Copyrights © 2012 Jatin Kotadiya. All Rights Reserved . Powered by Blogger.

Monday, November 26, 2012

CCN AMCQ

 CCNA MCQS with Answers Set-1
Here are 10 Multiple Choice exams questions for you to practice on:

Question 1# - Which of the following are ways to provide login access to a router? (choose all that apply)

A. HTTP
B. Aux Port
C. Console
D. LLC
E. Telnet
F.
 


Question 2# - Which statement is true regarding the user exec and privileged exec mode?

A. They both require the enable password
B. User exec is a subset of the privileged exec
C. The '?' only works in Privileged exec
D. They are identical

  

Question 3# - This modem standard has a speed of 28.8k and has error-correction features.

A. V.42
B. V.32bis
C. V.90
D. V.34


Questions 4# - What would be the proper command to set a DCE clock rate of 56k for a serial interface?

A. Router (config) # clockrate 56000
B. Router# clockrate 56000.
C. Router (config-if) #clock rate 56000
D. Router (config-if) # clockrate 56k



Question 5# - What is an example of a MAC address?

A. Az32:6362:2434
B. BA:281x:8288
C. 101:354:665:8734:ffd6:8023
D. A625:cbdf:6525



Question 6# - Which command does not show that two devices are failing to route packets between them successfully?

A. show interface
B. trace
C. telnet
D. ping


Question 7# - You are designing a network which needs to support 200 users. You don't plan to extend the segment beyond the current number of users. Which subnet mask would best meet your needs? Select the best answer.

A. 255.255.0.0
B. 255.255.255.0
C. 255.0.0.0
D. 255.224.0.0
E. 255.255.255.200


Question 8# - MAC is to Ethernet what ________ is to Frame Relay.

A. DLCI
B. LCI
C. PVC
D. None of the above


Question 9# - The 802.2 frame specifies a type whereas 802.3 frame specifies a length:

A. True
B. False


Question 10# - What is used to see if a client is still connected to a NetWare server?

A. Spoofing TCPSAP
B. Watchdog packet
C. GNS Round Robin
D. DNS Round Robin



ANSWERS


Question 1 - Correct Answers: B,C,E
Question 2 - Correct Answers: B
Question 3 - Correct Answers: A
Question 4 - Correct Answers: C
Question 5 - Correct Answers: D
Question 6 - Correct Answers: A
Question 7 - Correct Answers: B
Question 8 - Correct Answers: A
Question 9 - Correct Answers: A
Question 10 - Correct Answers: B

 
1. Which protocol working at the Transport layer provides a connectionless service between hosts?
A. IP
B. ARP
C. TCP
D. UDP
Answer: D
User Datagram Protocol is used at the Transport layer to provide a connectionless service.

 
2. Which protocol works at the Transport layer and provides virtual circuits between hosts?
A. IP
B. ARP
C. TCP
D. UDP
Answer: C
Transmission Control Protocol sets up a virtual circuit before transmitting any data. This creates a reliable session and is known as a connection-oriented session.

 
3. Which protocol works at the Internet layer and provides a connection service between hosts? 
A. IP
B. ARP
C. TCP
D. UDP
Answer: A
Internet Protocol is used to address hosts and route packets through the internetwork. The question does not refer to a connection-oriented service, which is different from a plain connection service.

 
4. If a host broadcasts a frame that includes a source and destination hardware address, and its purpose is to assign IP addresses to itself, which protocol at the Network layer does the host use?
A. RARP
B. ARPA
C. ICMP
D. TCP
E. IPX
Answer: A
Reverse ARP is used to find an IP address from a known hardware address.

 
5. If a router interface is congested, which protocol in the IP suite is used to tell neighbor routers?
A. RARP
B. ARP
C. ICMP
D. IP
E. TCP
Answer: C
Internet Control Message Protocol (ICMP) is used to send redirects back to an originating router.

