

MCQOPTIONS
Saved Bookmarks
This section includes 274 Mcqs, each offering curated multiple-choice questions to sharpen your Engineering knowledge and support exam preparation. Choose a topic below to get started.
101. |
Which statement is true regarding classless routing protocols? The use of discontiguous networks is not allowed. The use of variable length subnet masks is permitted. RIPv1 is a classless routing protocol. IGRP supports classless routing within the same autonomous system. RIPv2 supports classless routing. |
A. | 1, 3 and 5 |
B. | 3 and 4 |
C. | 2 and 5 |
D. | None of the above |
Answer» D. None of the above | |
102. |
You have the following routing table. Which of the following networks will not be placed in the neighbor routing table? R 192.168.30.0/24 [120/1] via 192.168.40.1, 00:00:12, Serial0 C 192.168.40.0/24 is directly connected, Serial0 172.16.0.0/24 is subnetted, 1 subnets C 172.16.30.0 is directly connected, Loopback0 R 192.168.20.0/24 [120/1] via 192.168.40.1, 00:00:12, Serial0 R 10.0.0.0/8 [120/15] via 192.168.40.1, 00:00:07, Serial0 C 192.168.50.0/24 is directly connected, Ethernet0 |
A. | 172.16.30.0 |
B. | 192.168.30.0 |
C. | 10.0.0.0 |
D. | All of them will be placed in the neighbor routing table. |
Answer» D. All of them will be placed in the neighbor routing table. | |
103. |
What command do you type to save the configuration stored in RAM to NVRAM? |
A. | <i class="networking-code">Router(config)#copy current to starting</i> |
B. | <i class="networking-code">Router#copy starting to running</i> |
C. | <i class="networking-code">Router(config)#copy running-config startup-config</i> |
D. | <i class="networking-code">Router#copy run startup</i> |
Answer» E. | |
104. |
How many simultaneous Telnet sessions does a Cisco router support by default? |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» E. | |
105. |
You set the console password, but when you display the configuration, the password doesn't show up; it looks like this: [output cut] Line console 0 Exec-timeout 1 44 Password 7098C0BQR Login [output cut] What cause the password to be stored like this? |
A. | <i class="networking-code">encrypt password</i> |
B. | <i class="networking-code">service password-encryption</i> |
C. | <i class="networking-code">service-password-encryption</i> |
D. | <i class="networking-code">exec-timeout 1 35</i> |
Answer» C. <i class="networking-code">service-password-encryption</i> | |
106. |
What is split horizon? |
A. | Information about a route should not be sent back in the direction from which the original update came. |
B. | It splits the traffic when you have a large bus (horizon) physical network. |
C. | It holds the regular updates from broadcasting to a downed link. |
D. | It prevents regular update messages from reinstating a route that has gone down. |
Answer» B. It splits the traffic when you have a large bus (horizon) physical network. | |
107. |
Which of the following are TCP/IP protocols used at the Application layer of the OSI model? IP TCP Telnet FTP TFTP |
A. | 1 and 3 |
B. | 1, 3 and 5 |
C. | 3, 4 and 5 |
D. | All of the above |
Answer» D. All of the above | |
108. |
Which of the following is the decimal and hexadecimal equivalents of the binary number 10011101? |
A. | 155, 0x9B |
B. | 157, 0x9D |
C. | 159, 0x9F |
D. | 185, 0xB9 |
Answer» C. 159, 0x9F | |
109. |
Which command will show you whether a DTE or a DCE cable is plugged into serial 0? |
A. | <i class="networking-code">sh int s0</i> |
B. | <i class="networking-code">sh int serial 0</i> |
C. | <i class="networking-code">show controllers serial 0</i> |
D. | <i class="networking-code">show serial 0 controllers</i> |
Answer» D. <i class="networking-code">show serial 0 controllers</i> | |
110. |
You want to totally reinitialize the router and replace the current running-config with the current startup-config. What command will you use? |
