Dear Students, This Purpose of Preparation of Computer Network Online Test is in 30 Questions English. There is a collection of questions asked in the CCNA Exam. On answering each question one point will be given. And it is mandatory to bring 50% marks to pass. To start the test you have to click on Start Button. All the questions will have to be answered. Go to Last and click on Finish Button, after which your Result will appear on the screen. After clicking Finish, there will be three option shows below 1.Restart Quiz 2.View Question 3.Show Leader-board. After filling your name and e-mail id by clicking on the show leader-board, click on send, after which your result will be shown.
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score
Your score
Categories
Not categorized0%
Thanks for attend this Quiz
Your result has been entered into leaderboard
Loading
maximum of 30 points
Pos.
Name
Entered on
Points
Result
Table is loading
No data available
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Answered
Review
Question 1 of 30
1. Question
1 points
Which of the following are types of multi tasking?
Correct
Incorrect
Question 2 of 30
2. Question
1 points
Which of the following is used for avoiding network congestion.
Correct
Incorrect
Question 3 of 30
3. Question
1 points
One packet is 64 bytes. If number of packets send is 16000, then the total number of bytes sent is
Correct
Incorrect
Question 4 of 30
4. Question
1 points
Which of the following is true with respect to TCP
Correct
Incorrect
Question 5 of 30
5. Question
1 points
What do you use the Aux port for?
Correct
Incorrect
Question 6 of 30
6. Question
1 points
The CSMA/CD Ethernet IEEE committee is defined as which of the following?
Correct
Incorrect
Question 7 of 30
7. Question
1 points
How many Frame-relay encapsulation types are available with Cisco routers?
Correct
Incorrect
Question 8 of 30
8. Question
1 points
What is the maximum hop count for Link-State protocols?
Correct
Incorrect
Question 9 of 30
9. Question
1 points
What is the protocol number for TCP?
Correct
Incorrect
Question 10 of 30
10. Question
1 points
What is the administrative distance for RIP?
Correct
Incorrect
Question 11 of 30
11. Question
1 points
IP standard access lists use which of the following as a basis for permitting or denying packets?
Correct
Incorrect
Question 12 of 30
12. Question
1 points
When discussing static routes, what is the gateway parameter used for?
Correct
Incorrect
Question 13 of 30
13. Question
1 points
What is the IEEE specification for Spanning Tree Protocol?
Correct
Incorrect
Question 14 of 30
14. Question
1 points
CO is an acronym for which of the following?
Correct
Incorrect
Question 15 of 30
15. Question
1 points
What is the IP extended access list range?
Correct
Incorrect
Question 16 of 30
16. Question
1 points
What is the default interval for SAP updates?
Correct
Incorrect
Question 17 of 30
17. Question
1 points
What does a router do with a packet that it does not have a destination network for?
Correct
Incorrect
Question 18 of 30
18. Question
1 points
What type of frame does CDP use to gather information about it’s neighbors?
Correct
Incorrect
Question 19 of 30
19. Question
1 points
Which protocol is used for booting diskless workstations?
Correct
Incorrect
Question 20 of 30
20. Question
1 points
Which layer is responsible for synchronizing sending and receiving applications?
Correct
Incorrect
Question 21 of 30
21. Question
1 points
Which protocol gets a hardware address from a known IP address?
Correct
Incorrect
Question 22 of 30
22. Question
1 points
Which layer defines bit synchronization?
Correct
Incorrect
Question 23 of 30
23. Question
1 points
When would you use ISDN?
Correct
Incorrect
Question 24 of 30
24. Question
1 points
Which protocol will send a message to routers if a network outage or congestion occurs?
Correct
Incorrect
Question 25 of 30
25. Question
1 points
What is the protocol number for UDP?
Correct
Incorrect
Question 26 of 30
26. Question
1 points
What is the default LMI type?
Correct
Incorrect
Question 27 of 30
27. Question
1 points
You have two Cisco routers setup back-to-back in a lab using DTE/DCE cables. To which router would you add the clock rate command?
Correct
Incorrect
Question 28 of 30
28. Question
1 points
An ISDN BRI circuit can be described as which of the following?
Correct
Incorrect
Question 29 of 30
29. Question
1 points
The two sublayers of the IEEE Data Link Layer are which of the following?
Correct
Incorrect
Question 30 of 30
30. Question
1 points
The — terminal no editing — command will perform what function?
Correct
Incorrect
MCQ-SET 2
1. In generating RSA keys, what does Cisco recommend for the key modulus size?
Answer is A)
1024
2. What is the command that will reset the RSA keys on a Cisco router?
Answer is D)
zeroize
3. Which of the following is not a Cisco IOS security feature commonly found on Cisco ISRs?
Answer is D)
CDP
4. Which command can turn on logging of unsuccessful login attempts?
Answer is B)
auto secure.
5. What is the name of the secure files used in conjunction with the Cisco IOS Resilient Configuration?
Answer is A)
bootset
6. Which of the following is the graphical user environment that is used to configure many router settings and provides several wizards to automate certain tasks?
Answer is A)
SDM
7. Which of the following is not one of the high – level tasks that you can perform from Cisco SDM?
Answer is D)
Configuration Management
8. Which command would you enter to use Cisco SDM in a secure web session?
Answer is B)
ip http secure – server
9. What is the global configuration mode command that will allow you to specify the number of failed login attempts that trigger a quiet period?
Answer is D)
login block – for
10. What is the global configuration mode command that allows you to configure a banner message for use when attempting to access a router via Telnet or SSH?
Answer is D)
banner motd
11. What is the default delay between successive login attempts if the login block – for command is issued without further qualifications?
Answer is D)
1 sec
12. Which of the following is not one of the files necessary to run Cisco SDM on your router?
Answer is A)
sdm.bin
13. When an IPsec VPN tunnel is configured, how does the router determine what traffic is to traverse the VPN tunnel?
Answer is C)
Access list
14. Which IPsec protocol does both encryption and authentication?
Answer is A)
ESP
15. What is the default encryption type when using SDM to configure an IPsec VPN tunnel?
Answer is D)
3DES
16. In Cisco Easy VPN, what is the advantage of network extension plus mode over network extension mode?
Answer is D)
A loopback address is configured.
17. If you were working in the IOS command – line interface and needed to check on the status of a VPN tunnel, what command would you enter?
Answer is A)
show crypto ipsec sa
18. You would use ESP because it supports both encryption and authentication. ESP uses IP Protocol 50.
Answer is D)
Both A & B
19. When configuring a site – to – site VPN, what is the type that is designated when using a crypto map?
Answer is D)
IPSEC – ISAKMP
20. Put the following steps in the order in which they occur.
Answer is D)
All of Above
21. What command is used to designate that you will use Diffie – Hellman Group 2 for your key exchange?
Answer is A)
group 2
22. What is the name of the set of both the encryption algorithm and the integrity protocol used in the crypto map?
Answer is D)
Transform set
23. Which of the following modes encrypts the entire packet and adds a new header for IPsec?
Answer is A)
Tunnel mode
24. When configuring a crypto map for a VPN tunnel, what is the command to configure the remote end IP that you need to communicate with?
Answer is C)
set peer ip address
25. What purpose does the preshared key serve?
Answer is D)
Authentication
26. What protocol is considered a hybrid encryption protocol?
Answer is A)
SSH
27. The Subject field of a certificate contains what information?
Answer is D)
Company information
28. How many certificates are involved in the user authentication process?
Answer is C)
It depends
29. How many prime numbers are used in the Diffie – Hellman algorithm?
Answer is D)
One
30. What is the key length of Diffie – Hellman Group 2?