CCNA 4 Quiz1

19 Questions | Attempts: 312
Share

SettingsSettingsSettings
CCNA Quizzes & Trivia



Questions and Answers
  • 1. 

    A single 802.11g access point has been configured and installed in the center of a square office. A few wireless users are experiencing slow performance and drops while most users are operating at peak efficiency. What are three likely causes of this problem? (Choose two.)

    • A.

      Mismatched TKIP encryption

    • B.

      Null SSID

    • C.

      Cordless phones

    • D.

      Mismatched SSID

    • E.

      Metal file cabinets

    Correct Answer(s)
    C. Cordless phones
    E. Metal file cabinets
  • 2. 

    Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?

    • A.

      Denial of service

    • B.

      Brute force

    • C.

      Reconnaissance

    • D.

      Trojan horse

    • E.

      Man in the middle

    Correct Answer
    A. Denial of service
  • 3. 

    What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)

    • A.

      Allow unrestricted access to the console or VTY ports.

    • B.

      Use a firewall to restrict access from the outside to the network devices.

    • C.

      Always use Telnet to access the device command line because its data is automatically encrypted.

    • D.

      Use SSH or another encrypted and authenticated transport to access device configurations.

    • E.

      Prevent the loss of passwords by disabling password encryption.

    Correct Answer(s)
    B. Use a firewall to restrict access from the outside to the network devices.
    D. Use SSH or another encrypted and authenticated transport to access device configurations.
  • 4. 

    Which spread spectrum technology does the 802.11b standard define for operation?

    • A.

      IR

    • B.

      DSSS

    • C.

      FHSS

    Correct Answer
    A. IR
  • 5. 

    A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port?

    • A.

      This is a 10 Mb/s switch port.

    • B.

      This is a 100 Mb/s switch port.

    • C.

      This is an Ethernet port operating at half duplex.

    • D.

      This is an Ethernet port operating at full duplex.

    • E.

      This is a port on a network interface card in a PC.

    Correct Answer
    C. This is an Ethernet port operating at half duplex.
  • 6. 

    Which routing protocol by default uses bandwidth and delay as metrics?

    • A.

      RIP

    • B.

      BGP

    • C.

      OSPF

    • D.

      IGRP

    • E.

      EIGRP

    Correct Answer
    E. EIGRP
  • 7. 

    Which two values are used by Spanning Tree Protocol to elect a root bridge? (Choose two.)

    • A.

      MAC address

    • B.

      Bridge priority

    • C.

      IOS version

    • D.

      IP address

    • E.

      Speed of the links

    Correct Answer(s)
    A. MAC address
    B. Bridge priority
  • 8. 

    While troubleshooting a network connectivity problem, a technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message "Request timed out." is displayed. At which layer of the OSI model does the problem most likely exist?

    • A.

      The session layer

    • B.

      The data link layer

    • C.

      The access layer

    • D.

      The network layer

    • E.

      The application layer

    Correct Answer
    D. The network layer
  • 9. 

    On point-to-point networks, OSPF hello packets are addressed to which address?

    • A.

      127.0.0.1

    • B.

      172.16.0.1

    • C.

      192.168.0.5

    • D.

      224.0.0.5

    • E.

      223.0.0.1

    Correct Answer
    D. 224.0.0.5
  • 10. 

    Which of the following describe the process identifier that is used to run OSPF on a router? (Choose two.)

    • A.

      It is locally significant.

    • B.

      It is globally significant.

    • C.

      It is needed to identify a unique instance of an OSPF database.

    • D.

      It is an optional parameter required only if multiple OSPF processes are running on the router.

    • E.

      All routers in the same OSPF area must have the same process ID if they are to exchange routing information.

    Correct Answer(s)
    A. It is locally significant.
    C. It is needed to identify a unique instance of an OSPF database.
  • 11. 

    Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)

    • A.

      It specifies use of a static encryption key that must be changed frequently to enhance security.

    • B.

      It requires use of an open authentication method.

    • C.