A. | <i class="networking-code">replace run start</i> |
B. | <i class="networking-code">copy run start</i> |
C. | <i class="networking-code">copy start run</i> |
D. | <i class="networking-code">reload</i> |
Answer» E. | |
111. |
If you delete the contents of NVRAM and reboot the router, what mode will you be in? |
A. | Privileged mode |
B. | Global mode |
C. | Setup mode |
D. | NVRAM loaded mode |
Answer» D. NVRAM loaded mode | |
112. |
What is the problem with an interface if you type show interface serial 0 and receive the following message? "Serial0 is administratively down, line protocol is down." |
A. | The keepalives are different times. |
B. | The administrator has the interface shut down. |
C. | The administrator is pinging from the interface. |
D. | No cable is attached. |
Answer» C. The administrator is pinging from the interface. | |
113. |
Which of the following services use UDP? DHCP SMTP SNMP FTP HTTP TFTP |
A. | 1, 3 and 6 |
B. | 2 and 4 |
C. | 1, 2 and 4 |
D. | All of the above |
Answer» B. 2 and 4 | |
114. |
If you use either Telnet or FTP, which is the highest layer you are using to transmit data? |
A. | Application |
B. | Presentation |
C. | Session |
D. | Transport |
Answer» B. Presentation | |
115. |
Which layer 4 protocol is used for a Telnet connection? |
A. | IP |
B. | TCP |
C. | TCP/IP |
D. | UDP |
Answer» C. TCP/IP | |
116. |
Which statements are true regarding ICMP packets? ICMP guarantees datagram delivery. ICMP can provide hosts with information about network problems. ICMP is encapsulated within IP datagrams. ICMP is encapsulated within UDP datagrams. |
A. | 1 only |
B. | 2 and 3 |
C. | 1 and 4 |
D. | All of the above |
Answer» C. 1 and 4 | |
117. |
Which of the following allows a router to respond to an ARP request that is intended for a remote host? |
A. | Gateway DP |
B. | Reverse ARP (RARP) |
C. | Proxy ARP |
D. | Inverse ARP (IARP) |
Answer» D. Inverse ARP (IARP) | |
118. |
The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is equivalent to the Network layer of the OSI model? |
A. | Application |
B. | Host-to-Host |
C. | Internet |
D. | Network Access |
Answer» D. Network Access | |
119. |
Which class of IP address provides a maximum of only 254 host addresses per network ID? |
A. | Class A |
B. | Class B |
C. | Class C |
D. | Class D |
Answer» D. Class D | |
120. |
What protocol is used to find the hardware address of a local device? |
A. | RARP |
B. | ARP |
C. | IP |
D. | ICMP |
Answer» C. IP | |
121. |
Which of the following commands sets the secret password to Cisco? |
A. | <i class="networking-code">enable secret password Cisco</i> |
B. | <i class="networking-code">enable secret cisco</i> |
C. | <i class="networking-code">enable secret Cisco</i> |
D. | <i class="networking-code">enable password Cisco</i> |
Answer» D. <i class="networking-code">enable password Cisco</i> | |
122. |
You type the following command into the router and receive the following output: Router#show serial 0/0 ^ % Invalid input detected at '^' marker. Why was this error message displayed? |
A. | You need to be in privileged mode. |
B. | You cannot have a space between serial and 0/0. |
C. | The router does not have a serial0/0 interface. |
D. | Part of the command is missing. |
Answer» E. | |
123. |
Which of the following commands will display the current IP addressing and the layer 1 and 2 status of an interface? show version show protocols show interfaces show controllers show ip interface |
A. | 1, 2 and 4 |
B. | 2, 3 and 5 |
C. | 3 and 4 only |
D. | None of the above |
Answer» C. 3 and 4 only | |
124. |
You type show running-config and get this output: [output cut] Line console 0 Exec-timeout 1 35 Password BIXPASSWD Login [output cut] What do the two numbers following the exec-timeout command mean? |
A. | If no command has been typed in 35 seconds, the console connection will be closed. |
