This quiz has been designed for students, professionals and learners who are learning about Routers, Networking concepts and preparing for exams. This will help you to prepare for the final Cisco test. It has multiple choice questions. So, let's try out this quiz. All the best!
Access-list 2 deny 172.16.34.0 0.0.0.0 access-list 2 permit any
Access-list 33 deny 172.16.34.0 0.0.0.255 access-list 33 permit any
Access-list 42 deny 172.16.134.0 access-list 42 permit any
Access-list 56 deny ip any 172.16.34.0 access-list 56 permit ip any
ATL> telnet CHI
ATI> telnet 198.168.4.2
ATL# connect ATL
CHI# telnet 192.168.4.1
CHI# telnet ATL
Paste the IOS filename to the command line of the router while in global configuration mode. Press enter. Then issue the copy tftp flash command.
Use the setup utility to load the new image to flash.
Copy the IOS image file from a TFTP server using the command copy filename ip address flash.
Copy the IOS image file from a TFTP server using the command copy tftp flash. When prompted, provide the IP address or name of the TFTP server and the IOS image filename.
5 seconds
13 seconds
17 seconds
25 seconds
30 seconds
Use the show cdp neighbors detail command from Router A to gather information about all Cisco routers in the network.
Use the traceroute command to discover exactly which link in the network is down.
Use an extended ping from Router A to each router in the network.
Use the show interfaces command from a Telnet session on Router B to check the connection to Router C.
Perform a reload or reset
Telnet from another router and issue the show running-config command to view the password
Boot the router to ROM monitor mode and configure the router to ignore NVRAM when it initializes
Boot the router to bootROM mode and enter the b command to load the IOS manually
The router will enter ROM monitor mode upon completion of the power-on self test (POST).
The router will load the last known valid configuration file.
The router will enter Rx-boot mode.
The router will prompt the user to enter setup mode or to continue without entering setup mode
RAM
NVRAM
Flash
ROM
RouterA(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1 Altamonta(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2 Altamonte(config)# ip route 0.0.0.0 0.0.0.0 s0/1
WinterPark(config)# ip route 0.0.0.0 255.255.255.0 192.168.146.1 Altamonta(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2 Altamonta(config)# ip route 198.18.222.0 255.255.255.0 s0/1
WinterPark(config)# ip route 172.191.67.0 255.255.255.0 192.168.146.1 WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1 Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2
WinterPark(config)# ip route 172.191.67.0 255.255.255.0 192.168.146.1 Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2 Attamonte(config)# ip route 0.0.0.0 0.0.0.0 s0/0
Rome(config)# interface fa0/0 Rome(config-if)# ip access-group 44 out
Rome(config)# interface s0/1 Rome(config-if)# ip access-group 44 out
Tokyo(config)# interface s0/0 Tokyo(config-if)# ip access-group 44 in
Tokyo(config)# interface fa0/0 Tokyo(config-if)# ip access-group 44 out
The ip classless command is not enabled on router A.
Router B is in a different autonomous system than Router A.
