Online Networking Test - Networking Test - Random

Instruction:

  • This is a FREE online test. Beware of scammers who ask for money to attend this test.
  • Total number of questions: 20.
  • Time allotted: 30 minutes.
  • Each question carries 1 mark; there are no negative marks.
  • DO NOT refresh the page.
  • All the best!

Marks : 2/20


Total number of questions
20
Number of answered questions
0
Number of unanswered questions
20
Test Review : View answers and explanation for this test.

1.
How long is an IPv6 address?
32 bits
128 bytes
64 bits
128 bits
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
An IPv6 address is 128 bits long.

2.
In a network with dozens of switches, how many root bridges would you have?
1
2
5
12
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
You should have only one root bridge per network.

3.
Which router command allows you to view the entire contents of all access lists?
show all access-lists
show access-lists
show ip interface
show interface
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
To see the contents of all access lists, use the show access-lists command.

4.
Which of the following services use UDP?
  1. DHCP
  2. SMTP
  3. SNMP
  4. FTP
  5. HTTP
  6. TFTP
1, 3 and 6
2 and 4
1, 2 and 4
All of the above
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
DHCP, SNMP, and TFTP use UDP.

5.
Which statements are true regarding ICMP packets?
  1. They acknowledge receipt of a TCP segment.
  2. They guarantee datagram delivery.
  3. They can provide hosts with information about network problems.
  4. They are encapsulated within IP datagrams.
1 only
2 and 3
3 and 4
2, 3 and 4
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Internet Control Message Protocol (ICMP) is used to send error messages through the network, but they do not work alone. Every segment or ICMP payload must be encapsulated within an IP datagram (or packet).

6.
What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask?
14
15
16
30
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
A /27 (255.255.255.224) is 3 bits on and 5 bits off. This provides 8 subnets, each with 30 hosts. Does it matter if this mask is used with a Class A, B, or C network address? Not at all. The number of host bits would never change.

7.
You need to configure a server that is on the subnet 192.168.19.24/29. The router has the first available host address. Which of the following should you assign to the server?
192.168.19.0 255.255.255.0
192.168.19.33 255.255.255.240
192.168.19.26 255.255.255.248
192.168.19.31 255.255.255.248
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
A /29 is 255.255.255.248, which is a block size of 8 in the fourth octet. The subnets are 0, 8, 16, 24, 32, 40, etc. 192.168.19.24 is the 24 subnet, and since 32 is the next subnet, the broadcast address for the 24 subnet is 31. 192.168.19.26 is the only correct answer.

8.
How many simultaneous Telnet sessions does a Cisco router support by default?
2
3
4
5
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Cisco routers, if they do not have the Enterprise edition of the IOS, will default to 5 simultaneous Telnet sessions.

9.
Which command will delete the contents of NVRAM on a router?
delete NVRAM
delete startup-config
erase NVRAM
erase start
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The erase startup-config command erases the contents of NVRAM and will put you in setup mode if the router is restarted.

10.
The corporate office sends you a new router to connect, but upon connecting the console cable, you see that there is already a configuration on the router. What should be done before a new configuration is entered in the router?
RAM should be erased and the router restarted.
Flash should be erased and the router restarted.
NVRAM should be erased and the router restarted.
The new configuration should be entered and saved.
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Before you start to configure the router, you should erase the NVRAM with the erase startup-config command and then reload the router using the reload command.

11.
The configuration register setting of 0x2102 provides what function to a router?
Tells the router to boot into ROM monitor mode
Provides password recovery
Tells the router to look in NVRAM for the boot sequence
Boots the IOS from a TFTP server
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The default configuration setting of 0x2102 tells the router to look in NVRAM for the boot sequence.

12.
What command is used to stop RIP routing updates from exiting out an interface but still allow the interface to receive RIP route updates?
Router(config-if)# no routing
Router(config-if)# passive-interface
Router(config-router)# passive-interface s0
Router(config-router)# no routing updates
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The (config-router)#passive-interface command stops updates from being sent out an interface, but route updates are still received.

13.
Which statement is true regarding classless routing protocols?
  1. The use of discontiguous networks is not allowed.
  2. The use of variable length subnet masks is permitted.
  3. RIPv1 is a classless routing protocol.
  4. IGRP supports classless routing within the same autonomous system.
  5. RIPv2 supports classless routing.
1, 3 and 5
3 and 4
2 and 5
None of the above
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Classful routing means that all hosts in the internetwork use the same mask. Classless routing means that you can use Variable Length Subnet Masks (VLSMs) and can also support discontiguous networking.

14.
A network administrator needs to configure a router with a distance-vector protocol that allows classless routing. Which of the following satisfies those requirements?
IGRP
OSPF
RIPv1
EIGRP
IS-IS
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
In this question, we're calling EIGRP just plain old distance vector. EIGRP is an "advanced" distance-vector routing protocol, sometimes called a hybrid routing protocol because it uses the characteristics of both distance-vector and link-state routing protocols.

15.
Which EIGRP information is held in RAM and maintained through the use of Hello and update packets?
  1. Neighbor table
  2. STP table
  3. Topology table
  4. DUAL table
2 only
4 only
1 and 3
All of the above
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
EIGRP holds three tables in RAM: neighbor, topology, and routing. The neighbor and topology tables are built and maintained with the use of Hello packets.

16.
You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?
  1. Switch(config-if)# ip access-group 10
  2. Switch(config-if)# switchport port-security maximum 1
  3. Switch(config)# access-list 10 permit ip host 1
  4. Switch(config-if)# switchport port-security violation shutdown
  5. Switch(config)# mac-address-table secure
1 and 3
2 and 4
2, 3 and 5
4 and 5
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The switchport port-security is an important command, and it's super easy with the CNA; however, from the CLI, you can set the maximum number of MAC addresses allowed into the port, and then set the penalty if this maximum has been passed.

17.
You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with?
access-list 10 deny 172.16.192.0 0.0.31.255
access-list 10 deny 172.16.0.0 0.0.255.255
access-list 10 deny 172.16.172.0 0.0.31.255
access-list 10 deny 172.16.188.0 0.0.15.255
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
First, you must know that a /19 is 255.255.224.0, which is a block size of 32 in the third octet. Counting by 32, this makes our subnet 192 in the third octet, and the wildcard for the third octet would be 31 since the wildcard is always one less than the block size.

18.
Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list?
  1. 172.16.30.55 0.0.0.255
  2. 172.16.30.55 0.0.0.0
  3. any 172.16.30.55
  4. host 172.16.30.55
  5. 0.0.0.0 172.16.30.55
  6. ip any 172.16.30.55
1 and 4
2 and 4
1, 4 and 6
3 and 5
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The wildcard 0.0.0.0 tells the router to match all four octets. This wildcard format alone can be replaced with the host command.

19.
What is the maximum data rate for the 802.11b standard?
6Mbps
11Mbps
22Mbps
54Mbps
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The IEEE 802.11b standard provides a maximum data rate of up to 11Mbps.

20.
Which of the following uses ATM as the Data Link layer protocol that's terminated at what's known as the DSLAM?
DSL
PPPoE
Frame Relay
Dedicated T1
Wireless
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
ATM is the Data-Link layer protocol that's typically used over the DSL layer 1 connection from the CPE and terminated at what's known as the DSLAM-an ATM switch that contains DSL interface cards, or ATU-Cs.

*** END OF THE TEST ***
Time Left: 00:29:56
Post your test result / feedback here: