Home

WAN 1000+ MCQ with answer for IBPS RRB

Thursday 9th of March 2023

Sharing is caring

1. EIGRP generates hellos every _________ seconds on LAN segments.
A. 5
B. 10
C. 15
D. 30
Answer : A
2. Which of the following is the most expensive type of WAN connection?
A. Dedicated circuit connection
B. Circuit-switched connection
C. Packet-switched connection
D.
Answer : A
3. When using debug with PAP, which of the following message types might you see?
A. AUTH-ACK
B. SUCCESS
C. CHALLENGE
D. None of these
Answer : A
4. You are at User EXEC mode and type the letter e. What message appears?
A. % Incomplete command.
B. % Ambiguous command:
C. % Unknown command or computer name
D. % Invalid input detected at '^'.
Answer : B
5. Cisco routers generate LMI enquiries every _______ seconds and a full status update every _________ seconds.
A. 10, 60
B. 10, 6
C. 60, 300
D. 15, 60
Answer : C
6. The root switch is the one elected with the __________ __________.
A. Lowest MAC address
B. Highest MAC address
C. Lowest switch ID
D. Highest switch ID
Answer : C
7. Which of the following is true concerning full-duplexing?
A. It can either send or receive frames, but not both simultaneously.
B. It can be used with hubs.
C. It can be used with 10Base5 cabling.
D. It uses point-to-point connections.
Answer : D
8. EIGRP uses the _________ algorithm to update its routing table.
A. Bellman-Ford
B. Dijkstra
C. DUAL
D. Integrated
Answer : C
9. Which controller command specifies how ones and zeros are represented on a digital circuit?
A. framing
B. linecode
C. clock source
D. interface
Answer : B
10. You are given a class C network, 192.168.1.0/24. You need one network with 120 hosts and three networks with 60 hosts. What subnet mask values would you use?
A. 255.255.255.128 and 255.255.255.192
B. 255.255.255.128
C. 255.255.255.192
D. None of these
Answer : D
11. Which would you use to move your cursor back one word?
A. ESC-B
B. esc-p
C. ctrl-b
D. ctrl-p
Answer : A
12. What would you use to prevent a packet from traveling around a routing loop forever?
A. Split horizon
B. Poison reverse
C. Hold-down timer
D. TTL
Answer : D
13. When examining the IP routing table, an EIGRP route will be shown as what letter?
A. I
B. E
C. O
D. D
Answer : D
14. Which of the following is true concerning RIPv2?
A. It uses triggered updates.
B. It uses broadcasts.
C. It is classful.
D. It doesn't support route summarization
Answer : A
15. You are given a class C network, 192.168.1.0/24. You need three networks with 60 hosts and two networks with 30 hosts. What are the subnet mask values you could use?
A. 255.255.255.128 and 255.255.255.192
B. 255.255.255.224 and 255.255.255.240
C. 255.255.255.192 and 255.255.255.224
D. None of these
Answer : A
16. RIP has a maximum hop count of ____________ hops.
A. 10
B. 15
C. 16
D. 100
Answer : B
17. A ___________ is basically all of the components, hardware and software, involved
in connecting computers across small and large distances.

