CCNA Protocol Practice Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By E2D3
E
E2D3
Community Contributor
Quizzes Created: 2 | Total Attempts: 6,543
Questions: 25 | Attempts: 184

SettingsSettingsSettings
CCNA Quizzes & Trivia

Questions and Answers
  • 1. 

    A company is developing an Internet store for its website. Which protocol should be used to transfer credit card information from customers to the company web server?

    • A.

      FTPS

    • B.

      HTTP

    • C.

      HTTPS

    • D.

      WEP2

    • E.

      TFTP

    Correct Answer
    C. HTTPS
    Explanation
    HTTPS should be used to transfer credit card information from customers to the company web server. HTTPS is a secure protocol that encrypts data during transmission, ensuring that sensitive information such as credit card details cannot be intercepted or accessed by unauthorized individuals. This protocol utilizes SSL/TLS encryption to establish a secure connection between the client (customer) and the server (company), providing confidentiality and integrity of the data being transmitted.

    Rate this question:

  • 2. 

    Refer to the exhibit. A new branch office has been added to the corporate network and a new router is to be installed to allow branch office users to access the database server at headquarters. How should the serial 0/0/0 interface of the new branch office router be configured to connect to the headquarters router?

    • A.

      Branch_23(config-if)# ip address 192.168.5.19 255.255.255.240 branch_23(config-if)# no shutdown branch_23(config-if)# encapsulation hdlc

    • B.

      Branch_23(config-if)# ip address 192.168.5.25 255.255.255.240 branch_23(config-if)# no shutdown branch_23(config-if)# encapsulation ppp

    • C.

      Branch_23(config-if)# no shutdown branch_23(config-if)# encapsulation ppp branch_23(config-if)# ip address 192.168.5.33 255.255.255.240

    • D.

      Branch_23(config-if)# encapsulation ppp branch_23(config-if)# ip address 192.168.5.21 255.255.255.240 branch_23(config-if)# no shutdown

    Correct Answer
    D. Branch_23(config-if)# encapsulation ppp branch_23(config-if)# ip address 192.168.5.21 255.255.255.240 branch_23(config-if)# no shutdown
    Explanation
    The serial 0/0/0 interface of the new branch office router should be configured with the encapsulation ppp command to specify the Point-to-Point Protocol (PPP) encapsulation method. This allows for the establishment of a direct point-to-point connection between the branch office router and the headquarters router. The ip address 192.168.5.21 255.255.255.240 command assigns the IP address and subnet mask to the interface, and the no shutdown command ensures that the interface is enabled and operational.

    Rate this question:

  • 3. 

    Which two commands ensure that any password that permits access to the privileged EXEC mode is not shown in plain text when the configuration files are displayed? (Choose two.)

    • A.

      Router(config)# enable secret cisco

    • B.

      Router(config)# enable cisco

    • C.

      Router(config)# encryption-password all

    • D.

      Router(config)# enable login encrypted

    • E.

      Router(config)# enable password encryption

    • F.

      Router(config)# service password-encryption

    Correct Answer(s)
    A. Router(config)# enable secret cisco
    F. Router(config)# service password-encryption
    Explanation
    The first command "Router(config)# enable secret cisco" sets the password for privileged EXEC mode to "cisco" using the secret encryption method. This ensures that the password is not displayed in plain text when the configuration files are displayed.

    The second command "Router(config)# service password-encryption" enables password encryption for all passwords stored in the configuration files. This ensures that any password, including the one set for privileged EXEC mode, is encrypted and not shown in plain text when the configuration files are displayed.

    Rate this question:

  • 4. 

    A new network is to be configured on a router. Which of the following tasks must be completed to configure this interface and implement dynamic IP routing for the new network? (Choose three.)

    • A.

      Select the routing protocol to be configured

    • B.

      Assign an IP address and subnet mask to the interface

    • C.

      Update the ip host configuration information with the device name and new interface IP address.

    • D.

      Configure the routing protocol with the new network IP address.

    • E.

      Configure the routing protocol with the new interface IP address and subnet mask

    • F.

