0 of 25 questions completed
CCENT Practice Quiz Bank 2
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
0 of 25 questions answered correctly
Time has elapsed
You have reached 0 of 0 points, (0)
- Question 1 of 25
What command configures a router to pass DHCP requests to a centralized DHCP server?CorrectIncorrect
- Question 2 of 25
What best describes what an L2 LAN switch does?CorrectIncorrect
L2 switches forward frames based on MAC address.
Packets are Layer 3 datagrams, and while a switch forwards the packets encapsulated in layer 2 headers, it does not use anything at layer 3 to make the forwarding decision. You could say that packets are forwarded, and forwarding is based on the MAC address, but that is not the best description, and since packets could be fragmented, it is not correct.
- Question 3 of 25
Which of the following are true regarding cut-through and a store-and-forward switching methods? Choose 2CorrectIncorrect
- Question 4 of 25
Which of the following is possible with VLSM? Choose 3.CorrectIncorrect
- Question 5 of 25
Match the following traffic types with their characteristics
- Very small packets, used for unencrypted, text based device control
- Bulk data transfer, bursty, not very delay sensitive.
- Most often seen carrying voice and video media.
- Transactional data, carries website data unencrypted.
- Question 6 of 25
Match the protocols with the port numbers they use
- FTP Control
- FTP Data
- Question 7 of 25
Which of the following are RFC 1918 private addresses? Choose 3.CorrectIncorrect
RFC 1918 defines the following as private address ranges:
10.0.0.0 - 10.255.255.255 (10/8 prefix) 172.16.0.0 - 172.31.255.255 (172.16/12 prefix) 192.168.0.0 - 192.168.255.255 (192.168/16 prefix)
10.12.256.6 is an invalid address, 256 is not a valid octet value.
- Question 8 of 25
How does Cisco create an EUI-64 IPv6 address for a LAN interface?CorrectIncorrect
EUI-64 addresses are created by inserting the Hex value FFFE between the first 24 bits and the last 24 bits in the interface MAC address. Since the burned in MAC address is guaranteed globally unique, the IP address is guaranteed to be unique on the network.
- Question 9 of 25
Match the protocols/programs with the functions they perform.
- SSH (Secure Shell)
- Used for unencrypted shell access
- Used for encrypted text based control
- Test basic network connectivity
- Show the path a network packet takes between two hosts
- Most often used to read values from a network host, but can also set them
- Question 10 of 25
Which command disables telnet on a Cisco router or switch?CorrectIncorrect
- Question 11 of 25
Match the network devices with their function. Functions can overlap, so choose the best description.
- Layer 2 Switch
- Layer 3 Switch
- Connects multiple Ethernet devices in a single collision domain
- Connects multiple Ethernet endpoints in separate collision domains
- Separates collision domains
- Separates broadcast domains
- Can separate both collision and broadcast domains in a single device
Technically a bridge and a switch provide the same function. A switch is just a bridge with more ports, but a switch is designed to connect end stations, where a bridge normally refers to a device that separates hubs.
Both a router and a Layer 3 switch device broadcast domains, but a layer 3 switch is designed to provide endpoint connection with collision domain separation, as well.
- Question 12 of 25
What network device would be most likely to be used to connect a LAN to a T1 for WAN access?CorrectIncorrect
- Question 13 of 25
What command causes all passwords stored in clear text in the configuration to be encrypted with a reversible encryption?CorrectIncorrect
- Question 14 of 25
All the devices on your network are only able to operate a half duplex due to a limitation of your network devices. Which action would most likely allow your devices to run at full duplex?CorrectIncorrect
The correct answer is to replace your hubs with switches. Since switches are a shared bus technology, only one device can be transmitting on the entire Ethernet network, and devices cannot operate in full duplex. Going the other way definitely will not help you. Replacing hubs with routers is not likely to even allow your network to function. Placing bridges between your hubs will reduce the size of the collision domains, and should reduce collisions, but the devices connected to the hubs will still need to operate in half-duplex.
- Question 15 of 25
How has RFC 1918 slowed the depletion of IP addresses?CorrectIncorrect
RFC 1918 provides 3 address ranges that can be assigned to endpoints in private networks.
- Question 16 of 25
What command verifies whether a router is synchronized with an NTP source?CorrectIncorrect
- Question 17 of 25
Which command will create a user named “ccna”, with a password of “cisco”, and full rights on the device?CorrectIncorrect
“username ccna privilege 15 password cisco” is the correct command structure. 16 is not a valid privilege level, and if you enter it as “username ccna password cisco privilege 15,” you end up with a standard user with a password of “cisco privilege 15”
- Question 18 of 25
Which devices would you use to separate Ethernet segments on the same network into different collision domains?CorrectIncorrect
- Question 19 of 25
What can access list 5 be used for?CorrectIncorrect
Access lists 1-99 are standard access lists, which only match on source IP address.
- Question 20 of 25
Match the password encryption types with their properties
- Type 0
- Type 4
- Type 5
- Type 7
- Plain Text
- SHA based hash
- MD5 based hash
- Cisco proprietary reversible encryption
Cisco encodes a type in any command that stores a password. Type 0 is unencrypted, Type 7 is a reversible encryption, suitable for preventing a password from being seen “over the shoulder,” but easy to decrypt. Type 5 passwords use a non-reversible encryption, based on combining the password with a pseudo random value, and then computing an MD5 hash. Type 4 was introduced in some newer IOS trains, and uses a similar process to the type 5, but using a longer SHA-1 hash for increased security.
- Question 21 of 25
What is most likely to cause late collisions?CorrectIncorrect
Collisions can occur on any shared media Ethernet network, i.e. hubs or coax. Late carrier detect should prevent late collisions. If there is a duplex mismatch, with one side of a cable running at full duplex, and the other side running half duplex, the full duplex side may attempt to transmit while the half duplex side is transmitting. The half duplex side will detect this as a collision.
- Question 22 of 25
What best describes an Ethernet runt?CorrectIncorrect
A frame smaller than 64 octets is padded to that length. Any frame smaller than 64 octets is considered a runt, and should be discarded. While it is true that a frame under 32 octets is a runt, and a runt would not have a properly calculated FCS, the most accurate description is a frame under 64 octets.
- Question 23 of 25
Why would you add a line to deny all unmatched traffic to the end of an access list?CorrectIncorrect
- Question 24 of 25
What is the full command that “copy run start” is an abbreviation of?CorrectIncorrect
- Question 25 of 25
Match the types of NAT with the problems the primarily address
- NAT Overload (Port Address Translation/PAT)
- one-to-one NAT
- Static NAT
- Public IP Address depletion
- Private IP Address overlap
- Publishing services on servers with private IP addresses on the internet
These online CCNA practice quizzes are designed to be part of an effective CCNA training strategy. They are not meant to be a representation of the question formats you will see in the actual test, but rather to improve your understanding Cisco networking, and the other subjects you will see on the test. Make sure to check out the other CCNA topics on this site, and the other resources we have available.