Skip survey header

CCNA Practice Quiz: 200-301 Quiz 28

Enjoy the following 10 question quiz from TestOut.

1. The default amount of time that a device will hold information about its neighbors using LLDP is 120 seconds. Which of the following command allows you to change the value? *This question is required.
2. Which of the following describes the function of a dedicated wireless access point on a network? *This question is required.
3. You are designing a routing solution for your organization. You want to improve routing efficiency by ensuring that routers save frequently used data link headers to encapsulate packets.

Which types of routing logic could you implement? (Choose two)
*This question is required.
4. You are currently using EIGRP on your network. Which of the following would you gain by switching to OSPF? (Choose two) *This question is required.
5. You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? (Choose two) *This question is required.
6. Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network.

One day, you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?
*This question is required.
7. You check the time on a router and find that it is behind by several minutes. To fix this issue, you decide to configure NTP on the router to get time from a Stratum 2 time provider on the internet with a hostname of

Which command should you use?
*This question is required.
8. Which SNMP component monitors individual network devices? *This question is required.
9. Which of the following parts of the Trojan horse packet installs the malicious code onto the target machine? *This question is required.
10. Heather wants to gain remote access to Randy's machine. She has developed a program and hidden it inside a legitimate program that she is sure Randy will install on his machine. Which of the following types of malware is she using? *This question is required.
This free quiz was provided by: