Networking Basics Test
Finish Quiz
0 of 30 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
Information
Networking Basics Online Test. Networking Basics Question and Answers in English. Networking Basics Online mock test paper is free for all students and Very Helpful for Exam Preparation. Networking Basics Online Quiz. Networking Online Mock test for Basics Topic. Here we are providing Networking Basics Online Test Series in English. Check Networking Mock Test Series 2019-2019.
This paper has 30 questions.
Time allowed is 30 minutes.
The Networking online Mock Test Exam is Very helpful for all students. Now Scroll down below n click on “Start Quiz” or “Start Test” and Test yourself.
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Answered
- Review
-
Question 1 of 30
1. Question
How long is an IPv6 address?
Correct
An IPv6 address is 128 bits long.
Incorrect
An IPv6 address is 128 bits long.
-
Question 2 of 30
2. Question
What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet?
Correct
Port Address Translation (PAT) allows a one-to-many approach to network address translation.
Incorrect
Port Address Translation (PAT) allows a one-to-many approach to network address translation.
-
Question 3 of 30
3. Question
What are the two main types of access control lists (ACLs)?
1.Standard
2.IEEE
3.Extended
4.SpecializedCorrect
Standard and extended access control lists (ACLs) are used to configure security on a router.
Incorrect
Standard and extended access control lists (ACLs) are used to configure security on a router.
-
Question 4 of 30
4. Question
What command is used to create a backup configuration?
Correct
The command to back up the configuration on a router is copy running-config startup-config.Incorrect
The command to back up the configuration on a router is copy running-config startup-config. -
Question 5 of 30
5. Question
You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to the server?
Correct
Each device has 10 Mbps to the server.
Incorrect
Each device has 10 Mbps to the server.
-
Question 6 of 30
6. Question
Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz?
Correct
IEEE 802.11B is 2.4GHz, but with a maximum of only 11Mbps. IEEE 802.11G is in the 2.4GHz range, with a top speed of 54Mbps.
Incorrect
IEEE 802.11B is 2.4GHz, but with a maximum of only 11Mbps. IEEE 802.11G is in the 2.4GHz range, with a top speed of 54Mbps.
-
Question 7 of 30
7. Question
Which of the following is the valid host range for the subnet on which the IP address 192.168.168.188 255.255.255.192 resides?
Correct
256 – 192 = 64. 64 + 64 = 128. 128 + 64 = 192. The subnet is 128, the broadcast address is 191, and the valid host range is the numbers in between, or 129-190.
Incorrect
256 – 192 = 64. 64 + 64 = 128. 128 + 64 = 192. The subnet is 128, the broadcast address is 191, and the valid host range is the numbers in between, or 129-190.
-
Question 8 of 30
8. Question
To back up an IOS, what command will you use?
Correct
The command copy flash tftp will prompt you to back up an existing IOS in flash to a TFTP host.Incorrect
The command copy flash tftp will prompt you to back up an existing IOS in flash to a TFTP host. -
Question 9 of 30
9. Question
What protocol does PPP use to identify the Network layer protocol?
Correct
Network Control Protocol is used to help identify the Network layer protocol used in the packet.
Incorrect
Network Control Protocol is used to help identify the Network layer protocol used in the packet.
-
Question 10 of 30
10. Question
Which of the following commands will allow you to set your Telnet password on a Cisco router?
Correct
The command line vty 0 4 places you in a prompt that will allow you to set or change your Telnet password.
Incorrect
The command line vty 0 4 places you in a prompt that will allow you to set or change your Telnet password.
-
Question 11 of 30
11. Question
Which protocol does DHCP use at the Transport layer?
Correct
User Datagram Protocol is a connection network service at the Transport layer, and DHCP uses this connectionless service.
Incorrect
User Datagram Protocol is a connection network service at the Transport layer, and DHCP uses this connectionless service.
-
Question 12 of 30
12. Question
Which command is used to determine if an IP access list is enabled on a particular interface?
Correct
The show ip interface command will show you if any outbound or inbound interfaces have an access list set.
Incorrect
The show ip interface command will show you if any outbound or inbound interfaces have an access list set.
-
Question 13 of 30
13. Question
Where is a hub specified in the OSI model?
Correct
Hubs regenerate electrical signals, which are specified at the Physical layer.
Incorrect
Hubs regenerate electrical signals, which are specified at the Physical layer.
-
Question 14 of 30
14. Question
What does the passive command provide to dynamic routing protocols?
Correct
The passive command, short for passive-interface, stops regular updates from being sent out an interface. However, the interface can still receive updates.
Incorrect
The passive command, short for passive-interface, stops regular updates from being sent out an interface. However, the interface can still receive updates.
-
Question 15 of 30
15. Question
Which protocol is used to send a destination network unknown message back to originating hosts?
Correct
ICMP is the protocol at the Network layer that is used to send messages back to an originating router.
Incorrect
ICMP is the protocol at the Network layer that is used to send messages back to an originating router.
-
Question 16 of 30
16. Question
How often are BPDUs sent from a layer 2 device?
Correct
Every 2 seconds, BPDUs are sent out from all active bridge ports by default.
Incorrect
Every 2 seconds, BPDUs are sent out from all active bridge ports by default.
-
Question 17 of 30
17. Question
How many broadcast domains are created when you segment a network with a 12-port switch?
Correct
By default, switches break up collision domains but are one large broadcast domain.
Incorrect
By default, switches break up collision domains but are one large broadcast domain.
-
Question 18 of 30
18. Question
What does the command routerA(config)#line cons 0 allow you to perform next?
Correct
The command line console 0 places you at a prompt where you can then set your console user-mode password.
Incorrect
The command line console 0 places you at a prompt where you can then set your console user-mode password.
-
Question 19 of 30
19. Question
Which router command allows you to view the entire contents of all access lists?
Correct
To see the contents of all access lists, use the show access-lists command.Incorrect
To see the contents of all access lists, use the show access-lists command. -
Question 20 of 30
20. Question
Which class of IP address has the most host addresses available by default?
Correct
Class A addressing provides 24 bits for host addressing.
Incorrect
Class A addressing provides 24 bits for host addressing.
-
Question 21 of 30
21. Question
In a network with dozens of switches, how many root bridges would you have?
Correct
You should have only one root bridge per network.
Incorrect
You should have only one root bridge per network.
-
Question 22 of 30
22. Question
What PPP protocol provides dynamic addressing, authentication, and multilink?
Correct
Link Control Protocol in the PPP stack provides dynamic addressing, authentication, and multilink.
Incorrect
Link Control Protocol in the PPP stack provides dynamic addressing, authentication, and multilink.
-
Question 23 of 30
23. Question
What is a stub network?
Correct
Stub networks have only one connection to an internetwork. Only default routes can be set on a stub network or network loops may occur.
Incorrect
Stub networks have only one connection to an internetwork. Only default routes can be set on a stub network or network loops may occur.
-
Question 24 of 30
24. Question
If your router is facilitating a CSU/DSU, which of the following commands do you need to use to provide the router with a 64000bps serial link?
Correct
The clock rate command is two words, and the speed of the line is in bps.Incorrect
The clock rate command is two words, and the speed of the line is in bps. -
Question 25 of 30
25. Question
Which one of the following is true regarding VLANs?
Correct
Switches do not propagate VLAN information by default; you must configure the VTP domain. VLAN Trunking Protocol (VTP) is used to propagate VLAN information across a trunk link.
Incorrect
Switches do not propagate VLAN information by default; you must configure the VTP domain. VLAN Trunking Protocol (VTP) is used to propagate VLAN information across a trunk link.
-
Question 26 of 30
26. Question
What does a VLAN do?
Correct
VLANs break up broadcast domains at layer 2.
Incorrect
VLANs break up broadcast domains at layer 2.
-
Question 27 of 30
27. Question
What is the main reason the OSI model was created?
Correct
The primary reason the OSI model was created was so that different networks could inter-operate.
Incorrect
The primary reason the OSI model was created was so that different networks could inter-operate.
-
Question 28 of 30
28. Question
How many collision domains are created when you segment a network with a 12-port switch?
Correct
Layer 2 switching creates individual collision domains.
Incorrect
Layer 2 switching creates individual collision domains.
-
Question 29 of 30
29. Question
What command will display the line, protocol, DLCI, and LMI information of an interface?
Correct
The show interface command shows the line, protocol, DLCI, and LMI information of an interface.Incorrect
The show interface command shows the line, protocol, DLCI, and LMI information of an interface. -
Question 30 of 30
30. Question
Which protocol does Ping use?
Correct
ICMP is the protocol at the Network layer that is used to send echo requests and replies.
Incorrect
ICMP is the protocol at the Network layer that is used to send echo requests and replies.
dca 1st-2nd sem.
Don’t weak thinks then nothing is a possible whai are you find it . I am possible