C-develop CCNA Quiz

42 Questions | Attempts: 179
Share

SettingsSettingsSettings
CCNA Quizzes & Trivia

C-Develop CCNA Quiz


Questions and Answers
  • 1. 

    Which of the following are connection oriented protocols? Choose Two

    • A.

      TCP

    • B.

      IP

    • C.

      FTP

    • D.

      ICMP

    • E.

      SNA

    Correct Answer(s)
    A. TCP
    C. FTP
  • 2. 

    Which of the following services is used to translate the web address into IP address?

    • A.

      DNS

    • B.

      WINS

    • C.

      DHCP

    • D.

      Telnet

    • E.

      ARP

    Correct Answer
    A. DNS
  • 3. 

    What is important to remember about the data link layer of the OSI model when considering Peer to Peer communication? (Choose three.)

    • A.

      It links data to the transport layer

    • B.

      It encapsulates frames into packets.

    • C.

      It provides a service to the network layer.

    • D.

      It encapsulates the network layer information into a frame.

    • E.

      Its header contains a physical address which is required to complete the data link functions.

    Correct Answer(s)
    C. It provides a service to the network layer.
    D. It encapsulates the network layer information into a frame.
    E. Its header contains a physical address which is required to complete the data link functions.
  • 4. 

    Using the data transfer calculation T=S/BW, how long would it take a 4MB file to be sent over a 1.5Mbps connection?

    • A.

      52.2 seconds

    • B.

      21.3 seconds

    • C.

      6.4 seconds

    • D.

      2 seconds

    • E.

      0.075 seconds

    Correct Answer
    B. 21.3 seconds
  • 5. 

    Which of the following are features of the Internet Protocol (IP)? (Choose two.)

    • A.

      It is the most widely implemented global addressing scheme.

    • B.

      It allows two hosts to share a single address on a local area network

    • C.

      It is a hierarchical addressing scheme allowing addresses to be grouped.

    • D.

      It is only locally significant, used primarily on local area networks.

    • E.

      None of the above

    Correct Answer(s)
    A. It is the most widely implemented global addressing scheme.
    C. It is a hierarchical addressing scheme allowing addresses to be grouped.
  • 6. 

    What are features of the Transport layer? (Choose two.)

    • A.

      Path determination

    • B.

      Handles representation, encoding and dialog control

    • C.

      Uses TCP and UDP protocols

    • D.

      Packet switching

    • E.

      Reliability, flow control and error correction

    Correct Answer(s)
    C. Uses TCP and UDP protocols
    E. Reliability, flow control and error correction
  • 7. 

    What is the Cisco name for the encapsulation type used on a serial interface?

    • A.

      HDLC

    • B.

      SDLC

    • C.

      SNAP

    • D.

      SAP

    • E.

      None of the above

    Correct Answer
    A. HDLC
  • 8. 

    A default route is analogous to a _________.

    • A.

      Default gateway

    • B.

      Static Route

    • C.

      Dynamic Route

    • D.

      One-Way route

    • E.

      None of the above

    Correct Answer
    A. Default gateway
  • 9. 

    You are logged into a router, what command would show you the IP addresses of routers connected to you?

    • A.

      Show cdp neighbors detail

    • B.

      Show run

    • C.

      Show neighbors

    • D.

      Show cdp

    • E.

      None of the above

    Correct Answer
    A. Show cdp neighbors detail
  • 10. 

    As a system administrator, you perform an extended ping at the privileged EXEC prompt. As part of the display, you see "Set DF bit in IP header? [yes] :" What would happen if you answered no at the prompt ?

    • A.

      This lets the router fragment the packet.

    • B.

      It tells the router not to fragment the packet.

    • C.

      This lets the router direct the packet to the destination it finds in its routing table.

    • D.

      It tell the router to send the packet to the next hop router.

    • E.

      None of the above

    Correct Answer
    A. This lets the router fragment the packet.
  • 11. 

    You have typed "ping" 172.16.101.1 and get the following display: Type escape sequence to abort. Sending 5, 100-byte ICMP Echoes to 172.16.101.1, timeout is 2 seconds: .!!!! What does the "." signify?

    • A.

      That all messages were successful.

    • B.

      That one message timed out.

    • C.

      That one message was successful.

    • D.

      That one message completed in under the allotted timeframe.

    • E.

      None of the above

    Correct Answer
    B. That one message timed out.
  • 12. 

    Which command, that is used to test address configuration, uses Time-To-Live (TTL) values to generate messages from each router ?

    • A.

      Ping

    • B.

      Telnet

    • C.

      Trace

    • D.

      Bootp

    • E.

      None of the above

    Correct Answer
    C. Trace
  • 13. 

    As a system administrator, you need to provide your routers with a Domain Name System (DNS) server. How many DNSservers can you specify with one command?

