Skip survey header

CCNA Practice Quiz: 200-301 Quiz 26

Enjoy the following 10 question quiz from TestOut.

1. After configuring a router to ignore the startup configuration when the device boots, what command would you use to tell the device to load the startup configuration upon boot?
2. A network host has an IP address of 137.65.1.2 assigned to it. Given that the network uses the default classful subnet mask, what is the default routing prefix for this address using CIDR subnet mask notation?
3. You have five routers running OSPF on a single subnet. RouterB has been elected as the DR.

You remove RouterB from the network for a hardware upgrade. The next day, you add the router back onto the network. What will happen when you add RouterB back onto the network?
4. You want to change the amount of time it takes for a hello packet to not be received before a router is declared offline. Which setting do you need to change?
5. A SOHO customer finds that their VoIP conversations frequently break up and become unintelligible. This happens most often when one person in the office streams video from the internet.

Which of the following configuration changes on the SOHO router is most likely to improve VoIP performance?
6. A technician is installing a new SOHO wireless router in a home office. The customer wants to secure the wireless network so only a smartphone, tablet, and laptop can connect.

Which of the following router settings should the technician change?
7. Consider the following log message generated by a router:

*00019: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down

What is being used to identify when the message is generated?
8. What happens to the history table and log files when the device loses power?
9. After enabling the DHCP snooping feature, you want to apply it to your network globally. Which command will apply DHCP snooping globally?
10. Heather is performing a penetration test of her client's malware protection. She has developed a malware program that doesn't require any user interaction and wants to see how far it will spread through the network. Which of the following types of malware is she using?
This free quiz was provided by: