CCNA Quiz Exam: Hardest MCQ!

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Dlefinc
D
Dlefinc
Community Contributor
Quizzes Created: 3 | Total Attempts: 8,640
| Attempts: 8,422
SettingsSettings
Please wait...
  • 1/76 Questions

    Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?

    • Application
    • Presentation
    • Session
    • Transport
Please wait...
About This Quiz

This challenging CCNA Quiz Exam tests your knowledge of networking concepts including OSI model layers, IP addressing, and cable types. It is designed for those preparing for Cisco certifications, enhancing skills in data transmission, network configuration, and troubleshooting.

CCNA Quiz Exam: Hardest MCQ! - Quiz

Quiz Preview

  • 2. 

    Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?

    • Application

    • Presentation

    • Session

    • Transport

    Correct Answer
    A. Transport
    Explanation
    IP relies on the transport layer to determine whether packets have been lost and to request retransmission. The transport layer is responsible for end-to-end communication and provides reliable delivery of data through protocols like TCP. TCP uses sequence numbers and acknowledgments to keep track of packets and ensure they are delivered correctly. If a packet is lost, TCP will request retransmission of that packet to ensure all data is successfully delivered. Therefore, the correct answer is transport.

    Rate this question:

  • 3. 

    What is the effect of using the Router# copy running-config startup-config command on a router?

    • The contents of ROM will change.

    • The contents of RAM will change.

    • The contents of NVRAM will change

    • The contents of flash will change.

    Correct Answer
    A. The contents of NVRAM will change
    Explanation
    The command "copy running-config startup-config" is used to save the current configuration of the router in NVRAM (Non-Volatile Random Access Memory). NVRAM is a type of memory that retains its contents even when the router is powered off or restarted. By using this command, the current running configuration is copied and saved in NVRAM, ensuring that the router will load the same configuration when it is powered on again. Therefore, the correct answer is that the contents of NVRAM will change.

    Rate this question:

  • 4. 

    Which password is automatically encrypted when it is created? 

    • Vty

    • Aux

    • Console

    • Enable secret

    • Enable password

    Correct Answer
    A. Enable secret
    Explanation
    The "enable secret" password is automatically encrypted when it is created. This password is used to secure privileged access to a Cisco device. Unlike the "enable password" which is stored in plain text, the "enable secret" password is automatically encrypted using a strong encryption algorithm. This provides an additional layer of security as the encrypted password cannot be easily deciphered or hacked.

    Rate this question:

  • 5. 

    What is the consequence of issuing the erase startup-config command in privileged EXEC mode on a Cisco router?

    • Data stored in RAM will be removed.

    • Data stored in NVRAM will be erased.

    • Information in flash memory will be removed.

    • Flags in the configuration register will be set to 0.

    • Both the startup-config and the running-config will be erased.

    Correct Answer
    A. Data stored in NVRAM will be erased.
    Explanation
    Issuing the "erase startup-config" command in privileged EXEC mode on a Cisco router will result in the data stored in NVRAM being erased. NVRAM (Non-Volatile Random Access Memory) is a type of memory that retains its contents even when the device is powered off or restarted. The startup-config file is stored in NVRAM and contains the router's configuration settings. By erasing the startup-config, the router will lose its configuration and revert to the default settings. However, the running-config, which is stored in RAM (Random Access Memory), will not be affected by this command.

    Rate this question:

  • 6. 

    A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?

    • Console

    • Enable

    • Enable secret

    • VTY

    Correct Answer
    A. Enable secret
    Explanation
    The most secure type of password that can be used to secure the privileged EXEC mode of a switch is the "enable secret" password. This password is encrypted and stored in the switch's configuration file, providing an additional layer of security compared to other types of passwords. The "console" password is used to secure access to the console port, while the "enable" password is used to secure access to privileged mode. The "VTY" password is used to secure access to virtual terminal lines.

    Rate this question:

  • 7. 

    A routing issue has occurred in your internet work. Which of the following type of devices should be examined to   isolate this error? 

    • Access point

    • Host

    • Hub

    • Router

    • Switch

    Correct Answer
    A. Router
    Explanation
    If a routing issue has occurred in your internet work, the device that should be examined to isolate this error is the router. A router is responsible for directing network traffic between different networks. It determines the best path for data packets to reach their destination. If there is a problem with routing, such as incorrect routing tables or misconfigured routing protocols, it can cause connectivity issues. Therefore, examining the router would be the logical step to identify and resolve the routing issue.