    • A.

      2

    • B.

      4

    • C.

      3

    • D.

      6

    • E.

      1

    Correct Answer
    D. 6
  • 14. 

    Which layer is responsible for encryption ?

    • A.

      Application

    • B.

      Session

    • C.

      Transport

    • D.

      Physical

    • E.

      Presentation

    Correct Answer
    E. Presentation
  • 15. 

    Identify the 2 hardware components used to manage and/or configure a router?

    • A.

      ROM Port

    • B.

      Management Port

    • C.

      Console Port

    • D.

      Aux Port

    • E.

      None of the above

    Correct Answer(s)
    C. Console Port
    D. Aux Port
  • 16. 

    Identify the switching method that receives the entire frame then dispatches it?

    • A.

      Cut-Through

    • B.

      Fragment Free

    • C.

      Store and Forward

    • D.

      Fast Forward

    • E.

      None of the above

    Correct Answer
    C. Store and Forward
  • 17. 

    What is the default bandwidth of a serial connection?

    • A.

      1200 Baud

    • B.

      1.544 Mbps (T1)

    • C.

      10 Mbps

    • D.

      100 Mbps

    • E.

      64 Kbps

    Correct Answer
    B. 1.544 Mbps (T1)
  • 18. 

    If configuring a Cisco router to connect to a non-Cisco router across a Frame Relay network, which encapsulation type would you select?

    • A.

      Q933a

    • B.

      ISDN

    • C.

      IETF

    • D.

      CISCO

    • E.

      ANSI

    Correct Answer
    C. IETF
  • 19. 

    A traffic light is an example of what type of mechanism?

    • A.

      Collision detection

    • B.

      Flow Control

    • C.

      Sequence Numbering

    • D.

      Network Management

    • E.

      None

    Correct Answer
    B. Flow Control
  • 20. 

    Identify the hardware component used to store buffers, tables, runningconfiguration etc?

    • A.

      NVRAM

    • B.

      ROM

    • C.

      DRAM

    • D.

      Flash

    • E.

      None

    Correct Answer
    C. DRAM
  • 21. 

    Identify the 3 pieces of hardware you would not install to prevent broadcasts?

    • A.

      Switch

    • B.

      Repeater

    • C.

      Bridge

    • D.

      Router

    • E.

      None

    Correct Answer(s)
    A. Switch
    B. Repeater
    C. Bridge
  • 22. 

    Identify the protocol to test connectivity without configuring any layer 3 protocols?

    • A.

      Telnet

    • B.

      Ping

    • C.

      Trace

    • D.

      TCP

    • E.

      CDP

    Correct Answer
    E. CDP
  • 23. 

    What is the purpose of the DLCI?

    • A.

      Identifies the remote routers

    • B.

      Contained with a 802.2 frame for routing purposes

    • C.

      Used with PPP during authentication

    • D.

      Identifies the PVC in a Frame Relay network

    • E.

      None

    Correct Answer
    D. Identifies the PVC in a Frame Relay network
  • 24. 

    Which of the following are distance vector protocols? (Choose Two)

    • A.

      OSPF

    • B.

      IS-IS

    • C.

      BGP

    • D.

      RIP

    • E.

      IGRP

    Correct Answer(s)
    D. RIP
    E. IGRP
  • 25. 

    Which of the following is Link State Protocol ?

    • A.

      EIGRP

    • B.

      OSPF

    • C.

      RIP v2

    • D.

      VTP v2

    • E.

      IGRP

    Correct Answer
    B. OSPF
  • 26. 

    Which of the following prevents routing loops ? ( Choose two)

    • A.

      Split Horizon

    • B.

      Poison reverse

    • C.

      STP

    • D.

      RSTP

    • E.

      MSTP

    Correct Answer(s)
    A. Split Horizon
    B. Poison reverse
  • 27. 

    What is the difference between Switches and Hubs ?

    • A.

      In Switches each port is in a individual collision domain, but in hubs all the ports are in same collision domain and broadcast domain

    • B.

      Switches uses MAC address table , but Hub doesn't

    • C.

      High speed data transfer is possible in Hubs

    • D.

      Hub works in Data link layer whereas Switch works in Physical layer

    • E.

      None of the above

    Correct Answer(s)
    A. In Switches each port is in a individual collision domain, but in hubs all the ports are in same collision domain and broadcast domain
    B. Switches uses MAC address table , but Hub doesn't
  • 28. 

    Which statement is true regarding Administrative distance? (Choose two)

    • A.

      It is a metric

    • B.

      Number of hops between two routers

    • C.

      Trustworthiness of the routing information

    • D.

      RIP Administrative distance is 120

    • E.

      None

    Correct Answer(s)
    C. Trustworthiness of the routing information
    D. RIP Administrative distance is 120
  • 29. 

    Identify the order of the 5 step encapsulation? 1. Create the segment 2. Convert the frame to bits 3. Create the packet 4. Create the frame 5. User creates the data

    • A.

      1,2,4,2,5

    • B.

      2,1,3,4,5

    • C.

      5,1,3,4,2

    • D.

      5,3,4,1,2

    • E.

      None

    Correct Answer
    C. 5,1,3,4,2
  • 30. 

    Identify the 3 major functions at layer 3 of the OSI model?

    • A.

      Forwarding process

    • B.

      Logical addressing

    • C.

      End-to-end connections

    • D.

      Path selection

    • E.

      MAC address examination

    Correct Answer(s)
    A. Forwarding process
    B. Logical addressing
    D. Path selection
  • 31. 

    Identify the true statement regarding subnetting?

    • A.

      Allows for more host address

    • B.

      Borrow bits from the network portion of the address

    • C.

      Allows for unlimited number of networks

    • D.

      Borrow bits from the host portion of the address

    • E.

      None of the above

    Correct Answer
    D. Borrow bits from the host portion of the address
  • 32. 

    You need to come up with a TCP/IP addressing scheme for your company. Which two factors must you consider when you define the subnet mask for the network?

    • A.

      The location of DHCP servers

    • B.

      The volume of traffic on each subnet

    • C.

      The number of subnets on the network

    • D.

      The location of the default gateway

    • E.

      The number of host IDs on each subnet

    Correct Answer(s)
    C. The number of subnets on the network
    E. The number of host IDs on each subnet
  • 33. 

    What does the 'S' mean when looking at the routing table?

    • A.

      Statically connected

    • B.

      Directly connected

    • C.

      Dynamically attached

    • D.

      Shutdown route

    • E.

      None

    Correct Answer
    A. Statically connected
  • 34. 

    Why would you use static routing instead of dynamic routing?

    • A.

      When you want automatic updates of the routing tables

    • B.

      All the time

    • C.

      When you have very few routes and want to conserve bandwidth

    • D.

      When you have a gateway of last resort

    • E.

      None

    Correct Answer
    C. When you have very few routes and want to conserve bandwidth
  • 35. 

    Which statement is true regarding full duplex?

    • A.

      Only works in a multipoint configuration

    • B.

      Does not affect the bandwidth

    • C.

      Allows for transmission and receiving of data simultaneously

    • D.

      Allows for transmission and receiving of data but not a the same time

    • E.

      None of the above

    Correct Answer
    C. Allows for transmission and receiving of data simultaneously
  • 36. 

    When the router runs out of buffer space, this is called ________.

    • A.

      Redirect

    • B.

      Source Quench

    • C.

      Low memory

    • D.

      Information request

    • E.

      None

    Correct Answer
    B. Source Quench
  • 37. 

    Which processes does TCP, but not UDP, use? (Choose Two)

    • A.

      Windowing

    • B.

      Acknowledgements

    • C.

      Source Port

    • D.

      Destination Port

    • E.

      None

    Correct Answer(s)
    A. Windowing
    B. Acknowledgements
  • 38. 

    A MAC address is made up of what two entities ?

    • A.

      Ip Address

    • B.

      Vendor Code

    • C.

      Serial Number

    • D.

      Sales Code

    • E.

      Nothing

    Correct Answer(s)
    B. Vendor Code
    C. Serial Number
  • 39. 

    What are the three benefits of LAN segmentation ?

    • A.

      Users Authority

    • B.

      Security

    • C.

      Management control

    • D.

      Broadcast control

    • E.

      Effective utilization of bandwidth

    Correct Answer(s)
    B. Security
    C. Management control
    D. Broadcast control
  • 40. 

    What kind of services provided by the presentation layer of OSI model? (Choose Three)

    • A.

      JPEG

    • B.

      DOC

    • C.

      XLS

    • D.

      TIFF

    • E.

      MPEG

    Correct Answer(s)
    A. JPEG
    D. TIFF
    E. MPEG
  • 41. 

    Which of the following is not a WAN protocol ?

    • A.

      V.35

    • B.

      IEE 802.3

    • C.

      ATM

    • D.

      SDLC

    • E.

      HDLC

    Correct Answer
    B. IEE 802.3
  • 42. 

    How do you backup a copy of IOS from a router to TFTP server ?

    • A.

      Copy the flash to ROM

    • B.

      Copy the flash to NVRAM

    • C.

      Issue the command Copy flash TFTP

    • D.

      Issue the command copy tftp flash

    • E.

      This feature is not yet released in cisco

    Correct Answer
    C. Issue the command Copy flash TFTP

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Dec 13, 2012
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 21, 2008
    Quiz Created by
    Bskumar
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.