Explore topic-wise MCQs in Engineering.

This section includes 274 Mcqs, each offering curated multiple-choice questions to sharpen your Engineering knowledge and support exam preparation. Choose a topic below to get started.

101.

Which statement is true regarding classless routing protocols?

  1. The use of discontiguous networks is not allowed.
  2. The use of variable length subnet masks is permitted.
  3. RIPv1 is a classless routing protocol.
  4. IGRP supports classless routing within the same autonomous system.
  5. RIPv2 supports classless routing.

A. 1, 3 and 5
B. 3 and 4
C. 2 and 5
D. None of the above
Answer» D. None of the above
102.

You have the following routing table. Which of the following networks will not be placed in the neighbor routing table?

R 192.168.30.0/24 [120/1] via 192.168.40.1, 00:00:12, Serial0
C 192.168.40.0/24 is directly connected, Serial0 172.16.0.0/24 is subnetted, 1 subnets
C 172.16.30.0 is directly connected, Loopback0
R 192.168.20.0/24 [120/1] via 192.168.40.1, 00:00:12, Serial0
R 10.0.0.0/8 [120/15] via 192.168.40.1, 00:00:07, Serial0
C 192.168.50.0/24 is directly connected, Ethernet0

A. 172.16.30.0
B. 192.168.30.0
C. 10.0.0.0
D. All of them will be placed in the neighbor routing table.
Answer» D. All of them will be placed in the neighbor routing table.
103.

What command do you type to save the configuration stored in RAM to NVRAM?

A. <i class="networking-code">Router(config)#copy current to starting</i>
B. <i class="networking-code">Router#copy starting to running</i>
C. <i class="networking-code">Router(config)#copy running-config startup-config</i>
D. <i class="networking-code">Router#copy run startup</i>
Answer» E.
104.

How many simultaneous Telnet sessions does a Cisco router support by default?

A. 2
B. 3
C. 4
D. 5
Answer» E.
105.

You set the console password, but when you display the configuration, the password doesn't show up; it looks like this:

[output cut]
Line console 0 Exec-timeout 1 44 Password 7098C0BQR Login
[output cut]
What cause the password to be stored like this?

A. <i class="networking-code">encrypt password</i>
B. <i class="networking-code">service password-encryption</i>
C. <i class="networking-code">service-password-encryption</i>
D. <i class="networking-code">exec-timeout 1 35</i>
Answer» C. <i class="networking-code">service-password-encryption</i>
106.

What is split horizon?

A. Information about a route should not be sent back in the direction from which the original update came.
B. It splits the traffic when you have a large bus (horizon) physical network.
C. It holds the regular updates from broadcasting to a downed link.
D. It prevents regular update messages from reinstating a route that has gone down.
Answer» B. It splits the traffic when you have a large bus (horizon) physical network.
107.

Which of the following are TCP/IP protocols used at the Application layer of the OSI model?

  1. IP
  2. TCP
  3. Telnet
  4. FTP
  5. TFTP

A. 1 and 3
B. 1, 3 and 5
C. 3, 4 and 5
D. All of the above
Answer» D. All of the above
108.

Which of the following is the decimal and hexadecimal equivalents of the binary number 10011101?

A. 155, 0x9B
B. 157, 0x9D
C. 159, 0x9F
D. 185, 0xB9
Answer» C. 159, 0x9F
109.

Which command will show you whether a DTE or a DCE cable is plugged into serial 0?

A. <i class="networking-code">sh int s0</i>
B. <i class="networking-code">sh int serial 0</i>
C. <i class="networking-code">show controllers serial 0</i>
D. <i class="networking-code">show serial 0 controllers</i>
Answer» D. <i class="networking-code">show serial 0 controllers</i>
110.

You want to totally reinitialize the router and replace the current running-config with the current startup-config. What command will you use?

A. <i class="networking-code">replace run start</i>
B. <i class="networking-code">copy run start</i>
C. <i class="networking-code">copy start run</i>
D. <i class="networking-code">reload</i>
Answer» E.
111.

If you delete the contents of NVRAM and reboot the router, what mode will you be in?

A. Privileged mode
B. Global mode
C. Setup mode
D. NVRAM loaded mode
Answer» D. NVRAM loaded mode
112.

What is the problem with an interface if you type show interface serial 0 and receive the following message? "Serial0 is administratively down, line protocol is down."

A. The keepalives are different times.
B. The administrator has the interface shut down.
C. The administrator is pinging from the interface.
D. No cable is attached.
Answer» C. The administrator is pinging from the interface.
113.

Which of the following services use UDP?

  1. DHCP
  2. SMTP
  3. SNMP
  4. FTP
  5. HTTP
  6. TFTP

A. 1, 3 and 6
B. 2 and 4
C. 1, 2 and 4
D. All of the above
Answer» B. 2 and 4
114.

If you use either Telnet or FTP, which is the highest layer you are using to transmit data?

A. Application
B. Presentation
C. Session
D. Transport
Answer» B. Presentation
115.

Which layer 4 protocol is used for a Telnet connection?

A. IP
B. TCP
C. TCP/IP
D. UDP
Answer» C. TCP/IP
116.

Which statements are true regarding ICMP packets?

  1. ICMP guarantees datagram delivery.
  2. ICMP can provide hosts with information about network problems.
  3. ICMP is encapsulated within IP datagrams.
  4. ICMP is encapsulated within UDP datagrams.

A. 1 only
B. 2 and 3
C. 1 and 4
D. All of the above
Answer» C. 1 and 4
117.

Which of the following allows a router to respond to an ARP request that is intended for a remote host?

A. Gateway DP
B. Reverse ARP (RARP)
C. Proxy ARP
D. Inverse ARP (IARP)
Answer» D. Inverse ARP (IARP)
118.

The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is equivalent to the Network layer of the OSI model?

A. Application
B. Host-to-Host
C. Internet
D. Network Access
Answer» D. Network Access
119.

Which class of IP address provides a maximum of only 254 host addresses per network ID?

A. Class A
B. Class B
C. Class C
D. Class D
Answer» D. Class D
120.

What protocol is used to find the hardware address of a local device?

A. RARP
B. ARP
C. IP
D. ICMP
Answer» C. IP
121.

Which of the following commands sets the secret password to Cisco?

A. <i class="networking-code">enable secret password Cisco</i>
B. <i class="networking-code">enable secret cisco</i>
C. <i class="networking-code">enable secret Cisco</i>
D. <i class="networking-code">enable password Cisco</i>
Answer» D. <i class="networking-code">enable password Cisco</i>
122.

You type the following command into the router and receive the following output:

Router#show serial 0/0 ^
% Invalid input detected at '^' marker.
Why was this error message displayed?

A. You need to be in privileged mode.
B. You cannot have a space between serial and 0/0.
C. The router does not have a serial0/0 interface.
D. Part of the command is missing.
Answer» E.
123.

Which of the following commands will display the current IP addressing and the layer 1 and 2 status of an interface?

  1. show version
  2. show protocols
  3. show interfaces
  4. show controllers
  5. show ip interface

A. 1, 2 and 4
B. 2, 3 and 5
C. 3 and 4 only
D. None of the above
Answer» C. 3 and 4 only
124.

You type show running-config and get this output:

[output cut]
Line console 0 Exec-timeout 1 35 Password BIXPASSWD Login
[output cut]
What do the two numbers following the exec-timeout command mean?

A. If no command has been typed in 35 seconds, the console connection will be closed.
B. If no router activity has been detected in 1 hour and 35 minutes, the console will be locked out.
C. If no commands have been typed in 1 minute and 35 seconds, the console connection will be closed.
D. If you're connected to the router by a Telnet connection, input must be detected within 1 minute and 35 seconds or the connection will be closed.
Answer» D. If you're connected to the router by a Telnet connection, input must be detected within 1 minute and 35 seconds or the connection will be closed.
125.

What layer of the OSI model would you assume the problem is in if you type show interface serial 1 and receive the following message? "Serial1 is down, line protocol is down."

A. Physical layer
B. Data Link layer
C. Network layer
D. None. It is a router problem.
Answer» B. Data Link layer
126.

Which of the following services use TCP?

  1. DHCP
  2. SMTP
  3. HTTP
  4. TFTP
  5. FTP

A. 1 and 2
B. 2, 3 and 5
C. 1, 2 and 4
D. 1, 3 and 4
Answer» C. 1, 2 and 4
127.

What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?

A. Application
B. Host-to-Host
C. Internet
D. Network Access
Answer» C. Internet
128.

Which of the following describe the DHCP Discover message?

  1. It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.
  2. It uses UDP as the Transport layer protocol.
  3. It uses TCP as the Transport layer protocol.
  4. It does not use a layer 2 destination address.

A. 1 only
B. 1 and 2
C. 3 and 4
D. 4 only
Answer» C. 3 and 4
129.

You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?

A. SMTP
B. SNMP
C. DHCP
D. ARP
Answer» D. ARP
130.

Which of the following is private IP address?

A. 12.0.0.1
B. 168.172.19.39
C. 172.15.14.36
D. 192.168.24.43
Answer» E.
131.

Which statement describes a spanning-tree network that has converged?

A. All switch and bridge ports are in the forwarding state.
B. All switch and bridge ports are assigned as either root or designated ports.
C. All switch and bridge ports are in either the forwarding or blocking state.
D. All switch and bridge ports are either blocking or looping.
Answer» D. All switch and bridge ports are either blocking or looping.
132.

What does a switch do when a frame is received on an interface and the destination hardware address is unknown or not in the filter table?

