CCNA

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

45 MCQ Q&A Cisco Certified Network Associate | info@networkjourney.

com | +91 9739521088

45 MCQ Question Answers with


Explanations
CCNA (Cisco Certified Network Associate)

45 MCQ CCNA | info@networkjourney.com | +91 9739521088 || P a g e 1 | 12


45 MCQ Q&A Cisco Certified Network Associate | info@networkjourney.com | +91 9739521088

1. Which layer of the OSI model is responsible for routing and forwarding packets?
A) Data Link
B) Network
C) Transport
D) Application
Correct Answer: B) Network
Explanation: The Network layer (Layer 3) is responsible for routing and forwarding packets
between different networks.

2. What is the default subnet mask for a Class C IP address?


A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) 255.255.255.255
Correct Answer: C) 255.255.255.0
Explanation: A Class C IP address uses a default subnet mask of 255.255.255.0.

3. What is the purpose of the ARP protocol?


A) Address Resolution Protocol
B) Advanced Routing Protocol
C) Application Recognition Protocol
D) All of the above
Correct Answer: A) Address Resolution Protocol
Explanation: ARP is used to map an IP address to a MAC address in a local network.

4. Which device is used to connect multiple devices in a local area network (LAN) and
make forwarding decisions based on MAC addresses?
A) Router
B) Switch
C) Hub
D) Firewall
Correct Answer: B) Switch
Explanation: A switch operates at Layer 2 (Data Link) of the OSI model and forwards
frames based on MAC addresses.

5. What is the purpose of a subnet mask?


A) To identify the network portion of an IP address
B) To hide the IP address of a device
C) To determine the DNS server address
D) To encrypt data transmission

45 MCQ CCNA | info@networkjourney.com | +91 9739521088 || P a g e 2 | 12


45 MCQ Q&A Cisco Certified Network Associate | info@networkjourney.com | +91 9739521088

Correct Answer: A) To identify the network portion of an IP address


Explanation: A subnet mask is used to determine which portion of an IP address belongs
to the network and which part belongs to the host.

6. Which protocol is used for dynamic IP address allocation in a network?


A) DNS
B) DHCP
C) FTP
D) HTTP
Correct Answer: B) DHCP
Explanation: Dynamic Host Configuration Protocol (DHCP) is used to assign IP addresses
dynamically to devices in a network.

7. What is the purpose of NAT (Network Address Translation)?


A) To translate MAC addresses to IP addresses
B) To map private IP addresses to a single public IP address
C) To encrypt data during transmission
D) To route packets between different networks
Correct Answer: B) To map private IP addresses to a single public IP address
Explanation: NAT allows multiple devices in a private network to share a single public IP
address.

8. Which routing protocol is commonly used to route data on the Internet?


A) OSPF
B) RIP
C) BGP
D) EIGRP
Correct Answer: C) BGP
Explanation: Border Gateway Protocol (BGP) is commonly used for routing on the Internet.

9. What is the maximum number of hosts that can be addressed in a /24 subnet?
A) 254
B) 256
C) 512
D) 1024
Correct Answer: A) 254
Explanation: A /24 subnet provides 256 addresses, but 2 addresses are reserved for
network and broadcast addresses, leaving 254 addresses for hosts.

10. Which port does the HTTP protocol use for unencrypted web traffic?
A) 80

45 MCQ CCNA | info@networkjourney.com | +91 9739521088 || P a g e 3 | 12


45 MCQ Q&A Cisco Certified Network Associate | info@networkjourney.com | +91 9739521088

B) 443
C) 21
D) 22
Correct Answer: A) 80
Explanation: HTTP uses port 80 for unencrypted web traffic.

11. What is the primary function of a router in a network?


A) Forwarding data within a network
B) Switching data between devices on the same network
C) Connecting devices to the Internet
D) Routing data between different networks
Correct Answer: D) Routing data between different networks
Explanation: Routers are responsible for forwarding data between different networks.

12. Which protocol is used for securely transferring files over a network?
A) SMTP
B) SNMP
C) SSH
D) Telnet
Correct Answer: C) SSH
Explanation: Secure Shell (SSH) is used for secure file transfers and remote access.

13. What is the purpose of the OSI model?


A) To define the structure of the Internet
B) To standardize networking protocols and functions
C) To provide a physical layer for network cables
D) To encrypt data for secure communication
Correct Answer: B) To standardize networking protocols and functions Explanation:
The OSI model is a framework for understanding and standardizing networking
protocols.

14. Which of the following is an example of a private IP address?


A) 192.168.1.100
B) 8.8.8.8
C) 172.16.0.1
D) 203.0.113.5
Correct Answer: A) 192.168.1.100
Explanation: IP addresses in the range 192.168.x.x are reserved for private use.

15. What is the purpose of the DNS (Domain Name System)?


A) To encrypt web traffic

45 MCQ CCNA | info@networkjourney.com | +91 9739521088 || P a g e 4 | 12


45 MCQ Q&A Cisco Certified Network Associate | info@networkjourney.com | +91 9739521088

B) To map domain names to IP addresses


C) To route packets in a network
D) To provide security for a network
Correct Answer: B) To map domain names to IP addresses
Explanation: DNS is used to translate human-readable domain names into IP addresses.

16. Which protocol is used for sending and receiving email messages?
A) FTP
B) POP3
C) ICMP
D) SNMP
Correct Answer: B) POP3
Explanation: Post Office Protocol version 3 (POP3) is used for receiving email.

17. What does the acronym "LAN" stand for in networking?


A) Local Area Network
B) Large Area Network
C) Link Access Node
D) Local Application Network
Correct Answer: A) Local Area Network
Explanation: LAN stands for Local Area Network, which is a network covering a small
geographic area.

18. Which device acts as a boundary between a private network and the public Internet?
A) Switch
B) Router
C) Hub
D) Modem
Correct Answer: B) Router
Explanation: A router serves as the boundary between a private network and the public
Internet.

19. What is the purpose of ICMP (Internet Control Message Protocol)?


A) To control network traffic
B) To encapsulate data for transmission
C) To diagnose network problems and report errors
D) To encrypt data during transmission
Correct Answer: C) To diagnose network problems and report errors

Explanation: ICMP is used for network diagnostics and error reporting.

45 MCQ CCNA | info@networkjourney.com | +91 9739521088 || P a g e 5 | 12


45 MCQ Q&A Cisco Certified Network Associate | info@networkjourney.com | +91 9739521088

20. In a TCP/IP network, which layer is responsible for segmenting data into packets and
ensuring reliable data delivery?
A) Data Link
B) Network
C) Transport
D) Session
Correct Answer: C) Transport
Explanation: The Transport layer (Layer 4) is responsible for segmenting and ensuring
reliable data delivery.

21. What is the purpose of the command "ping" in networking?


A) To request the IP address of a website
B) To test network connectivity and measure round-trip time
C) To encrypt data for secure communication
D) To send email messages
Correct Answer: B) To test network connectivity and measure round-trip time Explanation:
The "ping" command is used to check network connectivity and measure response times.

22. Which routing protocol uses a distance-vector algorithm for routing decisions?
A) OSPF
B) RIP
C) BGP
D) EIGRP
Correct Answer: B) RIP
Explanation: Routing Information Protocol (RIP) uses a distance-vector algorithm for
routing.

23. What is the primary purpose of VLANs (Virtual LANs) in a network?


A) To increase network speed
B) To physically separate network devices
C) To logically segment a network into multiple broadcast domains
D) To secure network devices
Correct Answer: C) To logically segment a network into multiple broadcast domains
Explanation: VLANs are used to segment a network for better management and security.

24. Which protocol is used for securely accessing remote devices and servers?
A) FTP
B) HTTP
C) Telnet
D) SSH

45 MCQ CCNA | info@networkjourney.com | +91 9739521088 || P a g e 6 | 12


45 MCQ Q&A Cisco Certified Network Associate | info@networkjourney.com | +91 9739521088

Correct Answer: D) SSH


Explanation: Secure Shell (SSH) is used for secure remote access.

25. What is the purpose of a firewall in network security?


A) To filter and control network traffic based on security rules
B) To accelerate network performance
C) To allocate IP addresses to devices
D) To route packets within a network
Correct Answer: A) To filter and control network traffic based on security rules
Explanation: Firewalls are used to protect a network by controlling incoming and outgoing
traffic.

26. Which IP address class is typically used for multicast addresses?


A) Class A
B) Class B
C) Class C
D) Class D
Correct Answer: D) Class D
Explanation: Class D addresses are used for multicast groups.

27. Which protocol is responsible for resolving fully qualified domain names (FQDNs) to IP
addresses? A) DNS
B) SMTP
C) SNMP
D) FTP
Correct Answer: A) DNS
Explanation: The Domain Name System (DNS) resolves domain names to IP addresses.

28. Which command is used to display the routing table on a Cisco router?
A) show ip route
B) display routing-table
C) route print
D) ipconfig
Correct Answer: A) show ip route
Explanation: "show ip route" is the command used to display the routing table on a Cisco
router.

29. Which protocol is used for secure web communication (HTTPS)?


A) HTTP
B) SNMP
C) SMTP

45 MCQ CCNA | info@networkjourney.com | +91 9739521088 || P a g e 7 | 12


45 MCQ Q&A Cisco Certified Network Associate | info@networkjourney.com | +91 9739521088

D) SSL/TLS
Correct Answer: D) SSL/TLS
Explanation: Secure Socket Layer (SSL) and Transport Layer Security (TLS) are used for
secure web communication (HTTPS).

30. What is the purpose of the subnetting process in IP addressing?


A) To assign IP addresses to devices
B) To divide a large network into smaller, manageable subnetworks
C) To hide the IP address of a device
D) To encrypt data transmission
Correct Answer: B) To divide a large network into smaller, manageable subnetworks
Explanation: Subnetting is used to create smaller, more manageable network segments.

