

MCQOPTIONS
This section includes 274 Mcqs, each offering curated multiple-choice questions to sharpen your Engineering knowledge and support exam preparation. Choose a topic below to get started.
101. |
Which statement is true regarding classless routing protocols?
|
A. | 1, 3 and 5 |
B. | 3 and 4 |
C. | 2 and 5 |
D. | None of the above |
Answer» D. None of the above | |
102. |
You have the following routing table. Which of the following networks will not be placed in the neighbor routing table?
|
A. | 172.16.30.0 |
B. | 192.168.30.0 |
C. | 10.0.0.0 |
D. | All of them will be placed in the neighbor routing table. |
Answer» D. All of them will be placed in the neighbor routing table. | |
103. |
What command do you type to save the configuration stored in RAM to NVRAM? |
A. | <i class="networking-code">Router(config)#copy current to starting</i> |
B. | <i class="networking-code">Router#copy starting to running</i> |
C. | <i class="networking-code">Router(config)#copy running-config startup-config</i> |
D. | <i class="networking-code">Router#copy run startup</i> |
Answer» E. | |
104. |
How many simultaneous Telnet sessions does a Cisco router support by default? |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» E. | |
105. |
You set the console password, but when you display the configuration, the password doesn't show up; it looks like this:
What cause the password to be stored like this?
|
A. | <i class="networking-code">encrypt password</i> |
B. | <i class="networking-code">service password-encryption</i> |
C. | <i class="networking-code">service-password-encryption</i> |
D. | <i class="networking-code">exec-timeout 1 35</i> |
Answer» C. <i class="networking-code">service-password-encryption</i> | |
106. |
What is split horizon? |
A. | Information about a route should not be sent back in the direction from which the original update came. |
B. | It splits the traffic when you have a large bus (horizon) physical network. |
C. | It holds the regular updates from broadcasting to a downed link. |
D. | It prevents regular update messages from reinstating a route that has gone down. |
Answer» B. It splits the traffic when you have a large bus (horizon) physical network. | |
107. |
Which of the following are TCP/IP protocols used at the Application layer of the OSI model?
|
A. | 1 and 3 |
B. | 1, 3 and 5 |
C. | 3, 4 and 5 |
D. | All of the above |
Answer» D. All of the above | |
108. |
Which of the following is the decimal and hexadecimal equivalents of the binary number 10011101? |
A. | 155, 0x9B |
B. | 157, 0x9D |
C. | 159, 0x9F |
D. | 185, 0xB9 |
Answer» C. 159, 0x9F | |
109. |
Which command will show you whether a DTE or a DCE cable is plugged into serial 0? |
A. | <i class="networking-code">sh int s0</i> |
B. | <i class="networking-code">sh int serial 0</i> |
C. | <i class="networking-code">show controllers serial 0</i> |
D. | <i class="networking-code">show serial 0 controllers</i> |
Answer» D. <i class="networking-code">show serial 0 controllers</i> | |
110. |
You want to totally reinitialize the router and replace the current running-config with the current startup-config. What command will you use? |
A. | <i class="networking-code">replace run start</i> |
B. | <i class="networking-code">copy run start</i> |
C. | <i class="networking-code">copy start run</i> |
D. | <i class="networking-code">reload</i> |
Answer» E. | |
111. |
If you delete the contents of NVRAM and reboot the router, what mode will you be in? |
A. | Privileged mode |
B. | Global mode |
C. | Setup mode |
D. | NVRAM loaded mode |
Answer» D. NVRAM loaded mode | |
112. |
What is the problem with an interface if you type show interface serial 0 and receive the following message? "Serial0 is administratively down, line protocol is down." |
A. | The keepalives are different times. |
B. | The administrator has the interface shut down. |
C. | The administrator is pinging from the interface. |
D. | No cable is attached. |
Answer» C. The administrator is pinging from the interface. | |
113. |
Which of the following services use UDP?
|
A. | 1, 3 and 6 |
B. | 2 and 4 |
C. | 1, 2 and 4 |
D. | All of the above |
Answer» B. 2 and 4 | |
114. |
If you use either Telnet or FTP, which is the highest layer you are using to transmit data? |
A. | Application |
B. | Presentation |
C. | Session |
D. | Transport |
Answer» B. Presentation | |
115. |
Which layer 4 protocol is used for a Telnet connection? |
A. | IP |
B. | TCP |
C. | TCP/IP |
D. | UDP |
Answer» C. TCP/IP | |
116. |
Which statements are true regarding ICMP packets?
|
A. | 1 only |
B. | 2 and 3 |
C. | 1 and 4 |
D. | All of the above |
Answer» C. 1 and 4 | |
117. |
Which of the following allows a router to respond to an ARP request that is intended for a remote host? |
A. | Gateway DP |
B. | Reverse ARP (RARP) |
C. | Proxy ARP |
D. | Inverse ARP (IARP) |
Answer» D. Inverse ARP (IARP) | |
118. |
The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is equivalent to the Network layer of the OSI model? |
A. | Application |
B. | Host-to-Host |
C. | Internet |
D. | Network Access |
Answer» D. Network Access | |
119. |
Which class of IP address provides a maximum of only 254 host addresses per network ID? |
A. | Class A |
B. | Class B |
C. | Class C |
D. | Class D |
Answer» D. Class D | |
120. |
What protocol is used to find the hardware address of a local device? |
A. | RARP |
B. | ARP |
C. | IP |
D. | ICMP |
Answer» C. IP | |
121. |
Which of the following commands sets the secret password to Cisco? |
A. | <i class="networking-code">enable secret password Cisco</i> |
B. | <i class="networking-code">enable secret cisco</i> |
C. | <i class="networking-code">enable secret Cisco</i> |
D. | <i class="networking-code">enable password Cisco</i> |
Answer» D. <i class="networking-code">enable password Cisco</i> | |
122. |
You type the following command into the router and receive the following output:
Why was this error message displayed?
|
A. | You need to be in privileged mode. |
B. | You cannot have a space between serial and 0/0. |
C. | The router does not have a serial0/0 interface. |
D. | Part of the command is missing. |
Answer» E. | |
123. |
Which of the following commands will display the current IP addressing and the layer 1 and 2 status of an interface?
|
A. | 1, 2 and 4 |
B. | 2, 3 and 5 |
C. | 3 and 4 only |
D. | None of the above |
Answer» C. 3 and 4 only | |
124. |
You type show running-config and get this output:
What do the two numbers following the exec-timeout command mean?
|
A. | If no command has been typed in 35 seconds, the console connection will be closed. |
B. | If no router activity has been detected in 1 hour and 35 minutes, the console will be locked out. |
C. | If no commands have been typed in 1 minute and 35 seconds, the console connection will be closed. |
D. | If you're connected to the router by a Telnet connection, input must be detected within 1 minute and 35 seconds or the connection will be closed. |
Answer» D. If you're connected to the router by a Telnet connection, input must be detected within 1 minute and 35 seconds or the connection will be closed. | |
125. |
What layer of the OSI model would you assume the problem is in if you type show interface serial 1 and receive the following message? "Serial1 is down, line protocol is down." |
A. | Physical layer |
B. | Data Link layer |
C. | Network layer |
D. | None. It is a router problem. |
Answer» B. Data Link layer | |
126. |
Which of the following services use TCP?
|
A. | 1 and 2 |
B. | 2, 3 and 5 |
C. | 1, 2 and 4 |
D. | 1, 3 and 4 |
Answer» C. 1, 2 and 4 | |
127. |
What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? |
A. | Application |
B. | Host-to-Host |
C. | Internet |
D. | Network Access |
Answer» C. Internet | |
128. |
Which of the following describe the DHCP Discover message?
|
A. | 1 only |
B. | 1 and 2 |
C. | 3 and 4 |
D. | 4 only |
Answer» C. 3 and 4 | |
129. |
You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this? |
A. | SMTP |
B. | SNMP |
C. | DHCP |
D. | ARP |
Answer» D. ARP | |
130. |
Which of the following is private IP address? |
A. | 12.0.0.1 |
B. | 168.172.19.39 |
C. | 172.15.14.36 |
D. | 192.168.24.43 |
Answer» E. | |
131. |
Which statement describes a spanning-tree network that has converged? |
A. | All switch and bridge ports are in the forwarding state. |
B. | All switch and bridge ports are assigned as either root or designated ports. |
C. | All switch and bridge ports are in either the forwarding or blocking state. |
D. | All switch and bridge ports are either blocking or looping. |
Answer» D. All switch and bridge ports are either blocking or looping. | |
132. |
What does a switch do when a frame is received on an interface and the destination hardware address is unknown or not in the filter table? |
A. | Forwards the switch to the first available link |
B. | Drops the frame |
C. | Floods the network with the frame looking for the device |
D. | Sends back a message to the originating station asking for a name resolution |
Answer» D. Sends back a message to the originating station asking for a name resolution | |
133. |
In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN? |
A. | During high-traffic periods |
B. | After broken links are reestablished |
C. | When upper-layer protocols require high reliability |
D. | In an improperly implemented redundant topology |
Answer» E. | |
134. |
If you want to disable STP on a port connected to a server, which command would you use? |
A. | <i class="networking-code">disable spanning-tree</i> |
B. | <i class="networking-code">spanning-tree off</i> |
C. | <i class="networking-code">spanning-tree security</i> |
D. | <i class="networking-code">spanning-tree portfast</i> |
Answer» E. | |
135. |
What is the purpose of Spanning Tree Protocol in a switched LAN? |
A. | To provide a mechanism for network monitoring in switched environments |
B. | To prevent routing loops in networks with redundant paths |
C. | To prevent switching loops in networks with redundant switched paths |
D. | To manage the VLAN database across multiple switches |
E. | To create collision domains |
Answer» D. To manage the VLAN database across multiple switches | |
136. |
How long is an IPv6 address? |
A. | 32 bits |
B. | 128 bytes |
C. | 64 bits |
D. | 128 bits |
Answer» E. | |
137. |
What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet? |
A. | NAT |
B. | Static |
C. | Dynamic |
D. | PAT |
Answer» E. | |
138. |
What are the two main types of access control lists (ACLs)?
|
A. | 1 and 3 |
B. | 2 and 4 |
C. | 3 and 4 |
D. | 1 and 2 |
Answer» B. 2 and 4 | |
139. |
Which protocol is used to send a destination network unknown message back to originating hosts? |
A. | TCP |
B. | ARP |
C. | ICMP |
D. | BootP |
Answer» D. BootP | |
140. |
Which of the following is true when describing a global unicast address? |
A. | Packets addressed to a unicast address are delivered to a single interface. |
B. | These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. |
C. | These are like private addresses in IPv4 in that they are not meant to be routed. |
D. | These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. |
Answer» C. These are like private addresses in IPv4 in that they are not meant to be routed. | |
141. |
What two multicast addresses does OSPFv3 use?
|
A. | 2 only |
B. | 3 only |
C. | 1 and 3 |
D. | 3 and 4 |
Answer» E. | |
142. |
How many collision domains are created when you segment a network with a 12-port switch? |
A. | 1 |
B. | 2 |
C. | 5 |
D. | 12 |
Answer» E. | |
143. |
What is the address range of a Class B network address in binary? |
A. | <i class="networking-code">01xxxxxx</i> |
B. | <i class="networking-code">0xxxxxxx</i> |
C. | <i class="networking-code">10xxxxxx</i> |
D. | <i class="networking-code">110xxxxx</i> |
Answer» D. <i class="networking-code">110xxxxx</i> | |
144. |
To enable EIGRP, which of the following would you use?
|
A. | 1, 3 and 5 |
B. | 3, 4 and 5 |
C. | 1 and 3 |
D. | 5 only |
Answer» C. 1 and 3 | |
145. |
Which statements are true regarding ICMP packets?
|
A. | 1 only |
B. | 2 and 3 |
C. | 3 and 4 |
D. | 2, 3 and 4 |
Answer» D. 2, 3 and 4 | |
146. |
What multicast addresses does EIGRPv6 use? |
A. | <i class="networking-code">FF02::A</i> |
B. | <i class="networking-code">FF02::9</i> |
C. | <i class="networking-code">FF02::5</i> |
D. | <i class="networking-code">FF02::6</i> |
Answer» B. <i class="networking-code">FF02::9</i> | |
147. |
Which of the following is the valid host range for the subnet on which the IP address 192.168.168.188 255.255.255.192 resides? |
A. | 192.168.168.129-190 |
B. | 192.168.168.129-191 |
C. | 192.168.168.128-190 |
D. | 192.168.168.128-192 |
Answer» B. 192.168.168.129-191 | |
148. |
Which of the following is true when describing a unique local address? |
A. | Packets addressed to a unicast address are delivered to a single interface. |
B. | These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. |
C. | These are like private addresses in IPv4 in that they are not meant to be routed. |
D. | These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. |
Answer» E. | |
149. |
Which of the following is true when describing a link-local address? |
A. | Packets addressed to a unicast address are delivered to a single interface. |
B. | These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. |
C. | These are like private addresses in IPv4 in that they are not meant to be routed. |
D. | These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. |
Answer» D. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. | |
150. |
What protocols are used to configure trunking on a switch?
|
A. | 1 and 2 |
B. | 3 and 4 |
C. | 1 only |
D. | 2 only |
Answer» C. 1 only | |