Professional Documents
Culture Documents
CCIE
CCIE
CCIE
1. Question: What is the maximum number of devices that can participate in an OSPF
area?
A) 50
B) 100
C) 255
D) Unlimited
Correct Answer: C) 255
Explanation: OSPF (Open Shortest Path First) supports up to 255 routers in a single area.
3. Question: Which routing protocol uses the DUAL algorithm for loopfree convergence?
A) RIP
B) OSPF
C) EIGRP
D) BGP
Correct Answer: C) EIGRP
Explanation: EIGRP (Enhanced Interior Gateway Routing Protocol) uses the DUAL
(Diffusing Update Algorithm) for loop prevention and fast convergence.
5. Question: Which OSI layer is responsible for logical addressing and routing?
A) Data Link Layer
B) Network Layer
C) Transport Layer
D) Session Layer
7. Question: Which spanning tree protocol is an IEEE standard for preventing loops in
bridged networks?
A) STP (Spanning Tree Protocol)
B) RSTP (Rapid Spanning Tree Protocol)
C) MSTP (Multiple Spanning Tree Protocol)
D) PVST+ (PerVLAN Spanning Tree Plus)
Correct Answer: A) STP (Spanning Tree Protocol)
Explanation: STP is the original IEEE standard for preventing loops in bridged networks.
10. Question: What is the primary function of BGP (Border Gateway Protocol)?
11. Question: What is the primary role of the Data Link Layer in the OSI model?
A) Logical addressing
B) Endtoend communication
C) Physical addressing
D) Error detection and correction
Correct Answer: C) Physical addressing
Explanation: The Data Link Layer is responsible for physical addressing (MAC addresses)
and framing.
13. Question: What is the purpose of the ARP (Address Resolution Protocol)?
A) Translate domain names to IP addresses
B) Map MAC addresses to IP addresses
C) Determine the best route for packet delivery
D) Establish a secure connection between devices
Correct Answer: B) Map MAC addresses to IP addresses
Explanation: ARP is used to map a known IP address to a MAC address on a local network.
14. Question: Which security protocol is used to secure remote access VPN connections?
A) SSL (Secure Sockets Layer)
B) IPsec (Internet Protocol Security)
C) PPTP (PointtoPoint Tunneling Protocol)
D) L2TP (Layer 2 Tunneling Protocol)
Correct Answer: B) IPsec (Internet Protocol Security)
15. Question: In MPLS (Multiprotocol Label Switching), what is the role of a label?
A) Identifying the source IP address
B) Indicating the destination MAC address
C) Enabling fast routing decisions
D) Ensuring QoS (Quality of Service)
Correct Answer: C) Enabling fast routing decisions
Explanation: Labels in MPLS allow routers to make fast forwarding decisions based on the
label instead of complex IP lookups.
17. Question: Which protocol operates at the Application Layer of the OSI model?
A) HTTP
B) TCP
C) ICMP
D) OSPF
Correct Answer: A) HTTP
Explanation: HTTP (Hypertext Transfer Protocol) operates at the Application Layer and is
used for web communication.
21. Question: What is the primary purpose of Quality of Service (QoS) in networking?
A) Ensure network security
B) Prioritize and manage network traffic
C) Implement load balancing
D) Configure virtual LANs
Correct Answer: B) Prioritize and manage network traffic
Explanation: QoS is used to prioritize and manage network traffic to ensure optimal
performance for critical applications.
22. Question: Which security protocol is commonly used for securing wireless networks?
A) WEP (Wired Equivalent Privacy)
B) SSL (Secure Sockets Layer)
C) WPA (WiFi Protected Access)
D) IPSec (Internet Protocol Security)
Correct Answer: C) WPA (WiFi Protected Access)
Explanation: WPA is a security protocol used to secure wireless networks and is an
improvement over the older WEP protocol.
23. Question: What is the purpose of the command "show ip route" in a Cisco router?
A) Display the IP address of the router
B) Show the routing table of the router
C) Configure dynamic routing protocols
D) Test connectivity to a remote host
Correct Answer: B) Show the routing table of the router
Explanation: The "show ip route" command displays the routing table of a Cisco router.
24. Question: Which protocol is commonly used for secure remote terminal access?
A) SSH (Secure Shell)
B) Telnet
C) FTP (File Transfer Protocol)
D) SNMP (Simple Network Management Protocol)
Correct Answer: A) SSH (Secure Shell)
Explanation: SSH is a secure protocol used for remote terminal access and secure file
transfer.
25. Question: What is the default subnet mask for a Class C IP address?
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) 255.255.255.255
Correct Answer: C) 255.255.255.0
Explanation: The default subnet mask for a Class C IP address is 255.255.255.0.
29. Question: Which type of attack involves flooding a network with a large volume of
traffic to disrupt normal operation?
A) DDoS (Distributed Denial of Service)
B) Spoofing
C) Phishing
D) ManintheMiddle
Correct Answer: A) DDoS (Distributed Denial of Service)
Explanation: DDoS attacks involve overwhelming a network or service with a flood of
traffic from multiple sources.
30. Question: What is the purpose of the command "show interface" in a network device?
A) Display information about connected devices
B) Configure network interfaces
C) View interface statistics and status
D) Test connectivity to a remote host
Correct Answer: C) View interface statistics and status
Explanation: The "show interface" command provides information about the status and
statistics of network interfaces on a device.
31. Question: What is the primary purpose of the ARP (Address Resolution Protocol)?
A) Assigning IP addresses dynamically
B) Mapping MAC addresses to IP addresses
C) Configuring routing protocols
D) Establishing secure connections
Correct Answer: B) Mapping MAC addresses to IP addresses
Explanation: ARP is used to map a known IP address to a MAC address on a local network.
32. Question: Which type of routing protocol uses metrics such as bandwidth and delay to
calculate the best path?
A) Distance Vector
B) LinkState
C) Hybrid
D) Exterior Gateway Protocol
Correct Answer: B) LinkState
Explanation: LinkState routing protocols use detailed information about the network, such
as bandwidth and delay, to calculate the best path.
33. Question: What is the primary function of NAT (Network Address Translation)?
A) Encrypting network traffic
B) Filtering network packets
C) Mapping private IP addresses to public IP addresses
D) Allocating IP addresses dynamically
Correct Answer: C) Mapping private IP addresses to public IP addresses
Explanation: NAT is used to map private IP addresses to a public IP address, allowing
devices within a private network to access the Internet.
34. Question: Which subnet mask provides the largest number of host addresses?
A) 255.255.255.0
B) 255.255.0.0
C) 255.0.0.0
D) 255.255.255.255
Correct Answer: C) 255.0.0.0
Explanation: A subnet mask of 255.0.0.0 allows for a large number of host addresses by
having a minimal number of network bits.
35. Question: What is the primary role of VLANs (Virtual LANs) in a network?
A) Increase network speed
B) Enhance network security
C) Divide a broadcast domain
D) Allocate IP addresses
Correct Answer: C) Divide a broadcast domain
Explanation: VLANs are used to logically divide a broadcast domain, improving network
performance and security.
36. Question: Which protocol is commonly used for secure file transfer over a network?
A) FTP (File Transfer Protocol)
B) HTTP (Hypertext Transfer Protocol)
C) SNMP (Simple Network Management Protocol)
D) SMTP (Simple Mail Transfer Protocol)
Correct Answer: A) FTP (File Transfer Protocol)
Explanation: FTP is commonly used for secure file transfer over a network, especially with
the addition of protocols like FTPS or SFTP for encryption.
37. Question: What is the purpose of the command "show runningconfig" on a Cisco
device?
A) Display the currently active configuration
B) Modify the running configuration
C) Save the configuration to the startup configuration
38. Question: Which routing protocol uses Autonomous Systems (AS) as a key concept?
A) OSPF (Open Shortest Path First)
B) EIGRP (Enhanced Interior Gateway Routing Protocol)
C) BGP (Border Gateway Protocol)
D) RIP (Routing Information Protocol)
Correct Answer: C) BGP (Border Gateway Protocol)
Explanation: BGP uses Autonomous Systems (AS) as a way to organize and identify
different routing domains on the Internet.
