Hack Your Mind Right Now....!

  • Home
  • Android
  • C Language
  • Facebook Hacking
    • 20 FB Tricks
    • Animation in FB
  • DeadlyHacker

Some Questions for CCNA Guys:

Posted by Unknown at 7:46 PM
Some sample and easy questions on CCNA just to refresh you:-

1) Which of the following protocols use "Hello" packets?
A) OSPF
B) RIP2
C) IGRP
D) RIP
2) How to enable a Banner on a Cisco Router ?
A) Router(Config-if)# banner motd #
B) Router(Config)# banner motd #
C) Router(Config)# motd banner motd #
D) Router(Config-if)# motd banner #
3) How many hosts and subnets are possible if you have an IP of 151.242.16.49 with a
subnet mask of 7 bits?
A) 510 hosts and 126 subnets
B) 512 hosts and 128 subnets
C) 126 subnets and 510 hosts
D) 128 subnets and 512 hosts
4) What's the default subnet mask for a Class C IP adresses?
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) 255.255.255.255
5) Which encapsulation must be used to enable Ethernet_II frame type on your Ethernet
interface?
A) SAP
B) ARPA
C) RIP
D) SNAP
6) Which IP-class provides the least number of Hosts?
A) Class A
B) Class B
C) Class C
D) Class D
7) How to define access-list commands ?
A) Router(config-if)# access-list 1 permit 172.16.20.1 255.255.0.0
B) Router(config) # access-list 1 permit 172.16.20.1 255.255.0.0
C) Router(config-if)# access-list 1 permit 172.16.20.1 0.0.0.0
D) Router(config) # access-list 1 permit 172.16.20.1 0.0.0.0
8) Which of the following solutions prevent routing loops?
A) Split Horizon
B) Poison Reverse
C) Hold-down Timers
D) Triggered Updates
9) Which of the following is a valid extended IP access list?
A) access-list 101 permit ip host 175.2.10.0 any eq 80
B) access-list 101 permit ip host 175.2.10.0 any eq www
C) access-list 101 permit tcp host 175.2.10.0 any eq 80
D) access-list 101 permit icmp host 175.2.10.0 any eq www
10) Which of the following is true about IP RIP based networks?
A) The default update time is 30 seconds.
B) The default update time is 90 seconds.
C) Only changes to the routing tables are sent during updates.
D) Complete routing table are sent during updates.
11) How do you apply the access group command?
A) Router(config) # access-list 1 out
B) Router(config-if) # access-listp 1 out
C) Router(config) # access-group 1 out
D) Router(config-if) # access-group 1 out
12) What are the access-list ranges of IP (standard and extended)?
A) 1-99 and 100-199
B) 1-99 and 900-999
C) 100-199 and 800-899
D) 800-899 and 900-999
13) Which are true regarding VLANs?
A) VLANs have the same collision domain
B) VLANs have the same broadcast domain
C) VLANs are less secure compared to switch or hub networks.
D) VLANs use layer 2 switching which is a substitute for routing technology which uses
routers.
14) Which of the following statements are true about EIGRP route summarization?
A) EIGRP provides summarization of routes at classful boundaries by default.
B) For summarizing routes at an arbitrary boundary, one need to disable auto
summarization, using “no auto-summary” command.
C) Manual summarization in EIGRP network takes place on any interface in the network.
D) For specifying a summary route manually, you must specify the metrics.
15) How many access-lists are possible on an interface per protocol ?
A) There can be only one access list in and one for out per router.
B) There can be only one access list for in and one for out on each interface per protocol.
C) There can be only one access list per router.
D) There can be only one access list for each interface per protocol.
16) What does the ISDN protocol Q define ?
A) Concepts, terminology and services
B) Existing telephone network
C) Switching and signaling
D) Quality of Services
17) You have a network ID of 121.69.0.0. You need to divide it into multiple subnets
with at least 500 hosts per each subnet. Which subnet mask should you use so that you
will be able to divide the network into maximum number of subnets?
A) 255.255.128.0
B) 255.255.224.0
C) 255.255.248.0
D) 255.255.254.0
18) What switching type has the lowest latency?
A) Store and forward
B) Cut-through
C) Split horizon
D) Fragment-free
19) What comprises an ISDN BRI line?
A) Two 64 KBPS B channels and one 4 KBPS D channel
B) 24 B channels and one 64 KBPS D channel
C) Two 64 KBPS B channels and one 16 KBPS D channel
D) One 64 KBPS B channels and one 16 KBPS D channel
20) Where is the fully functional IOS stored?
A) Flash
B) ROM
C) RAM
D) NVRAM
Answer Key
1)A, 2)B, 3)C, 4)C, 5)B, 6)C, 7)D, 8)A,B,C,D 9)C, 10)A,D 11)D, 12)A, 13)B, 14)A,B,C
15)B, 16)C 17)D, 18)B, 19)C, 20)A
Email ThisBlogThis!Share to XShare to Facebook

