CCNA Quiz 5

CCNA QUIZ 5

CONGRATULATIONS!

YOU HAVE COMPLETED CCNA QUIZ 5.

YOU HAVE %%SCORE%% TRUE ANSWERS OUT OF %%TOTAL%% QUESTIONS.

YOUR SCORE IS %%PERCENTAGE%%.

%%RATING%%

Your answers are highlighted below.
Question 1
What is the transmission capacity of a medium?
A
Hop Count
B
Cost
C
MTU
D
PDU
E
Bandwidth
Question 2
Which ACL uses Source IP, Destination IP, Port and Protocol for Filtering?
A
Extended
B
Standard
Question 3
What is the other name of Administrative Distance?
A
Preference
B
Priority
C
All of them
D
Hop Count
E
Cost
Question 4
Which one is standard based VLAN Tagging protocol?
A
ICMP
B
DOT1Q
C
MD5
D
STP
E
ISL
Question 5
How to delete all the records in CDP table?
A
undo cdp
B
delete cdp
C
undo cdp table
D
delete cdp table
E
clear cdp table
Question 6
Which ones are NTP Device Roles?
A
NTP Active
B
NTP Server
C
NTP Client
D
NTP Client/Server
E
NTP Passive
Question 7
Opportunistic Wireless Encryption is one of the improvements coming with ...
A
WPA2
B
WPA
C
WPA1
D
WEP
E
WPA3
Question 8
Switches forwards Packets based on IP Addresses. (True or False)
A
True
B
False
Question 9
Network operating system works on .... Plane of SDN.
A
Data
B
None of them
C
Management
D
Forwarding
E
Control
Question 10
Which ones are two of the REST API information parameters?
A
End
B
Tag
C
Body
D
Option
E
Path
Question 11
UDP is a protocol that is ... and ...
A
Fast
B
Slow
C
Reliable
D
Unreliable
Question 12
In .... Mode, both transmitting and receiving device can communicate at the same time.
A
Half Duplex
B
Full Duplex
Question 13
What is the name of the connector used with Copper Ethernet Cable?
A
RJ 50
B
None of them
C
RJ 45
D
DCE
E
RS-232
Question 14
How to create ip nat pool IPCISCO for ip address range 10.10.10.1-10.10.10.10
A
ip nat pool 10.10.10.1 10.10.10.10
B
ip nat pool 10.10.10.1 10.10.10.10 netmask
C
ip nat pool IPCISCO 10.10.10.1 10.10.10.10 netmask
D
ip pool IPCISCO 10.10.10.1 10.10.10.10 netmask
E
ip pool IPCISCO 10.10.10.1 10.10.10.10
Question 15
Which ones are some of the constraints of REST APIs?
A
Layered System
B
Client/Server
C
Uniform Interface
D
All of them
E
Code on Demand
Question 16
Which ones are some of the the Man-in-the-Middle Attacks? (Select three)
A
Teardrop Attack
B
Replay Attacks
C
Session Hijacking
D
DNS Spoofing
E
Ping of Death
Question 17
Which ones are related to TACACS+(Select three)
A
Supports 15 Priviledge modes
B
Only password encryption
C
Uses TCP
D
Uses UDP
E
Full packet encryption
Question 18
Which one translate host names to IP addresses?
A
ICMP
B
ARP
C
DNS
D
BGP
E
DHCP
Question 19
DR and BDR are used with which Routing Protocol?
A
RIP
B
EIGRP
C
OSPF
D
BGP
E
IS-IS
Question 20
Which one use Three-Way Handshake for session establishment?
A
RSTP
B
UDP
C
OSPF
D
TCP
E
RIP
Question 21
Which ones are the properties of Link State Routing Protocols?
A
Knows entire topolgy
B
Slow Convergence
C
sends only link state info
D
Susceptible to routing loops
E
Fast Convergence
Question 22
How to limit MAC address number for a an interface as maximum 5 MAC?
A
switchport port-security 5
B
port-security maximum 5
C
switchport port-security maximum 5
D
switchport maximum 5
E
port-security 5
Question 23
Maksimum Packet Size that can be sent without Fragmentation is ....
A
LSA
B
BPDU
C
Packet Length
D
Packet Size
E
MTU
Question 24
How to check syslog information?
A
show all logs
B
show log table
C
shoe log details
D
show logs
E
show logging
Question 25
.... stores configuration of a router.
A
RAM
B
Flash
C
ROM
D
TFTP Server
E
NVRAM
Question 26
Which ones are the port roles used in DHCP Snooping?
A
Passive Ports
B
Untrusted Ports
C
Trusted Ports
D
Standard Ports
E
Active Ports
Question 27
Which ones are the correct order of RPVST+ States?
A
Blocking, Learning, Forwarding, Disabled
B
Learning, Disabled, Blocking, Forwarding
C
Learning, Forwarding, Disabled, Blocking,
D
Forwarding, Disabled, Blocking, Learning
E
Learning, Blocking,, Forwarding, Disabled
Question 28
Whic AP Mode is used to detect malicious AP?
A
Monitor Mode
B
Bridge Mode
C
Rogue Detector Mode
D
REAP/H-REAP Mode
E
Client Mode
Question 29
BE, AF, EF codes are deterimned by .... in DSCP bits.
A
Drop Probability
B
None of them
C
Traffic Policing
D
Traffic Classification
E
Class Selector Codepoint
Question 30
.... is the attack type that is sued by the attackers to check a backdoor in the victim’s system.
A
Smurfing
B
ARP Spoofing
C
Port Scanning
D
Session Hijacking
E
DNS Spoofing
Question 31
The protocols used between WLC and LWAP are LWAPP and CAPWAP. This protocols work with ...
A
TCP
B
UDP
C
SCTP
Question 32
Which one is the simplest QoS Service Model?
A
Best Effort
B
AF1
C
AF2
D
EF
E
AF3
Once you are finished, click the button below. Any items you have not completed will be marked incorrect. Get Results
There are 32 questions to complete.