Explore topic-wise MCQs in CISCO Certification.

This section includes 71 Mcqs, each offering curated multiple-choice questions to sharpen your CISCO Certification knowledge and support exam preparation. Choose a topic below to get started.

1.

You want to ping the loopback address of your IPv6 local host. What will you type?

A. Ping 127.0.0.1
B. Ping 0.0.0.0
C. Ping ::1
D. trace 0.0. :: 1
Answer» D. trace 0.0. :: 1
2.

You want to implement a network medium that is not susceptible to EMI. Which type of cabling should you use?

A. Thicknet coax
B. Thinnet coax
C. Category 5 UTP cable
D. Fiber-optic cable
Answer» E.
3.

You type Router#sh ru and receive a % ambiguous command error. why did you receive this message?

A. The command requires additional options or parameters
B. There is more than one show command that starts with the letters ru.
C. There is no show command that starts with ru
D. The command is being executed from the wrong router mode
Answer» C. There is no show command that starts with ru
4.

You need to subnet a network that has 5 subnets, each wit at least 16 hosts. Which classful subnet mask would you use?

A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
Answer» C. 255.255.255.240
5.

You need to stop DoS attacks in real time and have a log of anyone who has tried to attack your network. What should you do your network?

A. Add more routers
B. Use the auto secure command
C. Implement IDS/IPS
D. Configure Naggle
Answer» D. Configure Naggle
6.

You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0 . Which of the following lists will you use?

A. access - list 10 deny 192.168.160.0 255.255.224.0
B. access - list 10 deny 192.168.160.0 0.0.191.255
C. access - list 10 deny 192.168.160.0 0.0.31.255
D. access - list 10 deny 192.168.0.0 0.0.31.255
Answer» D. access - list 10 deny 192.168.0.0 0.0.31.255
7.

You need the IP address of the devices with which the router has established an adjacency. Also, the retransmit interval and the queue counts for the adjacent routers  need to be  checked. What command will display the required information?

A. show ip eigrp adjacency
B. show ip eigrp topology
C. show ip eigrp interfaces
D. show ip eigrp neighbors
Answer» E.
8.

You have the following binary number :10110111. What are the decimal and hexadecimal equivalents?

A. 69/0x2102
B. 183/B7
C. 173/A6
D. 83/0xC5
Answer» C. 173/A6
9.

You have finished physically installing an access point on the ceiling of your office. At a minimum, which parameter must be configured on the access point in order to allow a wireless client to operate on it?

A. AES
B. PSK
C. SSID
D. WEp
Answer» D. WEp
10.

You get a call from a network administrator who tells you that he typed the following into his router:_x005F_x000D_ Router (config) #router ospf 1_x005F_x000D_ Router (config-router) # network 10.0.0.0. 255. 0.0.0 area 0_x005F_x000D_ He tells you he still can't see any routes in the routing table. What configuration error did the administrator make?

A. The wildcard mask is incorrect
B. The OSPF area is wrong
C. The OSPF Process ID is incorrect.
D. The AS configuration is wrong
Answer» B. The OSPF area is wrong
11.

You are connecting an access point and it is set to root. What does extended service set ID mean?

A. That you have more than one access point and they are in the same SSID connected by a distribution system
B. That you have more than one access point and they are in seperate SSIDs connected by a distribution system
C. That you have multiple access points, but they are placed physically in different buildings
D. That you have multiple access points, but one is a repeater access point
Answer» B. That you have more than one access point and they are in seperate SSIDs connected by a distribution system
12.

Which OSI layer defines the standards for cabling and connectors?

A. Layer 1
B. Layer 4
C. Layer 7
D. Layer 3
Answer» B. Layer 4
13.

Which part of a MAC address is called the organizationally unique identifier(OUI)?

A. The first 24 bits, or 3 bytes
B. The first 12 bits, or 3 bytes
C. The first 24 bits, or 6 bytes
D. The first 32 bits, or 3 bytes
Answer» B. The first 12 bits, or 3 bytes
14.

