CCENT 2
Quiz-summary
0 of 25 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
Information
CCENT Practice Quiz Bank 2
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 25 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- Answered
- Review
-
Question 1 of 25
1. Question
What command configures a router to pass DHCP requests to a centralized DHCP server?
Correct
Incorrect
-
Question 2 of 25
2. Question
What best describes what an L2 LAN switch does?
Correct
Incorrect
L2 switches forward frames based on MAC address.
Packets are Layer 3 datagrams, and while a switch forwards the packets encapsulated in layer 2 headers, it does not use anything at layer 3 to make the forwarding decision. You could say that packets are forwarded, and forwarding is based on the MAC address, but that is not the best description, and since packets could be fragmented, it is not correct.
-
Question 3 of 25
3. Question
Which of the following are true regarding cut-through and a store-and-forward switching methods? Choose 2
Correct
Incorrect
-
Question 4 of 25
4. Question
Which of the following is possible with VLSM? Choose 3.
Correct
Incorrect
-
Question 5 of 25
5. Question
Match the following traffic types with their characteristics
Sort elements
- Telnet
- FTP
- RTP
- HTTP
- HTTPS
- SSH
-
Very small packets, used for unencrypted, text based device control
-
Bulk data transfer, bursty, not very delay sensitive.
-
Most often seen carrying voice and video media.
-
Transactional data, carries website data unencrypted.
Correct
Incorrect
-
Question 6 of 25
6. Question
Match the protocols with the port numbers they use
Sort elements
- SMTP
- Telnet
- DNS
- FTP Control
- FTP Data
- POP3
-
25
-
23
-
53
-
21
-
20
-
110
Correct
Incorrect
-
Question 7 of 25
7. Question
Which of the following are RFC 1918 private addresses? Choose 3.
Correct
Incorrect
RFC 1918 defines the following as private address ranges:
10.0.0.0 - 10.255.255.255 (10/8 prefix) 172.16.0.0 - 172.31.255.255 (172.16/12 prefix) 192.168.0.0 - 192.168.255.255 (192.168/16 prefix)
10.12.256.6 is an invalid address, 256 is not a valid octet value.
-
Question 8 of 25
8. Question
How does Cisco create an EUI-64 IPv6 address for a LAN interface?
Correct
Incorrect
EUI-64 addresses are created by inserting the Hex value FFFE between the first 24 bits and the last 24 bits in the interface MAC address. Since the burned in MAC address is guaranteed globally unique, the IP address is guaranteed to be unique on the network.
-
Question 9 of 25
9. Question
Match the protocols/programs with the functions they perform.
Sort elements
- Telnet
- SSH (Secure Shell)
- Ping
- Tracert
- SNMP
- SMTP
- HTTP
-
Used for unencrypted shell access
-
Used for encrypted text based control
-
Test basic network connectivity
-
Show the path a network packet takes between two hosts
-
Most often used to read values from a network host, but can also set them
Correct
Incorrect
-
Question 10 of 25
10. Question
Which command disables telnet on a Cisco router or switch?
Correct
Incorrect
-
Question 11 of 25
11. Question
Match the network devices with their function. Functions can overlap, so choose the best description.
Sort elements
- Hub
- Layer 2 Switch
- Bridge
- Router
- Layer 3 Switch
-
Connects multiple Ethernet devices in a single collision domain
-
Connects multiple Ethernet endpoints in separate collision domains
-
Separates collision domains
-
Separates broadcast domains
-
Can separate both collision and broadcast domains in a single device
Correct
Incorrect
Technically a bridge and a switch provide the same function. A switch is just a bridge with more ports, but a switch is designed to connect end stations, where a bridge normally refers to a device that separates hubs.
Both a router and a Layer 3 switch device broadcast domains, but a layer 3 switch is designed to provide endpoint connection with collision domain separation, as well.
-
Question 12 of 25
12. Question
What network device would be most likely to be used to connect a LAN to a T1 for WAN access?
Correct
Incorrect
-
Question 13 of 25
13. Question
What command causes all passwords stored in clear text in the configuration to be encrypted with a reversible encryption?
Correct
Incorrect
-
Question 14 of 25
14. Question
All the devices on your network are only able to operate a half duplex due to a limitation of your network devices. Which action would most likely allow your devices to run at full duplex?
Correct
Incorrect
The correct answer is to replace your hubs with switches. Since switches are a shared bus technology, only one device can be transmitting on the entire Ethernet network, and devices cannot operate in full duplex. Going the other way definitely will not help you. Replacing hubs with routers is not likely to even allow your network to function. Placing bridges between your hubs will reduce the size of the collision domains, and should reduce collisions, but the devices connected to the hubs will still need to operate in half-duplex.
-
Question 15 of 25
15. Question
How has RFC 1918 slowed the depletion of IP addresses?
Correct
Incorrect
RFC 1918 provides 3 address ranges that can be assigned to endpoints in private networks.
-
Question 16 of 25
16. Question
What command verifies whether a router is synchronized with an NTP source?
Correct
Incorrect
-
Question 17 of 25
17. Question
Which command will create a user named “ccna”, with a password of “cisco”, and full rights on the device?
Correct
Incorrect
“username ccna privilege 15 password cisco” is the correct command structure. 16 is not a valid privilege level, and if you enter it as “username ccna password cisco privilege 15,” you end up with a standard user with a password of “cisco privilege 15”
-
Question 18 of 25
18. Question
Which devices would you use to separate Ethernet segments on the same network into different collision domains?
Correct
Incorrect
-
Question 19 of 25
19. Question
What can access list 5 be used for?
Correct
Incorrect
Access lists 1-99 are standard access lists, which only match on source IP address.
-
Question 20 of 25
20. Question
Match the password encryption types with their properties
Sort elements
- Type 0
- Type 4
- Type 5
- Type 7
-
Plain Text
-
SHA based hash
-
MD5 based hash
-
Cisco proprietary reversible encryption
Correct
Incorrect
Cisco encodes a type in any command that stores a password. Type 0 is unencrypted, Type 7 is a reversible encryption, suitable for preventing a password from being seen “over the shoulder,” but easy to decrypt. Type 5 passwords use a non-reversible encryption, based on combining the password with a pseudo random value, and then computing an MD5 hash. Type 4 was introduced in some newer IOS trains, and uses a similar process to the type 5, but using a longer SHA-1 hash for increased security.
-
Question 21 of 25
21. Question
What is most likely to cause late collisions?
Correct
Incorrect
Collisions can occur on any shared media Ethernet network, i.e. hubs or coax. Late carrier detect should prevent late collisions. If there is a duplex mismatch, with one side of a cable running at full duplex, and the other side running half duplex, the full duplex side may attempt to transmit while the half duplex side is transmitting. The half duplex side will detect this as a collision.
-
Question 22 of 25
22. Question
What best describes an Ethernet runt?
Correct
Incorrect
A frame smaller than 64 octets is padded to that length. Any frame smaller than 64 octets is considered a runt, and should be discarded. While it is true that a frame under 32 octets is a runt, and a runt would not have a properly calculated FCS, the most accurate description is a frame under 64 octets.
-
Question 23 of 25
23. Question
Why would you add a line to deny all unmatched traffic to the end of an access list?
Correct
Incorrect
-
Question 24 of 25
24. Question
What is the full command that “copy run start” is an abbreviation of?
Correct
Incorrect
-
Question 25 of 25
25. Question
Match the types of NAT with the problems the primarily address
Sort elements
- NAT Overload (Port Address Translation/PAT)
- one-to-one NAT
- Static NAT
-
Public IP Address depletion
-
Private IP Address overlap
-
Publishing services on servers with private IP addresses on the internet
Correct
Incorrect
These online CCNA practice quizzes are designed to be part of an effective CCNA training strategy. They are not meant to be a representation of the question formats you will see in the actual test, but rather to improve your understanding Cisco networking, and the other subjects you will see on the test. Make sure to check out the other CCNA topics on this site, and the other resources we have available.
Pingback: ICDN1 Practice exams