CCNA Interview Question Answers

CCNA Interview Questions & Answers

Introduction

Preparing for a CCNA interview requires a solid understanding of networking fundamentals, protocols, and configurations. This guide covers essential CCNA interview questions and answers, providing you with the knowledge needed to succeed. Whether you’re focusing on IP addressing, routing protocols, or wireless technologies, these questions will help you build a strong foundation for your CCNA certification.

1)The network 172.25.0.0 has been divided into sights Which of the following addresses can be assigned to hosts in the third subnet if the ip subnet-zero command is configured on the router

(Choose three)
A. 172.25.78.243

B.172.25.08.16

C. 172.25.72.0

D. 172.25.94.255

Ε. 172.25.96.17

F. 172.25.100.16

2) What is the subnet for the host IP address 172.16.210.0/22?

A. 172.16.42.0

B. 172.16.107.0

C. 172.16.208.0

D. 172.16.252.0

Ε. 172.16.254.0

F. None of the above

3)Which of the following devices support Full Duplex Ethernet? (Choose two)

A.Switch to host.

B.Switch to switch.

C.Hub to hub.

D.Switch to hub.

E.Hub to host.

4)What is the correct order of PDUs in data encapsulation?

A. Data, Frame, Packet, Segment, Bit

B. Data, Frame, Segment, Packet, Bit

C. Data, Packet, Frame, Segment, Bit

D. Data, Packet, Segment, Frame, Bit

E. Data, Segment, Frame, Packet, Bit

F. Data, Segment, Packet, Frame, Bit

5)What are the generic parts of a layer 3 address?

A. An internet network number and a URL.

B. A vendor code and a serial number.

C. A network number and host number.

D. A broadcast number and unicast number.

E. A domain identifier and a device identifier.

6)What is the MTU for Ethernet?

(A) 64

(B) 512

(C) 1,500

(D) 1,518

7)What address mask is associated with the following, 172.240.1.10/22?

(A) 255.255.255.0

(B) 255.255.252.0

(C) 255.255.255.252

(D) 255.255.255.248

8)You have an IP of 156.233.42.56 with a subnet mask of 7 bits. How many hosts and subnets are possible?

A. 126 hosts and 510 subnets

B. 128 subnets and 512 hosts

C. 510 hosts and 126 subnets

D. 512 subnets and 128 hosts

9)Which IP address and wildcard mask would you use in your ACL to block all the hosts in the subnet

192.168.16.43/287

Α. 192.168.16.32 0.0.0.16

B. 192.168.16.43 0.0.0.212

C. 192.168.16.0 0.0.0.15

D. 192.168.16.32 0.0.0.15

Ε. 192.168.16.0 0.0.0.31

F. 192.168.16.16 0.0.0.31

10)The NetMax network is subnetted using 29 bits for the subnet mask. Which wild card mask should be used to configure an extended access list to permit or deny access to an entire subnetwork?

Α. 255.255.255.224

B. 255.255.255.248

C. 0.0.0.224

D. 0.0.0.8

Ε. 0.0.0.7

F. 0.0.0.3

G. None of the above

11)A receiving host on the NetMax network named NetMaxi computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At which OSI layer did this happen?

A. Application

B. Presentation

C. Session

E. Internet

D. Transport

F. Data Link

G. Physical

12)Which one of following commands would you enter to terminate a VTY line session?

A. close

B. disable

C. disconnect

D. suspend

E. exit

F. None of the above

13)Which sequence of actions will allow telnet traffic from a NetMax user's PC to a router using TCP/IP?

A. Connect the PC’s COM port to the router’s console port using a straight-through cable.

B. Connect the PC’s COM port to the router’s console port using a crossover cable.

C. Connect the PC’s COM port to the router’s Ethernet port using a straight-through cable.

D. Connect the PC’s Ethernet port to the router’s Ethernet port using a crossover cable.

E. Connect the PC’s Ethernet port to the router’s Ethernet port using a rollover cable.

G. None of the above

F. Connect the PC’s Ethernet port to the router’s Ethernet port using a straight-through cable.

14)If NVRAM in a NetMax router lacks boot system commands, where does this router look for the Cisco IOS by default?

A. ROM

B. RAM

C. Flash

D. Bootstrap

E. Startup config

F. None of the above

15) What commands are required to enable ipv6 routing on global configuration mode of the Cisco IOS?

A. Routing ipv6 start

B. Routing ipv6 enable

C. ipv6 routing enable

D.ipv6 unicast-routing

E. Start ipv6 routing

16)What is the valid default Link-Local address in the following address?

A. FE80::123:2FF:FE12:0

B. FEBO AA FF FEIGA

C. FE10:0192:112

D.FE20:12:12:12

17)As a CCNA candidate, you must have a firm understanding of the IPv6 address structure. Refer to IP address, could you tell how many bits are included in each file?

A. 24

B. 4

C. 3

D. 16

18)In practical IPv6 application, a technology encapsulates IPv6 packets inside IPv4 packets, this technology is called what? 

