Wednesday, November 23, 2016


IMPORTANT
Topic  : CCNA Cisco Certified Network Associate Study Guide (Exam 640-802)

Type : MCQs

                                        Please note all the Bold Options are correct.
 
                                                         1 - 100 of 300 MCQs

I am publishing all this just to spread the knowledge.  I have took good care in selection of Correct options but "To Err is Human to Forgive Divine"
Please do consult your Book or Teacher when you feel any option confusing.
You may start

1 - 100 of 300 MCQs
1. Which of the following network characteristics is concerned about Mean Time Between Failures?
 
a.                   Cost
b.                  Password
c.                   Reliability
a.                   Non-Availability
 
2. Which of the following describes users working from home?
 
a.                  SOHO
b.                  Central Office
c.                   Regional Office
 
3. Which of the following topology uses a single cable to connect all devices together?
 
a.                  Bus
b.                  Extended Star
c.                   Point-to-point
d.                  Token Ring
 
4. Which of the following has both logical and physical ring topologies?
 
a.                   Router
b.                  FDDI
c.                   Token Ring
d.                  All above are correct
 
5. Whit of the following Ethernet has/have both a physical and logical bus topology?
 
a.                  10BaseT
b.                  10Base2 and 10Base5
c.                   10Base5 and 10BaseT
d.                  10Base2, 10BaseT, and 10Base5
 
6. Which topology describes the communication of devices with each other?
 
a.                   Star
b.                  Logical
c.                   Layered
d.                  Mesh
 
7. If a person is interested in attacking our network, what generally security term is used?
 
a.                   Security Rules
b.                  Adversary
c.                   Passive
d.                  Distributed
 
8. Looking for such things as clear-text passwords, What class of attack monitors unencrypted traffic?
 
a.                  Passive
b.                  Adversaries
c.                   Distributed
d.                  Programmed
 
9. Keeping spares on hand to mitigate the threat, which type of installation threat involves?
 
a.                   Software
b.                  Electronically
c.                   Management
d.                  Maintenance
 
10. As what kind of attack would be classified the brute-force password attack?
 
a.                   Reconnaissance
b.                  Access
c.                   Authorization
d.                  DoS
 
11. For what refers the term SSL?
 
a.         denial of service
b.         uninterruptible power supply
c.         Secure Sockets Layer
 
12. The term OTPs refers for what?
 
a.                   Access Control lists
b.                  One Time Passwords
c.                   Computer Security Institute
 
13. For what the term SSL stands?
 
a.         denial of service
b.         uninterruptible power supply
c.         Secure Sockets Layer
 
13. For what the term OSI stands?
 
a.         Open system interconnection
b.         International Organization for Standardization
c.         Command-line interface
 
14.  Which one of the following is not provide OSI Reference Model?
 
a.                   Defines the process for connecting two layers together, promoting interoperability between vendors
b.                  Allows vendors to compartmentalize their design efforts to fit a modular design, which  eases implementations and simplifies troubleshooting
c.                   Separates a complex function into simpler components
d.                  Defines eight layers common to all networking protocols
e.                   Provides a teaching tool to help network administrators understand the communication process used between networking components
 
15. Put the following in the correct order, from high to low:
 (a) session, (b) presentation, (c) physical, (d) data link, (e) network, (f) application, (g) transport.
 
a.                   c, e, d, f, a, b, g
b.                  f, a, b, g, d, e, c
c.                   f, b, g, a, e, d, c
d.                  f, b, a, g, e, d, c
 
16. Which one of the following layer provides for hardware addressing?
 
a.                   IPX Addresses
b.                  Point-to-Point Protocol
c.                   Data link
 
17. How many bits in length and what is the represented numbering format of MAC addresses?
 
a.                   40 Bits in length and representing octal format
b.                  40 Bits in length and representing hexadecimal format
c.                   20 Bits in length and representing octal format
d.                  20 Bits in length and representing decimal format
 
18. Except which one of the following Network layer handles all?
 
a.                   Broadcast problems
b.                  Conversion between media types
c.                   Hierarchy through the use of physical addresses
d.                  Splitting collision domains into smaller ones
 
19. Which of the following is used to provide reliable connections?
 
a.                   Ready/not ready signals
b.                  Sequence numbers and acknowledgments
c.                   Operating System
d.                  Ready/not ready signals and windowing
 
20. Through which of the following a number connection multiplexing is done
 
a.                  Socket
b.                  Software
c.                   Session
d.                  Internet
 
21. Match the device with the OSI Reference Model at which it primarily functions.
Devices: (1) Repeater, (2) Router, (3) NIC, and (4) Switch
Layers: (a) Physical, (b) Data link, (c) Network, and (d) Transport
 
a.                   1-a, 2-c, 3-d, 4-b
b.                  1-a, 2-c, 3-b, 4-b
c.                   1-b, 2-c, 3-d, 4-a
d.                  1-d, 2-a, 3-b, 4-c
 
22. Match the PDU name with the OSI Reference Model at which it is used.
 
PDU names: (1) Data, (2) Frame, (3) Packet, (4) Bits, and (5) Segment.
Layers: (a) Application, (b) Presentation, (c) Session, (d) Transport, (e) Network, (f) Data link, (g) Physical
 
a.                   1-a, 2-b, 3-c, 4-d, 5-e
b.                  1-b, 2-c, 3-d, 4-e, 5-f
c.                   1-a, 2-f, 3-e, 4-f, 5-d
d.                  1-g, 2-f, 3-d 4-e, 5-d
 
23. There is a network with some network components physically e.g. Data-link, Router and Hub. PC-1 wants
to send data to PC-2. Which of the following statements is true, assuming that the layer 2 medium is Ethernet and TCP/IP is used at layer?
 
a.                   When PC-2 generates the frame, it puts its MAC address in the source field and the Switch-A’s MAC address in the destination field.
b.                   When PC-1 generates the packet, it puts its MAC address in the source field and the PC-2’s MAC address in the destination field.
c.                   When PC-1 generates the packet, it puts its IP address in the source field and Router-A’s IP address in the destination field.
d.                   When PC-1 generates the packet, it puts Router-A’s IP address in the source field and PC-2’s IP address in the destination field.
e.                   When Router-1 generates the frame, it puts its MAC address as the source and PC-2’s MAC address as the destination.
 
24. Which of the following media access methods are used by Gigabit Ethernet?
 
a.                  Carrier Sense, Multiple Access, Collision Detection
b.                  Collision sense, multiple access, carrier detection
c.                   Defines the MAC
d.                  Multiple collision and carrier detection
 
25. Which of the following is not a characteristic of Ethernet 802.3?
 
a.                   Contains an LLC
b.                  Media Access Control
c.                   Has a type field
d.                  Uses FCS to detect invalid frames
 
26. Which is a valid MAC address given below?
 
a.                   00:00:11:GA:7A:34
b.                  000:00:FFCCC:ABC12
c.                   00:1F:FF:CE:DA:12
d.                  AC:45:FF:EE:12:57:34:65
 
27. 11000001 is what in hexadecimal and decimal?
 
a.                   B1, 193
b.                  C1, 193
c.                   C1, 195
d.                  C1, 190
 
28. In decimal what is the 11100111?
 
a.                   230
b.                  245
c.                   190
d.                  231
 
29. Match the following hexadecimal and binary values correctly to their corresponding decimal values:
 
Decimal           :           14, 3, 10, 7
Hexadecimal   :           A, 7, E, 3
Binary             :           1110, 1010, 0111, 0011
                 
                        Deci              Hex.                 Bin.
a.                  3                      3                      001     
b.                  7                      7                      0111   
c.                   10                    A                     1010
d.                  14                    E                     1110
e.                   None of above is correct.
 
