Professional Documents
Culture Documents
CCNA
CCNA
CCNA
1. Which layer of the OSI model is responsible for routing and forwarding packets?
A) Data Link
B) Network
C) Transport
D) Application
Correct Answer: B) Network
Explanation: The Network layer (Layer 3) is responsible for routing and forwarding packets
between different networks.
4. Which device is used to connect multiple devices in a local area network (LAN) and
make forwarding decisions based on MAC addresses?
A) Router
B) Switch
C) Hub
D) Firewall
Correct Answer: B) Switch
Explanation: A switch operates at Layer 2 (Data Link) of the OSI model and forwards
frames based on MAC addresses.
9. What is the maximum number of hosts that can be addressed in a /24 subnet?
A) 254
B) 256
C) 512
D) 1024
Correct Answer: A) 254
Explanation: A /24 subnet provides 256 addresses, but 2 addresses are reserved for
network and broadcast addresses, leaving 254 addresses for hosts.
10. Which port does the HTTP protocol use for unencrypted web traffic?
A) 80
B) 443
C) 21
D) 22
Correct Answer: A) 80
Explanation: HTTP uses port 80 for unencrypted web traffic.
12. Which protocol is used for securely transferring files over a network?
A) SMTP
B) SNMP
C) SSH
D) Telnet
Correct Answer: C) SSH
Explanation: Secure Shell (SSH) is used for secure file transfers and remote access.
16. Which protocol is used for sending and receiving email messages?
A) FTP
B) POP3
C) ICMP
D) SNMP
Correct Answer: B) POP3
Explanation: Post Office Protocol version 3 (POP3) is used for receiving email.
18. Which device acts as a boundary between a private network and the public Internet?
A) Switch
B) Router
C) Hub
D) Modem
Correct Answer: B) Router
Explanation: A router serves as the boundary between a private network and the public
Internet.
20. In a TCP/IP network, which layer is responsible for segmenting data into packets and
ensuring reliable data delivery?
A) Data Link
B) Network
C) Transport
D) Session
Correct Answer: C) Transport
Explanation: The Transport layer (Layer 4) is responsible for segmenting and ensuring
reliable data delivery.
22. Which routing protocol uses a distance-vector algorithm for routing decisions?
A) OSPF
B) RIP
C) BGP
D) EIGRP
Correct Answer: B) RIP
Explanation: Routing Information Protocol (RIP) uses a distance-vector algorithm for
routing.
24. Which protocol is used for securely accessing remote devices and servers?
A) FTP
B) HTTP
C) Telnet
D) SSH
27. Which protocol is responsible for resolving fully qualified domain names (FQDNs) to IP
addresses? A) DNS
B) SMTP
C) SNMP
D) FTP
Correct Answer: A) DNS
Explanation: The Domain Name System (DNS) resolves domain names to IP addresses.
28. Which command is used to display the routing table on a Cisco router?
A) show ip route
B) display routing-table
C) route print
D) ipconfig
Correct Answer: A) show ip route
Explanation: "show ip route" is the command used to display the routing table on a Cisco
router.
D) SSL/TLS
Correct Answer: D) SSL/TLS
Explanation: Secure Socket Layer (SSL) and Transport Layer Security (TLS) are used for
secure web communication (HTTPS).
31. In a network, which device maintains a table of MAC addresses and port associations?
A) Router
B) Hub
C) Switch
D) Modem
Correct Answer: C) Switch
Explanation: A switch maintains a MAC address table to make forwarding decisions.
32. Which protocol is used for sending and receiving email messages on the server?
A) POP3
B) SMTP
C) IMAP
D) FTP
Correct Answer: B) SMTP
Explanation: Simple Mail Transfer Protocol (SMTP) is used for sending email.
34. Which routing protocol uses a link-state algorithm for routing decisions?
A) RIP
B) EIGRP
C) BGP
D) OSPF
Correct Answer: D) OSPF
Explanation: Open Shortest Path First (OSPF) uses a link-state algorithm for routing.
35. What is the primary purpose of ACLs (Access Control Lists) in a network?
A) To block specific websites
B) To filter and control network traffic based on rules
C) To route packets to their destination
D) To encrypt data during transmission
Correct Answer: B) To filter and control network traffic based on rules
Explanation: ACLs are used to control the flow of network traffic based on rules.
39. Which device is used to connect multiple networks and make forwarding decisions
based on IP addresses?
A) Router
B) Switch
C) Hub
D) Firewall
Correct Answer: A) Router
Explanation: Routers are used to connect and forward data between different networks
based on IP addresses.
41. Which protocol is used for remotely managing and monitoring network devices?
A) SNMP
B) HTTP
C) SSH
D) FTP
Correct Answer: A) SNMP
Explanation: Simple Network Management Protocol (SNMP) is used for remote device
management.
43. Which command is used to view the ARP cache on a Windows computer?
A) arp -a
B) ifconfig
C) netstat -r
D) ipconfig /all
Correct Answer: A) arp -a
Explanation: "arp -a" displays the ARP cache on a Windows computer.
45. What is the primary purpose of the Data Link layer in the OSI model?
A) To provide error detection and correction
B) To route packets between different networks
C) To establish, maintain, and terminate communication sessions
D) To control the flow of data over a network
Correct Answer: A) To provide error detection and correction
Explanation: The Data Link layer provides error detection and correction, as well as control
over the physical medium.