31. In a network, which device maintains a table of MAC addresses and port associations?
A) Router
B) Hub
C) Switch
D) Modem
Correct Answer: C) Switch
Explanation: A switch maintains a MAC address table to make forwarding decisions.

32. Which protocol is used for sending and receiving email messages on the server?
A) POP3
B) SMTP
C) IMAP
D) FTP
Correct Answer: B) SMTP
Explanation: Simple Mail Transfer Protocol (SMTP) is used for sending email.

33. What is the purpose of the command "tracert" or "traceroute"?


A) To test network connectivity
B) To encrypt data during transmission
C) To find the location of a device on the Internet
D) To trace the route taken by packets to a destination
Correct Answer: D) To trace the route taken by packets to a destination
Explanation: "tracert" or "traceroute" is used to map the route packets take to reach a
destination.

34. Which routing protocol uses a link-state algorithm for routing decisions?
A) RIP
B) EIGRP

45 MCQ CCNA | info@networkjourney.com | +91 9739521088 || P a g e 8 | 12


45 MCQ Q&A Cisco Certified Network Associate | info@networkjourney.com | +91 9739521088

C) BGP
D) OSPF
Correct Answer: D) OSPF
Explanation: Open Shortest Path First (OSPF) uses a link-state algorithm for routing.

35. What is the primary purpose of ACLs (Access Control Lists) in a network?
A) To block specific websites
B) To filter and control network traffic based on rules
C) To route packets to their destination
D) To encrypt data during transmission
Correct Answer: B) To filter and control network traffic based on rules
Explanation: ACLs are used to control the flow of network traffic based on rules.

36. What is the default subnet mask for a Class A IP address?


A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) 255.255.255.255
Correct Answer: A) 255.0.0.0
Explanation: A Class A IP address uses a default subnet mask of 255.0.0.0.

37. What does NAT stand for in networking?


A) Network Address Table
B) Network Allocation Table
C) Network Address Translation
D) Network Access Token
Correct Answer: C) Network Address Translation
Explanation: NAT stands for Network Address Translation, which allows multiple devices
to share a single public IP address.

38. What is the primary purpose of a MAC address?


A) To identify a device on the Internet
B) To identify a device on a local network
C) To determine the IP address of a device
D) To encrypt data during transmission
Correct Answer: B) To identify a device on a local network
Explanation: A MAC address is used to identify a device on a local network.

45 MCQ CCNA | info@networkjourney.com | +91 9739521088 || P a g e 9 | 12


45 MCQ Q&A Cisco Certified Network Associate | info@networkjourney.com | +91 9739521088

39. Which device is used to connect multiple networks and make forwarding decisions
based on IP addresses?
A) Router
B) Switch
C) Hub
D) Firewall
Correct Answer: A) Router
Explanation: Routers are used to connect and forward data between different networks
based on IP addresses.

40. What does DHCP stand for in networking?


A) Dynamic Host Configuration Protocol
B) Data Handling and Control Protocol
C) Domain Host Configuration Helper
D) Digital Handshake Control Protocol
Correct Answer: A) Dynamic Host Configuration Protocol
Explanation: DHCP stands for Dynamic Host Configuration Protocol, used to dynamically
assign IP addresses.

41. Which protocol is used for remotely managing and monitoring network devices?
A) SNMP
B) HTTP
C) SSH
D) FTP
Correct Answer: A) SNMP
Explanation: Simple Network Management Protocol (SNMP) is used for remote device
management.

42. What is the purpose of a gateway in networking?


A) To filter and control network traffic
B) To connect devices to the Internet
C) To route packets within a network
D) To bridge two different networks
Correct Answer: D) To bridge two different networks
Explanation: A gateway is used to connect two different networks and route data between
them.

43. Which command is used to view the ARP cache on a Windows computer?
A) arp -a
B) ifconfig
C) netstat -r

45 MCQ CCNA | info@networkjourney.com | +91 9739521088 || P a g e 10 | 12


45 MCQ Q&A Cisco Certified Network Associate | info@networkjourney.com | +91 9739521088

D) ipconfig /all
Correct Answer: A) arp -a
Explanation: "arp -a" displays the ARP cache on a Windows computer.

44. What is the purpose of the OSI model's Session layer?


A) To establish, maintain, and terminate communication sessions
B) To ensure reliable data delivery
C) To route packets between different networks
D) To manage data link connections
Correct Answer: A) To establish, maintain, and terminate communication sessions
Explanation: The Session layer is responsible for session management.

45. What is the primary purpose of the Data Link layer in the OSI model?
A) To provide error detection and correction
B) To route packets between different networks
C) To establish, maintain, and terminate communication sessions
D) To control the flow of data over a network
Correct Answer: A) To provide error detection and correction
Explanation: The Data Link layer provides error detection and correction, as well as control
over the physical medium.

45 MCQ CCNA | info@networkjourney.com | +91 9739521088 || P a g e 11 | 12


45 MCQ Q&A Cisco Certified Network Associate | info@networkjourney.com | +91 9739521088

45 MCQ CCNA | info@networkjourney.com | +91 9739521088 || P a g e 12 | 12

You might also like