A. Tunneling

B.Hashing

C. Routing

D. NAT

19)Internet Protocol version 6 (IPv6) is the next-generation Internet Protocol version designated as the successor to IPv4 because IPv4 address space is being exhausted. Which one is correct?

A. Addresses are not hierarchical and are assigned at random.

B. Broadcasts have been eliminated and replaced with multicasts.

C. There are 2.7 billion available addresses.

D. An interface can only be configured with one IPv6 address.

20)You need to configure a single router into load balancing traffic across 4 unequal cost paths. Which routing protocols can satisfy this requirement? (Select two)

A RIPv2

B. RIPv2

C.IGRP

D. EIGRP

E. OSPF

F.I5-I5

21)Which of the following routing protocols support the use of VLSM (Variable Length Subnet Masking? (Select three)

A. RIPvI

B. EIGRP

C. OSPF

D. IGRP

E. RIPv2

22)Which of the following routing protocols do NOT support VLSM (variable length subnet masking)? (Choose all that apply).

A. RIPv1

B. IGRP

C. EIGRP

D. OSPF

E. 15-15

F. RIPv2

23)Which of the following technologies can be used in distance vector routing protocols to prevent routing loops? (Select two)

A.Spanning Tree Protocol

B. Shortest path first tree

C. Link-state advertisements (LSA)

D. Hold-down timers

E. Split horizon

F.VRP

24)What are the different characteristics of distance vector and link state routing.

A. Distance vector protocols send the entire routing table to directly connected neighbors

B. Distance vector protocols are responsible for sending updates to all networks listed in the routing table.

C. Link state protocols are responsible for sending the entire routing table to the whole network.

D.Link state protocols send updates regarding their own links status to all other routers on the network.

25)Which characteristics are representative of link-state routing protocols? (Choose three)

A. Provides common view of entire topology

B. Utilizes event-triggered updates

C. Exchanges routing tables with neighbors

D. Calculates shortest path

E. Utilizes frequent periodic updates

26)Which of the following statements below best describe the process identifier that is used to run OSPF on a Certkiller router? (Choose two)

A. It is an optional parameter required only if multiple OSPF processes are running on the router.
B.It is locally significant.

C. It is needed to identify a unique instance of an OSPF database.

D. All routers in the same OSPF area must have the same process ID if they are to exchange routing information.

E.It is globally significant.

27)Which one of the following privileged EXEC mode IOS show commands will display the state of the OSPF DR/BDR (designated router/backup designated router) election process?

A.NetMax1 # show ip ospf interface.

B.NetMax1 # show ip ospf priority 

C.NetMax1 show ospf neighbor detaIl

D.NetMax1# show ospf processes

E. NetMax1# show ospf neighbor state

F.None of the above

28)Router NetMax1 is being installed. You wish to add this router to your existing OSPF network. In doing so, you configure the following:

NetMax1 (config)# router ospf 1 

NetMax1 (config-router)# network 10.10.10.0 255.255.255.0

After making this change , you notice that the networks attached to NetMax1 are not being learned  by  the  other OSPF routers. What could be the cause of this?

A. The AS is not correctly configured

B. The network subnet mask is incorrectly configured C. The network wildcard mask is configured incorrectly

D. The network number is not correctly configured

E. The process id is configured incorrectly

F.None of the above

29)Netmax has chosen WPA over WEP in their wireless network. What is one reason why WPA encryption is preferred over WEP in this network?

A. The WPA key values remain the same until the client configuration is changed.

B. The values of WPA keys can change dynamically while the system is used.

C. The access point and the client are manually configured with different WPA key

D. A WPA key is longer and requires more special characters than the WEP key.

E. None of the above

30)You need to troubleshoot an interference issue with the NetMax wireless LAN. Which two devices can interfere with the operation of this network because they operate on similar (Choose two)

A. Microwave oven

B. AM radio

C. Toaster

D. Copier

E. Cordless phone

F. IP phone

G. I-pod

31)A new NetMax is using an IEEE 802.11b a wireless LAN. What is the maximum data rate.

A.11Mbps

B. 100Mbps

C. 54 Mbps

D. 10Mbps

E. 1000 Mbps

F. 16Mbps

32)Which IEEE standard is used to define Wi-Fi?

A.IEEE 802.2

B.IEEE 802.5

C.IEEE802.11h

D.IEEE802.c

E.IEEE 802.11

33)You need to determine the proper security settings on a new NetMax WLAN-capable office. Which encryption type would WPA2 use in this office?

A. PSK

B. AES-CCMP

C. PPK via IV

D. TKIP/MIC

E. None of the above

34)How many usable IP addresses can you get from a conventional Class C address?

A.128
B. 192
C. 254
D. 256
E. 510

35).On the topic of VISM, which one of the following statements best describes the concept of the route aggregation?

A. Deleting unusable addresses through the creation of many subnets.
B. Combining routes to multiple networks into one supernet.
C. Reclaiming unused space by means of changing the subnet size.
D. Calculating the available host addresses in the AS.
E. None of the above

36). A new PC is installed on the LAN of the NetMax Router as shown above. This PC is unable to connect to Server NetMax located on the Ethernet 0/1 network. What is the cause of this?

A. IP address of the Ethernet 0/0 router interface is wrong
B. Server is using an invalid IP address
C. Workstation default gateway is set incorrectly
D. Workstation subnet mask is incorrect
E. Workstation IP address is invalid
F. None of the above

37)Which IP address and wildcard mask would you use in your ACL to block all the hosts in the subnet 192.168.16.43/28?

A. 192.168.16.32 0.0.0.16

B. 192.168.16.43 0.0.0.212

C. 192.168.16.00.00.15

D. 192.168 16.32.0.0.0.15

E 192.168.16.0.0.0.0.31

F.192.168.16.16 0.0.0.31

38)The NetMax network is subnetted using 29 bits for the subnet mask. Which wildcard mask should be used to configure an extended access list to permit or deny access to an entire subnetwork?

A. 255.255.255.224

B. 255.255.255.248

C. 0.0.0.224

D. 0.0.0.8

E.0.0.0.7

F.0.0.0.3

39)A receiving host ON the NETMAX network named NetMax1 computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At which OSI layer did this happen?

A. Application

B. Presentation

C. Session

D. Transport

E. Internet

F. Data Link

G. Physical

40)Two NetMax workers have established wireless communication directly between their wireless laptops. What type of topology has created by these NetMax employees?

A. ESS

B. IBSS

C. SSID

D. BSS

E. None of these

37)Which IP address and wildcard mask would you use in your ACL to block all the hosts in the subnet 192.168.16.43/28?

A. 192.168.16.32 0.0.0.16

B. 192.168.16.43 0.0.0.212

C. 192.168.16.00.00.15

D. 192.168 16.32.0.0.0.15

E 192.168.16.0.0.0.0.31

F.192.168.16.16 0.0.0.31

38)The NetMax network is subnetted using 29 bits for the subnet mask. Which wildcard mask should be used to configure an extended access list to permit or deny access to an entire subnetwork?

A. 255.255.255.224

B. 255.255.255.248

C. 0.0.0.224

D. 0.0.0.8

E.0.0.0.7

F.0.0.0.3

Match your answers for the questions:

  1. A. 172.25.78.243
    D. 172.25.94.255
    E. 172.25.96.17
  2. C. 172.16.208.0
  3.  A. Switch to host
    B. Switch to switch
  4.  F. Data, Segment, Packet, Frame, Bit
  5.  C. A network number and host number
  6.  C. 1,500
  7.  B. 255.255.252.0
  8.  C. 510 hosts and 126 subnets
  9.  D. 192.168.16.32 0.0.0.15
  10.  E. 0.0.0.7
  11.  F. Data Link
  12.  E. exit
  13.  F. Connect the PC’s Ethernet port to the router’s Ethernet port using a straight-through cable
  14.  C. Flash
  15.  D. ipv6 unicast-routing
  16.  A. FE80::123:2FF:FE12:0
  17.  D. 16
  18.  A. Tunneling
  19.  B. Broadcasts have been eliminated and replaced with multicasts
  20.  A. RIPv2
    D. EIGRP
  21.  B. EIGRP
    C. OSPF
    E. RIPv2
  22.  A. RIPv1
    B. IGRP
  23.  D. Hold-down timers
    E. Split horizon
  24. A. Distance vector protocols send the entire routing table to directly connected neighbors
    D. Link state protocols send updates regarding their own links status to all other routers on the network
  25.  A. Provides common view of entire topology
    B. Utilizes event-triggered updates
    D. Calculates shortest path
  26.  B. It is locally significant
    C. It is needed to identify a unique instance of an OSPF database
  27.  A. NetMax1 # show ip ospf interface
  28.  C. The network wildcard mask is configured incorrectly
  29.  B. The values of WPA keys can change dynamically while the system is used
  30.  A. Microwave oven
    E. Cordless phone
  31.  A. 11 Mbps
  32.  E. IEEE 802.11
  33.  B. AES-CCMP
  34.  C. 254
  35.  B. Combining routes to multiple networks into one supernet
  36.  C. Workstation default gateway is set incorrectly
  37.  D. 192.168.16.32 0.0.0.15
  38.  E. 0.0.0.7
  39.  F. Data Link
  40.  B. IBSS

Conclusion

The questions and answers provided above cover essential topics that are crucial for anyone preparing for a CCNA interview. Mastering these concepts will not only help you succeed in interviews but also strengthen your networking knowledge. If you’re looking to enhance your skills further and gain Cisco certification, consider enrolling in the CCNA course at NetMax Technology Institute, a Cisco-certified institution that offers comprehensive training to help you excel in your networking career.