Wednesday, November 23, 2016









  

IMPORTANT
Topic  : CCNA Cisco Certified Network Associate Study Guide (Exam 640-802)

Type : MCQs

                                        Please note all the Bold Options are correct.
 
                                                         101 - 200 of 300 MCQs





I am publishing all this just to spread the knowledge.  I have took good care in selection of Correct options but "To Err is Human to Forgive Divine"
Please do consult your Book or Teacher when you feel any option confusing.
You may start:


101 - 200 of 300 MCQs


 
101.  In both TCP and UDP, which of the given below is not a common field?
 
a.                   Checksum
b.                  Code Bits
c.                   Length
d.                  Source Port
 
102. Which is the correct order for a three-way handshake?
 
a.                   SYN, ACK, SYN/ACK
b.                  ACK, SYN/SYN, ACK
c.                   ACK/SYN, SYN/ACK, ACK
d.                  SYN, SYN/ACK, ACK
 
103. Which two of the following TCP/IP applications send traffic in clear text?
 
a.                  telnet
b.                  SSH
c.                   VTY
d.                  FTP
 
104. Which of the given below has an incorrect application-to-well-known-port mapping?
 
a.                   telnet: 23
b.                  SMTP: 25
c.                   TFTP: 21
d.                  SNMP: 161
 
105. Which application and port number does use a DNS query?
 
a.                   65, TCP
b.                  152, UDP
c.                   1023, UDP
d.                  53, UDP
 
106. The source sends 10 segments but segments 5,6 and 7 are lost while an application is using TCP an
window size of 10, which number does the destination acknowledge with?
 
a.                   3
b.                  5
c.                   7
d.                  6
e.                    9
 
107. What does the server use to determine that these sessions are different from each other, when a PC
opens up two telnet connections to a server?
 
a.                   Source IP address
b.                  Destination port number
c.                   Source port number
d.                  Hub’s brand name
 
108. On basing of which of the following Hubs make switching decisions?
 
a.                   Frames
b.                  Datagrams
c.                   Segments
d.                  None of the above
 
109. Which is the true statement of given below?
 
a.                   MAC addresses must be same for devices connected to the same network
b.                  MAC devices must be unique in the world.
c.                   MAC devices must be unique within a protocol.
d.                  MAC addresses must be unique in a broadcast domain.
 
110. Which of the following are the components of IP address?
 
a.                  Network
b.                  Host
c.                   Addresses
d.                  Broadcast
 
111. Which of the following IP protocol maps a layer 2 to a layer 3 address?
 
e.                   Unlink Hub
f.                    Network Interface Cards
g.                  ICMP
h.                  None of the above
 
112. PC-B having IP 10.0.3.2/24 and MAC 0000.3333.BBBB,  pings the DNS server having IP 10.02.3/24 and
MAC 0000.2222.CCCC, and a Router having IP 10.0.2.2/24 and MAC 0000.2222.BBBB, What source
MAC address does DNS server’s NIC see?
 
 
a.                  0000.2222.BBBB
b.                  0000.2222.CCCC
c.                   0000.2222.AAAA
d.                  0000.3333.BBBB
 
113. What is the length of IP address?
 
a.                   8 bits
b.                  32 bits
c.                   24 bits
d.                  16 bits
 
114. How many components have the IP addresses?
 
a.                   Two
b.                  Four
c.                   Three
d.                  One
 
115. What does the term OSPF refers to?
 
a.                  Open Shortest Path First
b.                  Only Shortest Path Finder
c.                   Open Shortest Protocol First
d.                  Only Shortest Protocol First
 
116. By using which command (from the command prompt) we can see the local connection on a PC?
 
a.                   Tenet PC-B
b.                  Netsate
c.                   Ping
d.                  All above are correct
 
117. For what the term CIDR is referred?
 
a.                   Classless Internal Domain Routing
b.                  Classless In Domain Routing
c.                   Classless Inter Domain Routing.
d.                  None of above is correct.
 
