CCNA 4 Quiz1

19 Questions | Total Attempts: 302

SettingsSettingsSettings
CCNA Quizzes & Trivia


Questions and Answers
  • 1. 
    A single 802.11g access point has been configured and installed in the center of a square office. A few wireless users are experiencing slow performance and drops while most users are operating at peak efficiency. What are three likely causes of this problem? (Choose two.)
    • A. 

      Mismatched TKIP encryption

    • B. 

      Null SSID

    • C. 

      Cordless phones

    • D. 

      Mismatched SSID

    • E. 

      Metal file cabinets

  • 2. 
    Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?
    • A. 

      Denial of service

    • B. 

      Brute force

    • C. 

      Reconnaissance

    • D. 

      Trojan horse

    • E. 

      Man in the middle

  • 3. 
    What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)
    • A. 

      Allow unrestricted access to the console or VTY ports.

    • B. 

      Use a firewall to restrict access from the outside to the network devices.

    • C. 

      Always use Telnet to access the device command line because its data is automatically encrypted.

    • D. 

      Use SSH or another encrypted and authenticated transport to access device configurations.

    • E. 

      Prevent the loss of passwords by disabling password encryption.

  • 4. 
    Which spread spectrum technology does the 802.11b standard define for operation?
    • A. 

      IR

    • B. 

      DSSS

    • C. 

      FHSS

  • 5. 
    A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port?
    • A. 

      This is a 10 Mb/s switch port.

    • B. 

      This is a 100 Mb/s switch port.

    • C. 

      This is an Ethernet port operating at half duplex.

    • D. 

      This is an Ethernet port operating at full duplex.

    • E. 

      This is a port on a network interface card in a PC.

  • 6. 
    Which routing protocol by default uses bandwidth and delay as metrics?
    • A. 

      RIP

    • B. 

      BGP

    • C. 

      OSPF

    • D. 

      IGRP

    • E. 

      EIGRP

  • 7. 
    Which two values are used by Spanning Tree Protocol to elect a root bridge? (Choose two.)
    • A. 

      MAC address

    • B. 

      Bridge priority

    • C. 

      IOS version

    • D. 

      IP address

    • E. 

      Speed of the links

  • 8. 
    • A. 

      The session layer

    • B. 

      The data link layer

    • C. 

      The access layer

    • D. 

      The network layer

    • E. 

      The application layer

  • 9. 
    On point-to-point networks, OSPF hello packets are addressed to which address?
    • A. 

      127.0.0.1

    • B. 

      172.16.0.1

    • C. 

      192.168.0.5

    • D. 

      224.0.0.5

    • E. 

      223.0.0.1

  • 10. 
    Which of the following describe the process identifier that is used to run OSPF on a router? (Choose two.)
    • A. 

      It is locally significant.

    • B. 

      It is globally significant.

    • C. 

      It is needed to identify a unique instance of an OSPF database.

    • D. 

      It is an optional parameter required only if multiple OSPF processes are running on the router.

    • E. 

      All routers in the same OSPF area must have the same process ID if they are to exchange routing information.

  • 11. 
    Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)
    • A. 

      It specifies use of a static encryption key that must be changed frequently to enhance security.

    • B. 

      It requires use of an open authentication method.

    • C. 

      It specifies the use of dynamic encryption keys that change each time a client establishes a connection.

    • D. 

      It requires that all access points and wireless devices use the same encryption key.

    • E. 

      It includes authentication by PSK.

  • 12. 
    What are some of the advantages of using a router to segment the network? (Choose two.)
    • A. 

      Filtering can occur based on Layer 3 information.

    • B. 

      Broadcasts are eliminated.

    • C. 

      Routers generally cost less than switches.

    • D. 

      Broadcasts are not forwarded across the router.

    • E. 

      Adding a router to the network decreases latency.

  • 13. 
    There are no boot system commands in a router configuration in NVRAM. What is the fallback sequence that the router will use to find an IOS during reload?
    • A. 

      TFTP server, Flash, NVRAM

    • B. 

      ROM, NVRAM, TFTP server

    • C. 

      NVRAM, TFTP server, ROM

    • D. 

      Flash, TFTP server, ROM

    • E. 

      Flash, NVRAM, ROM

  • 14. 
    In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN?
    • A. 

      During high traffic periods

    • B. 

      After broken links are re-established

    • C. 

      When upper-layer protocols require high reliability

    • D. 

      In an improperly implemented redundant topology

    • E. 

      When a dual ring topology is in use

  • 15. 
    Which of the following describe private IP addresses? (Choose two.)
    • A. 

      Addresses chosen by a company to communicate with the Internet

    • B. 

      Addresses that cannot be routed through the public Internet

    • C. 

      Addresses that can be routed through the public Internet

    • D. 

      A scheme to conserve public addresses

    • E. 

      Addresses licensed to enterprises or ISPs by an Internet registry organization

  • 16. 
    Which of the following describes the roles of devices in a WAN? (Choose three.)
    • A. 

      A CSU/DSU terminates a digital local loop.

    • B. 

      A modem terminates a digital local loop.

    • C. 

      A CSU/DSU terminates an analog local loop.

    • D. 

      A modem terminates an analog local loop.

    • E. 

      A router is commonly considered a DTE device.

  • 17. 
    A router receives information about network 192.168.10.0/24 from multiple sources. What will the router consider the most reliable information about the path to that network?
    • A. 

      A directly connected interface with an address of 192.168.10.254/24

    • B. 

      A static route to network 192.168.10.0/24

    • C. 

      A RIP update for network 192.168.10.0/24

    • D. 

      A default route with a next hop address of 192.168.10.1

    • E. 

      A static route to network 192.168.10.0/24 with a local serial interface configured as the next hop

  • 18. 
    Which three Layer 2 encapsulation types would be used on a WAN rather than a LAN? (Choose three.)
    • A. 

      HDLC

    • B. 

      FDDI

    • C. 

      PPP

    • D. 

      ATM

    • E. 

      Frame Relay

  • 19. 
    Why will a switch never learn a broadcast address?
    • A. 

      Broadcasts only use network layer addressing.

    • B. 

      A broadcast frame is never forwarded by a switch.

    • C. 

      A broadcast address will never be the source address of a frame.

    • D. 

      Broadcast addresses use an incorrect format for the switching table.

    • E. 

      Broadcast frames are never sent to switches.