CCNA Quiz 5

CCNA QUIZ 5

CONGRATULATIONS!

YOU HAVE COMPLETED CCNA QUIZ 5.

YOU HAVE %%SCORE%% TRUE ANSWERS OUT OF %%TOTAL%% QUESTIONS.

YOUR SCORE IS %%PERCENTAGE%%.

%%RATING%%

Your answers are highlighted below.
Question 1
Switches forwards Packets based on IP Addresses. (True or False)
A
True
B
False
Question 2
The protocols used between WLC and LWAP are LWAPP and CAPWAP. This protocols work with ...
A
UDP
B
TCP
C
SCTP
Question 3
Which ones are the properties of Link State Routing Protocols?
A
Knows entire topolgy
B
Fast Convergence
C
Susceptible to routing loops
D
sends only link state info
E
Slow Convergence
Question 4
DR and BDR are used with which Routing Protocol?
A
BGP
B
EIGRP
C
RIP
D
OSPF
E
IS-IS
Question 5
Which one translate host names to IP addresses?
A
DHCP
B
DNS
C
BGP
D
ICMP
E
ARP
Question 6
Which ACL uses Source IP, Destination IP, Port and Protocol for Filtering?
A
Standard
B
Extended
Question 7
UDP is a protocol that is ... and ...
A
Fast
B
Unreliable
C
Slow
D
Reliable
Question 8
Which one is the simplest QoS Service Model?
A
AF1
B
AF3
C
Best Effort
D
EF
E
AF2
Question 9
.... is the attack type that is sued by the attackers to check a backdoor in the victim’s system.
A
DNS Spoofing
B
ARP Spoofing
C
Port Scanning
D
Session Hijacking
E
Smurfing
Question 10
How to delete all the records in CDP table?
A
delete cdp table
B
undo cdp table
C
delete cdp
D
clear cdp table
E
undo cdp
Question 11
Whic AP Mode is used to detect malicious AP?
A
REAP/H-REAP Mode
B
Rogue Detector Mode
C
Bridge Mode
D
Client Mode
E
Monitor Mode
Question 12
Which ones are the correct order of RPVST+ States?
A
Learning, Blocking,, Forwarding, Disabled
B
Blocking, Learning, Forwarding, Disabled
C
Learning, Disabled, Blocking, Forwarding
D
Forwarding, Disabled, Blocking, Learning
E
Learning, Forwarding, Disabled, Blocking,
Question 13
What is the transmission capacity of a medium?
A
PDU
B
Bandwidth
C
MTU
D
Cost
E
Hop Count
Question 14
Which one use Three-Way Handshake for session establishment?
A
OSPF
B
TCP
C
RSTP
D
RIP
E
UDP
Question 15
Which ones are NTP Device Roles?
A
NTP Client
B
NTP Server
C
NTP Client/Server
D
NTP Active
E
NTP Passive
Question 16
Which ones are two of the REST API information parameters?
A
Tag
B
Option
C
End
D
Body
E
Path
Question 17
How to limit MAC address number for a an interface as maximum 5 MAC?
A
switchport maximum 5
B
port-security maximum 5
C
switchport port-security 5
D
port-security 5
E
switchport port-security maximum 5
Question 18
What is the other name of Administrative Distance?
A
Priority
B
Cost
C
All of them
D
Preference
E
Hop Count
Question 19
Which one is standard based VLAN Tagging protocol?
A
ICMP
B
DOT1Q
C
STP
D
ISL
E
MD5
Question 20
Opportunistic Wireless Encryption is one of the improvements coming with ...
A
WPA2
B
WPA1
C
WPA3
D
WPA
E
WEP
Question 21
.... stores configuration of a router.
A
ROM
B
TFTP Server
C
Flash
D
RAM
E
NVRAM
Question 22
Network operating system works on .... Plane of SDN.
A
Management
B
Control
C
Data
D
None of them
E
Forwarding
Question 23
Which ones are some of the constraints of REST APIs?
A
All of them
B
Client/Server
C
Layered System
D
Code on Demand
E
Uniform Interface
Question 24
Which ones are some of the the Man-in-the-Middle Attacks? (Select three)
A
Replay Attacks
B
Session Hijacking
C
DNS Spoofing
D
Teardrop Attack
E
Ping of Death
Question 25
What is the name of the connector used with Copper Ethernet Cable?
A
RS-232
B
None of them
C
RJ 45
D
RJ 50
E
DCE
Question 26
Which ones are related to TACACS+(Select three)
A
Uses TCP
B
Supports 15 Priviledge modes
C
Full packet encryption
D
Only password encryption
E
Uses UDP
Question 27
Maksimum Packet Size that can be sent without Fragmentation is ....
A
LSA
B
BPDU
C
MTU
D
Packet Size
E
Packet Length
Question 28
How to check syslog information?
A
show all logs
B
show logging
C
show logs
D
show log table
E
shoe log details
Question 29
In .... Mode, both transmitting and receiving device can communicate at the same time.
A
Full Duplex
B
Half Duplex
Question 30
BE, AF, EF codes are deterimned by .... in DSCP bits.
A
None of them
B
Traffic Classification
C
Traffic Policing
D
Class Selector Codepoint
E
Drop Probability
Question 31
Which ones are the port roles used in DHCP Snooping?
A
Untrusted Ports
B
Standard Ports
C
Trusted Ports
D
Passive Ports
E
Active Ports
Question 32
How to create ip nat pool IPCISCO for ip address range 10.10.10.1-10.10.10.10
A
ip pool IPCISCO 10.10.10.1 10.10.10.10
B
ip nat pool 10.10.10.1 10.10.10.10 netmask
C
ip nat pool 10.10.10.1 10.10.10.10
D
ip nat pool IPCISCO 10.10.10.1 10.10.10.10 netmask
E
ip pool IPCISCO 10.10.10.1 10.10.10.10 netmask
Once you are finished, click the button below. Any items you have not completed will be marked incorrect. Get Results
There are 32 questions to complete.