CCNA Quiz 1

CCNA QUIZ 1

CONGRATULATIONS!

YOU HAVE COMPLETED CCNA QUIZ 1.

YOU HAVE %%SCORE%% TRUE ANSWERS OUT OF %%TOTAL%% QUESTIONS.

YOUR SCORE IS %%PERCENTAGE%%.

%%RATING%%

Your answers are highlighted below.
Question 1
Which ones are related to RADIUS? (Select three)
A
Unidirectional CHAP
B
UDP Port 1812,1645
C
Bidirectional CHAP
D
Combined AAA
E
TCP Port 49
Question 2
A VLAN trunked link belong to which VLAN by Default?
A
VLAN 1
B
All VLANs
C
VLAN 0
D
None of Them
E
VLAN 10
Question 3
For a Class C IPv4 Address, how many usable hosts are there by default?
A
32768
B
64516
C
255
D
65536
E
254
Question 4
.... and ... are the Southbound Interface API, that provide the communication of SDN Controller and SDN Data Plane devices.
A
Open Flow
B
Netconf
C
SNMP
D
REST
E
All of them
Question 5
Which ones are true about TCP & UDP?
A
TCP is a secure protocol UDP is not secure.
B
TCP has 8 bits header.
C
UDP has guaranteed trasmission.
D
TCP is slower than UDP.
E
There is no error checking mechanism in UDP.
Question 6
How to enable DHCP Snooping on Cisco devices?
A
ip dhcp snooping
B
run snooping
C
dhcp snooping start
D
ruın dhcp snooping
E
enable snooping
Question 7
Dynamic ARP Inspection (DAI) uses Trust states for interfaces. Which ones are these two trust states?
A
Active
B
Passive
C
Untrusted
D
Inabled
E
Trusted
Question 8
Which Artificial Intelligence type is used to create unique content?
Question 9
Which Artificial Intelligence type is used to create unique content?
Question 10
With which mode access point can connect to another access point as a client?
A
Client Mode
B
SE-Connect Mode
C
Local Mode
D
Sniffer Mode
E
Rogue Detector Mode
Question 11
How to open debug for nat?
A
debug ip nat
B
run nat
C
start nat
D
debug nat stats
E
debug start nat
Question 12
Which of the following are Fast Ethernet technologies?
A
1000BASE-F
B
100BASE-TX
C
100BASE-5
D
100BASE2
E
100BASE-FX
Question 13
Which one is a Distance Vector Protocol?
A
EIGRP
B
BGP
C
IS-IS
D
RIP
E
OSPF
Question 14
Which ones are FTP port numbers?
A
25
B
20
C
15
D
21
E
32
Question 15
Which ones are three important QoS Enemies?
A
Packet Loss
B
Jitter
C
CIR
D
Packet Check
E
Delay
Question 16
IP is a Connectionless Protocol.
A
False
B
True
Question 17
Which one of the following is used to build Switching Table?
A
MAC addresses
B
Source IP
C
Destination IP
D
All of Them
E
Source MAC
Question 18
Which Cisco command shows OSPF neighbor adjacencies?
A
show ip ospf database
B
debug ip ospf neighbor
C
show protocols
D
show ip ospf neighbor
E
show ip ospf
Question 19
Neighbour Discovery Protocols work on ....
A
Layer 3
B
Layer 5
C
Layer 4
D
Layer 2
E
Layer 1
Question 20
IPv6 Link Local Addresses can be configured in two ways. Auto-Address Configuration and Manual Configuration.
A
False
B
True
Question 21
What is the broadcast address for a Class C address of 192.168.145.0 with default Subnet Mask?
A
192.168.145.255
B
192.168.0.0
C
192.168.145.254
D
192.168.145.1
E
192.168.145.0
Question 22
Which ones are the main characteristic of the REST?
A
Flexible
B
Lightweight
C
All of them
D
Scalable
E
Platform-agnostic
Question 23
Which of the following protocols is used to eliminate Layer 2 loops?
A
IP
B
VTP
C
ARP
D
STP
E
OSPF
Question 24
Which ones are two main types of Site to Site VPN?
A
Included Based VPN
B
Internet Based VPN
C
Extranet Based VPN
D
Excluded Based VPN
E
Intranet Based VPN
Question 25
.... is simply the technical term for a network name.
A
SSID
B
WID
C
WLAN-ID
D
Router-ID
E
VLAN-ID
Question 26
Which ones are some of the Denial of Service Attacks? (Select three)
A
TCP SYN Flood Attack
B
Smurfing
C
ARP Spoofing
D
DNS Spoofing
E
Ping of Death
Question 27
How to enable syslog on cisco routers?
A
run logging
B
logging start
C
logging on
D
logging run
E
start logging
Question 28
Which ones are the Wireless SEcurity Protocols?
A
WPA3 (Wi-Fi Protected Access 3)
B
WPA (Wi-Fi Protected Access)
C
WPA2 (Wi-Fi Protected Access 2)
D
WEP (Wired Equivalent Privacy)
E
All of them
Question 29
How can we turn to Privileged mode from Interface configuration mode on Cisco routers?
A
Ctrl-A
B
Ctrl-P
C
Ctrl-Alt-Del
D
Esc
E
Ctrl-Z
Question 30
If there are centralized WLAN Controllers in each site and Access Points that are connected to this WLC, this is ...
A
Centralized Wireless Network Design
B
None of them
C
Flexconnect Wireless Network Design
D
Classic Wireless Network Design
E
SD-Access Wireless Network Design
Question 31
Which ones are  the protocols used between WLC and LWAP? (Select Two)
A
ICMP
B
CAPWAP
C
CDP
D
LLDP
E
LWAPP
Question 32
What does a PC broadcast to learn an unknown MAC address?
A
ICMP Reply
B
ARP Request
C
ARP Reply
D
ICMP Request
E
None of Them
Question 33
.... is the attack type in which routing table is manuplated by attackers.
A
Rerouting
B
Ping of Death
C
Replay Attack
D
Session Hijacking
E
DNS Spoofing
Question 34
DSCP bits are ... bits.
A
6
B
2
C
4
D
3
E
5
Question 35
QoS .... is the mechanism that is used during a Traffic Exceed. The Exceed Traffic is buffered and with a little delay, it is sent again.
A
Traffic Shaping
B
Traffic Monitoring
C
Traffic Selecting
D
Traffic Policing
E
Traffic Determining
Question 36
Which ones are the benefits of Network Automation? (Select Three)
A
More Staff Need
B
Reduced Operation Costs
C
Higher Errors
D
Higher Up Times
E
Increased Business Agility
Once you are finished, click the button below. Any items you have not completed will be marked incorrect. Get Results
There are 36 questions to complete.