      Configure the routing protocol in use on all other enterprise routers with the new network information

    Correct Answer(s)
    A. Select the routing protocol to be configured
    B. Assign an IP address and subnet mask to the interface
    D. Configure the routing protocol with the new network IP address.
    Explanation
    To configure a new network on a router and implement dynamic IP routing, there are three tasks that must be completed. First, the routing protocol needs to be selected. This is important as it determines how the router will exchange routing information with other routers. Second, an IP address and subnet mask must be assigned to the interface that will be connected to the new network. This allows the router to communicate with devices on that network. Finally, the routing protocol needs to be configured with the IP address of the new network. This ensures that the router knows how to route traffic to and from that network.

    Rate this question:

  • 5. 

    How does TCP ensure the reliable transfer of data?

    • A.

      If data segments are not received from the source, the destination requests that the segments be resent

    • B.

      If an acknowledgment of the transmitted segments is not received from the destination in a predetermined amount of the time, the source resends the data.

    • C.

      TCP uses the SYN-ACK portion of the three-way handshake to ensure that all data has been received

    • D.

      The TCP Protocol Interpreter process verifies the transmitted data at source and destination.

    Correct Answer
    C. TCP uses the SYN-ACK portion of the three-way handshake to ensure that all data has been received
    Explanation
    TCP ensures the reliable transfer of data by using the SYN-ACK portion of the three-way handshake to ensure that all data has been received. This handshake process involves the sender (source) sending a SYN packet to the receiver (destination), which responds with a SYN-ACK packet. The sender then acknowledges the SYN-ACK packet with an ACK packet. This process confirms the successful establishment of a connection and ensures that both parties are ready to exchange data. By using this handshake, TCP ensures that all data segments are received and acknowledged, providing reliable data transfer.

    Rate this question:

  • 6. 

    A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP for this network can only supply five public IPs. What can be used to accomplish this task?

    • A.

      Routable translation

    • B.

      Dynamic translation

    • C.

      Static translation

    • D.

      Port address translation

    Correct Answer
    D. Port address translation
    Explanation
    Port address translation (PAT) can be used to accomplish this task. PAT is a technique used to allow multiple devices to share a single public IP address. It works by assigning unique port numbers to each device within the network, allowing them to communicate with the Internet using the same public IP address. This way, the network administrator can provide simultaneous access to the Internet for all 250 users using only five public IPs.

    Rate this question:

  • 7. 

    What is the most commonly used exterior routing protocol?

    • A.

      BGP

    • B.

      RIP

    • C.

      OSPF

    • D.

      EIGRP

    Correct Answer
    A. BGP
    Explanation
    BGP (Border Gateway Protocol) is the most commonly used exterior routing protocol. It is used to exchange routing information between different autonomous systems (AS) on the internet. BGP is designed to provide highly scalable and flexible routing, making it ideal for large networks. It allows routers in different ASs to communicate and make informed routing decisions based on various factors such as network policies, path attributes, and performance metrics. BGP is widely used by internet service providers (ISPs) and large organizations to ensure efficient and reliable routing across the internet.

    Rate this question:

  • 8. 

    Refer to the exhibit. The network administrator needs to configure the router with a name. Which command will the administrator use to configure the router name?

    • A.

      Router# ip hostname Boise

    • B.

      Router# enable hostname Boise

    • C.

      Router(config-line)# name Boise

    • D.

      Router(config)# hostname Boise

    • E.

      Router(config)# ip hostname Boise

    Correct Answer
    D. Router(config)# hostname Boise
    Explanation
    The correct command to configure the router name is "Router(config)# hostname Boise". This command is used in global configuration mode to set the hostname of the router to "Boise".

    Rate this question:

  • 9. 

    Why are port numbers included in the TCP header of a segment?

    • A.

      To indicate the correct router interface that should be used to forward a segment

    • B.

      To identify which switch ports should receive or forward the segment

    • C.

      To determine which Layer 3 protocol should be used to encapsulate the data

    • D.

      To enable a receiving host to forward the data to the appropriate application

    • E.

      To allow the receiving host to assemble the packet in the proper order

    Correct Answer
    C. To determine which Layer 3 protocol should be used to encapsulate the data
    Explanation
    Port numbers are included in the TCP header of a segment to determine which Layer 3 protocol should be used to encapsulate the data. Port numbers are used to identify the specific application or service that the data is intended for. By including the port number in the TCP header, the receiving host can determine which Layer 3 protocol should be used to properly encapsulate and deliver the data to the appropriate application or service.

    Rate this question:

  • 10. 

    What is the purpose of the routing process?

    • A.

      To encapsulate data that is used to communicate across a network

    • B.

      To select the paths that are used to direct traffic to destination networks

    • C.

      To convert a URL name into an IP address

    • D.

      To provide secure Internet file transfer

    • E.

      To forward traffic on the basis of MAC addresses

    Correct Answer
    B. To select the paths that are used to direct traffic to destination networks
    Explanation
    The purpose of the routing process is to select the paths that are used to direct traffic to destination networks. Routing is responsible for determining the most efficient path for data packets to travel from the source to the destination network. It involves analyzing the network topology, considering factors such as network congestion and available bandwidth, and making decisions on how to forward the packets to their intended destination. By selecting the appropriate paths, routing ensures that data reaches its destination in a timely and efficient manner.

    Rate this question:

  • 11. 

    Which two statements are true about the use of the debug ip rip command on a Cisco router? (Choose two.)

    • A.

      The debug ip rip command displays RIP routing activity in real time

    • B.

      The debug ip rip command can be issued at the user EXEC configuration mode.

    • C.

      The debug ip rip command displays a combination of the information that is displayed by the show ip route and show ip protocols commands

    • D.

      Because of router processor usage, the debug ip rip command should be used only when necessary

    • E.

      The debug ip rip command should be used instead of the show ip route command whenever possible

    Correct Answer(s)
    A. The debug ip rip command displays RIP routing activity in real time
    B. The debug ip rip command can be issued at the user EXEC configuration mode.
    Explanation
    The debug ip rip command can be used to display RIP routing activity in real time. This command allows network administrators to monitor the routing updates and exchanges happening in the network. Additionally, the debug ip rip command can be issued at the user EXEC configuration mode, making it easily accessible for troubleshooting purposes.

    Rate this question:

  • 12. 

    What minimum configurations must be set on a host to allow a request to be sent to http://www.cisco.com/? (Choose four.)

    • A.

      DNS Server

    • B.

      WINS Server

    • C.

      IP address

    • D.

      NetBIOS

    • E.

      Subnet mask

    • F.

      Default gateway

    Correct Answer(s)
    A. DNS Server
    C. IP address
    E. Subnet mask
    F. Default gateway
    Explanation
    To allow a request to be sent to http://www.cisco.com, the minimum configurations that must be set on a host are the DNS Server, IP address, subnet mask, and default gateway. The DNS Server is necessary to resolve the domain name "www.cisco.com" to its corresponding IP address. The IP address, subnet mask, and default gateway are essential for establishing network connectivity and routing the request to the destination host. The WINS Server and NetBIOS are not required for sending a request to a website via HTTP.

    Rate this question:

  • 13. 

    A Catalyst 2960 switch has been taken out of storage to be used as a temporary replacement for another switch that needs to be repaired. About a minute after the switch has started, the SYST LED on the front of the switch transitions from blinking green to amber. What is the meaning of the amber SYST LED?

    • A.

      The switch has no configuration file in NVRAM

    • B.

      The switch has failed POST and must be sent for service

    • C.

      The switch is functioning properly

    • D.

      The switch is in half-duplex mode

    Correct Answer
    B. The switch has failed POST and must be sent for service
    Explanation
    The amber SYST LED indicates that the switch has failed POST (Power-On Self Test) and needs to be sent for service. This means that there is a hardware issue with the switch that needs to be addressed by a technician.

    Rate this question:

  • 14. 

    Refer to the exhibit. Which combination of cables and symbols is correct?

    • A.

      A - crossover, B - straight-through, C - straight-through

    • B.

      A - crossover, B - rollover, C - straight-through

    • C.

      A - straight-through, B -crossover, C - straight-through

    • D.

      A - straight-through, B -straight-through, C - straight-through

    • E.

      A - straight-through, B - straight-through, C - crossover

    • F.

      A - rollover, B - straight-through, C - straight-through

    Correct Answer
    C. A - straight-through, B -crossover, C - straight-through
    Explanation
    The correct combination of cables and symbols is A - straight-through, B - crossover, C - straight-through. This means that cable A is a straight-through cable, cable B is a crossover cable, and cable C is a straight-through cable. This combination is correct for connecting devices in a network.

    Rate this question:

  • 15. 

    After an unsuccessful ping to the local router, the technician decides to investigate the router. The technician observes that the lights and fan on the router are not operational. In which layer of the OSI model is the problem most likely occurring?