 
6. What is the valid host range the IP address 172.16.10.22 255.255.255.240 is a part of? 
A. 172.16.10.20 through 172.16.10.22
B. 172.16.10.1 through 172.16.10.255
C. 172.16.10.16 through 172.16.10.23
D. 172.16.10.17 through 172.16.10.31
E. 172.16.10.17 through 172.16.10.30
Answer: E
First start by using the 256 mask, which in this case is 256–240=16. The first subnet is 16; the second subnet is 32. This host must be in the 16 subnet; the broadcast address is 31 and the valid host range is 17–30.

 
7. What range of addresses can be used in the first octet of a Class B network address?
A. 1–126
B. 1–127
C. 128–190
D. 128–191
E. 129–192
F. 192–220
Answer: D
A Class B network is defined in the first octet with the numbers 128–191.

 
8. What range of addresses can be used in the first octet of a Class C address?
A. 1-127
B. 129-192
C. 203-234
D. 192-223
Answer: D
A Class C network is defined in the first octet with the numbers 192-223.

 
9. How many bytes is an Ethernet address?
A. 3
B. 4
C. 5
D. 6
E. 7
F. 8
G. 16
Answer: D
An Ethernet (MAC) address is 6 bytes long (48 bits).

 
10. What protocol is used to find the hardware address of a local device?
A. RARP
B. ARP
C. IP
D. ICMP
E. BootP
Answer: B
Address Resolution Protocol (ARP) is used to find the hardware address from a known IP address.

 
11. Which of the following is the broadcast address for a Class B network ID using the default subnet mask?
A. 172.16.10.255
B. 172.16.255.255
C. 172.255.255.255
D. 255.255.255.255
Answer: B
A Class B network address is two bytes long, which means the host bits are two bytes long. The network address must be 172.16.0.0, which is all host bits off. The broadcast address is all bits on, or 172.16.255.255.

 
12. Which class of IP address provides a maximum of only 254 host addresses per network ID?
A. A
B. B
C. C
D. D
E. E
Answer: C
A Class C network address only has 8 bits for defining hosts. 2^8–2=254.

 
13. What is the broadcast address of the subnet address 10.254.255.19 255.255.255.248?
A. 10.254.255.23
B. 10.254.255.24
C. 10.254.255.255
D. 10.255.255.255
Answer: A
First start with 256 mask or in this case, 256–248=8. The first subnet is 8. The second subnet is 16, then 24. This host is in the 16 subnet, the broadcast address is 23, and the valid host range is 17–22.

 
14. What is the broadcast address of the subnet address 172.16.99.99 255.255.192.0?
A. 172.16.99.255
B. 172.16.127.255
C. 172.16.255.255
D. 172.16.64.127
Answer: B
First start with 256 mask or in this case, 256-192=64. 64 is the first subnet; 128 is the second subnet. This host is in the 64-subnet range, the broadcast address is 127, and the valid host range is 65-126.

 
15. If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use?
A. 255.255.255.252
B. 255.255.255.248
C. 255.255.255.240
D. 255.255.255.255
Answer: C
Take a look at the answers and see which subnet mask will give you what you need for subnetting. 252 gives you 62 subnets, 248 gives you 30 subnets, 240 gives you 14 subnets, and 255 is invalid. Only answer C (240) gives you what you need.

 
16. What is the port number range that a transmitting host can use to set up a session with another host?
A. 1–1023
B. 1024 and above
C. 1–256
D. 1–65534
Answer: B
Source hosts can use any port number starting at 1024.

 
17. Which of the following ranges are considered well-known port numbers?
A. 1–1023
B. 1024 and above
C. 1–256
D. 1–65534
Answer: A
The port numbers 1–1023 are defined as and considered well-known port numbers.

 
18. What is the broadcast address of the host subnet address 10.10.10.10 255.255.254.0?
A. 10.10.10.255
B. 10.10.11.255
C. 10.10.255.255
D. 10.255.255.255
Answer: B
First start with 256-254=2. The first subnet is 2, the second subnet is 4, then 6, 8, 10, and 12. Remember that the fourth octet is host addresses. This host is a part of the subnet 10.0, the broadcast address is 11.255, and the valid host range is 10.1 through 11.254.

 
19. What broadcast address will the host 192.168.210.5 255.255.255.252 use?
A. 192.168.210.255
B. 192.168.210.254
C. 192.168.210.7
D. 192.168.210.15
Answer: C
Start with the 256 mask or in this case, 256-252=4. This first subnet is 4. The second subnet is 8. This falls in the 4-subnet range. The broadcast address is 7, and the valid hosts are 5 and 6.

 
20. If you need to have a Class B network address subnetted into exactly 510 subnets, what subnet mask would you assign?
A. 255.255.255.252
B. 255.255.255.128
C. 255.255.0.0
D. 255.255.255.192
Answer: B
If you use the mask 255.255.255.0, that only gives you eight subnet bits, or 254 subnets. You are going to have to use one subnet bit from the fourth octet, or 255.255.255.128. This is 9 subnet bits (2^9–2=510).

 
1. Which protocol is used to look up an IP address from a known Ethernet address?
A. IP
B. ARP
C. RARP
D. TCP
Answer: C
The protocol at the Network layer that finds an IP address from a known Ethernet address is Reverse ARP (RARP). See Chapter 3 for more information on IP protocols.

 
2. What is the subnet address of the IP address 192.168.100.30 255.255.255.248?
A. 192.168.100.32
B. 192.168.100.24
C. 192.168.100.0
D. 192.168.100.16
Answer: B
Start by using 256, the subnet mask, which is 256-248=8. The first subnet is 8. The next subnet would be 16, then 24, and then 32. This host is in the 24 subnet, the broadcast address is 31, and the valid host range is 25 through 31. See Chapter 3 for more information on IP addressing.

 
3. Which of the following is the valid host range for the IP address 192.168.168.188 255.255.255.192?
A. 192.168.168.129-190
B. 192.168.168.129-191
C. 192.168.168.128-190
D. 192.168.168.128-192
Answer: A
Start by using 256, the subnet mask, which is 256-192=64. The first subnet is 64. The next subnet would be 128. This host is in the 128 subnet, the broadcast address is 191, and the valid host range is 129 through 190. See Chapter 3 for more information on IP addressing.

 
4. What is the broadcast address of the subnet address 192.168.99.20 255.255.255.252?
A. 192.168.99.127
B. 192.168.99.63
C. 192.168.99.23
D. 192.168.99.31
Answer: C
Start by using 256, the subnet mask, which is 256-25=4. The first subnet is 4. The next subnet would be 8, then 12, 16, 20, and 24. The broadcast address is 23, and the valid host range is 21 and 22. See Chapter 3 for more IP addressing information.

 
5. What is the valid host range that the host ID 192.168.10.33 255.255.255.224 is a part of?
A. 192.168.10.32-63
B. 192.168.10.33-63
C. 192.168.10.33-62
D. 192.168.10.33-61
Answer: C
Start by using 256, the subnet mask, which is 256-224=32. The first subnet is 10.32. The next subnet would be 10.64. This host is in the 10.32 subnet, the broadcast address is 10.63, and the valid host range is 10.33 through 10.62. See Chapter 3 for more IP addressing information.

 
1. Which protocol does DHCP use at the Transport layer?
A. IP
B. TCP
C. UDP
D. ARP
Answer: C
User Datagram Protocol is a connection network service at the Transport layer, and DHCP uses this connectionless service. See Chapter 3 for more information.

 
2. Which of the following is the valid host range for the IP address 192.168.168.188 255.255.255.192?
A. 192.168.168.129-190
B. 192.168.168.129-191
C. 192.168.168.128-190
D. 192.168.168.128-192
Answer: A
· 256-192=64. 64+64=128. 128+64=192. The subnet is 128, the broadcast address is 191, and the valid host range is the numbers in between, or 129-190. See Chapter 3 for more information.

