OBJECT: Simulation of setting up Router Name and Password. REQUIRED SOFTWARE : Cisco Packet Tracer 8.1.1
Network Diagram
Setup this network:
Instruction’s Before LAB
Before Configuration on Switch the Connectivity is established between PC0 192.168.1.0.1 & PC1 192.168.1.11 A Terminal is connected to Console Port. Erase the entire configuration. Putty Software is used to manage the Hyper Terminal.
Console Port is used to configure Cisco Router. We want only Authentic users to configure the Router, so we set the password on the Console Port of the Router. We call this password as Console Password.
Dear Students, This Purpose of Preparation of Computer Network Online Test is in 30 Questions English. There is a collection of questions asked in the CCNA Exam. On answering each question one point will be given. And it is mandatory to bring 50% marks to pass. To start the test you have to click on Start Button. All the questions will have to be answered. Go to Last and click on Finish Button, after which your Result will appear on the screen. After clicking Finish, there will be three option shows below 1.Restart Quiz 2.View Question 3.Show Leader-board. After filling your name and e-mail id by clicking on the show leader-board, click on send, after which your result will be shown.
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score
Your score
Categories
Not categorized0%
Thanks for attend this Quiz
Your result has been entered into leaderboard
Loading
maximum of 30 points
Pos.
Name
Entered on
Points
Result
Table is loading
No data available
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Answered
Review
Question 1 of 30
1. Question
1 points
What type of switching creates variable latency through the switch?
Correct
Incorrect
Question 2 of 30
2. Question
1 points
Which layer of the 7 layer model provides services to the Application layer over the Session layer connection? (Choose two.)
Correct
Incorrect
Question 3 of 30
3. Question
1 points
When determining whether or not to route a LAN segment, which rule of thumb do you use?
Correct
Incorrect
Question 4 of 30
4. Question
1 points
Which of the following are examples of the Transport Layer?(Choose two.)
Correct
Incorrect
Question 5 of 30
5. Question
1 points
There are 2 types of PPP authentication supported by the Cisco IOS. What are they?
Correct
Incorrect
Question 6 of 30
6. Question
1 points
The Datalink Layer is broken down into 2 layers, LLC and MAC. The LLC establishes media independence and what else?
Correct
Incorrect
Question 7 of 30
7. Question
1 points
Which OSI Reference Layer controls application to application communication?
Correct
Incorrect
Question 8 of 30
8. Question
1 points
What is a characteristic of Store and Forward switches?
Correct
Incorrect
Question 9 of 30
9. Question
1 points
What is the standard ISDN term for a non-native analog telephone?
Correct
Incorrect
Question 10 of 30
10. Question
1 points
Which OSI Reference Layer is concerned with path determination?
Correct
Incorrect
Question 11 of 30
11. Question
1 points
If you are running Token Ring with Novell IPX routing, which encapsulation should you use?
Correct
Incorrect
Question 12 of 30
12. Question
1 points
Which can be true regarding VLANs?
Correct
Incorrect
Question 13 of 30
13. Question
1 points
Which two of the following are valid ways to have multiple encapsulation types on a single interface?
Correct
Incorrect
Question 14 of 30
14. Question
1 points
An ISDN BRI circuit can be described as which of the following?
Correct
Incorrect
Question 15 of 30
15. Question
1 points
Which two describe frame tagging?
Correct
Incorrect
Question 16 of 30
16. Question
1 points
Which of the following describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols?
Correct
Incorrect
Question 17 of 30
17. Question
1 points
Which of the following describes an industry-wide standard suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer 3 Network layer of the OSI model?
Correct
Incorrect
Question 18 of 30
18. Question
1 points
In which of the following technologies is the term HFC used?
Correct
Incorrect
Question 19 of 30
19. Question
1 points
Which of the following is true when describing a global unicast address?
Correct
Incorrect
Question 20 of 30
20. Question
1 points
Which of the following is true when describing a unicast address?
Correct
Incorrect
Question 21 of 30
21. Question
1 points
Which of the following is true when describing a link-local address?
Correct
Incorrect
Question 22 of 30
22. Question
1 points
Which of the following is true when describing a unique local address?
