Online Networking Test - Networking Test - Random

Instruction:

  • This is a FREE online test. Beware of scammers who ask for money to attend this test.
  • Total number of questions: 20.
  • Time allotted: 30 minutes.
  • Each question carries 1 mark; there are no negative marks.
  • DO NOT refresh the page.
  • All the best!

Marks : 2/20


Total number of questions
20
Number of answered questions
0
Number of unanswered questions
20
Test Review : View answers and explanation for this test.

1.
What command is used to create a backup configuration?
copy running backup
copy running-config startup-config
config mem
wr mem
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The command to back up the configuration on a router is copy running-config startup-config.

2.
How many collision domains are created when you segment a network with a 12-port switch?
1
2
5
12
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Layer 2 switching creates individual collision domains.

3.
Which protocol is used to send a destination network unknown message back to originating hosts?
TCP
ARP
ICMP
BootP
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
ICMP is the protocol at the Network layer that is used to send messages back to an originating router.

4.
Which of the following is the decimal and hexadecimal equivalents of the binary number 10011101?
155, 0x9B
157, 0x9D
159, 0x9F
185, 0xB9
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:

To turn a binary number into decimal, you just have to add the values of each bit that is a 1. The values of 10011101 are 128, 16, 8, 4, and 1. 128 + 16 + 8 + 4 + 1 = 157.

Hexadecimal is a base-16 number system. The values of hexadecimal are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F-16 characters total, from which to create all the numbers you'll ever need. So, if 1001 in binary is 9, then the hexadecimal equivalent is 9. Since we then have 1101, which is 13 in binary, the hexadecimal answer is D and the complete hexadecimal answer is 0x9D.


5.
What protocol is used to find the hardware address of a local device?
RARP
ARP
IP
ICMP
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Address Resolution Protocol (ARP) is used to find the hardware address from a known IP address.

6.
Which two statements describe the IP address 10.16.3.65/23?
  1. The subnet address is 10.16.3.0 255.255.254.0.
  2. The lowest host address in the subnet is 10.16.2.1 255.255.254.0.
  3. The last valid host address in the subnet is 10.16.2.254 255.255.254.0.
  4. The broadcast address of the subnet is 10.16.3.255 255.255.254.0.
1 and 3
2 and 4
1, 2 and 4
2, 3 and 4
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet bits and 9 host bits. The block size in the third octet is 2 (256 - 254). So this makes the subnets in the interesting octet 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 2.0 subnet. The next subnet is 4.0, so the broadcast address for the 2.0 subnet is 3.255. The valid host addresses are 2.1 through 3.254.

7.
You type show running-config and get this output:
[output cut]
Line console 0
    Exec-timeout 1 35
    Password BIXPASSWD
    Login
[output cut]
What do the two numbers following the exec-timeout command mean?
If no command has been typed in 35 seconds, the console connection will be closed.
If no router activity has been detected in 1 hour and 35 minutes, the console will be locked out.
If no commands have been typed in 1 minute and 35 seconds, the console connection will be closed.
If you're connected to the router by a Telnet connection, input must be detected within 1 minute and 35 seconds or the connection will be closed.
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The exec-timeout command is set in minutes and seconds.

8.
If you delete the contents of NVRAM and reboot the router, what mode will you be in?
Privileged mode
Global mode
Setup mode
NVRAM loaded mode
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
If you delete the startup-config and reload the router, the router will automatically enter setup mode. You can also type setup from privileged mode at any time.

9.
Which command will show you the IOS version running on your router?
sh IOS
sh flash
sh version
sh running-config
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The best answer is show version, which shows you the IOS file running currently on your router. The show flash command shows you the contents of flash memory, not which file is running.

10.
You are unsuccessful in telnetting into a remote device. What could the problem be?
  1. IP addresses are incorrect.
  2. Access control list is filtering Telnet.
  3. There is a defective serial cable.
  4. The VTY password is missing.
1 only
3 only
2 and 4 only
All of the above
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The best answers, the ones you need to remember, are that either an access control list is filtering the Telnet session or the VTY password is not set on the remote device.

