Time limit: 0
Quiz-summary
0 of 22 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
Information
Good luck!
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 22 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- Answered
- Review
-
Question 1 of 22
1. Question
Which PPP subprotocol negotiates authentication options?Correct
Incorrect
-
Question 2 of 22
2. Question
Which two statements describe characteristics of IPv6 unicast addressing? (Choose two.)Correct
Incorrect
-
Question 3 of 22
3. Question
While troubleshooting a DHCP client that is behaving erratically, you discover that the client has been assigned the same IP address as a printer that is a staticIP address. Which option is the best way to resolve the problem?Correct
Incorrect
-
Question 4 of 22
4. Question
Under which circumstance is a router on a stick most appropriate?Correct
Incorrect
-
Question 5 of 22
5. Question
Refer to the exhibit. Given the output from the show ip eigrp topology command, which router is the feasible successor?Correct
Incorrect
-
Question 6 of 22
6. Question
Which symptom can cause duplex mismatch problem?Correct
Incorrect
-
Question 7 of 22
7. Question
Which of the port is not part of STP protocol.Correct
Incorrect
-
Question 8 of 22
8. Question
which port security violation mode allows traffic from valid mac address to pass but block traffic from invalid mac address?Correct
Incorrect
-
Question 9 of 22
9. Question
Which type of routing protocol operates by exchanging the entire routing information ?Correct
Incorrect
-
Question 10 of 22
10. Question
Which IPsec security protocol should be used when confidentiality is required?Correct
Incorrect
-
Question 11 of 22
11. Question
Which IPv6 routing protocol uses multicast group FF02::9 to send updates?Correct
Incorrect
-
Question 12 of 22
12. Question
Which definition of a host route is true?Correct
Incorrect
-
Question 13 of 22
13. Question
Which statement about upgrading a cisco IOS device with TFTP server?Correct
Incorrect
-
Question 14 of 22
14. Question
Which statement about DHCP snooping is true?Correct
Incorrect
-
Question 15 of 22
15. Question
Which three commands are required to enable NTP authentication on a Cisco router? (Choose three)Correct
Incorrect
-
Question 16 of 22
16. Question
Which functionality does an SVI provide?Correct
Incorrect
-
Question 17 of 22
17. Question
Which three statements about IPv6 address fd14:920b:f83d:4079::/64 are true? (Choose three)Correct
Incorrect
-
Question 18 of 22
18. Question
Which type of cable must you use to connect two device with mdi interfaces?Correct
Incorrect
-
Question 19 of 22
19. Question
Which of the following is true about spanning-tree root-bridge electionCorrect
Incorrect
-
Question 20 of 22
20. Question
How is MPLS implemented (like this):Correct
Incorrect
-
Question 21 of 22
21. Question
Question about HTTP API:Correct
Incorrect
-
Question 22 of 22
22. Question
What two state that lacp forwarding (something like this)Correct
Incorrect