-
General Knowledge
-
General Topics
- Abbreviations
- Books and Authors
- Famous Academies and Institutes
- First in India (Man)
- First in India (Women)
- Important Dates
- Famous Personalities
- Public Administration Science
- Astronomy
- Biology
- Botany
- Chemistry
- Physics
- Zoology
- Inventions and Scientists Geography
- Geographical Epithets India
- Geographical Epithets World
- Places Associated with Industries in India
- National Parks and Sanctuaries
- Towns on River Banks History
- Indian History and Culture
- Indian National Movement
- Indian Polity and Constitution
- Ancient Period in Indian History
- World History
- Governor General of India Culture
- Languages
- Indian Dance and Music
- Classical Dances of India
- Folk Dances in India and Tribal Dances in India
- Famous Dancers, Instrumentalists, Vocalists in India World
- First in the World
- Parliament Names
- United Nation Organizations (UNO)
- World's Famous News Agencies
- World Industries
- National Emblems
- Countries and Alternative Names
- Countries and Capitals
- View More topics...
- General Aptitude
- Problems on Ages
- Alligation and Mixture
- Area
- Arithmetic Progression
- Average
- Banker's Discount
- Boats and Streams
- Calendar
- Chain Rule
- Clock
- Compound Interest
- Decimal Fraction
- Height and Distance
- Logarithms
- Mensurations
- Numbers
- Odd Man Out and Series
- Partnership and Share
- Percentage
- Permutation and Combination
- Pipes and Cisterns
- Probability
- Problems on H.C.F and L.C.M
- Problems on Numbers
- Problems on Trains
- Profit and Loss
- Races and Games
- Ratio and Proportion
- Simple Interest
- Simplification
- Stocks and Shares
- Surds and Indices
- Time and Distance
- Time and Work
- True Discount
- Volume & Surface Areas
- General English
- Antonyms
- Synonyms
- Vocabulary Test
- One Word Substitution
- Sentence Completion
- Sentence Improvement
- Idioms & Phrases
- Homonyms
- Word Formation
- Active & Passive Voice
- Direct and Indirect Speech
- Spotting Errors
- Double Synonyms
- Choose the Appropriate Filter
- Spelling Test
- Transformation
- Reconstruction of Sentence
- Chooose the Correct or Incorrect Sentence
- Networking
- Interview Questions
-
Programming
- .NET
- Java
- ASP.NET
- C++
- Perl
- Python
- Ruby and Rails
- Struts
- Core Java
- Hibernate Database
- DB2
- MS SQL Server
- MySQL
- Oracle
- SQL
- DBMS
- Data Warehousing
- Data structures and Algorithms Cisco
- CCNA
- CCNP Routing
- CCNP Switching
- Internetworking
- Border Gateway Protocol Windows
- MCSE
- Exchange Server
- Windows Server 2008
- DNS & Active Directory
- Firewall Questions Linux
- Unix
- Linux Server Administrator
- Linux System Administrator
- Linux File Manipulation
- Database
- CCNA Routing Switching Online Test 1
- CCNA Routing Switching Online Test 2
- CCNA Routing Switching Online Test 3
- CCNA Routing Switching Online Test 4
- CCNA Routing Switching Online Test 5
- Home
- Online-Quiz
- Networking
- CCNA Routing and Switching
Instructions
- Total Questions 20
- Each question carry 1 mark
- Must answer all the questions (otherwise report card will not be generated)
- If you dont want to take a test, simply click the check answers button and view all the answers with explanations
- Do Not Refresh the Page
- No Time Limit
- Good Luck :)
Correct Answers :
[C]
Explanation :
The computer will not be allowed to communicate, and the port will enter an err-disable state. The defaults for port security allow for only one MAC address, and the default violation is shutdown. The violation of shutdown will shut the port down and place it into an err-disable state, which will require administrative intervention.
Correct Answers :
[A]
Explanation :
TACACS+ will allow for authentication of users, and it also provides a method of restricting users to specific commands. This allows for much granular control of lower-level administrators.
Correct Answers :
[C]
Explanation :
You can have only one access control list (ACL) per direction, per protocol, and per interface. Therefore, each of the two interfaces can have both an inbound and outbound ACL, per the protocol of IPv4. This allows for a total of four ACLs, which can be used to control access through the router.
Correct Answers :
[D]
Explanation :
Once the password has been forgotten, a password recovery must be performed on the router. Although you have the encrypted password, it cannot be reversed since it is a hash of the password. A hash is a one-way encryption of the password; only the same combination of letters and number will produce the same hash.
Correct Answers :
[B]
Explanation :
The command access-list 2 permit 192.168.2.3 0.0.0.0 will perform the same function as access-list 2 permit host 192.168.2.3. The command configures the host 192.168.2.3 with a bit mask, which will only match the single IP address. Although it can be configured as a bit mask, it should be configured via the host parameter for readability.
Correct Answers :
[A]
Explanation :
The command license install usbflash0:FTX3463434Z_2016030415234562345.lic will install the license file to the router. This command must be entered in privileged exec mode.
Correct Answers :
[B]
Explanation :
By default, all syslog messages are sent to the console of the router or switch. It is recommended to configure a syslog server, because once the router or switch is powered off, the information is lost.
Correct Answers :
[C]
Explanation :
The configuration register of 0x2142 is used for the password recovery process. The configuration register will tell the boot process to ignore the contents of NVRAM, which is where the startup-configuration is located. It will only use NVRAM for the location of the boot system variable.
Correct Answers :
[D]
Explanation :
The Cisco Discovery Protocol functions on the management plane of the SDN model. It helps with management of the routers and switches and does not directly impact the data plane.
Correct Answers :
[D]
Explanation :
The network management station (NMS) must be configured with the version of SNMP, the community, and the management information base (MIB) before it can access the counters on a router or switch.
Correct Answers :
[C]
Explanation :
The Address Resolution Protocol (ARP) functions on layer 2, the Data Link layer
Correct Answers :
[B]
Explanation :
During the three-way-handshake, Computer A sends a SYN flag along with its receiving window size and initial sequence number. Then Computer B sends a SYN flag and ACK flag along with its receiving window and acknowledgment of the sequence number. Finally, Computer A sends an ACK flag, which acknowledges the synchronization of Computer B’s receiving window. Communication begins and is considered to be in an established state.
Correct Answers :
[D]
Explanation :
Rapid elasticity is the ability to add and remove compute capability in the cloud. As demand is needed, compute power can be increased by adding more CPUs or servers. As demand for compute power decreases, CPUs or servers can be removed.
Correct Answers :
[B]
Explanation :
The distribution layer is a partial mesh topology. Links between the distribution switches and core switches are multi-homed to each device for redundancy. Also, the links between the distribution switches and access switches are multi-homed to each device for redundancy. Although, this might seems to be a full mesh topology, the distribution switches are not connected to each other.
Correct Answers :
[B]
Explanation :
Single-mode fiber is typically used in high-speed long-distance transmission of data. It can span up to 70 kilometers (km) with the proper transceivers. The speeds of single-mode fiber can be up the 100 Gb/s with the proper transceivers.
Correct Answers :
[C]
Explanation :
Documenting the problem is the last step in resolving a problem. After you monitor the problem for the implementation of the fix, the documentation should describe the problem, the root cause of the problem, and the resolution. The documentation can then be used for future problems that match the same criteria.
Correct Answers :
[D]
Explanation :
The IP address 225.34.5.4 is a multicast IP address. Multicast IP addresses are defined as Class D addresses in the range 224.0.0.1 to 239.255.255.254.
Correct Answers :
[C]
Explanation :
In IPv6, the solicited-node multicast message is used for resolution of the MAC address for an IPv6 address. The first 104 bits of the 128-bit IPv6 address is ff02::1:ff, and the last 24 bits comprise the last 24 bits of the IPv6 address that needs to be resolved. The solicited-node multicast message is also used for Duplicate Address Detection (DAD).
Correct Answers :
[B]
Explanation :
Field C in the exhibit is the type field. The type field is used to define the upperlayer protocol the data belongs to.
Correct Answers :
[C]
Explanation :
When the destination MAC address is not in the MAC address table, the switch will flood the frame to all ports on the switch. When the computer or device responds, the switch will memorize the source MAC address with the port on which it sees the traffic.
|
|
||||||||||||||||||||||||||||