A. LAN
B. WAN
C. Network
D. SAN
Answer : C
18. With a crossover cable, which pins are crossed over?
A. 1 and 2, 3 and 6
B. 1 and 3, 2 and 6
C. 1 and 4, 2 and 6
D. 1 and 3, 4 and 6
Answer : B
19. The _________ is your network equipment, which includes the DCE (e.g., a modem) and the DTE (e.g., a router).
A. Demarcation point
B. Carrier switch
C. Local loop
D. CPE
Answer : D
20. You have a total of five routers. ________ circuits are required to fully mesh the network, where every router needs ___________ interfaces.
A. 5, 5
B. 8, 4
C. 10, 5
D. 10, 4
Answer : D
21. Which of the following commands belongs on the physical interface when using dialer profiles?
A. dialer pool-member
B. dialer-group
C. ip address
D. dialer string
Answer : A
22. You are given a Class C network with 25 bits of networking. How many subnets do you have?
A. 1
B. 2
C. 3
D. 4
Answer : B
23. How many steps do LCP and NCP go through when setting up a connection?
A. 1
B. 2
C. 3
D. 4
Answer : C
24. __________ states that if a neighboring router sends a route to a router, the receiving router will not propagate this route back to the advertising router on the same interface.
A. Split horizon
B. Poison reverse
C. Hold-down timer
D. Hop count limit
Answer : A
25. You are given a Class C network with a subnet mask of 255.255.255.248. How many host addresses are there on each subnet?
A. 4
B. 6
C. 8
D. 14
Answer : B
26. The _________ reference point defines the connection between the NT2 and the NT1.
A. P
B. Q
C. R
D. T
Answer : D
27. During the learning function, the switch places addresses and ports in a(n) _________ table.
A. IP address
B. learning
C. CAM
D. memory
Answer : C
28. Extended IP ACLs should be placed as close to the ____________ device as possible.
A. Source
B. Destination
C.
D.
Answer : A
29. If you wanted a list of parameters for the show command, you would type ________.
A. LOOK
B. VIEW
C. SHOW
D.
Answer : C
30. Distance vector protocols use ___________ to disseminate routing information.
A. Unicast
B. Multicast
C. Broadcast
D.
Answer : C
31. Which router command clears all of the static translations in the address translation table?
A. erase ip nat translation *
B. clear ip nat translation *
C. clear ip nat translation all
D. None of these commands
Answer : D
32. 191.75.39.24 is a Class __________ address.
A. A
B. B
C. C
D. None of the above
Answer : B
33. _________ describe(s) users that can connect to a network from any location.
A. SOHO
B. Branch office
C. Mobile users
D. Corporate office
Answer : C
34. A ___________ in a bit position of a wildcard mask means that the same bit position in the condition address must match the same bit position in the wildcard mask in order to execute the ACL's action.
A. 0
B. 1
C. 10
D. 11
Answer : A
35. If the port status LED on a 2950 is ________, there is a physical layer connection problem.
A. Flashing green and amber
B. Flashing green
C. Amber
D. Flashing amber
Answer : A
36. Which router command would you use to test only layer-3 connectivity?
A. telnet
B. show cdp traffic
C. show interfaces
D. traceroute
Answer : D
37. Which router command specifies the ISDN switch the router is connected to?
A. isdn switch-type
B. isdn connection-type
C. isdn spid1
D. interface serial0:15
Answer : A
38. A 1924 has _________ Ethernet interfaces.
A. 24
B. 26
C. 27
D. 28
Answer : C
39. Which command defines interesting traffic?
A. dialer-group
B. dialer-list
C. dialer map
D. dialer remote-name
Answer : B
40. _________ has a physical star topology but a logical ring topology.
A. FDDI
B. Token Ring
C. Ethernet
D. FDDI and Token Ring
Answer : B
41. When configuring your terminal emulation software for a console connection, set the flow control to __________.
A. Hardware
B. Software
C. None
D.
Answer : C
42. You are given this address space: 172.16.5.0/25. You need one network with 64 hosts and two with 30 hosts. What are the most specific subnet mask values to use?
A. /25 and /26
B. /26 and /27
C. /27 and /28
D. None of these
Answer : D
43. A _________ provides a high-speed infrastructure to move data between storage devices and file servers.
A. SAN
B. LAN
C. CN
D. SAN and CN
Answer : A
44. You are in Interface Subconfiguration mode and want to completely return to Privilege EXEC mode. What would you enter? (Choose all correct answers.)
A. CTRL-Z
B. end
C. exit
D. logout
Answer : A
45. Which type of traffic is not flooded?
A. Multicast
B. Known unicast
C. Broadcast
D. Unknown unicast
Answer : B
46. A ________ topology describes how devices communicate with each other.
A. Physical
B. Logical
C.
D.
Answer : B
47. When connecting a switch to a router, use a ___________ cable.
A. Crossover
B. Straight-through
C. Rollover
D.
Answer : B
48. If you enter a command in either User EXEC mode or Privilege EXEC mode that the IOS does not recognize, the switch or router
A. Logs you out
B. Tries to resolve the command to an IP address
C. Executes the closest command that it can find in its command set
D. Makes a "beep" sound
Answer : B
49. A _________ is used to connect networking devices that are in a very close geographic area, such as a floor of a building, a building itself, or a campus environment.
A. WAN
B. LAN
C. MAN
D. LAN and MAN
Answer : B
50. VLSM allows you to summarize __________ back to the class boundary.
A. Subnets
B. Networks
C.
D.
Answer : A

Sharing is caring