Which of the following is part of the IEEE 802.3u standard?

A. 100Base2
B. 10Base5
C. 100Base-TX
D. 1000Base-T
Answer» D. 1000Base-T
15.

Which of the following is the best description of the operation of split horizon?

A. Information about a route should not be sent back in the direction from which the original update came
B. It splits the traffic when you have a large bus (horizon) physical network
C. It holds the regular updates from broadcasting to a downed link
D. It prevents regular update messages from reinstating a route that has gone down
Answer» B. It splits the traffic when you have a large bus (horizon) physical network
16.

Which of the following is considered to be the inside hosts address after translation?

A. Inside local
B. outside local
C. Inside global
D. Outside global
Answer» D. Outside global
17.

Which of the following is an industry-wide standards suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer3 Network layer of the OSI model?

A. HDLC
B. xDSL
C. VPN
D. IPSec
Answer» E.
18.

Which of the following devices do not operate at all levels of the OSI model?

A. Network management stations (NMSs)
B. Routers
C. Web and application servers
D. Network hosts
Answer» C. Web and application servers
19.

Which of the following descriptions about IPv6 is correct?

A. Addresses are not hierarchical and are assigned at random
B. Broadcasts have been eliminated and replaced with multicasts
C. There are 2.7 billion addresses
D. An interface can only be configured with one IPv6 address
Answer» C. There are 2.7 billion addresses
20.

Which of the following connection mechanism is used by Ethernet?

A. Token passing
B. CSMA/CD
C. CSMA/CA
D. Host polling
Answer» C. CSMA/CA
21.

Which  of the following commands sets the secret password to Cisco?

A. enable secret password Cisco
B. enable secret cisco
C. enable secret Cisco
D. enable password Cisco
Answer» D. enable password Cisco
22.

Which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses?

A. /28
B. /29
C. /30
D. /31
Answer» D. /31
23.

Which layer of the OSI model offers three different modes of communication : Simplex, half duplex, and full duplex?

A. Presentation
B. Transport
C. Application
D. Session
Answer» E.
24.

Which encryption type does WPA2 use?

A. AES - CCMP
B. PPK via IV
C. PSK
D. TKIP/MIC
Answer» B. PPK via IV
25.

Which configuration command must be in effect to allow the use of 8 subnets if the Class C subnet mask is 255.255.25.224?

A. Router(config)#ip classless
B. Router(config)#ip version 6
C. Router(config)#ip unnumbered
D. Router(config)#ip subnet-zero
Answer» E.
26.

Which commands loads a new version of the Cisco IOS into a router?

A. copy flash ftp
B. copy ftp flash
C. copy flash tftp
D. copy tftp flash
Answer» E.
27.

Which command will allow you to see real - time translations on your router?

A. show ip nat translations
B. show ip nat statistics
C. debug ip nat
D. clear ip nat translations
Answer» D. clear ip nat translations
28.

Which command displays IP-to-MAC- address mappings on a Windows PC?

A. ping
B. traceroute
C. arp -a
D. tracert
Answer» D. tracert
29.

When making a HyperTerminal connection, what must the bit rate be set to?

A. 2400bps
B. 1200bps
C. 9600bps
D. 6400bps
Answer» D. 6400bps
30.

When data is encapsulated , which is the correct order?

A. Data, frame, packet, segment, bit
B. Segment, data, packet, frame, bit
C. Data, segment, packet, frame, bit
D. Data, segment, frame, packet, bit
Answer» D. Data, segment, frame, packet, bit
31.

When creating a pool of global address, which of the following can be used instead of the netmask command?

A. / (slash notation)
B. prefix - length
C. no mask
D. block - size
Answer» C. no mask
32.

When a station sends a transmission to the MAC address ff : ff : ff : ff : ff : ff, what type of transmission is it?

A. Unicast
B. Multicast
C. Anycast
D. Broadcast
Answer» E.
33.

When a ping to the loopback address fails , what can you assume?