B. | If no router activity has been detected in 1 hour and 35 minutes, the console will be locked out. |
C. | If no commands have been typed in 1 minute and 35 seconds, the console connection will be closed. |
D. | If you're connected to the router by a Telnet connection, input must be detected within 1 minute and 35 seconds or the connection will be closed. |
Answer» D. If you're connected to the router by a Telnet connection, input must be detected within 1 minute and 35 seconds or the connection will be closed. | |
125. |
What layer of the OSI model would you assume the problem is in if you type show interface serial 1 and receive the following message? "Serial1 is down, line protocol is down." |
A. | Physical layer |
B. | Data Link layer |
C. | Network layer |
D. | None. It is a router problem. |
Answer» B. Data Link layer | |
126. |
Which of the following services use TCP? DHCP SMTP HTTP TFTP FTP |
A. | 1 and 2 |
B. | 2, 3 and 5 |
C. | 1, 2 and 4 |
D. | 1, 3 and 4 |
Answer» C. 1, 2 and 4 | |
127. |
What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? |
A. | Application |
B. | Host-to-Host |
C. | Internet |
D. | Network Access |
Answer» C. Internet | |
128. |
Which of the following describe the DHCP Discover message? It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. It uses UDP as the Transport layer protocol. It uses TCP as the Transport layer protocol. It does not use a layer 2 destination address. |
A. | 1 only |
B. | 1 and 2 |
C. | 3 and 4 |
D. | 4 only |
Answer» C. 3 and 4 | |
129. |
You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this? |
A. | SMTP |
B. | SNMP |
C. | DHCP |
D. | ARP |
Answer» D. ARP | |
130. |
Which of the following is private IP address? |
A. | 12.0.0.1 |
B. | 168.172.19.39 |
C. | 172.15.14.36 |
D. | 192.168.24.43 |
Answer» E. | |
131. |
Which statement describes a spanning-tree network that has converged? |
A. | All switch and bridge ports are in the forwarding state. |
B. | All switch and bridge ports are assigned as either root or designated ports. |
C. | All switch and bridge ports are in either the forwarding or blocking state. |
D. | All switch and bridge ports are either blocking or looping. |
Answer» D. All switch and bridge ports are either blocking or looping. | |
132. |
What does a switch do when a frame is received on an interface and the destination hardware address is unknown or not in the filter table? |
A. | Forwards the switch to the first available link |
B. | Drops the frame |
C. | Floods the network with the frame looking for the device |
D. | Sends back a message to the originating station asking for a name resolution |
Answer» D. Sends back a message to the originating station asking for a name resolution | |
133. |
In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN? |
A. | During high-traffic periods |
B. | After broken links are reestablished |
C. | When upper-layer protocols require high reliability |
D. | In an improperly implemented redundant topology |
Answer» E. | |
134. |
If you want to disable STP on a port connected to a server, which command would you use? |
A. | <i class="networking-code">disable spanning-tree</i> |
B. | <i class="networking-code">spanning-tree off</i> |
C. | <i class="networking-code">spanning-tree security</i> |
D. | <i class="networking-code">spanning-tree portfast</i> |
Answer» E. | |
135. |
What is the purpose of Spanning Tree Protocol in a switched LAN? |
A. | To provide a mechanism for network monitoring in switched environments |
B. | To prevent routing loops in networks with redundant paths |
C. | To prevent switching loops in networks with redundant switched paths |
D. | To manage the VLAN database across multiple switches |
E. | To create collision domains |
Answer» D. To manage the VLAN database across multiple switches | |
136. |
How long is an IPv6 address? |
A. | 32 bits |
B. | 128 bytes |
C. | 64 bits |
D. | 128 bits |
