CCNA Quiz 7

CCNA QUIZ 7

CONGRATULATIONS!

YOU HAVE COMPLETED CCNA QUIZ 7.

YOU HAVE %%SCORE%% TRUE ANSWERS OUT OF %%TOTAL%% QUESTIONS.

YOUR SCORE IS %%PERCENTAGE%%.

%%RATING%%

Your answers are highlighted below.
Question 1
How to set logging level as critical?
A
logging level 5
B
logs trap critical
C
log-level 5
D
logging critical
E
logging trap critical
Question 2
.... is the attacks type that is done via too much ICMP Echo (Ping) and aims to exhaust system resources by trusted IP address.
A
Smurfing
B
Social Engineering
C
HTTPS Spoofing
D
Phishing
E
Port Scanning
Question 3
Which ones are true for OSPF?
A
Uses cost as Metric
B
Uses Hierarchical Areas
C
Classless Protocol
D
Path Vector Protocol
E
Adninistrative Distance is 100
Question 4
Which ones are QoS Identification mechanisms?
A
All of them
B
Marking
C
Shaping
D
Policing
E
Classification
Question 5
We have a network address 192.168.1.0 and we would like to divide this network into 6 subnets and there must be at least 23 host addresses in each subnet. Which subnet mush should we use?
A
255.255.255.224 (/27)
B
255.255.255.128 (/25)
C
255.255.255.240 (/28)
D
255.255.255.192 (/26)
E
255.255.255.0 (/24)
Question 6
In port security ...., there is no logging.
A
protect mode
B
restrict mode
C
shutdown mode
D
prohibited mode
E
all of them
Question 7
.....  provide redistribution of other routing protocols into OSPF.
A
ABR
B
DR
C
BDR
D
Backbone Routers
E
ASBR
Question 8
Which ones are some of the characteristics of UDP? (Choose Two)
A
Connection Oriented
B
Connectionless
C
Slow
D
Fast
E
Network Layer Protocol
Question 9
In CST (Common Spanning Tree), only one instance can be used for the whole network.There is no specific instances per VLAN.
A
False
B
True
Question 10
Which ones are Cisco Wireless Network Design Models?
A
FlexConnect Network Design
B
Normal Network Design
C
Centralized Network Design
D
SD-Access Network Design
E
All of them
Question 11
HTTP Verb .... writes new data to the destination defined with URL.
A
OPTIONS
B
HEAD
C
GET
D
DELETE
E
POST
Question 12
What is the value called between PIR amd CIR?
A
CER
B
PIR
C
EIR
D
PER
E
CIR
Question 13
Which protocols can be used to transfer files between systems? (Choose two)
A
FTP
B
DNS
C
DHCP
D
SNMP
E
TFTP
Question 14
What are the new mechanisms used developed with WPA2?
A
AES
B
All of them
C
CGMP
D
IPSEC
E
CCMP
Question 15
Which one is a valid IPv6 address?
A
FEC0:0:0:0:4:175:90:0:10
B
FEC0:0:0:0:40:0:7:0:1
C
FEC0:AA00::5:1:5
D
FEC0:8500:::8:9
E
FEC0::BB00::4:1:2
Question 16
Which one is a Standard Neighbour Discovery Protocol?
A
CGMP
B
ICMP
C
LLDP
D
ARP
E
CDP
Question 17
In AAA, .... means that “Who are you? And What is your key?”.
A
Authorization
B
Administration
C
Accounting
D
Advanced
E
Authenticaion
Question 18
APIPA Address block is ....
A
169.254.x.x/25
B
224.0.0.0/8
C
172.16.0.0/16
D
10.0.0.0./8
E
192.168.0.0/24
Question 19
What is the Class of IP address 147.101.61.5?
A
Class C
B
Class B
C
Class E
D
Class D
E
Class A
Question 20
Which of the following is included in the frame address field? (Choose two.)
A
source IP address
B
destination IP address
C
source MAC address
D
destination MAC address
E
destination subnet mask
Question 21
How can we reset OSPF databases, neighbourships on a Cisco router?
A
reset ospf
B
reset ospf process
C
reset ip ospf
D
clear ip ospf process
E
reset ip ospf process
Question 22
What is the Extended ACL Number Range?
A
1-199
B
100-199
C
1-100
D
0-99
E
99-199
Question 23
.... is the directly attached source level for NTP.
A
Stratum-0
B
Stratum-4
C
Stratum-1
D
Stratum-3
E
Stratum-2
Question 24
VLAN Memberships can be done only statically.
A
True
B
False
Question 24 Explanation: 
VLAN Memberships can be done statically and dynamically.
Question 25
If Access Points are used to connect two networks, this mode is called ....
A
Sniffer Mode
B
Bridge Mode
C
Monitor Mode
D
Flexconnect Mode
E
Client Mode
Question 26
In traditional networks control plane and data plane are together. SDN divides this into two separate planes.
A
True
B
False
Question 27
.... is an additional security mechanism over DHCP Snooping which is also known as ”DHCP Relay Agent Information”.
A
DHCP Option 32
B
DHCP Option 80
C
DHCP Option 85
D
DHCP Option 30
E
DHCP Option 82
Question 28
Which of the following are broadcasts sent by a client to a DHCP server? (Choose two.)
A
DHCPACK
B
DHCPOFFER
C
DHCPREQUEST
D
DHCPDISCOVER
E
DHCPRELEASE
Question 29
Which ones are the trunking protocols?
A
STP
B
ISL
C
ARP
D
MD5
E
802.1Q
Question 30
How can we set Telnet sessions from 0 to 4 with password Cisco?  
A
Router(config)# line vty 0 4 Router(config-line)# enable secret cisco Router(config-line)# login
B
Router(config)# line console 0 4 Router(config-line)# password cisco Router(config-line)# login
C
Router(config)# line vty 0 4 Router(config-line)# password cisco Router(config-line)# login
D
Router(config)# line 0 4 Router(config-line)# password cisco Router(config-line)# login
E
Router(config)# line console 0 4 Router(config-line)# enable secret cisco Router(config-line)# login
Question 31
Each NIC has a unique address. What is the name and the lenght of this address?
A
IP / 48 Bits
B
MAC / 48 Bits
C
IP / 24 Bits
D
MAC / 32 Bits
E
IP / 32 Bits
Question 32
What is the network number of a host with an IP address of 105.107.4.3/27?
A
105.107.4.0/27
B
105.107.4.1/27
C
105.107.0.1/27
D
105.107.0.0/27
E
105.107.4.31/27
Question 33
Multiple Private IP Addresses are mapped to a Pool of Public IP Addresses in ....
A
Static NAT
B
All of them
C
Dynamic NAT
D
Classic NAT
E
PAT
Once you are finished, click the button below. Any items you have not completed will be marked incorrect. Get Results
There are 33 questions to complete.