Correct
Incorrect
Question 23 of 30
23. Question
1 points
Which of the following is true when describing a multicast address?
Correct
Incorrect
Question 24 of 30
24. Question
1 points
Which command will allow you to see real-time translations on your router?
Correct
Incorrect
Question 25 of 30
25. Question
1 points
Which command will show you all the translations active on your router?
Correct
Incorrect
Question 26 of 30
26. Question
1 points
Which command will clear all the translations active on your router?
Correct
Incorrect
Question 27 of 30
27. Question
1 points
Which of the following is an example of a standard IP access list?
Correct
Incorrect
Question 28 of 30
28. Question
1 points
You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?
Correct
Incorrect
Question 29 of 30
29. Question
1 points
You have created a named access list called Blocksales. Which of the following is a valid command for applying this to packets trying to enter interface s0 of your router?
Correct
Incorrect
Question 30 of 30
30. Question
1 points
Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list?
Correct
Incorrect
MCQ SET-2
1. What type of switching creates variable latency through the switch?
Answer is B)
Store and Forward.
2. Which layer of the 7 layer model provides services to the Application layer over the Session layer connection?
Answer is D)
Presentation
3. Which OSI Reference Layer controls application to application communication?
Answer is C)
Session
4. What is a characteristic of Store and Forward switches?
Answer is B)
Frames
5. What is the standard ISDN term for a non-native analog telephone?
Answer is B)
TE2
6. Which OSI Reference Layer is concerned with path determination?
Answer is D
Network
7. If you are running Token Ring with Novell IPX routing, which encapsulation should you use?
Answer is D)
SNAP
8. An ISDN BRI circuit can be described as which of the following?
Answer is A)
2-64Kbps B channels and 1-16Kbps D channel
9. Which of the following describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols?
Answer is B)
VPN
10. Which of the following describes an industry-wide standard suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer 3 Network layer of the OSI model?
Answer is C)
IPSec
11. In which of the following technologies is the term HFC used?
Answer is B)
Cable Explain: In a modern network, hybrid fibre-coaxial (HFC) is a telecommunications industry term for a network that incorporates both optical fiber and coaxial cable to create a broadband network.
12. Which of the following is true when describing a global unicast address?
Answer is A)
These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4.
13. Which of the following is true when describing a unicast address?
Answer is C)
Packets addressed to a unicast address are delivered to a single interface.
14. Which of the following is true when describing a link-local address?
Answer is D)
These are like private addresses in IPv4 in that they are not meant to be routed.
15. Which of the following is true when describing a unique local address?
Answer is A)
These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap.
16. Which of the following is true when describing a multicast address?
Answer is C)
Packets are delivered to all interfaces identified by the address. This is also called a one-tomany address.
17. Which command will allow you to see real-time translations on your router?
Answer is A)
debug ip nat
18. Which command will show you all the translations active on your router?
Answer is D)
show ip nat translations
19. Which command will clear all the translations active on your router?
Answer is B)
clear ip nat translations *
20. Which of the following is an example of a standard IP access list?
Answer is A)
access-list 1 deny 172.16.10.1 0.0.0.0
21. You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?
Answer is D)
access-list 10 deny 192.168.160.0 0.0.31.255
22. You have created a named access list called Blocksales. Which of the following is a valid command for applying this to packets trying to enter interface s0 of your router?
Answer is A)
(config-if)#ip access-group Blocksales in
23. Which of the following access lists will allow only HTTP traffic into network 196.15.7.0?
Answer is D)
access-list 100 permit tcp any 196.15.7.0 0.0.0.255 eq www
24. A Cisco router is booting and has just completed the POST process. It is now ready to find and load an IOS image. What function does the router perform next?
Answer is B)
It checks the configuration register.
25. For IPX, what is the DEFAULT Cisco Encapsulation on an Ethernet interface?
Answer is A)
novell-ether
26. Which class of address allows for the fewest valid Internet hosts?
Answer is D)
class C
27. What is a characteristic of Store and Forward switches?
Answer is D)
They increase latency
28. Which OSI Reference Layer controls application to application communication?
Answer is B)
Session
29. What is a characteristic of Store and Forward switches?
Answer is A)
Frames
30. What is the standard ISDN term for a non-native analog telephone?