CCNA Quiz 7

CCNA QUIZ 7

CONGRATULATIONS!

YOU HAVE COMPLETED CCNA QUIZ 7.

YOU HAVE %%SCORE%% TRUE ANSWERS OUT OF %%TOTAL%% QUESTIONS.

YOUR SCORE IS %%PERCENTAGE%%.

%%RATING%%

Your answers are highlighted below.
Question 1
Which protocols can be used to transfer files between systems? (Choose two)
A
SNMP
B
DNS
C
DHCP
D
TFTP
E
FTP
Question 2
What is the Extended ACL Number Range?
A
100-199
B
1-199
C
0-99
D
1-100
E
99-199
Question 3
Which of the following are broadcasts sent by a client to a DHCP server? (Choose two.)
A
DHCPOFFER
B
DHCPACK
C
DHCPDISCOVER
D
DHCPREQUEST
E
DHCPRELEASE
Question 4
What are the new mechanisms used developed with WPA2?
A
AES
B
IPSEC
C
CCMP
D
All of them
E
CGMP
Question 5
What is the Class of IP address 147.101.61.5?
A
Class A
B
Class C
C
Class D
D
Class B
E
Class E
Question 6
In port security ...., there is no logging.
A
protect mode
B
restrict mode
C
prohibited mode
D
all of them
E
shutdown mode
Question 7
In AAA, .... means that “Who are you? And What is your key?”.
A
Administration
B
Authorization
C
Accounting
D
Advanced
E
Authenticaion
Question 8
Multiple Private IP Addresses are mapped to a Pool of Public IP Addresses in ....
A
Dynamic NAT
B
Classic NAT
C
PAT
D
All of them
E
Static NAT
Question 9
We have a network address 192.168.1.0 and we would like to divide this network into 6 subnets and there must be at least 23 host addresses in each subnet. Which subnet mush should we use?
A
255.255.255.240 (/28)
B
255.255.255.224 (/27)
C
255.255.255.192 (/26)
D
255.255.255.128 (/25)
E
255.255.255.0 (/24)
Question 10
If Access Points are used to connect two networks, this mode is called ....
A
Client Mode
B
Flexconnect Mode
C
Bridge Mode
D
Monitor Mode
E
Sniffer Mode
Question 11
Which ones are some of the characteristics of UDP? (Choose Two)
A
Slow
B
Fast
C
Network Layer Protocol
D
Connection Oriented
E
Connectionless
Question 12
What is the value called between PIR amd CIR?
A
CIR
B
PER
C
PIR
D
CER
E
EIR
Question 13
Which one is a valid IPv6 address?
A
FEC0:8500:::8:9
B
FEC0:0:0:0:4:175:90:0:10
C
FEC0:AA00::5:1:5
D
FEC0::BB00::4:1:2
E
FEC0:0:0:0:40:0:7:0:1
Question 14
How can we reset OSPF databases, neighbourships on a Cisco router?
A
clear ip ospf process
B
reset ospf
C
reset ip ospf process
D
reset ip ospf
E
reset ospf process
Question 15
How can we set Telnet sessions from 0 to 4 with password Cisco?  
A
Router(config)# line vty 0 4 Router(config-line)# enable secret cisco Router(config-line)# login
B
Router(config)# line console 0 4 Router(config-line)# password cisco Router(config-line)# login
C
Router(config)# line 0 4 Router(config-line)# password cisco Router(config-line)# login
D
Router(config)# line console 0 4 Router(config-line)# enable secret cisco Router(config-line)# login
E
Router(config)# line vty 0 4 Router(config-line)# password cisco Router(config-line)# login
Question 16
Which ones are the trunking protocols?
A
ARP
B
802.1Q
C
MD5
D
ISL
E
STP
Question 17
What is the network number of a host with an IP address of 105.107.4.3/27?
A
105.107.0.1/27
B
105.107.4.0/27
C
105.107.4.31/27
D
105.107.4.1/27
E
105.107.0.0/27
Question 18
.... is the directly attached source level for NTP.
A
Stratum-0
B
Stratum-3
C
Stratum-4
D
Stratum-2
E
Stratum-1
Question 19
In CST (Common Spanning Tree), only one instance can be used for the whole network.There is no specific instances per VLAN.
A
False
B
True
Question 20
Which ones are Cisco Wireless Network Design Models?
A
Normal Network Design
B
SD-Access Network Design
C
Centralized Network Design
D
All of them
E
FlexConnect Network Design
Question 21
.... is the attacks type that is done via too much ICMP Echo (Ping) and aims to exhaust system resources by trusted IP address.
A
HTTPS Spoofing
B
Port Scanning
C
Smurfing
D
Phishing
E
Social Engineering
Question 22
How to set logging level as critical?
A
logging critical
B
logging level 5
C
logs trap critical
D
logging trap critical
E
log-level 5
Question 23
Which of the following is included in the frame address field? (Choose two.)
A
destination subnet mask
B
source MAC address
C
destination IP address
D
destination MAC address
E
source IP address
Question 24
Which one is a Standard Neighbour Discovery Protocol?
A
LLDP
B
CGMP
C
ARP
D
ICMP
E
CDP
Question 25
Each NIC has a unique address. What is the name and the lenght of this address?
A
IP / 24 Bits
B
MAC / 32 Bits
C
MAC / 48 Bits
D
IP / 48 Bits
E
IP / 32 Bits
Question 26
Which ones are true for OSPF?
A
Path Vector Protocol
B
Uses cost as Metric
C
Classless Protocol
D
Uses Hierarchical Areas
E
Adninistrative Distance is 100
Question 27
Which ones are QoS Identification mechanisms?
A
Classification
B
Policing
C
All of them
D
Shaping
E
Marking
Question 28
.... is an additional security mechanism over DHCP Snooping which is also known as ”DHCP Relay Agent Information”.
A
DHCP Option 80
B
DHCP Option 85
C
DHCP Option 82
D
DHCP Option 30
E
DHCP Option 32
Question 29
APIPA Address block is ....
A
169.254.x.x/25
B
172.16.0.0/16
C
224.0.0.0/8
D
10.0.0.0./8
E
192.168.0.0/24
Question 30
In traditional networks control plane and data plane are together. SDN divides this into two separate planes.
A
False
B
True
Question 31
HTTP Verb .... writes new data to the destination defined with URL.
A
DELETE
B
GET
C
HEAD
D
OPTIONS
E
POST
Question 32
VLAN Memberships can be done only statically.
A
False
B
True
Question 32 Explanation: 
VLAN Memberships can be done statically and dynamically.
Question 33
.....  provide redistribution of other routing protocols into OSPF.
A
BDR
B
Backbone Routers
C
DR
D
ASBR
E
ABR
Once you are finished, click the button below. Any items you have not completed will be marked incorrect. Get Results
There are 33 questions to complete.