0 comments:

Post a Comment

Newer Post Home Older Post
Subscribe to: Post Comments (Atom)

Like Me On Facebook Mr. Deadly Hacker

About The Author

Unknown
View my complete profile
Aman Badhania writes this blog to help computer users with problems related to web services and getting the most out of their own websites.
Feel The Power Of Cyber Hacking Mr. DeadlyHacker

Popular

    List of google dorks for sql injunction List of google dorks for sql injunction
    Summary of TCP/IP commands for all platforms.. Summary of TCP/IP commands for all platforms..
    What is Windows.old folder and How to remove it. What is Windows.old folder and How to remove it.
    ACUNETIX WEB VULNERABILITY SCANNER 8 CRACKED DOWNLOAD ACUNETIX WEB VULNERABILITY SCANNER 8 CRACKED DOWNLOAD
    How to Increase Facebook Fan page Likes How to Increase Facebook Fan page Likes
    5 Most Important Software Tools for Bloggers 5 Most Important Software Tools for Bloggers
    FIND PASSWORDS BEHIND THE STARS("*" asterisk) FIND PASSWORDS BEHIND THE STARS("*" asterisk)

TemplateHits

  • Home
  • About Me
  • Serial Keys 1million
  • Password Hacking
  • Telnet
  • Hacking
  • Download
  • C Language Tips and Trick
Feel The Power Of Cyber Hacking Mr. DeadlyHacker

Hacking Tricks

Hacked Window Hacking Tools Window Software Window 8 Window Tips How To Make Window Genuiene Window 7 Hacking tutorial IP Tips Internet USB Hacking Hardware IGI 3 Internet Tricks Torrent HD movie HTML Hacker Types Hacking Game Hacking Tips Happy Deepawali Hard Disk Hardware Hacking HitMan Game HoneyPot Hosting IGI 2013 Image 2 Text Information Intrusion Detection System (IDS) Tekken 6 Telnet Terminator RAT TrueCaller UserName VLC Player Hacking Virus Visual Script Tricks Window 10 Window 8 Hack Window 9 Window News Window Server Youtube Tips Zombie iPhone

Crack Skull

Crack Skull
Shiiiiiiiiiiiiiiii.....Don't Live This

Followers

Deadly Tricks

Android Android Tips Android Apps Android Hack AntiVirus Hack Aman Badhania About Keylogging Backtrack Blogger Tips Backup Trick Batch Programming Browser APT Access Block Sites Advance Persistant Threat Albert Einstein Android Code Android Games Android Smart Phone Angry birds Application Assassin’s Creed III AutoCad Batch Hacking Blogger tools Bolloywood Movie HD
Facebook Hacking Firefox Imp. Addons Facebook Tips Download Facbook hack Deadly Hacker Desktop Hacking Exploits Email Hacking Data Recovery Desktop Apps Disable Mouse Dos Tools Drawing Arts Drive Icon Change Ethical Hacking Learn File hosting Firefox Download Flash Software

More Tricks

Software Proxy Server Password Hacking Software hacking Opreting System Partition Make Programming Of linux Remix Hacking Reverse Engineering Samsung Mobile Hacking Skin Pack For Window 7 System Hacking Open Source Code PC Hack PenDrive Bootable PenDrive Hacking Phishing Attacks Phreaking Proxy Sites RainMeters Recover Recover Deleted Files Red Hat Registry Hack Reinstall Your All Drivers In 5 MinutesThis is a featured page Resume Spear Phishing
Computer Hacking Backtrack Blogger Tips Command Hacking Crash Computer Cross Site Scripting (XSS) Backup Trick Batch Programming Browser CRIMINAL HACKED Computer trick Batch Hacking Blogger tools Bolloywood Movie HD C# CSS Check Password Coin Box Calling Hacking Cryptography
Aman Badhania
Copyright © 2012 Hack Your Mind Right Now....! - and Deadly Hacker.