CCNA Quiz 1

CCNA QUIZ 1

CONGRATULATIONS!

YOU HAVE COMPLETED CCNA QUIZ 1.

YOU HAVE %%SCORE%% TRUE ANSWERS OUT OF %%TOTAL%% QUESTIONS.

YOUR SCORE IS %%PERCENTAGE%%.

%%RATING%%

Your answers are highlighted below.
Question 1
Which ones are two main types of Site to Site VPN?
A
Excluded Based VPN
B
Internet Based VPN
C
Intranet Based VPN
D
Extranet Based VPN
E
Included Based VPN
Question 2
Which one of the following is used to build Switching Table?
A
Source IP
B
All of Them
C
Source MAC
D
Destination IP
E
MAC addresses
Question 3
Which ones are true about TCP & UDP?
A
TCP has 8 bits header.
B
TCP is slower than UDP.
C
There is no error checking mechanism in UDP.
D
TCP is a secure protocol UDP is not secure.
E
UDP has guaranteed trasmission.
Question 4
Which ones are  the protocols used between WLC and LWAP? (Select Two)
A
LLDP
B
CAPWAP
C
ICMP
D
LWAPP
E
CDP
Question 5
Which of the following protocols is used to eliminate Layer 2 loops?
A
VTP
B
ARP
C
IP
D
OSPF
E
STP
Question 6
Neighbour Discovery Protocols work on ....
A
Layer 3
B
Layer 5
C
Layer 4
D
Layer 2
E
Layer 1
Question 7
Which ones are the Wireless SEcurity Protocols?
A
WPA2 (Wi-Fi Protected Access 2)
B
WPA (Wi-Fi Protected Access)
C
WEP (Wired Equivalent Privacy)
D
WPA3 (Wi-Fi Protected Access 3)
E
All of them
Question 8
QoS .... is the mechanism that is used during a Traffic Exceed. The Exceed Traffic is buffered and with a little delay, it is sent again.
A
Traffic Shaping
B
Traffic Policing
C
Traffic Monitoring
D
Traffic Determining
E
Traffic Selecting
Question 9
Which Cisco command shows OSPF neighbor adjacencies?
A
show protocols
B
show ip ospf database
C
show ip ospf neighbor
D
debug ip ospf neighbor
E
show ip ospf
Question 10
What is the broadcast address for a Class C address of 192.168.145.0 with default Subnet Mask?
A
192.168.145.0
B
192.168.145.1
C
192.168.0.0
D
192.168.145.255
E
192.168.145.254
Question 11
.... is simply the technical term for a network name.
A
WID
B
WLAN-ID
C
Router-ID
D
VLAN-ID
E
SSID
Question 12
Which Artificial Intelligence type is used to create unique content?
Question 13
If there are centralized WLAN Controllers in each site and Access Points that are connected to this WLC, this is ...
A
Flexconnect Wireless Network Design
B
Centralized Wireless Network Design
C
SD-Access Wireless Network Design
D
Classic Wireless Network Design
E
None of them
Question 14
Which ones are the benefits of Network Automation? (Select Three)
A
More Staff Need
B
Higher Up Times
C
Reduced Operation Costs
D
Higher Errors
E
Increased Business Agility
Question 15
How to open debug for nat?
A
debug ip nat
B
start nat
C
debug start nat
D
debug nat stats
E
run nat
Question 16
Which of the following are Fast Ethernet technologies?
A
100BASE-TX
B
100BASE-FX
C
1000BASE-F
D
100BASE2
E
100BASE-5
Question 17
Which ones are related to RADIUS? (Select three)
A
UDP Port 1812,1645
B
TCP Port 49
C
Bidirectional CHAP
D
Combined AAA
E
Unidirectional CHAP
Question 18
Which ones are the main characteristic of the REST?
A
Scalable
B
Platform-agnostic
C
Lightweight
D
All of them
E
Flexible
Question 19
Which ones are three important QoS Enemies?
A
Packet Loss
B
CIR
C
Jitter
D
Packet Check
E
Delay
Question 20
IP is a Connectionless Protocol.
A
True
B
False
Question 21
For a Class C IPv4 Address, how many usable hosts are there by default?
A
64516
B
65536
C
255
D
32768
E
254
Question 22
How can we turn to Privileged mode from Interface configuration mode on Cisco routers?
A
Esc
B
Ctrl-A
C
Ctrl-Z
D
Ctrl-P
E
Ctrl-Alt-Del
Question 23
DSCP bits are ... bits.
A
6
B
4
C
2
D
5
E
3
Question 24
IPv6 Link Local Addresses can be configured in two ways. Auto-Address Configuration and Manual Configuration.
A
True
B
False
Question 25
What does a PC broadcast to learn an unknown MAC address?
A
ARP Reply
B
None of Them
C
ARP Request
D
ICMP Request
E
ICMP Reply
Question 26
.... and ... are the Southbound Interface API, that provide the communication of SDN Controller and SDN Data Plane devices.
A
REST
B
SNMP
C
Open Flow
D
Netconf
E
All of them
Question 27
.... is the attack type in which routing table is manuplated by attackers.
A
DNS Spoofing
B
Rerouting
C
Replay Attack
D
Session Hijacking
E
Ping of Death
Question 28
Which ones are FTP port numbers?
A
15
B
32
C
21
D
25
E
20
Question 29
How to enable DHCP Snooping on Cisco devices?
A
run snooping
B
ruın dhcp snooping
C
ip dhcp snooping
D
enable snooping
E
dhcp snooping start
Question 30
With which mode access point can connect to another access point as a client?
A
Rogue Detector Mode
B
Sniffer Mode
C
Client Mode
D
SE-Connect Mode
E
Local Mode
Question 31
Which Artificial Intelligence type is used to create unique content?
Question 32
A VLAN trunked link belong to which VLAN by Default?
A
VLAN 1
B
VLAN 0
C
None of Them
D
All VLANs
E
VLAN 10
Question 33
Which one is a Distance Vector Protocol?
A
IS-IS
B
EIGRP
C
OSPF
D
BGP
E
RIP
Question 34
How to enable syslog on cisco routers?
A
start logging
B
run logging
C
logging run
D
logging on
E
logging start
Question 35
Dynamic ARP Inspection (DAI) uses Trust states for interfaces. Which ones are these two trust states?
A
Untrusted
B
Trusted
C
Inabled
D
Active
E
Passive
Question 36
Which ones are some of the Denial of Service Attacks? (Select three)
A
ARP Spoofing
B
Smurfing
C
TCP SYN Flood Attack
D
DNS Spoofing
E
Ping of Death
Once you are finished, click the button below. Any items you have not completed will be marked incorrect. Get Results
There are 36 questions to complete.