30. Which of the following is a characteristic of UTP cabling?
 
a.                   Implemented with single wire
b.                  Uses two-pair wire
c.                   Is susceptible to EMI and RFI
d.                  Used between two office buildings
 
31. For connecting a hub to a switch, which cabling would be used?
 
a.         Straight-through UTP
b.         Crossover UTP
c.         Strar Topology
 
32. We need to connect a PC to a hub, hub to a switch, switch to another switch, and then second switch to a router. What kinds and numbers of UTP cables do we need to make this network?
 
a.                  Two straight-through and two crossover
b.                  Three straight-through and three crossover
c.                   One straight-through and One crossover
d.                  Four Crossover
 
33. Which is a connector on a Category 5 cable with 10BaseT running across it?
 
a.         AUI
b          DB-25
c.         RJ-45
d.         BNC
 
34. Collision problems can’t be solved by which devices?
 
a.      Hubs
b.      Routers
c.       Switches and Routers
d.      Switches and hubs
 
35. Which is the different than three main functions of a layer 2 device?
 
a.         Loop removal
b.         Forwarding
c.         Listening
d.         Learning
 
36. A switch can not flood which type of traffic?
 
a.         Multicast
b.         Known unicast
c.         VoIP
d.         Unknown unicast
 
37. If there are Host A, Host B, with one switch and Host C, Host D are with other switch but both switches
are connected with each other in Physical Depiction of Transparent Bridging How many collision and
broadcast domains are there?
 
a.         1, 4
b.         5, 1
c.         4, 1
d.         1, 5
 
38. Point out which is the true concerning bridges given below?
 
a.                   They switch frames in software.
b.                  They support full-duplexing.
c.                   They support one collision domain for the entire bridge.
d.                  They do only store-and-forward switching.
 
39. With which of the following switching, the switch reads the destination MAC address of the frame and
immediately starts forwarding the frame.
 
a.                   Half-Duplex
b.                  Cut-through
c.                   Fragment-free
d.                  Full Duplex
 
40. Concerning full-duplexing on a NIC which of the following is tru?
 
a.         It can’t either send or receive frames, but both simultaneously.
b.                  It can’t be used with hubs.
c.                   It can be used with 10Base10 cabling.
d.                  It uses point-to-point connections.
 
41. Concerning the switch learning process which of the following option is true?
 
a.                  Known destination MAC addressing information is updated in the port address table.
b.                  They do only store-and-forward switching.
c.                   A broadcast MAC address can be learned by the switch.
d.                  All above are correct
 
42. In a switched network, when do we see the transmitting multiple copies of same unicast frame   ?
 
a.                   When a port is misconfigured in half-duplex on one side and full-duplex on the other.
b.                  This is impossible.
c.                   When the switching mode is configured as runtless.
d.                  When an inadvertent layer 2 loop exists.
 
43. If PC A, PC B, and PC C are connected with a Hub and Hub is Connected with a Switch, Same three PCs
PC D, PC E, and PC F are connected with Switch. Which of the following statements would be false?
 
a.                   If PC-B sends a frame to PC-C, the frame would be dropped by the switch.
b.                  If PC-B is moved to port 3 of the switch, the switch will automatically update its CAM table when PC-A sends a frame to PC-B.
c.                   If PC-C sends out a broadcast, the switch will still learn the MAC address of the source.
d.                  PC-D can set its interface to full-duplex if the switch port supports full-duplexing.
 
44. What is meant by the term SNMP?
 
a.                  Single Network Management  Party
b.                  Super Network Multi protocol
c.                   Simple Network Management Protocol
 
45. What is called the term CDP?
 
a.                  Creative Discovery Protocol
b.                  Cisco Discovery Protocol
c.                   Cisco Disconnected Protocol
 
46. Concerning WLAN wireless transmissions, which is the following given statement is true?
 
a.                  A device can send only.
b.                  CSMA/CD is used to detect and transmit a signal.
c.                   A wireless device will use RTS and CTS signals to avoid collisions.
d.                  All are correct.
 
47. We are experiencing intermittent connection and signal quality problems with our WLAN implementation.
Which of the following would typically not be causing this problem?
 
a.                  Computer USB headset
b.                  Cordless phone
c.                   Microwave oven
d.                  Rogue AP
e.                   All above are wrong
 
48. Which of the given below statement is not true concerning 802.11b?
 
a.                  Maximum transmission rate of 11 Mbps
b.                  Backward compatible with the original 802.11 standard
c.                   Uses OFDM as a transmission method
d.                  Is an IEEE standard
 
49. OFDM is stands for which of the following?
 
a.                   Original Frequency Division Multiplexing
b.                  Orthogonal Frequency Division Multiplexing
c.                   Outgoing Frequency Division Multiplexing
d.                  Original Frequency Digital Multiplexing
 
50. Which of the following IEEE standards supports the Orthogonal Frequency Division Multiplexing  
transmission method and can transmit data at 54 Mbps using a 5 GHz frequency?
 
a.                  802.11b
b.                  802.11a
c.                   802.11n
d.                  802.11a and g
 
51. Which of the given below Wi-Fi standards supports RC4 encryption with TKIP and PSK authentication?
 
a.                  WAP
b.                  802.1x
c.                   WPA
d.                  All above are correct
 
52. Which of the given below will be true if we disable broadcast beaconing on an AP?
 
a.                  No any option is correct.
b.                  We need to enable MAC address filtering to allow clients to talk to the AP.
c.                   We must not define the IBSS on each client, matching it to the configured value on the AP.
d.                  We must define the SSID on each client, matching it to the configured value on the AP.
 
53. Which of the following be used by WLAN security solution uses 802.1x authentication with AES-CCMP
for encryption?
 
a.                  Personal WAP
b.                  Personal WPA2
c.                   Enterprise WAP
d.                  Enterprise WPA2
 
54. Which 802.11 access mode is based on Independent Basic Service Set?
 
a.                  Ad hoc
b.                  Infrastructure
c.                   SOHO
d.                  ISA
 
55. Three APs make up the WLAN network with roaming devices. Which of the given below is true concerning
the setup of the three APs?
 
a.                  They should use same SSID values.
b.                  ESA coverage should be used.
c.                   They should all use the different RF channel.
d.                  They should use same RF frequencies.
 
56. If there is a problem of consistent connection drops and poor performance on WLAN SOHO network
in A three room office. Which of the following would to be done to solve this problem?
 
a.      Buy an AP for each room and setup a network for better coverage.
b.      Place the AP in a central location between the three rooms.
c.                   Check the direction of the antennas on the AP and possibly upgrade the antennas to get better signal coverage.
d.      Replace the AP with another product.
 
57. How many layers does the TCP/IP protocol stack have? Choose the correct one.
 
a.                  2
b.                  4
c.                   6
d.                  8
 
58. Which option of the given below is wrong concerning the IP protocol and the TCP/IP protocol stack?
 
a.                  The Internet layer corresponds to layer 3 of the OSI Reference Model.
b.                  The IP protocol provides for connectionless delivery of datagrams.
c.                   The IP protocol provides for best effort delivery, with data recovery capabilities.
d.                  The source and destination address in an IP header totals 64 bits.
 
59. How many host bits has a Class A Address?
 
a.                  32
b.                  16
c.                   8
d.                  24
 
60. Which is the class of Address of 191.75.39.24? 
 
a.                  C
b.                  B
c.                   A
d.                  All above are correct
 
61. Which is the class of Address of 172.16.240.256? 
 
a.                  A
b.                  B
c.                   C
d.                  None of the above
e.                  All Above are correct
 
62. Which of the given below is a private IP address?
 
a.                  192.168.0.1
b.                  172.32.18.19
c.                   192.169.1.66
d.                  10.189.289.66
 
63. If we are getting reply message “request timeout” or “destination unreachable” by using ping command
while testing connectivity, At what layer of the OSI Reference Model does this indicate a problem?
 
a.                  Transport or Higher
b.                  Data link or equal
c.                   Network or lower
d.                  All above are correct
 
65. For What the term ARP stands?
 
a.                  Additional Resolution Protocol
b.                  Address Resolution Protocol
c.                   Added Resolution Protocol
d.                  None of above
 
66. We execute ping 127.0.0.1 on our Windows PC and we get echo replies to the ping. What is the indication
of its behavior?
 
a.                  We have connectivity to other layer 3 devices.
b.                  We have connectivity to other hosts on the same segment/domain.
c.                   We have correctly installed TCP/IP on your Pc.
d.                  We have correctly configured our DNS and default gateway settings.
 
67. We execute the Windows ping command. The first echo request times out, but the last three are
successful. What would typically cause this problem?
 
a.                   DHCP is occurring.
b.                  ARP is occurring.
c.                   The routers are running protocol to find the destination.
d.                  There is problem with application layer.
 
68. How many bits have a Class B address?
a.                   8
b.                  16
c.                   20
d.                  24
 
69. Which of the following is Class of address of 192.168.256.135?
 
a.                   A
b.                  B
c.                   C
d.                  None of the above
 
70. Which of the given below is a valid subnet mask value?
 
a.                   255.0.255.255
b.                  255.0.0.255
c.                   255.255.254.0
d.                  192.255.255.256
 
71. Which of the following function is to differentiate between the network address, the host addresses and the
directed broadcast address?
 
a.                  Subnet Mask
b.                  Configured IP
c.                   TCP/IP
d.                  WLAN
 
72. How many subnets do you have, if you are given a Class C network with 25 bits for networking?
 
a.                   1
b.                  2
c.                   4
d.                  3
 
73. If Class C network is given with a subnet mask 255.255.255.248, how many host addresses are there on
each subnet?
 
a.                   8
b.                  6
c.                   12
d.                  14
 
74. If there is a Class B network with a subnet mask of 255.255.255.192. How many host addresses would be
there on each subnet?
 
a.                   40
b.                  62
c.                   136
d.                  256
 
75. What type of address it would be, if you are given the addressing information 192.168.37.192/25?
 
a.                   Subnet Mask
b.                  Network
c.                   Host
 
76. You are given this addressing information 172.17.16.255/23. What type of it would be?
 
a.                   Network
b.                  TCP/IP
c.                   Host
 
77. What type of address it could be if we give the addressing information 10.0.8.0/22?
 
a.                  Network
b.                  Directed broadcast
c.                   Host
 
78. VLSM is supported by which protocol?
 
a.                  RIPv2
b.                  EIGRP
c.                   BGP
d.                  None of these
 
79. How many subnet masks do you need, if you given a Class C network, 192.168.1.0/24, but you need one
network with 120 hosts and two networks with 60 hosts?
 
a.       5
b.      2
c.       3
d.      1
 
80. If a Class C network is given 192.168.1.0./24. and need one network with 120 hosts and three networks
with 60 hosts. What subnet mask values would be used?
 
a.                   255.255.255.128
b.                  255.255.255.1/24
c.                   255.255.255.0
d.                  None of these
 
81. Class C network  162.168.1.0/24 is given and need three networks with 60 hosts and two networks with 30
hosts, what the subnet masks values could be used?
 
a.                  255.255.255.128 and 255.255.255.192
b.                  255.255.255.0 and 255.255.255.240
c.                   255.255.255.192 and 255.255.255.224
d.                  255.255.255.0 and 255.255.255.252
 
82. Some-one is given this address space: 172.16.5.0/25. and need one network with 64 hosts and two with 30
hosts. What are the most specific subnet mask values to use?
 
a.                   /27 and /28
b.                  /26 and /27
c.                   /25 and /26
d.                  None of these
 
83. If a Class C network is given and we have four LAN segments with the following numbers of devices: 120,
60, 30, and 30, what subnet masks values can be used to accommodate these segments?
 
a.                   /20, /25, and /20
b.                  /25, /26, and /27
c.                   /26, /27, and /28
d.                  All these are correct
 
84. VLSM allows us to summarize what back to the Class A,B or C network boundary?
 
a.                  Subnets
b.                  Networks
c.                   IPs
 
85. Which of the given below is not an advantage of route summarization?
 
a.                   It helps contain network problems such as flapping routes.
b.                  It supports smaller routing update sizes.
c.                   It requires less memory and processing.
d.                  It supports discontiguous subnets.
 
86. Which of the below option allows creating this summarization: 10.0.0.0/7.
 
a.                   Subnetting
b.                  Networks
c.                   Supernetting
d.                  VLSM
 
87. Which of the following are classless protocols?
 
a.                   IGRP and EIGRP
b.                  EIGRP
c.                   IGRP
d.                  Neither IGRP nor EIGRP
 
88. Except which of the following a routing protocol that supports route summarization must perform all?
 
a.                   Carry the subnet mask with the network entry.
b.                  Summarize entries so that the same lowest order bits match.
c.                   All of these are correct.
 
89. You have the following two routes: 192.168.1.64/27 and 192.168.1.96/27. Which is the most specific
summarized route for these two subnets?
 
a.       255.255.168.0.1
b.      192.168.256.0/24
c.       192.168.1.64/26
 
90. We have the following four routes: 192.168.1.32/30, 192.168.1.36/30, 192.168.1.40/30, and
192.168.1.44/30. Which of the following will be the most specific summarized route for these subnet?
 
a.       192.255.168.1/24
b.      192.168.1.32/28
c.       255.255.0.255.1
 
91. What can we get the term UDP?
 
a.                  User Datagram Protocol
b.                  Urgent Datagram Protocol
c.                   User Datagram Process
d.                  None of these is correct
 
92. How many Transport layer protocols use the TCP/IP?
 
a.                   Four Transport Layers Protocol
b.                  Two Transport Layers Protocol
c.                   Three Transport Layers Protocol
d.                  None of these is correct
 
93. What is the main responsibility of TCP?
 
a.                  To provide a reliable full-duplex, connection-oriented, logical service between two devices.
b.                  To provide a reliable full-duplex, connection-oriented, Physical service between two devices.
c.                   To provide a reliable Half-duplex, connection-oriented, Physical service between two devices.
d.                  All above are correct.
 
94. Which three steps take place during the three-way handshake?
 
a.                   SYN, SYN/AC, SYN
b.                  ACK, AC/SYN, ACK
c.                   SYN, SYN/AC, ACK
d.                  All these are Correct
 
95. Through which of the following mechanisms flow control is commonly implemented?
 
a.         Windowing
e.                   UDP
f.                    MAC addresses
g.                  Subnet mask
 
96. How many types the port numbers falls?
 
a.                   Four
b.                  Three
c.                   five
d.                  None of these
 
97. What called a PDU at the transport layer?
 
e.                   Single Host ability
f.                    UDP
g.                  Frame
h.                  segment
 
98. Except which of the following, all are the characteristics of TCP?
 
a.                   Connection-oriented
b.                  Windowing
c.                   Best-effort delivery
d.                  Reordering packets
 
99. Which are the three types of port numbers?
 
a.                   Un-Known, Registered, Dynamically Assigned
b.                  Well-Known, Registered, Dynamically Assigned
c.                   Well-Know, Un-Registered, Dynamically Assigned
d.                  Un-Known, Un-registered, Dynamically Assigned.
 
100.  What does the term SNMP refer to?
 
a.                   Super Network Management Protocol
b.                  Simple Network Management Protocol
c.                   Single Network Model Protocol
d.                  Source Network Modern Protocol

                                                                                                         [To be Continued]
 

1 comment:

  1. Download the IBM C1000-117 Q&A PDF file easily to prepare IBM Spectrum Storage Solution Advisor V7 Exam. It is particularly designed for IBM C1000-117 exam and our IBM specialists have created this C1000-117 Question Dumps observing the original C1000-117 exam.

    ReplyDelete