39. Question: What is the purpose of the command "arp a" on a Windows device?
A) Display the ARP cache
B) Assign a static ARP entry
C) Configure ARP settings
D) Perform an ARP scan
Correct Answer: A) Display the ARP cache
Explanation: The "arp a" command in Windows displays the ARP cache, showing mappings
between IP addresses and MAC addresses.
40. Question: Which protocol is responsible for translating domain names to IP addresses?
A) DHCP (Dynamic Host Configuration Protocol)
B) DNS (Domain Name System)
C) FTP (File Transfer Protocol)
D) SNMP (Simple Network Management Protocol)
Correct Answer: B) DNS (Domain Name System)
Explanation: DNS is responsible for translating humanreadable domain names into IP
addresses.
41. Question: What is the primary function of a DHCP (Dynamic Host Configuration
Protocol) server?
A) Translate domain names to IP addresses
B) Assign IP addresses dynamically to network devices
C) Encrypt network traffic
D) Authenticate network users
Correct Answer: B) Assign IP addresses dynamically to network devices
Explanation: DHCP servers dynamically assign IP addresses to devices on a network.
42. Question: In networking, what is the purpose of the command "ip route"?
A) Display the IP routing table
B) Configure dynamic routing protocols
C) Test network connectivity
D) Assign IP addresses to network interfaces
Correct Answer: A) Display the IP routing table
Explanation: The "ip route" command is used to display the IP routing table on a device.
43. Question: What is the default behavior of a switch when it receives a frame with an
unknown destination MAC address?
A) Drop the frame
B) Broadcast the frame to all ports
C) Forward the frame to the default gateway
D) Send an ARP request for the destination
Correct Answer: B) Broadcast the frame to all ports
Explanation: By default, a switch floods a frame with an unknown destination MAC
address to all ports, allowing the device to learn the location of the destination.
44. Question: What is the primary purpose of the command "tracert" in a Windows
environment?
A) Display IP configuration information
B) Test network bandwidth
C) Identify network devices along a route
D) Configure routing protocols
Correct Answer: C) Identify network devices along a route
Explanation: The "tracert" command is used to trace the route that packets take to reach
a destination, identifying each hop along the way.
46. Question: Which encryption protocol is commonly used for securing wireless
networks?
A) WEP (Wired Equivalent Privacy)
B) SSL (Secure Sockets Layer)
47. Question: What is the purpose of the command "show vlan" on a Cisco switch?
A) Display the routing table
B) Configure VLANs
C) View information about configured VLANs
D) Test VLAN connectivity
Correct Answer: C) View information about configured VLANs
Explanation: The "show vlan" command on a Cisco switch displays information about the
configured VLANs on the device.
48. Question: Which protocol is commonly used for securely transferring files over a
network?
A) FTPS (File Transfer Protocol Secure)
B) HTTP (Hypertext Transfer Protocol)
C) SMTP (Simple Mail Transfer Protocol)
D) Telnet
Correct Answer: A) FTPS (File Transfer Protocol Secure)
Explanation: FTPS is an extension of FTP that adds support for the Transport Layer Security
(TLS) and Secure Sockets Layer (SSL) cryptographic protocols for secure file transfer.
49. Question: What is the purpose of the command "show ip interface brief" on a Cisco
router?
A) Configure IP interfaces
B) Display detailed information about IP interfaces
C) View a summary of IP interface status
D) Test connectivity to a remote host
Correct Answer: C) View a summary of IP interface status
Explanation: The "show ip interface brief" command provides a summary of the status of
IP interfaces on a Cisco router.
50. Question: Which OSI layer is responsible for error detection and correction?
A) Physical Layer
B) Data Link Layer
C) Transport Layer
D) Presentation Layer
Correct Answer: B) Data Link Layer
Explanation: The Data Link Layer is responsible for error detection and correction,
ensuring reliable communication over the physical layer.