Would you like to submit the test?

Networking Questions And Answers Sample Test 1


Sample Networking Test 1 for you to Practice. Evaluate your Networking Test 1 test answering skills by trying the online Networking Sample Test 1 and know your score.

Networking Test 1


You have scored 3 out of 10
You Scored:2
Total Questions:2
Attended Questions:2
Correct Answered:2
1. What is the maximum data rate for the 802.11g standard?



Explanation:

The IEEE 802.11g standard provides a maximum data rate of up to 54Mbps.


2.
Which two statements describe the IP address 10.16.3.65/23?

The subnet address is 10.16.3.0 255.255.254.0.
The lowest host address in the subnet is 10.16.2.1 255.255.254.0.
The last valid host address in the subnet is 10.16.2.254 255.255.254.0.
The broadcast address of the subnet is 10.16.3.255 255.255.254.0.



Explanation:

The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet bits and 9 host bits. The block size in the third octet is 2 (256 - 254). So this makes the subnets in the interesting octet 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 2.0 subnet. The next subnet is 4.0, so the broadcast address for the 2.0 subnet is 3.255. The valid host addresses are 2.1 through 3.254.


3. Which command will show you all the translations active on your router?



Explanation:

The command show ip nat translations will show you the translation table containing all the active NAT entries.


4. Which of the following is considered to be the destination host before translation?



Explanation:

The host on the global network before translation is considered to be an outside local host.


5. To back up an IOS, what command will you use?



Explanation:

The command copy flash tftp will prompt you to back up an existing IOS in flash to a TFTP host.


6.
You set the console password, but when you display the configuration, the password doesn't show up; it looks like this:

[output cut]
Line console 0
    Exec-timeout 1 44
    Password 7098C0BQR
    Login
[output cut]
What cause the password to be stored like this?



Explanation:

The command service password-encryption, from global configuration mode, will encrypt the passwords.


7. Which of the following is the decimal and hexadecimal equivalents of the binary number 10011101?



Explanation:

To turn a binary number into decimal, you just have to add the values of each bit that is a 1. The values of 10011101 are 128, 16, 8, 4, and 1. 128 + 16 + 8 + 4 + 1 = 157.

Hexadecimal is a base-16 number system. The values of hexadecimal are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F-16 characters total, from which to create all the numbers you'll ever need. So, if 1001 in binary is 9, then the hexadecimal equivalent is 9. Since we then have 1101, which is 13 in binary, the hexadecimal answer is D and the complete hexadecimal answer is 0x9D.


8. What is the frequency range of the IEEE 802.11a standard?



Explanation:

The IEEE 802.11a standard runs in the 5GHz RF range.


9. Which command will allow you to see real-time translations on your router?



Explanation:

The command debug ip nat will show you in real time the translations occurring on your router.


10.
Which of the following types of connections can use full duplex?

Hub to hub
Switch to switch
Host to host
Switch to hub
Switch to hostwing types of connections can use full duplex?



Explanation:

Hubs cannot run full-duplex Ethernet. Full duplex must be used on a point-to-point connection between two devices capable of running full duplex. Switches and hosts can run full duplex between each other, but a hub can never run full duplex.


11.
Which of the following is true regarding VLANs?



Explanation:

Switches do not propagate VLAN information by default; you must configure the VTP domain. VLAN Trunk Protocol (VTP) is used to propagate VLAN information across a trunked link.


12. A switch has been configured for three different VLANs: VLAN2, VLAN3, and VLAN4. A router has been added to provide communication between the VLANs. What type of interface is necessary on the router if only one connection is to be made between the router and the switch?



Explanation:

Although you can use either 100Mbps or 1Gbps Ethernet, the 100Mbps is necessary at a minimum and is the best answer to this question. You need to trunk the link from the switch to the router to make this connection work with inter-VLAN communication.


13. You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router?



Explanation:

The only command that shows which access lists have been applied to an interface is show ip interface Ethernet 0. The command show access-lists displays all configured access lists, and show ip access-lists displays all configured IP access lists, but neither command indicates whether the displayed access lists have been applied to an interface.


14.
 How many non-overlapping channels are available with 802.11h?



Explanation:

The IEEE 802.11h standard provides an addition 11 channels to the 802.11a standard's 12 non-overlapping channel for a total of 23 non-overlapping channels.


15. Which of the following commands sets a trunk port on a 2960 switch?



Explanation:

To set a switch port to trunk mode, which allows all VLAN information to pass down the link, use the switchport mode trunk command.


16.
What is the maximum data rate for the 802.11a standard?



Explanation:

The IEEE 802.11a standard provides a maximum data rate of up to 54Mbps.


17. What protocol is used to find the hardware address of a local device?



Explanation:

Address Resolution Protocol (ARP) is used to find the hardware address from a known IP address.


18. You telnet to a router and make your necessary changes; now you want to end the Telnet session. What command do you type in?



Explanation:

Since the question never mentioned anything about a suspended session, you can assume that the Telnet session is still open, and you would just type exit to close the session


19. Which protocol is used to send a destination network unknown message back to originating hosts?



Explanation:

ICMP is the protocol at the Network layer that is used to send messages back to an originating router.


20.
In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN?



Explanation:

If the Spanning Tree Protocol is not running on your switches and you connect them together with redundant links, you will have broadcast storms and multiple frame copies.


21. What protocol does PPP use to identify the Network layer protocol?



Explanation:

Network Control Protocol is used to help identify the Network layer protocol used in the packet.


22.
Which of the following is true regarding access lists applied to an interface?





Explanation:

A Cisco router has rules regarding the placement of access lists on a router interface. You can place one access list per direction for each layer 3 protocol configured on an interface


23.
If you want to have more than one Telnet session open at the same time, what keystroke combination would you use?



Explanation:

To keep open one or more Telnet sessions, use the Ctrl+Shift+6 and then X keystroke combination.


24.      Which of the following is true regarding RIPv2?



Explanation:

RIPv2 is pretty much just like RIPv1. It has the same administrative distance and timers and is configured just like RIPv1.


25.
You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with?



Explanation:

First, you must know that a /20 is 255.255.240.0, which is a block size of 16 in the third octet. Counting by 16s, this makes our subnet 48 in the third octet, and the wildcard for the third octet would be 15 since the wildcard is always one less than the block size.


26. Which command is used to determine if an IP access list is enabled on a particular interface?



Explanation:

The show ip interface command will show you if any outbound or inbound interfaces have an access list set.


27.
What are the two main types of access control lists (ACLs)?

Standard
IEEE
Extended
Specialized



Explanation:

Standard and extended access control lists (ACLs) are used to configure security on a router.


28. What is the maximum distance with maximum data rate for 802.11b?



Explanation:

The IEEE 802.11b standard provides a maximum data rate of up to only 11Mbps, and you can be around 150 feet, maybe farther, depending on conditions.


29. Which of the following allows a router to respond to an ARP request that is intended for a remote host?



Explanation:

Proxy ARP can help machines on a subnet reach remote subnets without configuring routing or a default gateway.


30.      What is split horizon?



Explanation:

A split horizon will not advertise a route back to the same router it learned the route from.




FreshersLive - No.1 Job site in India. Here you can find latest 2017 government as well as private job recruitment notifications for different posts vacancies in India. Get top company jobs for both fresher and experienced. Job Seekers can get useful interview tips, resume services & interview Question and answer. Practice online test free which is helpful for interview preparation. Register with us to get latest employment news/rojgar samachar notifications. Also get latest free govt and other sarkari naukri job alerts daily through E-mail.