A. Forwards the switch to the first available link
B. Drops the frame
C. Floods the network with the frame looking for the device
D. Sends back a message to the originating station asking for a name resolution
Answer» D. Sends back a message to the originating station asking for a name resolution
133.

In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN?

A. During high-traffic periods
B. After broken links are reestablished
C. When upper-layer protocols require high reliability
D. In an improperly implemented redundant topology
Answer» E.
134.

If you want to disable STP on a port connected to a server, which command would you use?

A. <i class="networking-code">disable spanning-tree</i>
B. <i class="networking-code">spanning-tree off</i>
C. <i class="networking-code">spanning-tree security</i>
D. <i class="networking-code">spanning-tree portfast</i>
Answer» E.
135.

What is the purpose of Spanning Tree Protocol in a switched LAN?

A. To provide a mechanism for network monitoring in switched environments
B. To prevent routing loops in networks with redundant paths
C. To prevent switching loops in networks with redundant switched paths
D. To manage the VLAN database across multiple switches
E. To create collision domains
Answer» D. To manage the VLAN database across multiple switches
136.

How long is an IPv6 address?

A. 32 bits
B. 128 bytes
C. 64 bits
D. 128 bits
Answer» E.
137.

What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet?

A. NAT
B. Static
C. Dynamic
D. PAT
Answer» E.
138.

What are the two main types of access control lists (ACLs)?

  1. Standard
  2. IEEE
  3. Extended
  4. Specialized

A. 1 and 3
B. 2 and 4
C. 3 and 4
D. 1 and 2
Answer» B. 2 and 4
139.

Which protocol is used to send a destination network unknown message back to originating hosts?

A. TCP
B. ARP
C. ICMP
D. BootP
Answer» D. BootP
140.

Which of the following is true when describing a global unicast address?

A. Packets addressed to a unicast address are delivered to a single interface.
B. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4.
C. These are like private addresses in IPv4 in that they are not meant to be routed.
D. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap.
Answer» C. These are like private addresses in IPv4 in that they are not meant to be routed.
141.

What two multicast addresses does OSPFv3 use?

  1. FF02::A
  2. FF02::9
  3. FF02::5
  4. FF02::6

A. 2 only
B. 3 only
C. 1 and 3
D. 3 and 4
Answer» E.
142.

How many collision domains are created when you segment a network with a 12-port switch?

A. 1
B. 2
C. 5
D. 12
Answer» E.
143.

What is the address range of a Class B network address in binary?

A. <i class="networking-code">01xxxxxx</i>
B. <i class="networking-code">0xxxxxxx</i>
C. <i class="networking-code">10xxxxxx</i>
D. <i class="networking-code">110xxxxx</i>
Answer» D. <i class="networking-code">110xxxxx</i>
144.

To enable EIGRP, which of the following would you use?

  1. Router1(config-if)# ipv6 ospf 10 area 0.0.0.0
  2. Router1(config-if)# ipv6 router rip 1
  3. Router1(config)# ipv6 router eigrp 10
  4. Router1(config-rtr)# no shutdown
  5. Router1(config-if)# ipv6 eigrp 10

A. 1, 3 and 5
B. 3, 4 and 5
C. 1 and 3
D. 5 only
Answer» C. 1 and 3
145.

Which statements are true regarding ICMP packets?

  1. They acknowledge receipt of a TCP segment.
  2. They guarantee datagram delivery.
  3. They can provide hosts with information about network problems.
  4. They are encapsulated within IP datagrams.

A. 1 only
B. 2 and 3
C. 3 and 4
D. 2, 3 and 4
Answer» D. 2, 3 and 4
146.

What multicast addresses does EIGRPv6 use?

A. <i class="networking-code">FF02::A</i>
B. <i class="networking-code">FF02::9</i>
C. <i class="networking-code">FF02::5</i>
D. <i class="networking-code">FF02::6</i>
Answer» B. <i class="networking-code">FF02::9</i>
147.

Which of the following is the valid host range for the subnet on which the IP address 192.168.168.188 255.255.255.192 resides?

A. 192.168.168.129-190
B. 192.168.168.129-191
C. 192.168.168.128-190
D. 192.168.168.128-192
Answer» B. 192.168.168.129-191
148.

Which of the following is true when describing a unique local address?

A. Packets addressed to a unicast address are delivered to a single interface.
B. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4.
C. These are like private addresses in IPv4 in that they are not meant to be routed.
D. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap.
Answer» E.
149.

Which of the following is true when describing a link-local address?

A. Packets addressed to a unicast address are delivered to a single interface.
B. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4.
C. These are like private addresses in IPv4 in that they are not meant to be routed.
D. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap.
Answer» D. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap.
150.

What protocols are used to configure trunking on a switch?

  1. VLAN Trunking Protocol
  2. VLAN
  3. 802.1Q
  4. ISL

A. 1 and 2
B. 3 and 4
C. 1 only
D. 2 only
Answer» C. 1 only