospf neighbor
E
show ip ospf database
Question 30
A VLAN trunked link belong to which VLAN by Default?
A
VLAN 1
B
All VLANs
C
VLAN 10
D
None of Them
E
VLAN 0
Question 31
Which one of the following is used to build Switching Table?
A
Source IP
B
All of Them
C
Source MAC
D
MAC addresses
E
Destination IP
Question 32
If there are centralized WLAN Controllers in each site and Access Points that are connected to this WLC, this is ...
A
SD-Access Wireless Network Design
B
Classic Wireless Network Design
C
Centralized Wireless Network Design
D
None of them
E
Flexconnect Wireless Network Design
Question 33
Which ones are true about TCP & UDP?
A
There is no error checking mechanism in UDP.
B
UDP has guaranteed trasmission.
C
TCP has 8 bits header.
D
TCP is slower than UDP.
E
TCP is a secure protocol UDP is not secure.
Question 34
QoS .... is the mechanism that is used during a Traffic Exceed. The Exceed Traffic is buffered and with a little delay, it is sent again.
A
Traffic Selecting
B
Traffic Monitoring
C
Traffic Shaping
D
Traffic Policing
E
Traffic Determining
Question 35
Which ones are  the protocols used between WLC and LWAP? (Select Two)
A
LWAPP
B
CDP
C
LLDP
D
CAPWAP
E
ICMP
Question 36
Which ones are the Wireless SEcurity Protocols?
A
All of them
B
WPA (Wi-Fi Protected Access)
C
WPA3 (Wi-Fi Protected Access 3)
D
WPA2 (Wi-Fi Protected Access 2)
E
WEP (Wired Equivalent Privacy)
Once you are finished, click the button below. Any items you have not completed will be marked incorrect. Get Results
There are 36 questions to complete.