Router A and B are using different routing protocols
Router A has no route in its routing table that includes the address 172.16.201.5
The configuration register value
The number and types of interfaces installed
The router model and the amount of memory that is available
The amount of memory required to load the IOS and configuration
Access-list 98 permit ip 192.168.2.0 0.0.0.255 any access-list 98 permit TCP 10.90.3.0 0.0.0.255 any eq www
Access-list 125 permit ip 192.0.2.0 0.0.0.255 any access-list 125 permit tcp 10.90.3.0 0.0.0.255 any eq www
Access-list 132 permit ip 192.168.2.0 0.0.0.255 any access-list 132 permit tcp 10.90.3.0 0.0.0.255 any eq www access-list 132 permit ip any any
Access-list 156 permit 192.168.2.0 0.0.0.255 any access-list 156 permit tcp 10.90.3.0 0.0.0.255 any eq www
Flash, ROM, TFTP server
RAM, Flash, NVRAM
Flash, TFTP server, ROM
ROM, TFTP server, Flash
Flash, NVRAM, RAM
StPetersburg(config)# banner San Jose T1 StPetersburg(config)# interface fa0/0 StPetersburg(config-if)# ip address 172.26.155.5 255.255.255.252
StPetersburg(config)# interface fa0/0 StPetersburg(config-if)# ip address 172.26.155.5 netmask 255.255.255.252 StPetersburg(config-if)# description San Jose T1
StPetersburg(config)# interface fa0/0 StPetersburg(config-if)# ip address 172.26.155.5 255.255.255.252 StPetersburg(config-if)# banner remote site San Jose T1
StPetersburg(config)# interface fa0/0 StPetersburg(config-if)# ip address 172.26.155.5 255.255.255.252 StPetersburg(config-if)# description San Jose T1
DTE
Modem
Hub
DCE device
CSU/DSU
Networks 192.168.12.0/24, 192.168.4.0/24, and 172.16.0.0/16 will be unreachable from Router A.
Router A will have no knowledge of network 192.168.12.0/24, but will have routes to networks 192.168.4.0/24 and 172.16.0.0/16.
All networks shown in the graphic will be reachable by Router A, Router B, and Router C.
Networks 192.168.4.0/24 and 172.16.0.0/16 will be unreachable from Router A and Router B.
RAM - loads the operating system
NVRAM - store the configuration file
Flash - executes diagnostics at bootup
POST - runs diagnostics on hardware modules
DRAM - loads the bootstrap
Provides information on directly connected devices that have CDP enabled
Tests Layer 2 connectivity
Enabled by default on each interface
Provides a layer of security
Used for debugging Layer 4 connectivity issues
Up to five separate Telnet lines are supported by default in standard edition IOS files.
For security purposes, Telnet sessions are required to be established from the privileged mode.
A router can host simultaneous Telnet sessions.
Once established, a Telnet session can remain operational regardless of network status.
Telnet tests wireless connectivity and does not require a physical connection between devices to gain remote access.
The startup-config file was not saved to RAM before reboot.
The IOS has been erased.
The router has not been configured.
The startup-config file cannot be located.
The router will not enter initial configuration dialog.
NVRAM
IOS
IP Address
TFTP
FLASH
Router(config)# access-list 192 permit ICMP host 192.18.4.3 172.22.0.255 0.0.0.0 echo
Router(config)# access-list 153 deny udp 10.43.0.0 0.0.255.255 any eq 161
Router(config)# access-list 98 permit tcp 192.0.2.3 0.0 0.0 eq 23
Router(config)# access-list 99 permit host 192.18.0.5
Router(config)# access-list 166 permit ip any eq 80
To display security warning messages
To welcome any user to the router
To warn people about misusing privileged EXEC mode
To identify circuits and other devices connected to the router
To announce a scheduled system shutdown
HTTP and FTP traffic from hosts on 198.18.0.0 will be denied
Telnet traffic destined for hosts on network 198.18.0.0 will be denied
SMTP traffic from hosts on network 198.18.0.0 will be denied
SMTP and HTTP traffic to hosts on the 198.18.0.0 network is permitted
Telnet traffic from any hosts to any host on network 198.18.0.0 will be denied
Press Ctrl-Shift-6, X to abort the configuration dialog
Press Enter or the Return key to accept the default values
Enter the address on an interface or add a new routing protocol suite
Press Ctrl-C to return to the privileged mode prompt or to terminate setup mode.
Type Reload to save the changes created in setup mode and use the new configuration
Use a crossover cable to connect the terminal serial port to the router console port.
Use a rollover cable to connect the terminal NIC to the router console port.
Use an RJ-45 to DB-9 adapter on the terminal serial port to connect to the cable going to the router console.
Use a transceiver to connect a straight-through cable to the router console port.
Use a rollover cable to connect from a terminal serial port to the router console port.
The startup-config file will be ignored at bootup.
The router will load the IOS from Flash.
The router will enter ROM monitor mode upon reload.
The router will enter boot ROM mode and have limited capabilities.
The administrator can enter the b command to manually boot the IOS.
A(config)# router rip A(config-router)# no network 192.168.25.64
A(config)# router rip A(config-router)# passive-interface S0/0
B(config)# router rip B(config-router)# passive-interface S0/1
(config)# no router rip
B(config)# router rip B(config-router)# network 192.168.25.32 B(config-router)# network 192.168.25.48
Packet switching
Microsegmentation
Domain name resolution
Path selection
Flow control
Three Telnet lines are available for remote access.
Two Telnet lines are available for remote access.
Future configuration of the remaining Telnet lines will require the password to be set to g8k33pr.
To login to the remote device, g8k33pr will be used as the Telnet and secret password.
Remote access to this local router will require a Telnet password of g8k33pr.
The version for this IOS file is 12.1 release 5
The file format for this IOS version is T12
The expression mz indicates whether the file is relocatable
The image could be used on a 2620 with enough RAM
The number 121 indicates that this version of the software has been updated 121 times
To enable support personnel to easily identify networks and customers that may be affected by a possible interface issue
To provide comments on the interface without affecting the router functionality
To display access warning messages before users enter the interface configuration mode
To eliminate the need to use IP addresses when using the ping and telnet commands
To identify the purpose and location of the interface
Marketing(config)# ip route 192.18.150.0 255.255.255.0 fa 0/0
Marketing(config)# ip route 192.18.160.0 255.255.255.0 198.18.160.1
Marketing(config)# ip route 0.0.0.0 0.0.0.0 fa0/0
Sales(config)# ip route 192.0.2.0 255.255.255.0 fa 0/0
Sales(config)# ip route 0.0.0.0 0.0.0.0 s0/0
They provide enough information in the Layer 3 address to allow a packet to be forwarded from one network to another
They carry user data between networks
They allow routers to share information about networks and their proximity to each other
They are used by routers to maintain routing tables
RIP and IGRP are routed protocols
Quiz Review Timeline (Updated): Mar 22, 2022 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
CISCO QUIZ 5.1 V2
CISCO QUIZ 5.1 V2 tests knowledge on data link layer functions, communication tools, network device roles, router operations, and port numbers.
Questions:
161 |
Attempts:
332 |
Last updated:
Mar 19, 2023
|
CCNA Cyber Ops (210-250 SECFND)
This CCNA Cyber Ops (210-250 SECFND) quiz assesses knowledge on cryptography, SSL\/TLS communications, cipher types, hash algorithms, and data integrity. It prepares learners for...
Questions:
114 |
Attempts:
549 |
Last updated:
Mar 21, 2023
|
Cisco CyberOps Security Fundamentals Section )
The Cisco Cyber security Fundamentals quiz below aids those preparing for the first of two exams leading to that certification by helping understand cyber security basics,...
Questions:
10 |
Attempts:
356 |
Last updated:
Mar 20, 2023
|
Basic Cisco Networking Quiz
How good are you at computer networking? Play this informative Cisco Computer Networking quiz and gauge your skills and knowledge. This quiz contains many factual, conceptual, and...
Questions:
25 |
Attempts:
17415 |
Last updated:
Jun 28, 2024
|
WebEx Trivia Test! Short Quiz
Long before the introduction of the internet, people had to be physically present for meetings or wait for a long time so that they can know the outcomes of the said meetings....
Questions:
5 |
Attempts:
164 |
Last updated:
Mar 16, 2023
|
CISCO Exam Test NR1
This CISCO exam test NR1 assesses knowledge on private IP ranges, OSI model functions, and network addressing. It evaluates skills in router functions and subnetting within a...
Questions:
50 |
Attempts:
463 |
Last updated:
Mar 19, 2023
|
Wait!
Here's an interesting quiz for you.