Answer» E. | |
137. |
What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet? |
A. | NAT |
B. | Static |
C. | Dynamic |
D. | PAT |
Answer» E. | |
138. |
What are the two main types of access control lists (ACLs)? Standard IEEE Extended Specialized |
A. | 1 and 3 |
B. | 2 and 4 |
C. | 3 and 4 |
D. | 1 and 2 |
Answer» B. 2 and 4 | |
139. |
Which protocol is used to send a destination network unknown message back to originating hosts? |
A. | TCP |
B. | ARP |
C. | ICMP |
D. | BootP |
Answer» D. BootP | |
140. |
Which of the following is true when describing a global unicast address? |
A. | Packets addressed to a unicast address are delivered to a single interface. |
B. | These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. |
C. | These are like private addresses in IPv4 in that they are not meant to be routed. |
D. | These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. |
Answer» C. These are like private addresses in IPv4 in that they are not meant to be routed. | |
141. |
What two multicast addresses does OSPFv3 use? FF02::A FF02::9 FF02::5 FF02::6 |
A. | 2 only |
B. | 3 only |
C. | 1 and 3 |
D. | 3 and 4 |
Answer» E. | |
142. |
How many collision domains are created when you segment a network with a 12-port switch? |
A. | 1 |
B. | 2 |
C. | 5 |
D. | 12 |
Answer» E. | |
143. |
What is the address range of a Class B network address in binary? |
A. | <i class="networking-code">01xxxxxx</i> |
B. | <i class="networking-code">0xxxxxxx</i> |
C. | <i class="networking-code">10xxxxxx</i> |
D. | <i class="networking-code">110xxxxx</i> |
Answer» D. <i class="networking-code">110xxxxx</i> | |
144. |
To enable EIGRP, which of the following would you use? Router1(config-if)# ipv6 ospf 10 area 0.0.0.0 Router1(config-if)# ipv6 router rip 1 Router1(config)# ipv6 router eigrp 10 Router1(config-rtr)# no shutdown Router1(config-if)# ipv6 eigrp 10 |
A. | 1, 3 and 5 |
B. | 3, 4 and 5 |
C. | 1 and 3 |
D. | 5 only |
Answer» C. 1 and 3 | |
145. |
Which statements are true regarding ICMP packets? They acknowledge receipt of a TCP segment. They guarantee datagram delivery. They can provide hosts with information about network problems. They are encapsulated within IP datagrams. |
A. | 1 only |
B. | 2 and 3 |
C. | 3 and 4 |
D. | 2, 3 and 4 |
Answer» D. 2, 3 and 4 | |
146. |
What multicast addresses does EIGRPv6 use? |
A. | <i class="networking-code">FF02::A</i> |
B. | <i class="networking-code">FF02::9</i> |
C. | <i class="networking-code">FF02::5</i> |
D. | <i class="networking-code">FF02::6</i> |
Answer» B. <i class="networking-code">FF02::9</i> | |
147. |
Which of the following is the valid host range for the subnet on which the IP address 192.168.168.188 255.255.255.192 resides? |
A. | 192.168.168.129-190 |
B. | 192.168.168.129-191 |
C. | 192.168.168.128-190 |
D. | 192.168.168.128-192 |
Answer» B. 192.168.168.129-191 | |
148. |
Which of the following is true when describing a unique local address? |
A. | Packets addressed to a unicast address are delivered to a single interface. |
B. | These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. |
C. | These are like private addresses in IPv4 in that they are not meant to be routed. |
D. | These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. |
Answer» E. | |
149. |
Which of the following is true when describing a link-local address? |
A. | Packets addressed to a unicast address are delivered to a single interface. |
B. | These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. |
C. | These are like private addresses in IPv4 in that they are not meant to be routed. |
D. | These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. |
Answer» D. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. | |
150. |
What protocols are used to configure trunking on a switch? VLAN Trunking Protocol VLAN 802.1Q ISL |
A. | 1 and 2 |
B. | 3 and 4 |
C. | 1 only |
D. | 2 only |
Answer» C. 1 only | |