Skip survey header

CCNA Practice Quiz: 200-301 Quiz 29

Enjoy the following 10 question quiz from TestOut.

1. You have two subnets on your private network, one with a 20-bit mask, and another with a 22-bit mask. How many available host addresses are there on each subnet? (Choose two) *This question is required.
2. Which of the following allow you to disable automatic summarization? (Choose two) *This question is required.
3. During which state in the OSPF communication process are link-state databases exchanged? *This question is required.
4. Which of the following describes a Type 2 LSA? *This question is required.
5. You have configured a wireless access point to create a small network. You have configured all necessary parameters. Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect.

What should you do?
*This question is required.
6. You are designing an update to your client's wireless network. The existing wireless network uses 802.11b equipment, which your client complains runs too slowly. She wants to upgrade the network to run up to 600 Mbps.

Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless network boards in her users' workstations. She has also indicated that the system must continue to function during the transition period.

Which 802.11 standard will work best in this situation?
*This question is required.
7. You are configuring ACLs on a router, and you want to deny traffic being sent to the 10.10.16.0/21 network. Which wildcard mask should you use with the access-list statement? *This question is required.
8. Which method is used by the SNMP manager when it contacts an SNMP agent and requests information about a monitored network device? *This question is required.
9. Which of the following malware types shows the user signs of potential harm that could occur if the user doesn't take a certain action? *This question is required.
10. Rudy is analyzing a piece of malware discovered in a penetration test. He has taken a snapshot of the test system and will run the malware. He will take a snapshot afterward and monitor different components, such as ports, processes, and event logs, and note changes.

Which of the following processes is he using?
*This question is required.
This free quiz was provided by: