Would you like to submit the test?

Networking Questions And Answers Sample Test 5

Sample Networking Test 5 for you to Practice. Evaluate your Networking Test 5 test answering skills by trying the online Networking Sample Test 5 and know your score.

Networking Test 5

You have scored 3 out of 10
You Scored:2
Total Questions:2
Attended Questions:2
Correct Answered:2
1. To back up an IOS, what command will you use?


The command copy flash tftp will prompt you to back up an existing IOS in flash to a TFTP host.

2. Which of the following is considered to be the address before translation?


The host on the private network before translation is considered to be an inside local host.

3. What are the decimal and hexadecimal equivalents for the binary number 10110111?


You must be able to take a binary number and convert it into both decimal and hexadecimal. To convert to decimal, just add up the 1s using their values. The values that are turned on with the binary number of 10110111 are 128 + 32 + 16 + 4 + 2 + 1 = 183. To get the hexadecimal equivalent, you need to break the eight binary digits into nibbles (4 bits), 1011 and 0111. By add- ing up these values, you get 11 and 7. In hexadecimal, 11 is B, so the answer is 0xB7.

Which of the following statement is true?


Switches break up collision domains, and routers break up broadcast domains.

5. Two connected routers are configured with RIP routing. What will be the result when a router receives a routing update that contains a higher-cost path to a network already in its routing table?


When a routing update is received by a router, the router first checks the administrative distance (AD) and always chooses the route with the lowest AD. However, if two routes are received and they both have the same AD, then the router will choose the one route with the lowest metrics, or in RIP's case, hop count.

6. If an Ethernet port on a router were assigned an IP address of, what would be the valid subnet address of this host?


A /25 mask is Used with a Class B network, the third and fourth octets are used for subnetting with a total of 9 subnet bits, 8 bits in the third octet and 1 bit in the fourth octet. Since there is only 1 bit in the fourth octet, the bit is either off or on-which is a value of 0 or 128. The host in the question is in the 0 subnet, which has a broadcast address of 127 since 128 is the next subnet.

7. What is the maximum distance with maximum data rate for 802.11b?


The IEEE 802.11b standard provides a maximum data rate of up to only 11Mbps, and you can be around 150 feet, maybe farther, depending on conditions.

 Which of the following are disadvantages of using NAT?

Translation introduces switching path delays.
Conserves legally registered addresses.
Causes loss of end-to-end IP traceability.
Increases flexibility when connecting to the Internet.
Certain applications will not function with NAT enabled.
Reduces address overlap occurrence.


NAT is not perfect and can cause some issues in some networks, but most networks work just fine. NAT can cause delays and troubleshooting problems, and some applications just won't work.

9. Which of the following would be a good starting point for troubleshooting if your router is not translating?


In order for NAT to provide translation services, you must have ip nat inside and ip nat outside configured on your router's interfaces.

The Acme Corporation is implementing dial-up services to enable remote-office employees to connect to the local network. The company uses multiple routed protocols, needs authentication of users connecting to the network, and since some calls will be long distance, needs callback support. Which of the following protocols is the best choice for these remote services?


PPP is your only option, as HDLC and Frame Relay do not support these types of business requirements. PPP provides dynamic addressing, authentication using PAP or CHAP, and callback services.

11. What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the subnet mask?


A /27 ( is 3 bits on and 5 bits off. This provides 8 subnets, each with 30 hosts. Does it matter if this mask is used with a Class A, B, or C network address? Not at all. The number of host bits would never change.

12. You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router?


The only command that shows which access lists have been applied to an interface is show ip interface Ethernet 0. The command show access-lists displays all configured access lists, and show ip access-lists displays all configured IP access lists, but neither command indicates whether the displayed access lists have been applied to an interface.

13. What command is used to create a backup configuration?


The command to back up the configuration on a router is copy running-config startup-config.

14. Which command would you place on interface on a private network?


As in access-lists, you must configure your interfaces before NAT will provide any translations. On the inside networks you would use the command ip nat inside. On the outside interface, you will use the command ip nat outside.

15. A switch has been configured for three different VLANs: VLAN2, VLAN3, and VLAN4. A router has been added to provide communication between the VLANs. What type of interface is necessary on the router if only one connection is to be made between the router and the switch?


