Curriculum
Course:
CCNA Certification Training
time left:
:
:
Login
Curriculum
CCNA Certification Training
First week
0/4
20 questions part one
20 questions
34 Questions Part 2
34 questions
16 Questions Part 3
16 questions
10 Questions Part 4
10 questions
The second week
0/0
End
0/2
CCNA Part 1
53 questions
CCNA Part 2
30 questions
Quiz
20 questions part one
Submit quiz
Once you submit, you will no longer be able to change your answers. Are you sure you want to submit the quiz?
Cancel
Submit
Questions count:
20
Passing grade:
200%
Time limit:
20 minutes
Start Quiz
1. How is the native VLAN secured in a network?
separate from other VLANs within the administrative domain
give it a value in the private VLAN range
assign it as VLAN 1
configure it as a different VLAN ID on each end of the link
2. PC1 is trying to ping PC3 for the first time and sends out an ARP to S1 Which action is taken by S1?
It forwards it out G0/3 only
It is flooded out every port except G0/0.
It drops the frame.
It forwards it out interface G0/2 only.
3. Which spanning-tree enhancement avoids the learning and listening states and immediately places ports in the forwarding state?
BPDUfilter
PortFast
Backbonefast
BPDUguard
4. How do TCP and UDP differ in the way they guarantee packet delivery?
TCP uses checksum, acknowledgement, and retransmissions, and UDP uses checksums only.
TCP uses two-dimensional parity checks, checksums, and cyclic redundancy checks and UDP uses retransmissions only.
TCP uses checksum, parity checks, and retransmissions, and UDP uses acknowledgements only.
TCP uses retransmissions, acknowledgement and parity checks and UDP uses cyclic redundancy checks only.
5. What protocol allows an engineer to back up 20 network router configurations globally while using the copy function?
SMTP
SNMP
TCP
FTP
6. Which QoS Profile is selected in the GUI when configuring a voice over WLAN deployment?
Bronze
Platinum
Silver
Gold
7. What is the benefit of using FHRP?
reduced management overhead on network routers
balancing traffic across multiple gateways in proportion to their loads
higher degree of availability
reduced ARP traffic on the network
8. Which CRUD operation corresponds to the HTTP GET method?
read
update
create
delete
9. What is the purpose of using First Hop Redundancy Protocol in a specific subnet?
Filter traffic based on destination IP addressing
Sends the default route to the hosts on a network
ensures a loop-free physical topology
forwards multicast hello messages between routers
10. Which function is performed by the collapsed core layer in a two-tier architecture?
enforcing routing policies
marking interesting traffic for data polices
attaching users to the edge of the network
applying security policies
11. Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols.
dual algorithm
metric
administrative distance
hop count
12. An administrator must turn off the Cisco Discovery Protocol on the port configured with address last usable address in the 10.0.0.0/30 subnet. Which command set meets the requirement?
interface gi0/1 no cdp enable
interface gi0/1 clear cdp table
interface gi0/0 no cdp advertise-v2
interface gi0/0 no cdp run
13. On workstations running Microsoft Windows, which protocol provides the default gateway for the device?
DHCP
STP
SNMP
DNS
14. Which WAN topology provides a combination of simplicity quality, and availability?
partial mesh
full mesh
point-to-point
hub-and-spoke
15. Which two components are needed to create an Ansible script that configures a VLAN on a switch?
cookbook
task
playbook
model
recipe
16. Which command automatically generates an IPv6 address from a specified IPv6 prefix and MAC address of an interface?
ipv6 address dhcp
ipv6 address 2001:DB8:5:112::/64 eui-64
ipv6 address autoconfig
ipv6 address 2001:DB8:5:112::2/64 link-local
17. What is a function of Wireless LAN Controller?
register with a single access point that controls traffic between wired and wireless endpoints.
use SSIDs to distinguish between wireless clients.
send LWAPP packets to access points.
monitor activity on wireless and wired LANs
18. What is the function of a hub-and-spoke WAN topology?
allows access restrictions to be implemented between subscriber sites.
provides direct connections between subscribers
supports Layer 2 VPNs
supports application optimization
19. Which two protocols are supported on service-port interfaces? (Choose two.)
RADIUS
TACACS+
SCP
Telnet
SSH
20. Which network action occurs within the data plane?
compare the destination IP address to the IP routing table.
run routing protocols (OSPF, EIGRP, RIP, BGP)
make a configuration change from an incoming NETCONF RPC
reply to an incoming ICMP echo request
Next
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Sign In
The password must have a minimum of 8 characters of numbers and letters, contain at least 1 capital letter
Remember me
Sign In
Sign Up
Restore password
Send reset link
Password reset link sent
to your email
Close
Your application is sent
We'll send you an email as soon as your application is approved.
Go to Profile
No account?
Sign Up
Sign In
Lost Password?