    Rate this question:

  • 8. 

    Which service is used when the nslookup command is issued on a computer?

    • FTP

    • DNS

    • DHCP

    • Telnet

    Correct Answer
    A. DNS
    Explanation
    When the nslookup command is issued on a computer, it is used to query the DNS (Domain Name System) service. DNS is responsible for translating domain names into IP addresses, allowing computers to locate and connect to specific websites or servers on the internet. By using the nslookup command, users can retrieve information about a specific domain name, such as its IP address, hostname, or mail server. Therefore, the correct answer is DNS.

    Rate this question:

  • 9. 

    Which OSI layer addressing is required to route packets between two networks?

    • Layer 2

    • Layer 3

    • Layer 1

    • Layer 5

    Correct Answer
    A. Layer 3
    Explanation
    Layer 3 addressing is required to route packets between two networks. Layer 3, also known as the network layer, is responsible for logical addressing and routing. It adds a network address to the packet header, allowing routers to determine the best path for the packet to reach its destination network. Layer 2 addressing is used for local network communication, while layer 1 deals with physical connections. Layer 5, the session layer, is responsible for establishing, managing, and terminating sessions between applications.

    Rate this question:

  • 10. 

    Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts?

    • Use the ipconfig command at the host.

    • Use the ipconfig/all command at the destination.

    • Use the tracert command at the host.

    • Use the ping command at the destination.

    Correct Answer
    A. Use the tracert command at the host.
    Explanation
    Using the tracert command at the host will help identify the path between the hosts. Tracert is a command-line tool used to trace the route that packets take to reach a destination. It sends out packets with increasing TTL (Time to Live) values, and each router along the path will decrement the TTL value. This allows the host to receive ICMP Time Exceeded messages from each router, which helps to identify the path taken by the packets.

    Rate this question:

  • 11. 

    Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue?

    • Issue the clock rate command on interface Serial 0/0/0

    • Issue the description command on interface Serial 0/0/1

    • Issue the ip address command on interface FastEthernet 0/0

    • Issue the no shutdown command on interface FastEthernet 0/1

    Correct Answer
    A. Issue the no shutdown command on interface FastEthernet 0/1
    Explanation
    The correct action to correct the network issue is to issue the "no shutdown" command on interface FastEthernet 0/1. This command will bring up the interface and enable it to transmit and receive data. By performing this action, the network associate can resolve the problem with router B and restore network connectivity.

    Rate this question:

  • 12. 

    Which TCP/IP model layer creates additional overhead on network resources due to acknowledgments, tracking, and data retransmission?

    • Internet

    • Transport

    • Application

    • Network access

    Correct Answer
    A. Transport
    Explanation
    The transport layer in the TCP/IP model creates additional overhead on network resources due to acknowledgments, tracking, and data retransmission. This layer is responsible for ensuring reliable and error-free delivery of data between the source and destination hosts. It uses protocols like TCP (Transmission Control Protocol) to establish a connection, break data into smaller packets, and reassemble them at the destination. The overhead of acknowledgments, tracking, and retransmission is necessary to ensure that all data is successfully delivered and any lost or corrupted packets are retransmitted.

    Rate this question:

  • 13. 

    Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are   unable to communicate outside the local network?

    • Host A was assigned a network address.

    • Host B was assigned a multicast address.

    • Host A and Host B belong to different networks.

    • The gateway address was assigned a broadcast address.

    Correct Answer
    A. The gateway address was assigned a broadcast address.
    Explanation
    The reason that Host A and Host B are unable to communicate outside the local network is because the gateway address was assigned a broadcast address. A broadcast address is used to send a message to all devices on a network, so assigning it as the gateway address means that the gateway is not able to properly route traffic between networks.

    Rate this question:

  • 14. 

    In a Cisco IOS device, where is the startup-configuration file stored?

    • Flash

    • NVRAM

    • RAM

    • ROM

    Correct Answer
    A. NVRAM
    Explanation
    The startup-configuration file is stored in NVRAM (Non-Volatile Random Access Memory) in a Cisco IOS device. NVRAM is a type of memory that retains its data even when the device is powered off or restarted. This allows the device to retain its configuration settings and load them during the startup process. Flash memory is used to store the operating system image, while RAM is used for temporary storage during device operation. ROM (Read-Only Memory) contains the firmware and bootstrap code for the device.