 
3. Which protocol is used to find an Ethernet address from a known IP address?
A. IP
B. ARP
C. RARP
D. BootP
Answer: B
If a device knows the IP address of where it wants to send a packet, but doesn't know the hardware address, it will send an ARP broadcast looking for the hardware or, in this case, Ethernet address. See Chapter 3 for more information.

 
4. Which class of IP address has the most host addresses available by default?
A. A
B. B
C. C
D. A and B
Answer: A
Class A addressing provides 24 bits for hosts addressing. See Chapter 3 for more information.

 
5. Which protocol does Ping use?
A. TCP
B. ARP
C. ICMP
D. BootP
Answer: C
ICMP is the protocol at the Network layer that is used to send echo requests and replies. See Chapter 3 for more information.

 
6. Which protocol is used to send a Destination Network Unknown message back to originating hosts?
A. TCP
B. ARP
C. ICMP
D. BootP
Answer: C
ICMP is the protocol at the Network layer that is used to send messages back to an originating router. See Chapter 3 for more information.

 
1. What is the subnet broadcast address the host 192.168.10.17 with four bits of subnetting will use?
A. 192.168.10.16
B. 192.168.10.19
C. 192.168.10.23
D. 192.168.10.31
Answer: D
When referring to only subnet bits, add the bits to the default mask. In this case, it is a Class C address, and the default mask is 255.255.255.0. Four bits would make the mask 255.255.255.240. 256-240=16. 16+16=32. Therefore, the subnet broadcast must be 192.168.10.31.

 
2. What is the subnet broadcast address the host 172.16.10.12 with nine bits of subnetting will use?
A. 172.16.10.127
B. 172.16.10.255
C. 172.16.255.255
D. 172.16.10.128
Answer: A
The default mask for Class B network IDs is 255.255.0.0. By adding nine subnet bits, the subnet mask is 255.255.255.128. The subnet is 172.16.10.0, and the broadcast address is 172.16.10.127. This is determined by looking at the host ID, which is 12 in this case. Since it is less than 128, the subnet must be zero in the fourth octet.

 
3. What is the valid host range of the IP subnet address 172.16.10.61 255.255.255.224?
A. 172.16.10.48-63
B. 172.16.10.33-62
C. 172.16.10.0-254
D. 172.16.10.60-94
Answer: B
· 256-224=32. 32+32=64. The subnet is 172.16.10.32, and the broadcast address is the number right before the next subnet (63 in this question). The valid hosts are the numbers in between the network ID and the broadcast address: 33-62.

 
4. What protocol is used to resolve an Ethernet address to an IP address?
A. IP
B. ARP
C. RARP
D. BootP
Answer: C
The RARP protocol is used to find an IP address from a known hardware address.

 
5. What protocol is used to resolve an IP address to an Ethernet address?
A. IP
B. ARP
C. RARP
D. BootP
Answer: B
The ARP protocol is used to find the hardware address from a known IP address.

 
 CCNA MCQS with Answers Set-2

Here are 10 Multiple Choice exams questions for you to practice on:


Question 1# - Which of the following are valid parameters for an extended IPX access list (Choose all that apply)?

A. source-network
B. permit or deny
C. source-socket
D. protocol
E. list-number

 
Question 2# - Which of the following is not valid?

A. router#show RAM
B. router>show version
C. router#show running-config
D. router#show startup-config


 
Question 3# - Which of the following is a congestion management scheme that identifies conversations, separates packets that belong to each conversation, and shares bandwidth fairly between the various streams?

A. Weighted Priority queuing
B. Prioritizing queuing
C. FIFO fair queuing
D. Weighted fair queuing


 
Question 4# - Which of the following describes a full-duplex transmission?

A. Data transmission in only one direction
B. Data transmission in both directions, but only one way at a time
C. Uses a single cable
D. Uses a point-to-point connection from the transmitter of the transmitting station to the receiver of the receiving station


 
Question 5# - What would be the proper command to set a bandwidth of 56K for a serial interface?