    • A.

      Transport

    • B.

      Network

    • C.

      Data link

    • D.

      Physical

    Correct Answer
    D. Physical
    Explanation
    The problem is most likely occurring in the physical layer of the OSI model. This layer is responsible for the physical transmission of data, including the hardware components such as cables, connectors, and network devices. In this case, the fact that the lights and fan on the router are not operational suggests a physical issue with the router itself, which is preventing it from functioning properly.

    Rate this question:

  • 16. 

    What are three characteristics of the TCP protocol? (Choose three.)

    • A.

      Exchanges datagrams unreliably

    • B.

      Is used to send IP error messages

    • C.

      Forces the retransmission of unacknowledged packets

    • D.

      Creates a virtual session between end-user applications

    • E.

      Carries the IP address of the destination host in the TCP header

    • F.

      Is responsible for breaking messages into segments and reassembling them at their destination

    Correct Answer(s)
    D. Creates a virtual session between end-user applications
    E. Carries the IP address of the destination host in the TCP header
    Explanation
    The TCP protocol creates a virtual session between end-user applications, allowing them to communicate with each other. It also carries the IP address of the destination host in the TCP header, ensuring that the data reaches the correct destination.

    Rate this question:

  • 17. 

    Refer to the exhibit. The network shown is connected using services from the same ISP. How will the Fohi router dynamically learn routes to the 192.168.16.16/28, 192.168.16.32/28, and 192.168.16.64/28 subnetworks?

    • A.

      With BGP

    • B.

      With a static route

    • C.

      With a directly connected route

    • D.

      With an interior routing protocol

    Correct Answer
    B. With a static route
    Explanation
    The Fohi router will dynamically learn routes to the 192.168.16.16/28, 192.168.16.32/28, and 192.168.16.64/28 subnetworks using a static route. This means that the network administrator manually configures the routes on the router, specifying the next hop for each subnetwork. This is in contrast to dynamic routing protocols like BGP or interior routing protocols, which automatically exchange routing information between routers to dynamically learn and update routes.

    Rate this question:

  • 18. 

    Refer to the exhibit. Which type of UTP cable should be used to connect Host A to Switch1?

    • A.

      Rollover

    • B.

      Console

    • C.

      Crossover

    • D.

      Straight-through

    Correct Answer
    D. Straight-through
    Explanation
    To connect Host A to Switch1, a straight-through UTP cable should be used. A straight-through cable has the same wiring arrangement on both ends, with the pins on one end mirroring the pins on the other end. This type of cable is typically used to connect a host device, like a computer or a server, to a switch or a hub. In this case, connecting Host A to Switch1 would require a straight-through cable to ensure proper communication between the two devices.

    Rate this question:

  • 19. 

    When customers use credit cards to make purchases at a small business, a modem is heard dialing a telephone number to transfer the transaction data to the central office. What type of WAN serial connection is in use?

    • A.

      Leased line

    • B.

      Packet switched

    • C.

      Circuit switched

    • D.

      Point to point

    Correct Answer
    C. Circuit switched
    Explanation
    The correct answer is circuit switched. In this scenario, the modem dials a telephone number to establish a dedicated circuit for the transfer of transaction data. Circuit switching creates a continuous connection between the sender and receiver, ensuring reliable and secure data transmission.

    Rate this question:

  • 20. 

     A user reports being unable to access the Internet. The help desk technician employs a bottom-up approach to troubleshooting. The technician first has the user check the patch cable connection from the PC to the wall, and then has the user verify that the NIC has a green link light. What will the technician have the user do next?

    • A.

      Enter an IP address into the WWW browser address bar to see if DNS is at fault

    • B.

      Use traceroute to identify the device along the path to the ISP that may be at fault

    • C.

      Verify the IP address, subnet, and gateway settings using ipconfig on the PC

    • D.

      Connect to the user home router to check firewall settings for blocked TCP ports

    Correct Answer
    C. Verify the IP address, subnet, and gateway settings using ipconfig on the PC
    Explanation
    The technician will have the user verify the IP address, subnet, and gateway settings using ipconfig on the PC. This step is important because it helps determine if there is an issue with the network configuration on the user's PC. By checking the IP address, subnet, and gateway settings, the technician can identify any misconfigurations that may be causing the inability to access the Internet. This step is part of the bottom-up troubleshooting approach, where the technician starts with the basic network connections and gradually moves towards more complex troubleshooting steps.

    Rate this question:

  • 21. 

    A ping 192.1.1.20 command is issued on workstation A to determine if workstation B can be reached. What events will occur if this command is successful? (Choose two.)

    • A.

      The router will block the ping request message

    • B.

      The router will reply to the echo request with a proxy ping response

    • C.

      Workstation A will send a UDP ping request message to workstation B

    • D.

      Workstation B will send a UDP ping reply message to workstation A

    • E.

      Workstation A will send an ICMP echo request message to workstation B.

    • F.

      Workstation B will send an ICMP echo reply message to workstation A.

    Correct Answer(s)
    E. Workstation A will send an ICMP echo request message to workstation B.
    F. Workstation B will send an ICMP echo reply message to workstation A.
    Explanation
    If the ping command is successful, it means that workstation A is able to reach workstation B. In order to determine this, workstation A will send an ICMP echo request message to workstation B. Workstation B, upon receiving this request, will send an ICMP echo reply message back to workstation A. These two events confirm that the communication between the two workstations is successful.

    Rate this question:

  • 22. 

    How does a router know of paths to destination networks? (Choose two.)

    • A.

      Inspection of the destination IP address in data packets

    • B.

      ARP requests from connected routers

    • C.

      Manual configuration of routes

    • D.

      Updates from other routers

    • E.

      DHCP information broadcasts

    • F.

      Updates from the SMTP management information base

    Correct Answer(s)
    A. Inspection of the destination IP address in data packets
    D. Updates from other routers
    Explanation
    A router knows of paths to destination networks through two methods. Firstly, it inspects the destination IP address in data packets. By analyzing the IP address, the router can determine the appropriate path to forward the packet towards the destination network. Secondly, routers receive updates from other routers in the network. These updates contain information about the current network topology and any changes in the paths to destination networks. By receiving and processing these updates, the router can maintain an up-to-date routing table and make informed decisions on how to route data packets.

    Rate this question:

  • 23. 

    Refer to the exhibit. Which two statements describe the data conversation shown? (Choose two.)

    • A.

      The data conversation was started by the HTTP application process running on the client

    • B.

      The data conversation is identified by TCP port 80 on the client

    • C.

      The user started the data conversation by sending an e-mail.

    • D.

      The IP address of the Internet server is 192.168.17.43 .

    • E.

      The Internet server will send data to port 8547 on the client.

    Correct Answer(s)
    A. The data conversation was started by the HTTP application process running on the client
    E. The Internet server will send data to port 8547 on the client.
    Explanation
    The exhibit shows a data conversation and the two statements that describe it are: 1) The data conversation was started by the HTTP application process running on the client, and 2) The Internet server will send data to port 8547 on the client. These statements indicate that the client initiated the conversation through an HTTP application process, and the server will send data to a specific port on the client.

    Rate this question:

  • 24. 

    What is one purpose of the TCP three-way handshake?

    • A.

      Sending echo requests from the source to the destination host to establish the presence of the destination

    • B.

      Determining the IP address of the destination host in preparation for data transfer

    • C.

      Requesting the destination to transfer a binary file to the source

    • D.

      Synchronizing sequence numbers between source and destination in preparation for data transfer

    Correct Answer
    D. Synchronizing sequence numbers between source and destination in preparation for data transfer
    Explanation
    The purpose of the TCP three-way handshake is to synchronize sequence numbers between the source and destination in preparation for data transfer. This process ensures that both the source and destination are ready to establish a reliable connection and exchange data. By synchronizing sequence numbers, TCP ensures that data packets are delivered in the correct order and without errors.

    Rate this question:

  • 25. 

    Which type of address is 192.168.17.111/28?

    • A.

      Host address

    • B.

      Network address

    • C.

      Broadcast address

    • D.

      Multicast address

    Correct Answer
    C. Broadcast address
    Explanation
    The given IP address, 192.168.17.111/28, falls within the range of a broadcast address. In IPv4, a broadcast address is used to send a message to all devices on a network. The /28 subnet mask indicates that the first 28 bits of the IP address are used for the network portion, leaving only the last 4 bits for host addresses. Therefore, the last possible address in the network is the broadcast address, which is 192.168.17.111 in this case.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 02, 2011
    Quiz Created by
    E2D3
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.