Online Networking Test - Networking Test - Random
Instruction:
- This is a FREE online test. Beware of scammers who ask for money to attend this test.
- Total number of questions: 20.
- Time allotted: 30 minutes.
- Each question carries 1 mark; there are no negative marks.
- DO NOT refresh the page.
- All the best!
Marks : 2/20
Total number of questions
20
Number of answered questions
0
Number of unanswered questions
20
Test Review : View answers and explanation for this test.
1.
What command is used to create a backup configuration?
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The command to back up the configuration on a router is copy running-config startup-config.
Discuss about this problem : Discuss in Forum
Learn more problems on : Networking Basics
2.
How many collision domains are created when you segment a network with a 12-port switch?
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Layer 2 switching creates individual collision domains.
Discuss about this problem : Discuss in Forum
Learn more problems on : Networking Basics
3.
Which protocol is used to send a destination network unknown message back to originating hosts?
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
ICMP is the protocol at the Network layer that is used to send messages back to an originating router.
Discuss about this problem : Discuss in Forum
Learn more problems on : Networking Basics
4.
Which of the following is the decimal and hexadecimal equivalents of the binary number 10011101?
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
To turn a binary number into decimal, you just have to add the values of each bit that is a 1. The values of 10011101 are 128, 16, 8, 4, and 1. 128 + 16 + 8 + 4 + 1 = 157.
Hexadecimal is a base-16 number system. The values of hexadecimal are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F-16 characters total, from which to create all the numbers you'll ever need. So, if 1001 in binary is 9, then the hexadecimal equivalent is 9. Since we then have 1101, which is 13 in binary, the hexadecimal answer is D and the complete hexadecimal answer is 0x9D.
Discuss about this problem : Discuss in Forum
Learn more problems on : TCP/IP
5.
What protocol is used to find the hardware address of a local device?
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Address Resolution Protocol (ARP) is used to find the hardware address from a known IP address.
Discuss about this problem : Discuss in Forum
Learn more problems on : TCP/IP
6.
Which two statements describe the IP address 10.16.3.65/23?
- The subnet address is 10.16.3.0 255.255.254.0.
- The lowest host address in the subnet is 10.16.2.1 255.255.254.0.
- The last valid host address in the subnet is 10.16.2.254 255.255.254.0.
- The broadcast address of the subnet is 10.16.3.255 255.255.254.0.
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet bits and 9 host bits. The block size in the third octet is 2 (256 - 254). So this makes the subnets in the interesting octet 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 2.0 subnet. The next subnet is 4.0, so the broadcast address for the 2.0 subnet is 3.255. The valid host addresses are 2.1 through 3.254.
Discuss about this problem : Discuss in Forum
Learn more problems on : Subnetting
7.
You type show running-config and get this output:
[output cut]
Line console 0
Exec-timeout 1 35
Password BIXPASSWD
Login
[output cut]
What do the two numbers following the exec-timeout command mean?Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The exec-timeout command is set in minutes and seconds.
Discuss about this problem : Discuss in Forum
Learn more problems on : IOS and Security Device Manager
8.
If you delete the contents of NVRAM and reboot the router, what mode will you be in?
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
If you delete the startup-config and reload the router, the router will automatically enter setup mode. You can also type setup from privileged mode at any time.
Discuss about this problem : Discuss in Forum
Learn more problems on : IOS and Security Device Manager
9.
Which command will show you the IOS version running on your router?
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The best answer is show version, which shows you the IOS file running currently on your router. The show flash command shows you the contents of flash memory, not which file is running.
Discuss about this problem : Discuss in Forum
Learn more problems on : Managing a Cisco Internetwork
10.
You are unsuccessful in telnetting into a remote device. What could the problem be?
- IP addresses are incorrect.
- Access control list is filtering Telnet.
- There is a defective serial cable.
- The VTY password is missing.
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The best answers, the ones you need to remember, are that either an access control list is filtering the Telnet session or the VTY password is not set on the remote device.
Discuss about this problem : Discuss in Forum
Learn more problems on : Managing a Cisco Internetwork
11.
If routers in a single area are configured with the same priority value, what value does a router use for the OSPF Router ID in the absence of a loopback interface?
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
At the moment of OSPF process startup, the highest IP address on any active interface will be the Router ID (RID) of the router. If you have a loopback interface configured (logical interface), then that will override the interface IP address and become the RID of the router automatically.
Discuss about this problem : Discuss in Forum
Learn more problems on : EIGRP and OSPF
12.
Which EIGRP information is held in RAM and maintained through the use of Hello and update packets?
- Neighbor table
- STP table
- Topology table
- DUAL table
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
EIGRP holds three tables in RAM: neighbor, topology, and routing. The neighbor and topology tables are built and maintained with the use of Hello packets.
Discuss about this problem : Discuss in Forum
Learn more problems on : EIGRP and OSPF
13.
You want to run the new 802.1w on your switches. Which of the following would enable this protocol?
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
802.1w is the also called Rapid Spanning Tree Protocol. It is not enabled by default on Cisco switches, but it is a better STP to run since it has all the fixes that the Cisco extensions provide with 802.1d.
Discuss about this problem : Discuss in Forum
Learn more problems on : Spanning Tree Protocol
14.
When a new trunk link is configured on an IOS-based switch, which VLANs are allowed over the link?
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
By default, all VLANs are allowed on the trunk link and you must remove by hand each VLAN that you don't want traversing the trunked link.
Discuss about this problem : Discuss in Forum
Learn more problems on : Virtual LANs
15.
What VTP mode allows you to change VLAN information on the switch?
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Only in server mode can you change VTP information on a switch.
Discuss about this problem : Discuss in Forum
Learn more problems on : Virtual LANs
16.
Which of the following is true regarding VLANs?
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Switches do not propagate VLAN information by default; you must configure the VTP domain. VLAN Trunk Protocol (VTP) is used to propagate VLAN information across a trunked link.
Discuss about this problem : Discuss in Forum
Learn more problems on : Virtual LANs
17.
If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use?
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The extended access list ranges are 100-199 and 2000-2699, so the access-list number of 100 is valid. Telnet uses TCP, so the protocol TCP is valid. Now you just need to look for the source and destination address. Only the third option has the correct sequence of parameters. Answer B may work, but the question specifically states "only" to network 192.168.10.0, and the wildcard in answer B is too broad.
Discuss about this problem : Discuss in Forum
Learn more problems on : Security
18.
Cisco's Unified Wireless Solution provides a mesh solution. What devices do you absolutely need to purchase to run a Cisco solution?
- WCS
- Controller
- Access point
- Bridge
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
The Cisco Unified Wireless Solution is a great product, but you must purchase specialized devices. Cisco managed access points and a controller are the devices you need to purchase to run the Unified Wireless Solution.
Discuss about this problem : Discuss in Forum
Learn more problems on : Wireless Technologies
19.
Which of the following is true when describing a global unicast address?
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Unlike unicast addresses, global unicast addresses are meant to be routed.
Discuss about this problem : Discuss in Forum
Learn more problems on : IPv6
20.
Which of the following is true when describing a unicast address?
Your Answer: Option
(Not Answered)
Correct Answer: Option
Explanation:
Packets addressed to a unicast address are delivered to a single interface. For load balancing, multiple interfaces can use the same address.
Discuss about this problem : Discuss in Forum
Learn more problems on : IPv6
*** END OF THE TEST ***
Time Left: 00:29:56
Post your test result / feedback here:
Quick links
Quantitative Aptitude
Verbal (English)
Reasoning
Programming
Interview
Placement Papers