Would you like to submit the test?

Networking Questions And Answers Sample Test 2

Sample Networking Test 2 for you to Practice. Evaluate your Networking Test 2 test answering skills by trying the online Networking Sample Test 2 and know your score.

Networking Test 2

You have scored 3 out of 10
You Scored:2
Total Questions:2
Attended Questions:2
Correct Answered:2
You have the following routing table. Which of the following networks will not be placed in the neighbor routing table?

R [120/1] via, 00:00:12, Serial0
C is directly connected, Serial0 is subnetted, 1 subnets
C is directly connected, Loopback0
R [120/1] via, 00:00:12, Serial0
R [120/15] via, 00:00:07, Serial0
C is directly connected, Ethernet0


The network cannot be placed in the next router's routing table because it already is at 15 hops. One more hop would make the route 16 hops, and that is not valid in RIP networking.

2. You have two switches connected together with two crossover cables for redundancy, and STP is disabled. Which of the following will happen between the switches?


If spanning tree is disabled on a switch and you have redundant links to another switch, broadcast storms will occur, among other possible problems.

3. Which class of IP address provides a maximum of only 254 host addresses per network ID?


A Class C network address has only 8 bits for defining hosts: 28 - 2 = 254.

4. The network address of provides how many subnets and hosts?


A CIDR address of /19 is This is a Class B address, so that is only 3 subnet bits, but it provides 13 host bits, or 8 subnets, each with 8,190 hosts.

A network administrator views the output from the show ip route command. A network that is advertised by both RIP and IGRP appears in the routing table flagged as an IGRP route. Why is the RIP route to this network not used in the routing table?


RIP has an administrative distance (AD) of 120, while IGRP has an administrative distance of 100, so the router will discard any route with a higher AD than 100.

Which three statements are true about the operation of a full-duplex Ethernet network?

There are no collisions in full-duplex mode.
A dedicated switch port is required for each full-duplex node.
Ethernet hub ports are preconfigured for full-duplex mode.
In a full-duplex environment, the host network card must check for the availability of the network media before transmitting.
The host network card and the switch port must be capable of operating in full-duplex mode.


Full-duplex means you are using both wire pairs simultaneously to send and receive data. You must have a dedicated switch port for each node, which means you will not have collisions. Both the host network card and the switch port must be capable and set to work in full-duplex mode.

7. Which command will show you the summary of the NAT configuration?


The show ip nat statistics command displays a summary of the NAT configuration as well as counts of active translation types, hits to an existing mapping, misses (causing an attempt to create a mapping), and expired translations.

8. Which of the following are benefits of VLANs?
They increase the size of collision domains.
They allow logical grouping of users by function.
They can enhance network security.
They increase the size of broadcast domains while decreasing the number of collision domains.
They simplify switch administration.
They increase the number of broadcast domains while decreasing the size of the broadcast domains.


VLANs break up broadcast domains in a switched layer 2 network, which means smaller broadcast domains. They allow configuration by logical function instead of physical location and can create some security if configured correctly.

You are unsuccessful in telnetting into a remote device. What could the problem be?

IP addresses are incorrect.
Access control list is filtering Telnet.
There is a defective serial cable.
The VTY password is missing.


The best answers, the ones you need to remember, are that either an access control list is filtering the Telnet session or the VTY password is not set on the remote device.

Which encapsulations can be configured on a serial interface?

Token Ring
Frame Relay


Ethernet and Token Ring are LAN technologies and cannot be configured on a serial interface. PPP, HDLC, and Frame Relay are layer 2 WAN technologies that are typically configured on a serial interface.

11. Suppose that you have a customer who has a central HQ and six branch offices. They anticipate adding six more branches in the near future. They wish to implement a WAN technology that will allow the branches to economically connect to HQ and you have no free ports on the HQ router. Which of the following would you recommend?


The key is "there are no free ports" on your router. Only Frame Relay can provide a connection to multiple locations with one interface, and in an economical manner no less.

What does a switch do when a frame is received on an interface and the destination hardware address is unknown or not in the filter table?


Switches flood all frames that have an unknown destination address. If a device answers the frame, the switch will update the MAC address table to reflect the location of the device.

13. Which of the following is an example of a standard IP access list?


Standard IP access lists use the numbers 1-99 and 1300-1999 and filter based on source IP address only. Option C is incorrect because the mask must be in wildcard format.

Which WAN encapsulations can be configured on an asynchronous serial connection?

Frame Relay


Please do not freak out because ATM is an answer to this question. ATM is not covered in depth on the CCNA exam. PPP is mostly used for dial-up (async) services, but ATM could be used as well, though it typically is not used anymore since PPP is so efficient.

Pat Address Translation is also termed what?


Another term for port address translation is NAT Overload because that is the command used to enable port address translation.

16. You type debug ip rip on your router console and see that is being advertised to you with a metric of 16. What does this mean?


You cannot have 16 hops on a RIP network by default. If you receive a route advertised with a metric of 16, this means it is inaccessible.

17. You are troubleshooting a connectivity problem in your corporate network and want to isolate the problem. You suspect that a router on the route to an unreachable network is at fault. What IOS user exec command should you issue?


The command traceroute (trace for short), which can be issued from user mode or privileged mode, is used to find the path a packet takes through an internetwork and will also show you where the packet stops because of an error on a router.

18. How many non-overlapping channels are available with 802.11a?


The IEEE 802.11a standard provides up to 12 non-overlapping channels.

You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?


Dynamic Host Configuration Protocol (DHCP) is used to provide IP information to hosts on your network. DHCP can provide a lot of information, but the most common is IP address, subnet mask, default gateway, and DNS information.

You want to create a standard access list that denies the subnet of the following host: Which of the following would you start your list with?


First, you must know that a /20 is, which is a block size of 16 in the third octet. Counting by 16s, this makes our subnet 48 in the third octet, and the wildcard for the third octet would be 15 since the wildcard is always one less than the block size.

21. Which of the following is private IP address?


Class A private address range is through Class B private address range is through, and Class C private address range is through

Which statement is true regarding classless routing protocols?

The use of discontiguous networks is not allowed.
The use of variable length subnet masks is permitted.
RIPv1 is a classless routing protocol.
IGRP supports classless routing within the same autonomous system.
RIPv2 supports classless routing.


Classful routing means that all hosts in the internetwork use the same mask. Classless routing means that you can use Variable Length Subnet Masks (VLSMs) and can also support discontiguous networking.

23. What is the purpose of flow control?


Flow control allows the receiving device to control the transmitter so the receiving device's buffer does not overflow.

24. You need to find the broadcast address used on a LAN on your router. What command will you type into the router from user mode to find the broadcast address?


The command show ip protocols will actually show you the broadcast address for each interface - too bad it isn't a possible answer. Your best answer is show interfaces, which will provide the IP address and mask for each interface.

25. Which of the following is considered to be the address after translation?


The host on the private network after translation is considered to be an inside global host.

26. You need to create an access list that will prevent hosts in the network range of to Which of the following lists will you use?


The range of to is a block size of 32. The network address is and the mask would be, which for an access list must be a wildcard format of The 31 is used for a block size of 32. The wildcard is always one less than the block size.

27. What is the purpose of Spanning Tree Protocol in a switched LAN?


The Spanning Tree Protocol (STP) was designed to stop layer 2 loops. All Cisco switches have the STP on by default.

28. In which of the following technologies is the term HFC used?


In a modern network, hybrid fibre-coaxial (HFC) is a telecommunications industry term for a network that incorporates both optical fiber and coaxial cable to create a broadband network.

29. A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?


A receiving host can control the transmitter by using flow control (TCP uses Windowing by default). By decreasing the window size, the receiving host can slow down the transmitting host so the receiving host does not overflow its buffers.

Which of the following are layers in the TCP/IP model?

Data Link


This seems like a hard question at first because it doesn't make sense. The listed answers are from the OSI model and the question asked about the TCP/IP protocol stack (DoD model). However, let's just look for what is wrong. First, the Session layer is not in the TCP/IP model; neither are the Data Link and Physical layers. This leaves us with the Transport layer (Host-to-Host in the DoD model), Internet layer (Network layer in the OSI), and Application layer (Application/Process in the DoD).

FreshersLive - No.1 Job site in India. Here you can find latest 2018 government as well as private job recruitment notifications for different posts vacancies in India. Get top company jobs for both fresher and experienced. Job Seekers can get useful interview tips, resume services & interview Question and answer. Practice online test free which is helpful for interview preparation. Register with us to get latest employment news/rojgar samachar notifications. Also get latest free govt and other sarkari naukri job alerts daily through E-mail.