Online Networking Test - Networking Test 3

Instruction:

  • This is a FREE online test. Beware of scammers who ask for money to attend this test.
  • Total number of questions: 20.
  • Time allotted: 30 minutes.
  • Each question carries 1 mark; there are no negative marks.
  • DO NOT refresh the page.
  • All the best!

Marks : 2/20


Total number of questions
20
Number of answered questions
0
Number of unanswered questions
20
Test Review : View answers and explanation for this test.

1.
How many collision domains are created when you segment a network with a 12-port switch?
1
2
5
12
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Layer 2 switching creates individual collision domains.

2.
Which protocol is used to send a destination network unknown message back to originating hosts?
TCP
ARP
ICMP
BootP
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
ICMP is the protocol at the Network layer that is used to send messages back to an originating router.

3.
Which of the following services use TCP?
  1. DHCP
  2. SMTP
  3. HTTP
  4. TFTP
  5. FTP
1 and 2
2, 3 and 5
1, 2 and 4
1, 3 and 4
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
SMTP, HTTP and FTP use TCP.

4.
What is the address range of a Class B network address in binary?
01xxxxxx
0xxxxxxx
10xxxxxx
110xxxxx
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The range of a Class B network address is 128-191. This makes our binary range 10xxxxxx.

5.
You need to configure a server that is on the subnet 192.168.19.24/29. The router has the first available host address. Which of the following should you assign to the server?
192.168.19.0 255.255.255.0
192.168.19.33 255.255.255.240
192.168.19.26 255.255.255.248
192.168.19.31 255.255.255.248
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
A /29 is 255.255.255.248, which is a block size of 8 in the fourth octet. The subnets are 0, 8, 16, 24, 32, 40, etc. 192.168.19.24 is the 24 subnet, and since 32 is the next subnet, the broadcast address for the 24 subnet is 31. 192.168.19.26 is the only correct answer.

6.
You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be?
You copied the wrong configuration into RAM.
You copied the configuration into flash memory instead.
The copy did not override the shutdown command in running-config.
The IOS became corrupted after the copy command was initiated.
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Since the configuration looks correct, you probably didn't screw up the copy job. However, when you perform a copy from a network host to a router, the interfaces are automatically shut down and need to be manually enabled with the no shutdown command.

7.
What command is used to stop RIP routing updates from exiting out an interface but still allow the interface to receive RIP route updates?
Router(config-if)# no routing
Router(config-if)# passive-interface
Router(config-router)# passive-interface s0
Router(config-router)# no routing updates
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The (config-router)#passive-interface command stops updates from being sent out an interface, but route updates are still received.

8.
Which is true regarding EIGRP successor routes?
  1. A successor route is used by EIGRP to forward traffic to a destination.
  2. Successor routes are saved in the topology table to be used if the primary route fails.
  3. Successor routes are flagged as "active" in the routing table.
  4. A successor route may be backed up by a feasible successor route.
  5. Successor routes are stored in the neighbor table following the discovery process.
1 and 3
2 and 3
1 and 4
3, 4 and 5
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Successor routes are the routes picked from the topology table as the best route to a remote network, so these are the routes that IP uses in the routing table to forward traffic to a remote destination. The topology table contains any route that is not as good as the successor route and is considered a feasible successor, or backup route. Remember that all routes are in the topology table, even successor routes.

9.
Which type of OSPF network will elect a backup designated router?
  1. Broadcast multi-access
  2. Non-broadcast multi-access
  3. Point-to-point
  4. Broadcast multipoint
1 and 2
3 and 4
3 only
None of the above
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
DR and BDR are elected on broadcast and non-broadcast multi-access networks. Frame Relay is a non-broadcast multi-access (NBMA) network by default. No DR is assigned on any type of point-to-point link. No DR/BDR is assigned on the NBMA point-to-multipoint due to the hub/spoke topology.