A. Router# bandwidth 56000
B. Router (config-if) #bandwidth 56,000
C. Router (config) #bandwidth 56000
D. Router (config-if) #bandwidth 56


 
Question 6# - Which of the following is not part of the data link layer?

A. Determines network topology
B. Performs flow control
C. Performs physical addressing
D. Terminates a session
E. Transports data across the physical link


 

Question 7# - You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class of address, subnet address, and broadcast address?

A. Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255

B. Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127

C. Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255

D. Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127.


 
Question 8# - Coaxial cable was used for which types of ethernet networks? (Select 2)

A. 10Base-T
B. 100Base-T4
C. 10Base2
D. 100Base-FX
E. 10Base5
F. 100Base-T


 
Question 9# - As a system administrator, you need to set up one Ethernet interface on the Cisco router to allow for both sap and Novell-ether encapsulations. Which set of commands will accomplish this?

A.
interface ethernet 0.1
ipx encapsulation Novell-ether
ipx network 9e
interface ethernet 0.2
ipx encapsulation sap
ipx network 6c

B.
interface ethernet 0.1
ipx encapsulation Novell-ether
interface ethernet 0.2
ipx encapsulation sap

C.
interface ethernet 0
ipx encapsulation Novell-ether
ipx network 9e
interface ethernet 0
ipx encapsulation sap
ipx network 6c

D.
interface ethernet 0.1
ipx encapsulation Novell-ether
ipx network 9e
interface ethernet 0.2
ipx network 6c


 
Question 10# - Using a switch we divide the network into multiple _________ domains

A. collision
B. broadcast
C. bridged
D. virtual


 
ANSWERS

Question 1 - Correct Answers: A, B,C,D,E
Question 2 - Correct Answers: A
Question 3 - Correct Answers: D
Question 4 - Correct Answers: D
Question 5 - Correct Answers: D
Question 6 - Correct Answers: D
Question 7 - Correct Answers: B
Question 8 - Correct Answers: C,E
Question 9 - Correct Answers: A
Question 10 - Correct Answers: A

 CCNA MCQS with Answers Set-3

Question 1: What command will show you the routed protocols running on your Cisco router?
Answer: show protocols


Question 2: What type of cable should you use to connect to the console port of a Cisco router?
Answer: Rollover cable


Question 3: What type of ethernet cable should you use to connect a Hub and a Switch or two Switches?
Answer: Crossover cable



Question4: RIP uses bandwidth and delay to the determine the best path to a destination network (TrueFalse)
Answer: False. RIP uses only hop count



Question 5: Which statement about MAC addresses is correct?

A. The MAC address can never be changed.
B. A MAC address is represented by binary digits that are organized in pairs.
C. A MAC address is a number in hexadecimal format that is physically located on the NIC.
D. It is not necessary for a device to have a unique MAC address to participate in the network.
Answer: C




Question 6: Which of the following is an IOS command that can be used to increase the security of unused switch ports?

A. Port security
B. Mac-secure
C. Firewall
D. Shutdown
Answer: D



Question 7: IP addresses are represented by:

A. 16-bit decimal numbers
B. 32-bit binary numbers
C. 8 sets of 4-bit decimal numbers
D. 8-bit binary numbers
Answer: B



Question 8: What does the command ip route 192.168.50.0 255.255.255.0 10.2.1.3 specify?

A. The router should use network 192.168.50.0 to get to address 10.2.1.3.
B. Both 192.168.50.0 and 10.2.1.3 use a mask of 255.255.255.0.
C. You want the router to trace a route to network 192.168.50.0 via 10.2.1.3.
D. The router should use address 10.2.1.3 to get to devices on network 192.168.50.0.
Answer: D


Question 9: Which of the following protocols is an example of an exterior gateway protocol?

A. BGP
B. RIP
C. EIGRP
D. OSPF
Answer: A


Question 10: What does the configuration register 0x2102 do?

Answer: Instructs the router to look in NVRAM for the boot sequence

0 comments:

Post a Comment