118. Where is the IOS loaded by default, when a router is first booted?
 
a.                    Boot ROM
b.                   NVRAM
c.                    Flash
d.                   Router
 
119. Which of the following two ways by we can enter setup mode on a router?
 
a.                   By typing the Disable command
b.                  By typing the erase start command and rebooting the router
c.                   By typing the command setup
b.                  By typing the command setup mode
 
120. If you are in privileged mode and want to return to user mode, what command would you use?
 
a.            Exit
b.           Quit
c.           Disable
d.           Control+Z
 
121. Which command shows the IOS version currently running on router?
 
a.            Show mem
b.           Show flash file
c.            verify
d.                  Sh ver
 
122. Which of the following command will show the contents of the EEPROM in router?
 
a.           Show flash
b.           Ipconfig
c.            Show ip flash
d.                  Sh ver
 
123. Which are the three commonly used protocols to transport the information between hosts?
 
a.                  Dynamic Host Control Protocol
b.                  Domain Name Service
c.                   Access Point
d.                  Address Resolution Protocol
 
124. Which of the following cable is used to connect to the console port of IOS device?
 
a.                   Connecting Cable
b.                  Rollover Cable
c.                   Serial Cable
d.                  Bad Cable      
 
125. What will happen if we use the Command Ctrl + U?
 
  1. Single word will be deleted
  2. Cursor will move to End of line
  3. A Line will be Erased
  4. Cursor will move in start of line
 
126. To get context-sensitive help which of the following command allows us to get it?
 
a.           help
b.           show
c.           ?
d.           verify
 
127. Which control sequence takes to the beginning of the CLI?
 
a.                   CTRL-N
b.                  CTRL-A
c.                   ESC-B
d.                  CTRL-U
 
128. By using which IOS command a device name can be changed?
 
a.            Show controller
b.           Login Local
c.           hostname prettier
d.           Banner motd
 
129. Which command will have to use if we want to move the cursor one word forward?
 
a.                   Ctrl + F
b.                  Ctrl + Z
c.                   Esc + F
d.                  Ctrl + W
 
130. What will the router’s prompt be, if we execute the line consol 0 command from configuration mode?
 
a.      Router(config-interface)
b.      Router(config-line)#
c.      Router(config-interface)#
d.      Router#(config-if)#
 
131. What is the IOS command that will encrypt un-encrypted password?
 
a.                  service password-encryption
b.                  show controller
c.                   show running-config
d.                  None of these is correct
 
132. By which IOS command would be displayed a message of “This is Router5” after login in?
 
a.      banner motd
b.      cmd.exe
c.      banner exec
d.      ipconfig/all
 
133. What will be the indication if one examines his interfaces and the Ethernet 0 interface status says
Ethernet 0 is up, line protocol is down?
 
a.                   A Logical layer problem
b.                  A data link layer problem
c.                   A network connectivity problem
d.                  There is no problem.
 
134. IOS command what saves the active configuration to NVRAM?
 
a.                   Service password-encryption
b.                  Banner-exec
c.                   copy running-config nvram
d.                  copy running-config startup-config
 
135. If a DTE or DCE cable is plugged into serial 0, which command will show?
 
a.            Sh int s0
b.           Show commands cl
c.           Sho controllers s 0
d.           % incomplete command
 
136. Which of the following command stops console messages from writing over the command are being tried
to type in?
 
a.            No logging
b.           tracert
c.            arp -a
d.           Logging synchronous
 
137. Which command allows users to telnet into a router and not be prompted with a user-mode password?
 
a.         banner motd
b.         No login
c.         No command is needed because you can telnet by default
d.         Show controller
 
 
138. If we want to set our console to time out after only one second, which command will have to be used?
 
a.            Timeout  only 1 0
b.           Timeout 0 1
c.            Exect-timeout 1 only
d.           Exec-timeout 0 1
 
139. How does the password set for the auxiliary port?
 
a.         Line aux 0 1
b.         Line aux 0
c.         Line aux 0 4
d.         Line aux port
 
140. What are the two different management setup configurations, when using setup mode?
 
a.                  Basic
b.                  Extra Advanced
c.                   Extended
d.                  Un-Expanded
 
141. By which command we can delete the contents of NVRAM on a router?
 
a.                   Delete NVRAM
b.                  Del mem
c.                   Erase NVRAM
d.                  Erase start
 
142. Which of the LED will indicate if the switch has experienced a malfunction.
 
a.                   green
b.                  white
c.                   amber
d.                  red
 
143. What would not indicate a problem if two PCs are connected to a switch configures in same subnet, but
both are unable to ping each other while 100Base TX is used for connectivity?
 
a.                   The SYSTEM LED is off.
b.                  The PORT LED is amber on one of the two PCs’ switch port connections.
c.                   The PORT LED is off on one of the two PCs’ switch port connections.
d.                  The MIC connectors on the Ethernet cables are not seated correctly in the switch ports.
 
144. Which of the given option is not asked for during the System Configuration Dialog script?
 
a.                              Enabling interfaces
b.                              Enable secret password
c.                               VLAN interface to use for management functions
d.                              Default gateway address
 
145. In which configuration mode default gateway address configured for a switch?
 
a.                   Interface
b.                  Line aux 04
c.                   Global
d.                  Port
 
146.  The term MAC stands for what?
 
a.                  Media Access Control
b.                  Media Allocated Control
c.                   Media Access Count
d.                  Media All Count
 
147. Which of the following switch command allows us see the contents of the port address table?
 
a.                  show mac-address-table
b.                  Delete NVRAM
c.                   Erase NVRAM
d.                  None of these is correct
 
148. What will happen if a switch sees a frame with a destination MAC address of 0000.1111.DDDD,
(examine the given MAC address table on switch ). Switch> show mac address-table
Vlan Mac Address Type Ports
---- ----------- ---- -----
1 0000.1111.AAAA DYNAMIC FA0/1
1 0000.1111.CCCC DYNAMIC FA0/2
1 0000.1111.BBBB DYNAMIC FA0/3
 
a.      Flood it
b.      Drop it
c.       Forward it out FA0/1
d.      Violation mode shutdown
 
149. Which of the given below switch feature is used to prevent unauthorized access to a LAN?
 
a.                  Port security
b.                  Port security and 802.1Q
c.                   VTY passwords
d.                  Enable password
 
150. Which of the following is not a default configuration for port security?
 
a.                   1 MAC address per interface
b.                  Violation mode shutdown
c.                   Sticky learning
d.                  Disabled by default
 
151. To associate the server with a switch port when port security is enable, what learning mode should used?
 
a.                   Interface
b.                  Automatic
c.                   Sticky
d.                  Static
 
152. Which command will delete the automatically entered MAC addresses in the MAC filter table?
 
a.                               (config)#delete nvram
b.                  No logging
c.                               (config)#clear mac-address-table dynamic
d.                              #clear mac-address-table dynamic
 
153. Concerning VLANs which of the fallowing option is not true?
 
a.                   A VLAN is logical group of users.
b.                  A VLAN is broadcast domain.
c.                   A VLAN is location-dependent.
d.                  A VLAN is subnet.
 
154. There are two groups of users are connected to a switch (1) Sales,  (2) Marketing. We are concerned
about No.2 that’s marketing, while sales people from group1 Sales can see each others’ traffic. What
solutions would be used to prevent this issue?
 
a.                  VLANs
b.                  Enable Secret Password
c.                   MAC address filtering
d.                  Router with ACLs
 
155. What is a trunked link?
 
a.                               A link that is referred to as the native VLAN of the port
b.                              A link that can carry multiple VLANs
c.                               A switch port connected to the Internet
d.                              Data & voice capability on one interface
 
156. What is an access link?
 
a.                  A link that is only part of one VLAN and is referred to as the native VLAN of the port
b.                  Violation mode shutdown
c.                   A switch port connected to the Internet
d.                  Media Access Count
 
157. What does a VLAN do?
 
a.                   Saves the password
b.                  Runs internet
c.                   Breaks up broadcast domains
d.                  Provides fragmentation segmentation
 
158. What is a static VLAN?
 
a.                   A VLAN that can not be renamed or removed
b.                  A VLAN which can not be removed
c.                   Ports on the switch assigned to a VLAN by an administrator
d.                  Ports on the switch assigned to a VLAN by a VTP server
 
159. Which of the following is a true statement regarding VLANs?
 
a.                   Must have at least two VLANs defined in every Cisco network.
b.                  All VLANs configured at the fastest by default; propagate information to all others witches.
c.                   VLAN can only be used with Fast-Ethernet or Gigabit Ethernet.
d.                  VTP is used to send VLAN information to switches in a configured VTP domain.
 
160. Which are the two ways that an administrator can configure VLAN memberships?
 
a.                   Via a ISA server
b.                  Statically
c.                   Dynamically
d.                  Via a VTP domain database
 
161. How the dynamic VLANs can be configured?
 
a.                   Dynamically
b.                  By network administrator
c.                   Using any ghost software
d.                  Via a VLAN Management Policy Server
 
162. Which of the given below protocols is used to configure trunking on a switch?
 
a.                   VTP
b.                  Static
c.                   Trunk
d.                  DSL
 
163. Regarding trunked links, which of the given below is true?
 
a.                   By default they are configured on all switch ports
b.                  No token Ring, FDDI or ATM, but they work only with a type of Ethernet networking.
c.                   Can be settled trunk links on any 10-, 100-, and 1000Mbps ports.
d.                  You must clear the unwanted VLANs by hand.
 
164. Regarding an access link, which of the following is true?
 
a.                   They can carry multiple VLANs.
b.                  Switches remove any VLAN information from frame before sending to an access-link device.
c.                   Access-link devices cannot communicate with devices outside their VLAN unless the packet is routed through a router.
d.                  Access links transport the VLANs between devices and can be configured to transport all VLANs or just a few.
 
165. When is frame tagging used?
 
a.                   When 802.1q is used on an access link
b.                  When VLANs are traversing a trunked link
c.                   When ISL is used on an access link
d.                  When VLANs are traversing an access link
e.                    
166. What is called the connection which supports multiple VLANs?
 
a.                   Server
b.                  Ethernet
c.                   Trunk
d.                  Router
 
167. Which of the following is true concerning 802.1Q?
 
a.                  It supports hub connections.
b.                  It is not supported on the 2960 switches.
c.                   NVLAN is tagged.
e.                   Transparent mode makes a switch dynamically secure.
 
168. Which of the following is a proprietary Cisco protocol used to share VLAN configuration information
between Cisco switches on trunk connections.
 
a.                   Server
b.                  DSL
c.                   Trunk Protocol
d.                  Router
 
169. Which of the given below VTP mode can propagate VTP messages?
 
a.                   Client and server
b.                  Server, client
c.                   Client, server, and transparent
d.                  All above are correct
 
170. There are a server switch VLANs accounting “A” and “B” are on  one switch with a configuration
revision value of 55 and another server switch with VLANs engineering. “C” and “D” are with configuration revision value of 57. Now the two switches are not connected together. We connect them together. What can be possible happenings?
 
A. If the domain names don’t match, nothing occurs , if the domain names don’t match.
B. If the domain names don’t match the revision switch are used and the other ones are deleted.
C. If the domain names match, the engineering, “C”, and “D” VLANs are deleted.
D. If the domain names match, the accounting, HR, and executives VLANs are deleted.
 
171. Enter the switch command to set the VTP mode to transparent mode: __________.
 
Erase NVRAM
Vtp transparent
Line aux port
None of above
 
172. Which of the given switch command can enable trunking on a 2960 switch?
 
a.           switchport mode trunk
b.           trunking on
c.            trunking enable
d.           switchport trunk on
 
173. Which 2960 command assigns a VLAN to an interface, choose the correct option?
 
a.            vlan-membership static
b.           nvlan
c.           switchport access vlan
d.           All above are correct
 
174. Which of the given below is not symptom of a layer 2 loop?
 
Broadcast flooding
Transparent mode makes a switch dynamically secure
Learning MAC addresses on incorrect ports
None of these
 
175. With what the root switch is elected?
 
Weak MAC address
highest MAC address
lowest switch ID
Strong switch ID
 
176. What called the port that is chosen to forward traffic for a segment?
 
root port
alternate port
Serial port
designated port
 
177. Which the two options are true concerning a port in a listening state?
 
a.                  It remains there for 15 seconds.
b.                  It forwards BPDUs and builds the CAM table.
c.                   It remains there for 25 seconds.
d.                  It forwards BPDUs.
 
178. There are how many port states  in RSTP?
 
3
5
7
9
 
179. What role will be assigned to a port that has the second best path to the root switch?
 
a.                   Root Directory
b.                  Designated
c.                   Alternate
d.                  Database
 
180. On a switch, which command enables RSTP with PVRST+?
 
a.           spanning-tree mode rapid-pvst
b.                  (config)#clear mac-address-table dynamic
c.            stp state rapid-pvst
d.           Exec-timeout 0 1
 
181. Regarding Ether-Channels which of the following is true?
 
a.                   Switch should be configured with server.
b.                  You can have up to eight channels on a switch.
c.                   Ports must be configured identically to form a channel.
d.                  RSTP logically groups ports into a channel.
 
182. What symptom should be looked to determine whether we have a layer 2 loop?
 
High number of packets and/or multicast frames
High port utilization
User switch interfaces dropping and disconnecting
Address tables are not being updated
 
183. Which tool would be used to determine whether broadcast storm caused by a layer 2 loop?
 
a.                   traceroute command
b.                  Protocol analyzer
c.                   High port utilization
d.                  show interface command
 
184. Which of the following is/are a routed protocol?
 
a.                   RIP
b.                  OSPF
c.                   Both RIP and OSPF
d.                  Neither RIP nor OSPF
 
185. Which of the given routes between different autonomous systems?
 
a.                   IGP
b.                  EGP
c.                   IPP
d.                  BGP
 
186. Which routing protocol will be router to use for this route if a router is running RIP and OSPF, while
both routing protocols are learning 192.168.1.0/24.?
 
a.                   RIP
b.                  OSPF
 
187. What will a routing protocol use to determine which path is best?
 
a.                   Cost
b.                  Metric
c.                   Hop count
d.                  Administrative distance
 
188. Which type of routing protocol uses the Shortest Path First algorithm?
 
a.                   Hybrid
b.                  Link state
c.                   Distance vector
d.                  None of these is correct.
 
189. Which is an example of a hybrid protocol?
 
a.                   IPP
b.                  EIGRP
c.                   RIP
d.                  BGP
 
190. What would use to prevent forever a packet from traveling around a routing loop?
 
a.                   Split horizon
b.                  ICMP
c.                   Hold-down timer
d.                  TTL
 
191. Which of the following States that if a neighboring router sends a route to a router, the receiving router
will not propagate this route back to advertising router on the same interface?
 
a.                  Split horizon
b.                  Hold-down timer
c.                   Hold-count limit
d.                  Poison reverse
 
192. If a route has been poisoned in the routing table, how would we know?
 
a.                   It uses hold-down timers.
b.                  It has an infinite metric assigned to it
c.                   Distance vector protocols use broadcasts
d.                  It has an infinite administrative distance assigned to it.
 
 
193. What could cause the problem if we ping a host in the destination network, but the ICMP message we
receive back is “TTL expired in transit.” What could cause this problem?
 
a.                   Link is down between an intermediate router and the destination network.
b.                  The administrative distances of RIP are mismatch.
c.                   A routing loop exists.
d.                  There is any physical layer problem with destination host.
 
194. What does the Passive command provide to dynamic routing protocols?
 
a.                   Stops an interface from sending/receiving periodic logical Updates
b.                  Stops an interface from sending periodic dynamic updates but still receives updates
c.                   Stops the router from receiving any dynamic updates
d.                  All above are correct
195. Which protocol does Ping use?
 
a.                   TCP
b.                  ARP
c.                   ICMP
d.                  BootP
 
196. Which two of the following are stored in ROM?
 
a.                  POST
b.                  ROMMON
c.                   passwords
d.                  routing information
 
197. Which type of memory does not maintain its contents during a power-off state?
 
a.       NVRAM
b.      ROM
c.       RAM
d.      Flash
 
198. If configuration register is set to 0x0101, where a router boots from??
 
a.                   Flash memory
b.                  ROM
c.                   Boot ROM
d.                  VRAM
 
199. Which router command we have to use to view the configuration register value?
 
a.                   Switchport mode trunk
b.                  show interfaces trunk
c.                   switch(config)# interface type 0/port_#
d.                  show version
 
200. Which isrouter IOS Configuration mode command to change the configuration register 0x2142
 
a.            switch (config - if)# switchport mode access
b.            config-version 0x2142
c.            config-register 0x2142
d.           config-interface 0x2142
 
                                           
                                                                                                  [To be Continued]



No comments:

Post a Comment