10.
What is the purpose of Spanning Tree Protocol in a switched LAN?
To provide a mechanism for network monitoring in switched environments
To prevent routing loops in networks with redundant paths
To prevent switching loops in networks with redundant switched paths
To manage the VLAN database across multiple switches
To create collision domains
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The Spanning Tree Protocol (STP) was designed to stop layer 2 loops. All Cisco switches have the STP on by default.

11.
What does a switch do when a frame is received on an interface and the destination hardware address is unknown or not in the filter table?
Forwards the switch to the first available link
Drops the frame
Floods the network with the frame looking for the device
Sends back a message to the originating station asking for a name resolution
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Switches flood all frames that have an unknown destination address. If a device answers the frame, the switch will update the MAC address table to reflect the location of the device.

12.
Which of the following is true regarding VTP?
All switches are VTP servers by default.
All switches are VTP transparent by default.
VTP is on by default with a domain name of Cisco on all Cisco switches.
All switches are VTP clients by default.
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
All Cisco switches are VTP servers by default. No other VTP information is configured on a Cisco switch by default. You must set the VTP domain name on all switches to be the same domain name or they will not share the VTP database.

13.
Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?
STP
VTP
DHCP
ISL
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Virtual Trunk Protocol (VTP) is used to pass a VLAN database to any or all switches in the switched network. The three VTP modes are server, client, and transparent.

14.
Which of the following modes are valid when a switch port is used as a VLAN trunk?
  1. Blocking
  2. Dynamic auto
  3. Dynamic desirable
  4. Nonegotiate
  5. Access
  6. Learning
1, 2 and 6
2, 3 and 4
4, 5 and 6
2, 4, and 5
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The valid modes of a VLAN trunk on a switch are dynamic auto, dynamic desirable, trunk (on), and nonegotiate.

15.
If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use?
access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet
access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet
access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23
access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The extended access list ranges are 100-199 and 2000-2699, so the access-list number of 100 is valid. Telnet uses TCP, so the protocol TCP is valid. Now you just need to look for the source and destination address. Only the third option has the correct sequence of parameters. Answer B may work, but the question specifically states "only" to network 192.168.10.0, and the wildcard in answer B is too broad.

16.
Which of the following are disadvantages of using NAT?
  1. Translation introduces switching path delays.
  2. Conserves legally registered addresses.
  3. Causes loss of end-to-end IP traceability.
  4. Increases flexibility when connecting to the Internet.
  5. Certain applications will not function with NAT enabled.
  6. Reduces address overlap occurrence.
1, 3 and 5
3 and 4
2, 4 and 5
1 and 3
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
NAT is not perfect and can cause some issues in some networks, but most networks work just fine. NAT can cause delays and troubleshooting problems, and some applications just won't work.

17.
Which of the following is considered to be the address after translation?
Inside local
Outside local
Inside global
Outside global
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The host on the private network after translation is considered to be an inside global host.

18.
What is the maximum data rate for the 802.11b standard?
6Mbps
11Mbps
22Mbps
54Mbps
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The IEEE 802.11b standard provides a maximum data rate of up to 11Mbps.

19.
You are connecting your access point and it is set to root. What does Extended Service Set ID mean?
That you have more than one access point and they are in the same SSID connected by a distribution system.
That you have more than one access point and they are in separate SSIDs connected by a distribution system.
That you have multiple access points, but they are placed physically in different buildings.
That you have multiple access points, but one is a repeater access point.
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Extended Service Set ID means that you have more than one access point and they all are set to the same SSID and all are connected together in the same VLAN or distribution system so users can roam.

20.
Which statement(s) about IPv4 and IPv6 addresses are true?
  1. An IPv6 address is 32 bits long, represented in hexidecimal.
  2. An IPv6 address is 128 bits long, represented in decimal.
  3. An IPv4 address is 32 bits long, represented in decimal.
  4. An IPv6 address is 128 bits long, represented in hexidecimal.
1 and 3 only
2 only
3 and 4
2 and 4
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
IPv4 addresses are 32 bits long and are represented in decimal format. IPv6 addresses are 128 bits long and represented in hexadecimal format.

*** END OF THE TEST ***
Time Left: 00:29:56
Post your test result / feedback here: