Explore topic-wise MCQs in Networking.

This section includes 31 Mcqs, each offering curated multiple-choice questions to sharpen your Networking knowledge and support exam preparation. Choose a topic below to get started.

1.

You configure the following access list: What will the result of this access list be?

A. Email and Telnet will be allowed out E0.
B. Email and Telnet will be allowed in E0.
C. Everything but email and Telnet will be allowed out E0.
D. No IP traffic will be allowed out E0.
Answer» E.
2.

In asymmetric encryption _____________

A. same key is used for encryption and decryption
B. different keys are used encryption and decryption
C. no key is required for encryption and decryption
D. none of the mentioned
Answer» C. no key is required for encryption and decryption
3.

Multipartite viruses attack on _____________

A. files
B. boot sector
C. memory
D. all of the mentioned
Answer» E.
4.

File virus attaches itself to the _____________

A. source file
B. object file
C. executable file
D. all of the mentioned
Answer» D. all of the mentioned
5.

Which one of the following is not an attack, but a search for vulnerabilities to attack?

A. denial of service
B. port scanning
C. memory access violation
D. dumpster diving
Answer» C. memory access violation
6.

What is a trap door in a program?

A. a security hole, inserted at programming time in the system for later use
B. a type of antivirus
C. security hole in a network
D. none of the mentioned
Answer» B. a type of antivirus
7.

Which one of the following is a process that uses the spawn mechanism to revage the system performance?

A. worm
B. trojan
C. threat
D. virus
Answer» B. trojan
8.

The pattern that can be used to identify a virus is known as _____________

A. stealth
B. virus signature
C. armoured
D. multipartite
Answer» C. armoured
9.

The internal code of any software that will set of a malicious function when specified conditions are met, is called _____________

A. logic bomb
B. trap door
C. code stacker
D. none of the mentioned
Answer» B. trap door
10.

The code segment that misuses its environment is called a _____________

A. internal thief
B. trojan horse
C. code stacker
D. none of the mentioned
Answer» C. code stacker
11.

When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called _____________

A. denial-of-service attack
B. slow read attack
C. spoofed attack
D. starvation attack
Answer» B. slow read attack
12.

Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list?1. 172.16.30.55 0.0.0.2552. 172.16.30.55 0.0.0.03. any 172.16.30.554. host 172.16.30.555. 0.0.0.0 172.16.30.556. ip any 172.16.30.55

A. and 4
B. and 4
C. , 4 and 6
D. and 5
Answer» C. , 4 and 6
13.

You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with?

A. access-list 10 deny 172.16.192.0 0.0.31.255
B. access-list 10 deny 172.16.0.0 0.0.255.255
C. access-list 10 deny 172.16.172.0 0.0.31.255
D. access-list 10 deny 172.16.188.0 0.0.15.255
Answer» B. access-list 10 deny 172.16.0.0 0.0.255.255
14.

Which of the following access lists will allow only HTTP traffic into network 196.15.7.0?

A. access-list 100 permit tcp any 196.15.7.0 0.0.0.255 eq www
B. access-list 10 deny tcp any 196.15.7.0 eq www
C. access-list 100 permit 196.15.7.0 0.0.0.255 eq www
D. access-list 110 permit ip any 196.15.7.0 0.0.0.255
Answer» B. access-list 10 deny tcp any 196.15.7.0 eq www
15.

If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid?

A. access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftp access-list 111 permit ip any 0.0.0.0 255.255.255.255
B. access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any
C. access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp
D. access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp access-list 198 permit ip any 0.0.0.0 255.255.255.255
Answer» E.
16.

If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use?

A. access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet
B. access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet
C. access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23
D. access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23
Answer» D. access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23
17.

Which of the following commands connect access list 110 inbound to interface ethernet0?

A. Router(config)# ip access-group 110 in
B. Router(config)# ip access-list 110 in
C. Router(config-if)# ip access-group 110 in
D. Router(config-if)# ip access-list 110 in
Answer» D. Router(config-if)# ip access-list 110 in
18.

You have created a named access list called Blocksales. Which of the following is a valid command for applying this to packets trying to enter interface s0 of your router?

A. (config)# ip access-group 110 in
B. (config-if)# ip access-group 110 in
C. (config-if)# ip access-group Blocksales in
D. (config-if)# blocksales ip access-list in
Answer» D. (config-if)# blocksales ip access-list in
19.

Which router command allows you to view the entire contents of all access lists?

A. Router# show interface
B. Router> show ip interface
C. Router# show access-lists
D. Router> show all access-lists
Answer» D. Router> show all access-lists
20.

You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with?

A. access-list 10 deny 172.16.48.0 255.255.240.0
B. access-list 10 deny 172.16.144.0 0.0.7.255
C. access-list 10 deny 172.16.64.0 0.0.31.255
D. access-list 10 deny 172.16.136.0 0.0.15.255
Answer» C. access-list 10 deny 172.16.64.0 0.0.31.255
21.

Which of the following series of commands will restrict Telnet access to the router?

A. Lab_A(config)#access-list 10 permit 172.16.1.1 Lab_A(config)#line con 0 Lab_A(config-line)#ip access-group 10 in
B. Lab_A(config)#access-list 10 permit 172.16.1.1 Lab_A(config)#line vty 0 4 Lab_A(config-line)#access-class 10 out
C. Lab_A(config)#access-list 10 permit 172.16.1.1 Lab_A(config)#line vty 0 4 Lab_A(config-line)#access-class 10 in
D. Lab_A(config)#access-list 10 permit 172.16.1.1 Lab_A(config)#line vty 0 4 Lab_A(config-line)#ip access-group 10 in
Answer» D. Lab_A(config)#access-list 10 permit 172.16.1.1 Lab_A(config)#line vty 0 4 Lab_A(config-line)#ip access-group 10 in
22.

What router command allows you to determine whether an IP access list is enabled on a particular interface?

A. show ip port
B. show access-lists
C. show ip interface
D. show access-lists interface
Answer» D. show access-lists interface
23.

You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with?

A. access-list 10 deny 172.16.48.0 255.255.240.0
B. access-list 10 deny 172.16.0.0 0.0.255.255
C. access-list 10 deny 172.16.64.0 0.0.31.255
D. access-list 10 deny 172.16.48.0 0.0.15.255
Answer» E.
24.

Which of the following is an example of a standard IP access list?

A. access-list 110 permit host 1.1.1.1
B. access-list 1 deny 172.16.10.1 0.0.0.0
C. access-list 1 permit 172.16.10.1 255.255.0.0
D. access-list standard 1.1.1.1
Answer» C. access-list 1 permit 172.16.10.1 255.255.0.0
25.

Which command would you use to apply an access list to a router interface?

A. ip access-list 101 out
B. access-list ip 101 in
C. ip access-group 101 in
D. access-group ip 101 in
Answer» D. access-group ip 101 in
26.

You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router?

A. show access-lists
B. show interface Ethernet 0
C. show ip access-lists
D. show ip interface Ethernet 0
Answer» E.
27.

Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list? 172.16.30.55 0.0.0.255 172.16.30.55 0.0.0.0 any 172.16.30.55 host 172.16.30.55 0.0.0.0 172.16.30.55 ip any 172.16.30.55

A. 1 and 4
B. 2 and 4
C. 1, 4 and 6
D. 3 and 5
Answer» C. 1, 4 and 6
28.

You configure the following access list: access-list 110 deny tcp 10.1.1.128 0.0.0.63 any eq smtp access-list 110 deny tcp any eq 23 int ethernet 0 ip access-group 110 out What will the result of this access list be?

A. Email and Telnet will be allowed out E0.
B. Email and Telnet will be allowed in E0.
C. Everything but email and Telnet will be allowed out E0.
D. No IP traffic will be allowed out E0.
Answer» E.
29.

You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?

A. access-list 10 deny 192.168.160.0 255.255.224.0
B. access-list 10 deny 192.168.160.0 0.0.191.255
C. access-list 10 deny 192.168.160.0 0.0.31.255
D. access-list 10 deny 192.168.0.0 0.0.31.255
Answer» D. access-list 10 deny 192.168.0.0 0.0.31.255
30.

What command will permit SMTP mail to only host 1.1.1.1?

A. access-list 10 permit smtp host 1.1.1.1
B. access-list 110 permit ip smtp host 1.1.1.1
C. access-list 10 permit tcp any host 1.1.1.1 eq smtp
D. access-list 110 permit tcp any host 1.1.1.1 eq smtp
Answer» E.
31.

Which of the following is true regarding access lists applied to an interface?

A. You can place as many access lists as you want on any interface until you run out of memory.
B. You can apply only one access list on any interface.
C. One access list may be configured, per direction, for each layer 3 protocol configured on an interface.
D. You can apply two access lists to any interface.
Answer» D. You can apply two access lists to any interface.