CCNA Sample Test Questions
Home | CCNA Exam Notes | CCNA Practice Test Providers | CCNA Sample Test Questions | CCNA FAQ
Question 1: Which layer of the OSI model is responsible for routing and logical addressing?
- A. Data Link
- B. Network
- C. Transport
- D. Application
Answer: B. Network
Explanation: The Network layer (Layer 3) of the OSI model is responsible for logical addressing and routing. It deals with the logical addressing of devices (IP addresses) and determines the best path for data to travel from the source to the destination.
Question 2: What is the purpose of the ARP (Address Resolution Protocol)?
- A. To resolve logical addresses to physical addresses
- B. To resolve physical addresses to logical addresses
- C. To establish secure communication
- D. To encrypt data packets
Answer: B. To resolve physical addresses to logical addresses
Explanation: The Address Resolution Protocol (ARP) is used to map a known IP address to a corresponding MAC (Media Access Control) address on a local network.
Question 3: Which subnet mask is used for Class B private IP addresses?
- A. 255.255.255.0
- B. 255.0.0.0
- C. 255.255.0.0
- D. 255.0.255.0
Answer: C. 255.255.0.0
Explanation: Class B private IP addresses use a subnet mask of 255.255.0.0. This allows for a large number of host addresses within a private network.
Question 4: What is the purpose of the DNS (Domain Name System)?
- A. To map IP addresses to domain names
- B. To map domain names to IP addresses
- C. To secure network traffic
- D. To manage network devices
Answer: B. To map domain names to IP addresses
Explanation: The Domain Name System (DNS) is used to translate human-readable domain names into IP addresses. It enables users to access websites and other resources using easily memorable names.
Question 5: Which transport layer protocol provides connection-oriented and reliable communication?
- A. TCP
- B. UDP
- C. ICMP
- D. SNMP
Answer: A. TCP
Explanation: TCP (Transmission Control Protocol) is a connection-oriented and reliable transport layer protocol. It establishes a connection before data transfer and ensures the reliable delivery of data.
Question 6: What is the default subnet mask for a Class C IP address?
- A. 255.255.255.0
- B. 255.255.0.0
- C. 255.0.0.0
- D. 255.255.255.255
Answer: A. 255.255.255.0
Explanation: A Class C IP address uses a default subnet mask of 255.255.255.0. This allows for up to 254 hosts in a network.
Question 7: Which command is used to display the IP configuration of a Windows device?
- A. ipconfig
- B. ifconfig
- C. netstat
- D. ping
Answer: A. ipconfig
Explanation: The "ipconfig" command in Windows is used to display the IP configuration of a device, including its IP address, subnet mask, and default gateway.
Question 8: What is the purpose of the ICMP protocol?
- A. To provide secure communication
- B. To manage network devices
- C. To troubleshoot network connectivity
- D. To encrypt data packets
Answer: C. To troubleshoot network connectivity
Explanation: The Internet Control Message Protocol (ICMP) is used for network troubleshooting. It includes tools like "ping" and "traceroute" to test connectivity and identify issues in a network.
Question 9: Which device operates at the Data Link layer of the OSI model?
- A. Router
- B. Switch
- C. Hub
- D. Bridge
Answer: B. Switch
Explanation: A switch operates at the Data Link layer (Layer 2) of the OSI model. It uses MAC addresses to forward data within a local network.
Question 10: What is the primary purpose of a router in a network?
- A. To connect devices within the same local network
- B. To connect multiple local networks
- C. To amplify network signals
- D. To manage network traffic
Answer: B. To connect multiple local networks
Explanation: A router connects multiple local networks and directs traffic between them. It makes decisions based on logical addresses (IP addresses) and helps route data between different networks.
Question 11: Which routing protocol uses DUAL (Diffusing Update Algorithm) to calculate the shortest path?
- A. RIP
- B. OSPF
- C. EIGRP
- D. BGP
Answer: C. EIGRP
Explanation: EIGRP (Enhanced Interior Gateway Routing Protocol) uses the Diffusing Update Algorithm (DUAL) to calculate the shortest path to a destination. DUAL ensures loop-free paths and quick convergence in the network.
Question 12: In a TCP three-way handshake, what is the purpose of the SYN-ACK packet?
- A. Initiates the connection
- B. Acknowledges the receipt of the SYN packet
- C. Confirms the termination of the connection
- D. Carries data from the sender
Answer: B. Acknowledges the receipt of the SYN packet
Explanation: In a TCP three-way handshake, the SYN-ACK packet is sent by the server to acknowledge the receipt of the SYN packet from the client and to simultaneously initiate its own connection request.
Question 13: Which of the following subnetting techniques allows for the creation of the maximum number of subnets?
- A. Variable Length Subnet Masking (VLSM)
- B. Classful Subnetting
- C. Binary Coded Decimal (BCD) Subnetting
- D. Supernetting
Answer: A. Variable Length Subnet Masking (VLSM)
Explanation: VLSM allows for the creation of subnets with different sizes within the same network, maximizing the use of IP address space and providing flexibility in subnet design.
Question 14: What is the purpose of the TCP window size in a data transmission?
- A. To specify the maximum packet size
- B. To control the rate of data flow
- C. To determine the number of packets to be transmitted
- D. To set the maximum allowable latency
Answer: B. To control the rate of data flow
Explanation: The TCP window size represents the amount of data that can be sent before receiving an acknowledgment. It helps control the rate of data flow and optimize the efficiency of data transmission.
Question 15: Which security protocol operates at the Application layer of the OSI model and provides secure communication over a network?
- A. IPsec
- B. SSH
- C. TLS
- D. SNMP
Answer: C. TLS
Explanation: Transport Layer Security (TLS) operates at the Application layer and provides secure communication over a network. It is commonly used in securing web traffic (HTTPS) and other applications.
Question 16: In a switched Ethernet network, what is the purpose of the Spanning Tree Protocol (STP)?
- A. Load balancing
- B. Collision detection
- C. Loop prevention
- D. VLAN segmentation
Answer: C. Loop prevention
Explanation: Spanning Tree Protocol (STP) is used to prevent loops in a switched network by blocking redundant paths. It ensures a loop-free topology, preventing broadcast storms.
Question 17: Which IPv6 address type is used for communication between nodes on the same network segment?
- A. Link-Local
- B. Global Unicast
- C. Multicast
- D. Anycast
Answer: A. Link-Local
Explanation: Link-Local addresses are used for communication between nodes on the same network segment. They are automatically assigned and are not routable beyond the local network.
Question 18: What is the primary function of a DHCP (Dynamic Host Configuration Protocol) server in a network?
- A. Assigning static IP addresses
- B. Resolving domain names to IP addresses
- C. Dynamically assigning IP addresses to devices
- D. Encrypting data during transmission
Answer: C. Dynamically assigning IP addresses to devices
Explanation: DHCP servers dynamically assign IP addresses to devices in a network, simplifying the management of IP addresses and configuration settings.
Question 19: Which network topology provides the highest level of fault tolerance and redundancy?
- A. Bus
- B. Star
- C. Ring
- D. Mesh
Answer: D. Mesh
Explanation: Mesh topology provides the highest level of fault tolerance and redundancy because each node is connected to every other node, ensuring multiple paths for data transmission.
Question 20: What is the purpose of the Access Control List (ACL) in networking?
- A. Routing decisions
- B. Load balancing
- C. Filtering network traffic
- D. Dynamic IP assignment
Answer: C. Filtering network traffic
Explanation: Access Control Lists (ACLs) are used to filter network traffic based on specified criteria, controlling which packets are allowed or denied through a router or firewall.