Cisco CCNA Practice Test
Which of the following statements concerning TCP and UDP are correct?
Please select 3 correct answers
Explanation:
The main difference between these protocols is that TCP is a connection-oriented protocol, while
UDP is a connectionless one. Each of the protocols has its strengths and weaknesses. One is much
faster, while the other is safer.
Which of the wireless protocols is the most reliable?
Explanation:
The Wi-Fi Alliance established three security and security certification methods to secure wireless computer
networks: Wi-Fi Protected Access (WPA), Wi-Fi Protected Access II (WPA2), and Wi-Fi Protected Access 3
(WPA3). These were specified by the Alliance in response to severe flaws discovered by researchers in the
previous system, Wired Equivalent Privacy (WEP).
What are the two main types of site-to-site VPNs?
Please select 2 correct answers
Explanation:
Intranet-based and Extranet-based VPNs are the two most frequent types of site-to-site VPNs. Intranet-based
site-to-site VPNs are used to connect numerous office sites' LANs into a single private network, referred to as a
WAN (Wide Area Network).
Which of the protocols listed below is a routed protocol?
Explanation:
An Internet Protocol address, such as 192.0.2.1, is a numerical label that identifies a computer network
that communicates using the Internet Protocol. The fundamental functionalities of an IP address are
network interface identification and location addressing.
DSCP bits are____ bits.
Explanation:
The main difference between IP precedence and DSCP is that IP precedence is a 3-bit field in TOC to give
priorities to the IP packets, while DSCP is 6 bits in Differential Services (DS) field for packet classification.
Generally, a computer network is a collection of networking devices connected together to exchange data.
What command is used to turn on the Cisco router interface?
Explanation:
The shutdown interface configuration command, which disables an interface, and the no shutdown command,
which enables it, are both available on the CISCO command-line interface.
During a Traffic Exceed, QoS.... is the mechanism used. Exceed Traffic is buffered and transmitted again after a brief delay.
Explanation:
Traffic shaping is a bandwidth management technique used on computer networks which delays some or
all datagrams to bring them into compliance with a desired traffic profile. Traffic shaping is used to optimize
or guarantee performance, improve latency, or increase usable bandwidth for some kinds of packets by
delaying other kinds. It is often confused with traffic policing, the distinct but related practice of packet
dropping and packet marking.
True/False: On Ethernet technology, CSMA/CD mechanisms prevent transmission at the same time.
Explanation:
Carrier-sense multiple access with collision detection (CSMA/CD) is a media access control (MAC) method used
most notably in early Ethernet technology for local area networking. It uses carrier -sensing to defer transmissions
until no other stations are transmitting.
What are the REST's primary characteristics?
Explanation:
Characteristics of REST and WS. 1. client- server. REST's client–server separation of concerns simplifies component
implementation, reduces the complexity of connector semantics, improves the effectiveness of performance tuning,
and increases the scalability of pure server components. REST enables intermediate processing by constraining
messages to be self-descriptive: interaction is stateless between requests, standard methods and media types are used
to indicate semantics and exchange.
Instead of SNMP, SDN uses ____ as a network configuration management protocol.
Explanation:
The Network Configuration Protocol (NETCONF) is a network management protocol developed and standardized
by the IETF. It was developed in the NETCONF working group and published in December 2006 as RFC 4741 and
later revised in June 2011 and published as RFC 6241. The NETCONF protocol specification is an Internet Standards
Track document.
To learn an unknown MAC address, what does a PC broadcast?
Explanation:
ARP (Address Resolution Protocol) Request ARP stands for address resolution protocol. This protocol is
used to find the MAC address of the device corresponding to its IP address. This protocol aims to create
communication between two devices on a local area network (Ethernet) byproviding the other device's
MAC address.
The ____ protocol is used to manage network devices.
Explanation:
Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing
information about managed devices on IP networks and for modifying that information to change device behavior.
Devices that typically support SNMP include cable modems, routers, switches, servers, workstations, printers, and
more. SNMP is widely used in network management for network monitoring.
Which of the following protocols is a Distance Vector Protocol?
Explanation:
Routing Information Protocol (RIP) is normally a broadcast protocol, and for RIP routing updates to reach
nonbroadcast networks, you must configure the Cisco software to permit this exchange of routing information.
To identify traffic bottlenecks between two sites, which router command is used?
Explanation:
The traceroutecommand returns the sequence of hops a packet has traversed in order to get to a destination from
a given source, allowing you to discover the path a packet takes to get to a destination from a given source. This
application is included with both your host operating system (such as Linux or Microsoft (MS) Windows) and Cisco
IOS® Software.
What are some examples of Denial of Service Attacks? (Choose three)
Please select 3 correct answers
Explanation:
TCP SYN flood (a.k.a. SYN flood) is a type of Distributed Denial of Service (DDoS) attack that exploits part of the
normal TCP three-way handshake to consume resources on the targeted server and render it unresponsive.
Ping of Death (a.k.a. PoD) is a type of Denial of Service (DoS) attack in which an attacker attempts to crash, destabilize,
or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command.
If Dynamic ARP Inspection (DAI) is enabled,.... is checked, and this ARP packet is permitted if the incoming MAC address is in this table.
Explanation:
The feature used in this procedure is called IP/MAC binding. Using CLI, an Administrator may configure manual
binding table and configure which MAC address corresponds to which IP address. This is only recommended in
small to medium networks. Extra caution is required to implement in large networks.
If each site has a centralized WLAN Controller and Access Points attached to it, this is...
Explanation:
A centralized network architecture is built around a single server that handles all the major processing.
Less powerful workstations connect to the server and submit their requests to the central server rather
than performing them directly. This can include applications, data storage, and utilities.
True/False: The Internet Protocol (IP) is a connectionless protocol.
Explanation:
The Internet Protocol (IP) is a connectionless protocol that splits huge volumes of data into smaller,
transmittable packets and controls addressing data from one point to another. The following are the
primary components of Internet Protocol datagrams: IP Identification (IPID) is a protocol for reassembling
broken packets and uniquely identifying IP datagrams.
What is the broadcast address for a 192.168.145.0 Class C address with the default Subnet Mask?
Explanation:
The correct answer:
192.168.145.255
What protocols are Link State Routing?
Please select 2 correct answers
Explanation:
OSPF (Open Shortest Path First) is an Internet Protocol (IP) routing protocol. It is part of the set of internal
gateway protocols (IGPs) that operate within a single autonomous system and uses the link state routing (LSR)
algorithm (AS). RFC 2328 (1998) defines it as OSPF Version 2 for IPv4.
Intermediate System to Intermediate System (IS-IS, also abbreviated ISIS) is a routing system for efficiently moving
data across a computer network, which is a collection of physically connected computers or similar devices. It does
it by determining the most efficient data path through a packet switching network.
Which of the following technologies is Fast Ethernet?
Please select 2 correct answers
Explanation:
The most common type of Fast Ethernet is 100BASE-TX, which uses two wire pairs inside
a category 5 or above cable.
A form of Fast Ethernet network implementation standard. 100BaseFX is a Fast Ethernet
variant that is commonly used to connect campus backbones.
What are the RPVST+ states?
Explanation:
RPVST+ is essentially RSTP that operates per-VLAN in a single layer 2 domain. In a multi-VLAN network,
VLAN tagging is used to enable the blocking of redundant links in one VLAN while enabling non-redundant
use of the same links by another VLAN.
What are the ones that are used with NAT?
Explanation:
Network address translation (NAT) is a method of translating one IP address space to another by changing
network address information in packets' IP headers while they are in transit through a traffic routing device.
Which of these is the Cisco-developed Neighbour Discovery Protocol?
Explanation:
Cisco Discovery Protocol (previously known as CDP) is a Layer 2 media-agnostic, network-agnostic protocol
that runs on Cisco equipment and allows networking applications to discover about directly linked devices 3
nearby.
For a boot system, the router looks to....
Explanation:
Non-volatile random-access memory (NVRAM) is a type of random-access memory that can maintain data
even after power is turned off. This is in contrast to dynamic random-access memory (DRAM) and static
random-access memory (SRAM), which both save data for as long as power is supplied, or magnetic tape,
which can't be randomly accessed but keeps data indefinitely without power.