A. The IP address of the local host is incorrect
B. The IP address of the remote host is incorrect
C. The NIC is not functional
D. The IP stack has failed to initialize
Answer» E.
34.

When a ping to the local host IP address fails, what can you assume?

A. The IP address of the local host is incorrect
B. The IP address of the remote host is incorrect
C. The NIC is not functional
D. The IP stack has failed to initialize
Answer» D. The IP stack has failed to initialize
35.

What switch must be added to the ipconfig command on a PC to verify DNS configuration?

A. /dns
B.
C. /all
D.
Answer» D.
36.

What network service is the most likely problem if you can ping a computer by IP address but not by name?

A. DNS
B. DHCP
C. ARP
D. ICMP
Answer» B. DHCP
37.

What must happen if a DHCP IP conflict occurs?

A. Proxy ARP will fix the issue
B. The client uses a gratuitous ARP to fix the issue
C. The administrator must fix the conflict by hand at the DHCP server
D. The DHCP server will reassign new IP addresses to both computers
Answer» D. The DHCP server will reassign new IP addresses to both computers
38.

What metric does RIPv2 use to find the best path to a remote network?

A. Hop count
B. MTU
C. Cumulative interface delay
D. Load
Answer» B. MTU
39.

What is the specific term for the unwanted signal interference from adjacent pairs in the cable?

A. EMI
B. RFI
C. Crosstalk
D. Attenuation
Answer» D. Attenuation
40.

What is the most common attack on a network today?

A. Lock picking
B. Naggle
C. DoS
D. auto secure
Answer» D. auto secure
41.

What does the command confreg 0x2142 provide?

A. It is used to restart the router
B. It is used to bypass the configuration in NVRAM
C. It is used to enter ROM monitor mode
D. It is used to view the lost password
Answer» C. It is used to enter ROM monitor mode
42.

What command will display the forward / filter table?

A. Show mac filter
B. show run
C. show mac address-table
D. show mac filter-table
Answer» D. show mac filter-table
43.

What command is the Windows version of the Cisco command that displays the networks traversed on a path to a network destination?

A. ping
B. traceroute
C. arp
D. tracert
Answer» E.
44.

What command displays the ARP table on a Cisco router?

A. show ip arp
B. traceroute
C. arp -a
D. tracert
Answer» B. traceroute
45.

Two workers have established wireless communication directly between their wireless laptops. What type of wireless topology has been created by these employees?

A. BSS
B. SSID
C. IBSS
D. ESS
Answer» D. ESS
46.

Two connected routers are configured only with RIP routing. What will be the result when a router receives a routing update that contains a higher-cost path to a network already in its routing table?

A. The updated information will be added to the existing routing table
B. The update will be ignored and no further action will occur
C. The updated information will replace the existing routing table entry
D. The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence
Answer» C. The updated information will replace the existing routing table entry
47.

To use VLSM, what capability must the routing protocols in use possess?

A. Support for multicast
B. Multi-protocol support
C. Transmission of subnet mask information
D. Support for unequal load balancing
Answer» D. Support for unequal load balancing
48.

To enable RIPng , which of the following would you use?

A. Router1 (config - if) # ipv6 ospf 10 area 0.0.0.0
B. Router1 (config - if) # ipv6 router rip 1
C. Router1 (config - if) # ipv6 router eigrp 10
D. Router1 (config - if) # ospf ipv6 10 area 0
Answer» C. Router1 (config - if) # ipv6 router eigrp 10
49.

There are three possible routes for a router to reach a destination network. The first route is from OSPF with a metric of 782. The second route is from RIPv2 with a metric of 4. The third is from EIGRP with a composite metric of 20514560. Which route will be installed by the router in its routing table?

A. RIPv2
B. EIGRP
C. OSPF
D. All three
Answer» C. OSPF
50.

The network address used to advertise a summary address is always which of the following?

A. The last network address in the block
B. The next to last network in the block
C. The second network in the block
D. The first network in the block
Answer» E.