    Rate this question:

  • 15. 

    Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last been saved. The modified configuration did not produce the desired changes. The technician wants to store a backup copy of the saved configuration on a TFTP server before reloading. Which action will cause the unmodified data to be saved on the TFTP server?  

    • The answer is selected in the picture

    • This test is crazy

    Correct Answer
    A. The answer is selected in the picture
  • 16. 

    Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to the web server?

    • 00-08-a3-b6-ce-46

    • 198.133.219.25:80

    • Http://cisco.com

    • C 198.133.219.0/24 is directly connected, FastEthernet0/0

    Correct Answer
    A. 198.133.219.25:80
    Explanation
    The correct destination socket number for a web page request from Host A to the web server is 198.133.219.25:80. This is indicated by the IP address 198.133.219.25 and the port number 80, which is the default port for HTTP communication.

    Rate this question:

  • 17. 

    Examine the graphic with current configurations. Host A in the Clerical offices failed and was replaced. Although a ping  to 127.0.0.1 was successful, the replacement computer can not access the company network. What is the likely cause   of the problem? 

    • IP address incorrectly entered

    • Network cables unplugged

    • Subnet mask incorrectly entered

    • Network card failure

    Correct Answer
    A. Subnet mask incorrectly entered
    Explanation
    The likely cause of the problem is that the subnet mask was incorrectly entered. The subnet mask is used to determine which portion of an IP address is the network address and which portion is the host address. If the subnet mask is incorrect, the replacement computer may not be able to properly communicate with the company network.

    Rate this question:

  • 18. 

    Refer to the exhibit. Which set of devices contains only intermediary devices?

    • A, B, D, G

    • A, B, E, F

    • C, D, G, I

    • G, H, I, J

    Correct Answer
    A. A, B, D, G
    Explanation
    The set of devices A, B, D, and G contains only intermediary devices. Intermediary devices are network devices that facilitate communication between other devices. In the exhibit, devices A, B, D, and G are all switches, which are examples of intermediary devices. Device A is a distribution switch, device B is an access switch, device D is a core switch, and device G is an aggregation switch. These devices are responsible for forwarding data packets between different networks and ensuring efficient communication between devices.

    Rate this question:

  • 19. 

    Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was   captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The   packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is   192.168.219.24. At which point in the network was this packet captured? 

    • Leaving host A

    • Leaving ATL

    • Leaving Dallas

    • Leaving NYC

    Correct Answer
    A. Leaving Dallas
    Explanation
    The packet was captured while leaving Dallas because the source MAC address indicates that it originated from host A, and the destination MAC address indicates that it was heading towards host C. Since the packet was captured with these MAC addresses in Dallas, it suggests that it was intercepted at a point in the network while it was leaving Dallas.

    Rate this question:

  • 20. 

    Which of the following are the address ranges of the private IP addresses?

    • 10.0.0.0 to 10.255.255.255

    • 200.100.50.0 to 200.100.25.255

    • 150.150.0.0 to 150.150.255.255

    • 172.16.0.0 to 172.31.255.255

    • 192.168.0.0 to 192.168.255.255

    • 127.16.0.0 to 127.31.255.255

    Correct Answer(s)
    A. 10.0.0.0 to 10.255.255.255
    A. 172.16.0.0 to 172.31.255.255
    A. 192.168.0.0 to 192.168.255.255
    Explanation
    The private IP address ranges are used for internal networks and are not routable on the internet. The address ranges 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255 are reserved for private use. These ranges are commonly used in home and small office networks. The other address ranges mentioned in the question are not private IP address ranges.

    Rate this question:

  • 21. 

    Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a response to the initial tracert packet from PC1?

    • Athens

    • Ankara

    • London

    • Paris

    • PC4

    Correct Answer
    A. London
    Explanation
    The tracert command is used to trace the route that packets take from the source to the destination. In this scenario, PC1 is the source and PC4 is the destination. The question asks which device will send a response to the initial tracert packet from PC1. Since the tracert command works by sending packets with increasing TTL (Time to Live) values, each device along the route will decrement the TTL and send back an ICMP Time Exceeded message to the source. Therefore, London, being a device along the route between PC1 and PC4, will send a response to the initial tracert packet from PC1.

    Rate this question:

  • 22. 

    What type of network is maintained if a server takes no dedicated role in the network?

    • Mainframe

    • Client/server

    • Peer-to-peer

    • Centralized

    Correct Answer
    A. Peer-to-peer
    Explanation
    A peer-to-peer network is maintained if a server takes no dedicated role in the network. In a peer-to-peer network, all devices in the network are considered equal and can act as both clients and servers. This means that each device can share its resources and communicate directly with other devices without relying on a centralized server. Therefore, in this scenario, where the server does not have a dedicated role, a peer-to-peer network is maintained.

    Rate this question:

  • 23. 

    Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?

    • 127.0.0.1

    • 192.168.64.196

    • 192.168.254.1

    • 192.168.254.9

    • 192.168.254.254

    Correct Answer
    A. 192.168.254.1
    Explanation
    The correct answer is 192.168.254.1. This address should be pinged from the host to confirm that the router interface is operational.

    Rate this question:

  • 24. 

    When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data? 

    • IP

    • UDP

    • Ethernet

    • A connectionless acknowledgement

    • An upper-layer, connection-oriented protocol or service

    Correct Answer
    A. An upper-layer, connection-oriented protocol or service
    Explanation
    When connectionless protocols are implemented at the lower layers of the OSI model, an upper-layer, connection-oriented protocol or service is usually used to acknowledge that the data was received and to request the retransmission of missing data. This is because connectionless protocols, such as IP and UDP, do not provide built-in mechanisms for acknowledging the receipt of data or requesting retransmission. Instead, they rely on higher-layer protocols or services to handle these functions. These upper-layer protocols or services establish a connection between the sender and receiver, ensuring reliable delivery of data.

    Rate this question:

  • 25. 

    Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection? 

    • The data is automatically encrypted.

    • A Telnet server process is running on PC1.

    • The connection is made through a VTY session on the router.

    • A GET request was sent to RouterB to retrieve data during this session.

    Correct Answer
    A. The connection is made through a VTY session on the router.
    Explanation
    The correct answer is "The connection is made through a VTY session on the router." This means that the network administrator is accessing the CLI of RouterB using Telnet, which establishes a virtual terminal session on the router. This allows the administrator to remotely manage and configure the router. The other statements are not true because Telnet does not automatically encrypt data, a Telnet server process is not running on PC1, and a GET request is not sent to RouterB during a Telnet session.

    Rate this question:

  • 26. 

    Which prompt represents the appropriate mode used for the copy running-config startup-config command?

    • Switch-6J>

    • Switch-6J#

    • Switch-6J(config)#

    • Switch-6J(config-if)#

    • Switch-6J(config-line)#

    Correct Answer
    A. Switch-6J#
    Explanation
    The prompt "Switch-6J#" represents the appropriate mode used for the "copy running-config startup-config" command. This prompt indicates that the user is in privileged EXEC mode, which allows them to execute privileged commands such as copying the running configuration to the startup configuration.

    Rate this question:

  • 27. 

    Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?

    • Only computer D

    • Only computer A and computer D

    • Only computer B, computer C, and computer D

    • All computers

    Correct Answer
    A. Only computer D
    Explanation
    When computer A sends a frame to computer D, only computer D receives the frame. This is because the frame is specifically addressed to computer D, so only computer D will process and receive the frame. The other computers (A, B, and C) will not receive the frame as it is not intended for them.

    Rate this question:

  • 28. 

    C:\>nslookup Default Server: center.tampabay.cisco.com Address: 10.32.5.74   The nslookup command that is shown was issued on a Windows PC host. What does the 10.32.5.74 address represent?

    • The IP address of the host

    • The default gateway for the host

    • The primary DNS server for the host

    • The home page address for the host

    Correct Answer
    A. The primary DNS server for the host
    Explanation
    The 10.32.5.74 address represents the primary DNS server for the host.

    Rate this question:

  • 29. 

    The serial interface 0/0/0 of the router was configured without the use of the <ip address> command . The router cannot ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this problem?

    • Configure the description at interface serial 0/0/0.

    • Configure an IP address on interface serial 0/0/0.

    • Remove the no shutdown command at interface serial 0/0/0

    • Reboot the router.

    Correct Answer
    A. Configure an IP address on interface serial 0/0/0.
    Explanation
    The network technician should configure an IP address on interface serial 0/0/0. Without an IP address, the router cannot communicate with other devices on the network. By configuring an IP address on the interface, the router will be able to establish connections and ping the directly connected router.

    Rate this question:

  • 30. 

    Which OSI layers offer reliable, connection-oriented data communication services? 

    • Application

    • Presentation

    • Session

    • Transport

    • Network

    Correct Answer
    A. Transport
    Explanation
    The transport layer in the OSI model offers reliable, connection-oriented data communication services. This layer ensures that data is transmitted accurately and efficiently by establishing a connection between the sender and receiver and managing the flow control, error correction, and retransmission of data if necessary. It guarantees that data is delivered in the correct order and without errors, providing a reliable communication channel for applications.

    Rate this question:

  • 31. 

    Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the router R1 FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by the devices on the network?

    • R1 will drop the packet because R1 does not have a specific route in its routing table to the 10.1.1.0/24 network.

    • R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to the directly connected network 10.1.1.0/24.

    • R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a default route to network 10.1.1.0/24.

    • R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a route that is learned by a routing protocol to network 10.1.1.0/24.

    Correct Answer
    A. R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to the directly connected network 10.1.1.0/24.
    Explanation
    The correct answer states that R1 will forward the packet to its default gateway, the next hop router R2. R2 will then forward the packet to the directly connected network 10.1.1.0/24. This means that R1 will recognize that it does not have a specific route in its routing table for the 10.1.1.0/24 network, so it will send the packet to its default gateway, which is R2. R2, being directly connected to the 10.1.1.0/24 network, will then forward the packet to its destination.

    Rate this question:

  • 32. 

    In a network design project, a network designer needs to select a device to provide collision-free connections to 40 hosts on the LAN. Which device should be selected?

    • Hub

    • Router

    • Switch

    • Firewall

    Correct Answer
    A. Switch
    Explanation
    A switch should be selected to provide collision-free connections to 40 hosts on the LAN. Unlike a hub, which broadcasts all incoming data to all connected devices, a switch creates a separate collision domain for each connected device, allowing for simultaneous and independent communication. This ensures that collisions are minimized and network performance is optimized. A router is used to connect multiple networks, while a firewall is used to protect a network from unauthorized access.

    Rate this question:

  • 33. 

    Which range of port numbers are reserved for services commonly used by applications that run on servers?

    • 0 to 255

    • 0 to 1023

    • 1024 to 49151

    • 49152 to 65535

    Correct Answer
    A. 0 to 1023
    Explanation
    The range of port numbers from 0 to 1023 is reserved for services commonly used by applications that run on servers. These ports are known as well-known ports or system ports. They are assigned to specific services such as HTTP (port 80), FTP (port 21), and SSH (port 22). These ports are typically used by server applications to listen for incoming connections from client applications.

    Rate this question:

  • 34. 

    Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/IP model? 

    • Application layer

    • Presentation layer

    • Session layer

    • Transport layer

    • Network layer

    • Data link layer

    • Physical layer

    Correct Answer(s)
    A. Transport layer
    A. Network layer
    Explanation
    The transport layer of the OSI model and the transport layer of the TCP/IP model both provide end-to-end communication services and are responsible for the reliable delivery of data between hosts. Similarly, the network layer of the OSI model and the network layer of the TCP/IP model both handle the routing of data packets across different networks. Therefore, the transport layer and network layer of the OSI model correspond to the same functions as the transport and network layers of the TCP/IP model.

    Rate this question:

  • 35. 

    Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices? 

    • Connection 1 - rollover cable Connection 2 - straight-through cable Connection 3 - crossover cable

    • Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - crossover cable

    • Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - crossover cable

    • Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - straight-through cable

    • Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - crossover cable

    Correct Answer
    A. Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - straight-through cable
    Explanation
    The correct answer is Connection 1 - straight-through cable, Connection 2 - crossover cable, Connection 3 - straight-through cable. This is because a straight-through cable is used to connect a host to a switch or hub, while a crossover cable is used to connect two hosts directly without a switch or hub in between. In this scenario, Connection 1 is between a host and a switch, so a straight-through cable is needed. Connection 2 is between two hosts, so a crossover cable is needed. Connection 3 is between a switch and a router, so a straight-through cable is needed.

    Rate this question:

  • 36. 

    Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?

    • IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2

    • IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17

    • IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18

    • IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5

    • IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1

    • IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18

    Correct Answer
    A. IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
    Explanation
    The valid configuration for Host A is IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17. This configuration falls within the same IP address range as the other options, but it has a different default gateway. The default gateway is the IP address of the router that connects the local network to external networks. In this case, the correct default gateway is 192.168.100.17, which is within the same subnet as the IP address of Host A.

    Rate this question:

  • 37. 

    Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?

    • Address translation

    • DHCP services

    • Ftpd

    • Web server

    Correct Answer
    A. Address translation
    Explanation
    Router RT_A needs to provide address translation in order to allow Internet access for hosts in this network. Address translation, also known as Network Address Translation (NAT), is a process that allows multiple devices in a private network to share a single public IP address. This is necessary because the private IP addresses used within the network are not routable on the Internet. By performing address translation, RT_A can map the private IP addresses of the hosts to the public IP address assigned to the router, enabling communication with the Internet.

    Rate this question:

  • 38. 

    Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?

    • 1

    • 3

    • 4

    • 5

    • 7

    Correct Answer
    A. 3
    Explanation
    Based on the given exhibit, there are three distinct networks that need to be addressed. Each network requires a separate subnet. Therefore, three subnets are required to address the topology shown.

    Rate this question:

  • 39. 

    Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?

    • An FTP client

    • A Telnet client

    • A terminal emulation program

    • A web browser

    Correct Answer
    A. A terminal emulation program
    Explanation
    To create the initial configuration on Router1, a network technician would need a terminal emulation program on host A. A terminal emulation program allows the technician to access and configure the router remotely through the console port. This program provides a text-based interface that emulates a physical terminal, allowing the technician to enter commands and configure the router's settings.

    Rate this question:

  • 40. 

    An administrator makes changes to the default configuration of a router and saves them to NVRAM. After testing, it is discovered that the configurations did not have the desired effect and must be removed. What steps must be taken to remove the changes and return the router to the default configuration?

    • Reboot the router.

    • Use no version of the commands that are issued.

    • Issue the erase startup-config command, and then reboot the router.

    • Issue the erase running-config command, and then reboot the router.

    Correct Answer
    A. Issue the erase startup-config command, and then reboot the router.
    Explanation
    To remove the changes made to the default configuration of the router and return it to its original state, the administrator needs to issue the "erase startup-config" command. This command will delete the startup configuration file, which contains the saved changes made to the router's configuration, from NVRAM. After issuing this command, the router needs to be rebooted for the changes to take effect. Rebooting the router will load the default configuration from ROM and discard any changes made in the startup configuration file.

    Rate this question:

  • 41. 

    Which two functions of the OSI model occur at layer two? 

    • Physical addressing

    • Encoding

    • Routing

    • Cabling

    • Media access control

    Correct Answer(s)
    A. Physical addressing
    A. Media access control
    Explanation
    The OSI model is a conceptual framework that defines the functions of a communication system. Layer two of the OSI model is the Data Link layer, which is responsible for transferring data between adjacent network nodes. Two functions that occur at this layer are physical addressing and media access control. Physical addressing involves assigning unique addresses to devices on a network, such as MAC addresses. Media access control manages how devices access and transmit data over a shared network medium, such as Ethernet. Therefore, physical addressing and media access control are the correct answers for this question.

    Rate this question:

  • 42. 

    What information can be gathered by using the command netstat?

    • The default gateway

    • The routing protocol

    • Active TCP connections

    • The locally configured subnet mask

    Correct Answer
    A. Active TCP connections
    Explanation
    The netstat command provides information about active TCP connections. It displays a list of all current network connections, including the local and remote IP addresses, the protocol being used, and the state of the connection. This information can be useful for troubleshooting network issues, monitoring network activity, and identifying potential security threats. It does not provide information about the default gateway, routing protocol, or locally configured subnet mask.

    Rate this question:

  • 43. 

    The Layer 4 header contains which type of information to aid in the delivery of data?

    • Service port number

    • Host logical address

    • Device physical address

    • Virtual connection identifier

    Correct Answer
    A. Service port number
    Explanation
    The Layer 4 header contains the service port number to aid in the delivery of data. The service port number helps identify the specific service or application that the data is intended for. This information is crucial for the proper routing and delivery of data packets to the correct destination.

