Would you like to submit the test?

Networking Questions And Answers Sample Test 6

Sample Networking Test 6 for you to Practice. Evaluate your Networking Test 6 test answering skills by trying the online Networking Sample Test 6 and know your score.

Networking Test 6

You have scored 3 out of 10
You Scored:2
Total Questions:2
Attended Questions:2
Correct Answered:2
1. To back up an IOS, what command will you use?


The command copy flash tftp will prompt you to back up an existing IOS in flash to a TFTP host.

2.    Where is a hub specified in the OSI model


Hubs regenerate electrical signals, which are specified at the Physical layer.

3. Which command will show you all the translations active on your router?


The command show ip nat translations will show you the translation table containing all the active NAT entries.

4. Which of the following commands displays the configurable parameters and statistics of all interfaces on a router?


With the show interfaces command, you can view the configurable parameters, get statistics for the interfaces on the router, verify if the interfaces are shut down, and see the IP address of each interface.

5. Which command will show you the summary of the NAT configuration?


The show ip nat statistics command displays a summary of the NAT configuration as well as counts of active translation types, hits to an existing mapping, misses (causing an attempt to create a mapping), and expired translations.

6. A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?


A receiving host can control the transmitter by using flow control (TCP uses Windowing by default). By decreasing the window size, the receiving host can slow down the transmitting host so the receiving host does not overflow its buffers.

7. When creating a pool of global addresses, which of the following can be used instead of the netmask command?


Instead of the netmask command, you can use the prefix-length <length> statement.

8. Suppose that you have a customer who has a central HQ and six branch offices. They anticipate adding six more branches in the near future. They wish to implement a WAN technology that will allow the branches to economically connect to HQ and you have no free ports on the HQ router. Which of the following would you recommend?


The key is "there are no free ports" on your router. Only Frame Relay can provide a connection to multiple locations with one interface, and in an economical manner no less.

You are unsuccessful in telnetting into a remote device. What could the problem be?

IP addresses are incorrect.
Access control list is filtering Telnet.
There is a defective serial cable.
The VTY password is missing.


The best answers, the ones you need to remember, are that either an access control list is filtering the Telnet session or the VTY password is not set on the remote device.

10. If an Ethernet port on a router were assigned an IP address of, what would be the valid subnet address of this host?


A /25 mask is Used with a Class B network, the third and fourth octets are used for subnetting with a total of 9 subnet bits, 8 bits in the third octet and 1 bit in the fourth octet. Since there is only 1 bit in the fourth octet, the bit is either off or on-which is a value of 0 or 128. The host in the question is in the 0 subnet, which has a broadcast address of 127 since 128 is the next subnet.

11. Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?


Virtual Trunk Protocol (VTP) is used to pass a VLAN database to any or all switches in the switched network. The three VTP modes are server, client, and transparent.

Which of the following are types of flow control?

Congestion avoidance


The common types of flow control are buffering, windowing, and congestion avoidance.

13. What is the maximum data rate for the 802.11b standard?


The IEEE 802.11b standard provides a maximum data rate of up to 11Mbps.

14.   How long is an IPv6 address


An IPv6 address is 128 bits long.

Which of the following is true regarding access lists applied to an interface?


A Cisco router has rules regarding the placement of access lists on a router interface. You can place one access list per direction for each layer 3 protocol configured on an interface

Which three statements are true about the operation of a full-duplex Ethernet network?

There are no collisions in full-duplex mode.
A dedicated switch port is required for each full-duplex node.
Ethernet hub ports are preconfigured for full-duplex mode.
In a full-duplex environment, the host network card must check for the availability of the network media before transmitting.
The host network card and the switch port must be capable of operating in full-duplex mode.


Full-duplex means you are using both wire pairs simultaneously to send and receive data. You must have a dedicated switch port for each node, which means you will not have collisions. Both the host network card and the switch port must be capable and set to work in full-duplex mode.

17.      Which of the following is true regarding RIPv2?


RIPv2 is pretty much just like RIPv1. It has the same administrative distance and timers and is configured just like RIPv1.

A network administrator views the output from the show ip route command. A network that is advertised by both RIP and IGRP appears in the routing table flagged as an IGRP route. Why is the RIP route to this network not used in the routing table?


RIP has an administrative distance (AD) of 120, while IGRP has an administrative distance of 100, so the router will discard any route with a higher AD than 100.

In Cisco's Unified Wireless Solution, what is the split-MAC architecture?


The split-MAC architecture allows the splitting of 802.11 protocol packets between the Cisco LWAPP-based AP, which handles real-time portions of the protocol, and the WLAN controller, which handles those items that are not time sensitive.

20. Which of the following commands sets the secret password to Cisco?


The enable secret password is case sensitive, so the second option is wrong. To set the enable secret <password>, use the enable secret <password> command from global configuration mode.

21. Which of the following is true when describing a link-local address?


Link-local addresses are meant for throwing together a temporary LAN for meetings or a small LAN that is not going to be routed but needs to share and access files and services locally.

22. What multicast addresses does EIGRPv6 use?


EIGRPv6's multicast address stayed very near the same. In IPv4 it was; now it is FF02::A (A=10 in hexadecimal notation).

What are two purposes for segmentation with a bridge?

To add more broadcast domains.
To create more collision domains.
To add more bandwidth for users.
To allow more broadcasts for users.


Bridges break up collision domains, which allow more bandwidth for users

24. Which command would you place on interface on a private network?


As in access-lists, you must configure your interfaces before NAT will provide any translations. On the inside networks you would use the command ip nat inside. On the outside interface, you will use the command ip nat outside.

What are the two main types of access control lists (ACLs)?



Standard and extended access control lists (ACLs) are used to configure security on a router.

What is the result of segmenting a network with a bridge (switch)?

It increases the number of collision domains.
It decreases the number of collision domains.
It increases the number of broadcast domains.
It decreases the number of broadcast domains.
It makes smaller collision domains.
It makes larger collision domains.


Bridges break up collision domains, which would increase the number of collision domains in a network and also make smaller collision domains.

Which of the following statement is true?


Switches break up collision domains, and routers break up broadcast domains.

28. Which statement describes a spanning-tree network that has converged?


Convergence occurs when all ports on bridges and switches have transitioned to either the forwarding or blocking states. No data is forwarded until convergence is complete. Before data can be forwarded again, all devices must be updated.

29. Which of the following are benefits of VLANs?
They increase the size of collision domains.
They allow logical grouping of users by function.
They can enhance network security.
They increase the size of broadcast domains while decreasing the number of collision domains.
They simplify switch administration.
They increase the number of broadcast domains while decreasing the size of the broadcast domains.


VLANs break up broadcast domains in a switched layer 2 network, which means smaller broadcast domains. They allow configuration by logical function instead of physical location and can create some security if configured correctly.

Which of the following provide inter-switch VLAN communication?



ISL is a Cisco-proprietary frame-tagging method. IEEE 802.1Q is the nonproprietary version of frame tagging.

FreshersLive - No.1 Job site in India. Here you can find latest 2017 government as well as private job recruitment notifications for different posts vacancies in India. Get top company jobs for both fresher and experienced. Job Seekers can get useful interview tips, resume services & interview Question and answer. Practice online test free which is helpful for interview preparation. Register with us to get latest employment news/rojgar samachar notifications. Also get latest free govt and other sarkari naukri job alerts daily through E-mail.