      It specifies the use of dynamic encryption keys that change each time a client establishes a connection.

    • D.

      It requires that all access points and wireless devices use the same encryption key.

    • E.

      It includes authentication by PSK.

    Correct Answer(s)
    C. It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
    E. It includes authentication by PSK.
  • 12. 

    What are some of the advantages of using a router to segment the network? (Choose two.)

    • A.

      Filtering can occur based on Layer 3 information.

    • B.

      Broadcasts are eliminated.

    • C.

      Routers generally cost less than switches.

    • D.

      Broadcasts are not forwarded across the router.

    • E.

      Adding a router to the network decreases latency.

    Correct Answer(s)
    A. Filtering can occur based on Layer 3 information.
    D. Broadcasts are not forwarded across the router.
  • 13. 

    There are no boot system commands in a router configuration in NVRAM. What is the fallback sequence that the router will use to find an IOS during reload?

    • A.

      TFTP server, Flash, NVRAM

    • B.

      ROM, NVRAM, TFTP server

    • C.

      NVRAM, TFTP server, ROM

    • D.

      Flash, TFTP server, ROM

    • E.

      Flash, NVRAM, ROM

    Correct Answer
    D. Flash, TFTP server, ROM
  • 14. 

    In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN?

    • A.

      During high traffic periods

    • B.

      After broken links are re-established

    • C.

      When upper-layer protocols require high reliability

    • D.

      In an improperly implemented redundant topology

    • E.

      When a dual ring topology is in use

    Correct Answer
    D. In an improperly implemented redundant topology
  • 15. 

    Which of the following describe private IP addresses? (Choose two.)

    • A.

      Addresses chosen by a company to communicate with the Internet

    • B.

      Addresses that cannot be routed through the public Internet

    • C.

      Addresses that can be routed through the public Internet

    • D.

      A scheme to conserve public addresses

    • E.

      Addresses licensed to enterprises or ISPs by an Internet registry organization

    Correct Answer(s)
    B. Addresses that cannot be routed through the public Internet
    D. A scheme to conserve public addresses
  • 16. 

    Which of the following describes the roles of devices in a WAN? (Choose three.)

    • A.

      A CSU/DSU terminates a digital local loop.

    • B.

      A modem terminates a digital local loop.

    • C.

      A CSU/DSU terminates an analog local loop.

    • D.

      A modem terminates an analog local loop.

    • E.

      A router is commonly considered a DTE device.

    Correct Answer(s)
    A. A CSU/DSU terminates a digital local loop.
    D. A modem terminates an analog local loop.
    E. A router is commonly considered a DTE device.
  • 17. 

    A router receives information about network 192.168.10.0/24 from multiple sources. What will the router consider the most reliable information about the path to that network?

    • A.

      A directly connected interface with an address of 192.168.10.254/24

    • B.

      A static route to network 192.168.10.0/24

    • C.

      A RIP update for network 192.168.10.0/24

    • D.

      A default route with a next hop address of 192.168.10.1

    • E.

      A static route to network 192.168.10.0/24 with a local serial interface configured as the next hop

    Correct Answer
    A. A directly connected interface with an address of 192.168.10.254/24
  • 18. 

    Which three Layer 2 encapsulation types would be used on a WAN rather than a LAN? (Choose three.)

    • A.

      HDLC

    • B.

      FDDI

    • C.

      PPP

    • D.

      ATM

    • E.

      Frame Relay

    Correct Answer(s)
    A. HDLC
    C. PPP
    E. Frame Relay
  • 19. 

    Why will a switch never learn a broadcast address?

    • A.

      Broadcasts only use network layer addressing.

    • B.

      A broadcast frame is never forwarded by a switch.

    • C.

      A broadcast address will never be the source address of a frame.

    • D.

      Broadcast addresses use an incorrect format for the switching table.

    • E.

      Broadcast frames are never sent to switches.

    Correct Answer
    C. A broadcast address will never be the source address of a frame.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Dec 13, 2012
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 21, 2008
    Quiz Created by
    Mc_gilbert
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.