11.
If routers in a single area are configured with the same priority value, what value does a router use for the OSPF Router ID in the absence of a loopback interface?
The lowest IP address of any physical interface
The highest IP address of any physical interface
The lowest IP address of any logical interface
The highest IP address of any logical interface
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
At the moment of OSPF process startup, the highest IP address on any active interface will be the Router ID (RID) of the router. If you have a loopback interface configured (logical interface), then that will override the interface IP address and become the RID of the router automatically.

12.
Which EIGRP information is held in RAM and maintained through the use of Hello and update packets?
  1. Neighbor table
  2. STP table
  3. Topology table
  4. DUAL table
2 only
4 only
1 and 3
All of the above
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
EIGRP holds three tables in RAM: neighbor, topology, and routing. The neighbor and topology tables are built and maintained with the use of Hello packets.

13.
You want to run the new 802.1w on your switches. Which of the following would enable this protocol?
Switch(config)# spanning-tree mode rapid-pvst
Switch# spanning-tree mode rapid-pvst
Switch(config)# spanning-tree mode 802.1w
Switch# spanning-tree mode 802.1w
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
802.1w is the also called Rapid Spanning Tree Protocol. It is not enabled by default on Cisco switches, but it is a better STP to run since it has all the fixes that the Cisco extensions provide with 802.1d.

14.
When a new trunk link is configured on an IOS-based switch, which VLANs are allowed over the link?
By default, all VLANs are allowed on the trunk.
No VLAN's are allowed, you must configure each VLAN by hand.
Only configured VLAN's are allowed on the link.
Only extended VLAN's are allowed by default.
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
By default, all VLANs are allowed on the trunk link and you must remove by hand each VLAN that you don't want traversing the trunked link.

15.
What VTP mode allows you to change VLAN information on the switch?
Client
STP
Server
Transparent
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Only in server mode can you change VTP information on a switch.

16.
Which of the following is true regarding VLANs?
You must have at least two VLANs defined in every Cisco switched network.
All VLANs are configured at the fastest switch and, by default, propagate this information to all other switches.
You should not have more than 10 switches in the same VTP domain.
VTP is used to send VLAN information to switches in a configured VTP domain.
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Switches do not propagate VLAN information by default; you must configure the VTP domain. VLAN Trunk Protocol (VTP) is used to propagate VLAN information across a trunked link.

17.
If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use?
access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet
access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet
access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23
access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The extended access list ranges are 100-199 and 2000-2699, so the access-list number of 100 is valid. Telnet uses TCP, so the protocol TCP is valid. Now you just need to look for the source and destination address. Only the third option has the correct sequence of parameters. Answer B may work, but the question specifically states "only" to network 192.168.10.0, and the wildcard in answer B is too broad.

18.
Cisco's Unified Wireless Solution provides a mesh solution. What devices do you absolutely need to purchase to run a Cisco solution?
  1. WCS
  2. Controller
  3. Access point
  4. Bridge
1 and 2
2 and 3
1 and 4 only
4 only
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The Cisco Unified Wireless Solution is a great product, but you must purchase specialized devices. Cisco managed access points and a controller are the devices you need to purchase to run the Unified Wireless Solution.

19.
Which of the following is true when describing a global unicast address?
Packets addressed to a unicast address are delivered to a single interface.
These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4.
These are like private addresses in IPv4 in that they are not meant to be routed.
These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap.
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Unlike unicast addresses, global unicast addresses are meant to be routed.

20.
Which of the following is true when describing a unicast address?
Packets addressed to a unicast address are delivered to a single interface.
These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4.
These are like private addresses in IPv4 in that they are not meant to be routed.
These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap.
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Packets addressed to a unicast address are delivered to a single interface. For load balancing, multiple interfaces can use the same address.

*** END OF THE TEST ***
Time Left: 00:29:56
Post your test result / feedback here: