Computer Networks – CCNA Multiple Choice Questions with Answers

Computer Networks – CCNA Multiple Choice Questions with Answers




CCNA Multiple Choice Questions with Answers contains set of 10 CCNA MCQ Questions With Answers which will help you to clear beginner level quiz.



1: Three access points have been installed and configured to cover a small office. What term defines the wireless topology?
(A) SSID
(B) BSS
(C) ESS
(D) IBSS

2: Routers R1 and R2 are connected via a private line using PPP. On this link, which of the following options lists the steps in PPP session establishment in the correct order?
(A) Network layer protocol phase, optional authentication phase, link establishment phase
(B) Link establishment phase, network layer protocol phase, optional authentication phase
(C) Optional authentication phase, network layer protocol phase, link establishment phase
(D) Link establishment phase, optional authentication phase, network layer protocol phase
(E) Network layer protocol phase, link establishment phase, optional authentication phase
(F) Optional authentication phase, link establishment phase, network layer protocol phase
(G) None of the above

3: What is the advantage of using a multipoint interface instead of point-to-point subinterfaces when configuring a Frame Relay hub in a hub-and-spoke topology?
(A) It avoids split-horizon issues with distance vector routing protocols.
(B) IP addresses can be conserved if VLSM is not being used for subnetting.
(C) A multipoint interface offers greater security compared to point-to-point subinterface
Configurations.
(D) The multiple IP network addresses required for a multipoint interface provide greater
addressing flexibility over point-to-point configurations.
(E) None of the above

4: Which of the following are benefits provided with access control lists (ACLs)? (Select all that apply)
(A) ACLs monitor the number of bytes and packets.
(B) Virus detection.
(C) ACLs identify interesting traffic for DDR.
(D) ACLs provide IP route filtering.
(E) ACLs provide high network availability.
(F) ACLs classify and organize network traffic.
 
5: Which of the following data network would you implement if you wanted a wireless network that had a relatively high data rate, but was limited to very short distances?
(A) Broadband personal comm. Service (PCS)
(B) Broadband circuit
(C) Infrared
(D) Spread spectrum
(E) Cable

6: On router, you issued the “service password-encryption” command. What is the effect of this configuration command?
(A) Only passwords configured after the command has been entered will be encrypted.
(B) Only the enable password will be encrypted.
(C) It will encrypt all current and future passwords.
(D) Only the enable secret password will be encrypted.
(E) It will encrypt the secret password and remove the enable secret password from the
Configuration.
(F) None of the above

7: Router R1 is configured to run EIGRP. Which tables of EIGRP route information are held in RAM and maintained through the use of hello and update packets in this router? (Choose two).
(A) SPF table
(B) Query table
(C) RTP table
(D) Neighbor table
(E) DUAL table
(F) Topology table
(G) State Table

8: Under which network type circumstance would an OSPF router establish router adjacencies while not performing the DR/BDR election process?
(A) Point-to-point
(B) Broadcast
(C) Non-broadcast multi-access
(D) Backbone area 0
(E) None of the above

9: If the bandwidth of an OSPF interface on a router is configured with the “bandwidth 64” command, what would be the calculated cost of the link?
(A) 1
(B) 64
(C) 1562
(D) 64000
(E) 1500
(F) None of the above

10: Router R1 is not operating as expected and you want to verify that the router booted using the correct IOS image. Which command should be used to determine which IOS is running on the router?
(A) show memory
(B) show flash
(C) show version
(D) show startup-config
(E) show config-register
(F) None of the above

11: Some of the routers have been configured with default routes. What are some of the advantages of using default routes? (Choose two)
(A) They establish routes that will never go down.
(B) The keep routing tables small.
(C) They require a great deal of CPU power.
(D) The allow connectivity to remote networks that are not in the routing table.
(E) They direct traffic from the Internet into corporate networks.