CONGRATULATIONS!
YOU HAVE COMPLETED CCNA QUIZ 1.
YOU HAVE %%SCORE%% TRUE ANSWERS OUT OF %%TOTAL%% QUESTIONS.
YOUR SCORE IS %%PERCENTAGE%%.
%%RATING%%Question 1 |
Unidirectional CHAP
| |
UDP Port 1812,1645 | |
Bidirectional CHAP | |
Combined AAA
| |
TCP Port 49 |
Question 2 |
VLAN 1 | |
All VLANs | |
VLAN 0 | |
None of Them | |
VLAN 10 |
Question 3 |
32768 | |
64516 | |
255 | |
65536 | |
254
|
Question 4 |
Open Flow | |
Netconf | |
SNMP | |
REST | |
All of them |
Question 5 |
TCP is a secure protocol UDP is not secure.
| |
TCP has 8 bits header. | |
UDP has guaranteed trasmission.
| |
TCP is slower than UDP.
| |
There is no error checking mechanism in UDP. |
Question 6 |
ip dhcp snooping | |
run snooping | |
dhcp snooping start | |
ruın dhcp snooping | |
enable snooping |
Question 7 |
Active | |
Passive | |
Untrusted | |
Inabled | |
Trusted
|
Question 8 |
Question 9 |
Question 10 |
Client Mode | |
SE-Connect Mode
| |
Local Mode | |
Sniffer Mode | |
Rogue Detector Mode |
Question 11 |
debug ip nat | |
run nat | |
start nat | |
debug nat stats | |
debug start nat |
Question 12 |
1000BASE-F | |
100BASE-TX | |
100BASE-5
| |
100BASE2 | |
100BASE-FX |
Question 13 |
EIGRP | |
BGP | |
IS-IS | |
RIP | |
OSPF |
Question 14 |
25 | |
20 | |
15 | |
21 | |
32 |
Question 15 |
Packet Loss
| |
Jitter
| |
CIR | |
Packet Check | |
Delay |
Question 16 |
False | |
True |
Question 17 |
MAC addresses | |
Source IP | |
Destination IP
| |
All of Them | |
Source MAC |
Question 18 |
show ip ospf database | |
debug ip ospf neighbor | |
show protocols | |
show ip ospf neighbor | |
show ip ospf |
Question 19 |
Layer 3 | |
Layer 5 | |
Layer 4 | |
Layer 2 | |
Layer 1 |
Question 20 |
False | |
True |
Question 21 |
192.168.145.255 | |
192.168.0.0 | |
192.168.145.254 | |
192.168.145.1 | |
192.168.145.0 |
Question 22 |
Flexible
| |
Lightweight
| |
All of them | |
Scalable | |
Platform-agnostic |
Question 23 |
IP | |
VTP | |
ARP | |
STP | |
OSPF |
Question 24 |
Included Based VPN
| |
Internet Based VPN
| |
Extranet Based VPN
| |
Excluded Based VPN
| |
Intranet Based VPN
|
Question 25 |
SSID | |
WID | |
WLAN-ID | |
Router-ID | |
VLAN-ID |
Question 26 |
TCP SYN Flood Attack | |
Smurfing | |
ARP Spoofing
| |
DNS Spoofing | |
Ping of Death
|
Question 27 |
run logging | |
logging start | |
logging on | |
logging run | |
start logging |
Question 28 |
WPA3 (Wi-Fi Protected Access 3)
| |
WPA (Wi-Fi Protected Access)
| |
WPA2 (Wi-Fi Protected Access 2)
| |
WEP (Wired Equivalent Privacy)
| |
All of them |
Question 29 |
Ctrl-A | |
Ctrl-P | |
Ctrl-Alt-Del | |
Esc | |
Ctrl-Z
|
Question 30 |
Centralized Wireless Network Design | |
None of them | |
Flexconnect Wireless Network Design | |
Classic Wireless Network Design | |
SD-Access Wireless Network Design |
Question 31 |
ICMP | |
CAPWAP | |
CDP | |
LLDP | |
LWAPP |
Question 32 |
ICMP Reply | |
ARP Request | |
ARP Reply | |
ICMP Request | |
None of Them |
Question 33 |
Rerouting
| |
Ping of Death | |
Replay Attack | |
Session Hijacking
| |
DNS Spoofing
|
Question 34 |
6 | |
2 | |
4 | |
3 | |
5 |
Question 35 |
Traffic Shaping | |
Traffic Monitoring | |
Traffic Selecting | |
Traffic Policing | |
Traffic Determining |
Question 36 |
More Staff Need | |
Reduced Operation Costs | |
Higher Errors
| |
Higher Up Times | |
Increased Business Agility |