Although you can use either 100Mbps or 1Gbps Ethernet, the 100Mbps is necessary at a minimum and is the best answer to this question. You need to trunk the link from the switch to the router to make this connection work with inter-VLAN communication.

What information is displayed by the show hosts command?

Temporary DNS entries
The names of the routers created using the hostname command
The IP addresses of workstations allowed to access the router
Permanent name-to-address mappings created using the ip host command
The length of time a host has been connected to the router via Telnet


The show hosts command provides information on temporary DNS entries and permanent name-to-address mappings created using the ip host command.

17. Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz?


IEEE 802.11B is 2.4GHz, but with a maximum of only 11Mbps. IEEE 802.11G is in the 2.4GHz range, with a top speed of 54Mbps.

If you want to disable STP on a port connected to a server, which command would you use?


If you have a server or other devices connected into your switch that you're totally sure won't create a switching loop if STP is disabled, you can use something called portfast on these ports. Using it means the port won't spend the usual 50 seconds to come up while STP is converging.

19. What command is used to stop RIP routing updates from exiting out an interface but still allow the interface to receive RIP route updates?


The (config-router)#passive-interface command stops updates from being sent out an interface, but route updates are still received.

Your switch has a port status LED that is alternating between green and amber. What could this indicate?


When you connect to a switch port, at first the link lights are orange/amber, and then they turn green, indicating normal operation. If the link light is blinking, you have a problem.

To enable EIGRP, which of the following would you use?

Router1(config-if)# ipv6 ospf 10 area
Router1(config-if)# ipv6 router rip 1
Router1(config)# ipv6 router eigrp 10
Router1(config-rtr)# no shutdown
Router1(config-if)# ipv6 eigrp 10 


Unlike RIPng and OSPFv3, you need to configure EIGRP both from global configuration mode and from interface mode, and you have to enable the command with the no shutdown command.

22. Which of the following is an example of a standard IP access list?


Standard IP access lists use the numbers 1-99 and 1300-1999 and filter based on source IP address only. Option C is incorrect because the mask must be in wildcard format.

23.   How long is an IPv6 address


An IPv6 address is 128 bits long.

Which WAN encapsulations can be configured on an asynchronous serial connection?

Frame Relay


Please do not freak out because ATM is an answer to this question. ATM is not covered in depth on the CCNA exam. PPP is mostly used for dial-up (async) services, but ATM could be used as well, though it typically is not used anymore since PPP is so efficient.

25. Which of the following allows a router to respond to an ARP request that is intended for a remote host?


Proxy ARP can help machines on a subnet reach remote subnets without configuring routing or a default gateway.

26. What is the purpose of flow control?


Flow control allows the receiving device to control the transmitter so the receiving device's buffer does not overflow.

You have your laptop directly connected into a router's Ethernet port. Which of the following are among the requirements for the copy flash tftp command to be successful?

TFTP server software must be running on the router.
TFTP server software must be running on your laptop.
The Ethernet cable connecting the laptop directly into the router's Ethernet port must be a straight-through cable.
The laptop must be on the same subnet as the router's Ethernet interface.
The copy flash tftp command must be supplied the IP address of the laptop.


Before you back up an IOS image to a laptop directly connected to a router's Ethernet port, make sure the TFTP server software is running on your laptop, that the Ethernet cable is a "crossover," and that the laptop is in the same subnet as the router's Ethernet port, and then you can use the copy flash tftp command from your laptop.

What are the two main types of access control lists (ACLs)?



Standard and extended access control lists (ACLs) are used to configure security on a router.

Which of the following are types of flow control?

Congestion avoidance


The common types of flow control are buffering, windowing, and congestion avoidance.

30. Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?


Virtual Trunk Protocol (VTP) is used to pass a VLAN database to any or all switches in the switched network. The three VTP modes are server, client, and transparent.

FreshersLive - No.1 Job site in India. Here you can find latest 2017 government as well as private job recruitment notifications for different posts vacancies in India. Get top company jobs for both fresher and experienced. Job Seekers can get useful interview tips, resume services & interview Question and answer. Practice online test free which is helpful for interview preparation. Register with us to get latest employment news/rojgar samachar notifications. Also get latest free govt and other sarkari naukri job alerts daily through E-mail.