    Rate this question:

  • 44. 

    Which statement is true about Layer 3 addresses?

    • They are physical addresses.

    • They are used in routing decisions.

    • They are only used on local networks

    • They are altered each time a packet crosses a router.

    Correct Answer
    A. They are used in routing decisions.
    Explanation
    Layer 3 addresses, also known as IP addresses, are used in routing decisions. When a packet is sent across a network, routers use the destination IP address to determine the best path for the packet to reach its destination. Layer 3 addresses are not physical addresses, as those are handled by Layer 2 (MAC addresses). Additionally, Layer 3 addresses are not altered each time a packet crosses a router, as they remain unchanged during the routing process. They are used not only on local networks but also in wide area networks for routing purposes.

    Rate this question:

  • 45. 

    When must a router serial interface be configured with the clock rate command? 

    • When the interface is functioning as a DTE device

    • When the interface timers have been cleared

    • When the connected DTE device is shut down

    • When the interface is functioning as a DCE device

    Correct Answer
    A. When the interface is functioning as a DCE device
    Explanation
    A router serial interface must be configured with the clock rate command when it is functioning as a DCE (Data Communications Equipment) device. In a network, a DCE device provides clocking signals to a DTE (Data Terminal Equipment) device, which is typically a router or a switch. The clock rate command is used to set the clocking speed on the DCE device, allowing it to synchronize with the connected DTE device. This synchronization is necessary for proper communication between the devices.

    Rate this question:

  • 46. 

    As a network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0? 

    • 255.255.0.0

    • 255.255.248.0

    • 255.255.252.0

    • 255.255.254.0

    • 255.255.255.0

    • 255.255.255.128

    Correct Answer
    A. 255.255.254.0
    Explanation
    The IP address 172.30.0.0 is a Class B address, which has a default subnet mask of 255.255.0.0. However, we need a subnet mask that allows for 510 hosts. To determine the required subnet mask, we need to find the smallest subnet that can accommodate at least 510 hosts.

    The subnet mask 255.255.254.0 provides a subnet with 9 bits for host addresses, which allows for 2^9 - 2 = 510 usable host addresses. Therefore, this subnet mask is the correct choice to accommodate 510 hosts within the given IP address range.

    Rate this question:

  • 47. 

    Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through   172.16.159.255? 

    • 172.16.128.0 255.255.255.224

    • 172.16.128.0 255.255.0.0

    • 172.16.128.0 255.255.192.0

    • 172.16.128.0 255.255.224.0

    • 172.16.128.0 255.255.255.192

    Correct Answer
    A. 172.16.128.0 255.255.224.0
    Explanation
    The subnet mask 255.255.224.0 allows for a range of IP addresses from 172.16.128.0 to 172.16.159.255. This is because the subnet mask has 19 bits set to 1, which means that the first 19 bits of the IP address are used to identify the network, while the remaining 13 bits can be used to identify individual hosts within that network. Since the IP addresses given in the question fall within the range defined by the subnet mask, it is the correct combination.

    Rate this question:

  • 48. 

    Refer to the exhibit. The command that is shown was issued on a PC. What does the IP address 192.168.33.2   represent? 

    • IP address of the host

    • Default gateway of the host

    • IP address of the homepage for the host

    • Primary domain name server for the host

    • IP address of the website resolver1.mooki.local

    Correct Answer
    A. Primary domain name server for the host
    Explanation
    The IP address 192.168.33.2 represents the primary domain name server for the host.

    Rate this question:

  • 49. 

    What is true regarding network layer addressing? 

    • Uses a flat structure

    • Prevent broadcasts

    • Heirarchical

    • Uniquely identifies each host

    • 48 bits in length

    • Contains a network portion

    Correct Answer(s)
    A. Heirarchical
    A. Uniquely identifies each host
    A. Contains a network portion
    Explanation
    Network layer addressing is hierarchical, meaning it is organized in a hierarchical structure. This allows for efficient routing and management of network traffic. It also uniquely identifies each host on the network, ensuring that there are no duplicate addresses. Additionally, network layer addressing contains a network portion, which helps in identifying the specific network to which a host belongs.

    Rate this question:

Quiz Review Timeline (Updated): Jun 26, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jun 26, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 02, 2012
    Quiz Created by
    Dlefinc
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.