Unlock hundreds more features
Save your Quiz to the Dashboard
View and Export Results
Use AI to Create Quizzes and Analyse Results

Sign inSign in with Facebook
Sign inSign in with Google

Free CCENT Practice Exam Quiz

Think you can ace a TCP/IP protocols quiz? Dive in and prove it!

Difficulty: Moderate
2-5mins
Learning OutcomesCheat Sheet
Paper art illustration for CCENT practice quiz on sky blue background showing TCP IP OSI model routing icons and challenge

Ready to ace your CCENT certification? Dive into our CCENT practice exam, a dynamic TCP/IP protocols quiz meets OSI model practice test that sharpens your networking foundation. Whether you're hunting for CCENT exam questions free or aiming for the CCENT practice certification, this quiz challenges you on routing essentials, IP addressing, and even asks you which three statements characterize UDP - choose three to prove your mastery! Along the way, access a comprehensive study guide for your practice resources and boost your confidence with an extra quiz . Jump in now to test your limits and take a significant step towards CCENT success!

Which OSI model layer is responsible for reliable end-to-end delivery and error recovery?
Session
Data Link
Network
Transport
The Transport layer (Layer 4) is responsible for end-to-end communication, flow control, and error recovery between hosts. It ensures reliable data transfer through mechanisms like acknowledgments and retransmissions. Protocols such as TCP operate at this layer to provide guaranteed delivery. Reference
Which protocol provides connectionless communication and is used for applications requiring minimal overhead?
FTP
SSH
TCP
UDP
UDP is connectionless and does not establish a session before sending data, reducing latency. It is suitable for applications like streaming and DNS queries. UDP does not guarantee delivery or order. Reference
What is the default gateway used for in an IP network?
To resolve MAC addresses
To route traffic to other networks
To encrypt data
To assign IP addresses
A default gateway is a router that sends packets from the local subnet to other networks or the internet. Devices use it when the destination IP is not in the local address range. Without it, inter-network communication would not occur. Reference
Which IP address range is used by APIPA when DHCP fails?
192.168.0.0/16
10.0.0.0/8
169.254.0.0/16
172.16.0.0/12
APIPA (Automatic Private IP Addressing) assigns addresses in the 169.254.0.0/16 range when DHCP is unavailable. This allows local-only network communication. APIPA cannot route beyond the local segment. Reference
What does the IP address 127.0.0.1 represent?
Multicast address
Network broadcast
Loopback address
Default gateway
127.0.0.1 is the loopback address used by a host to refer to itself. It is used for testing network software and connectivity locally. Packets sent to this address never leave the host. Reference
Which well-known port number does HTTP use by default?
25
443
80
21
HTTP uses TCP port 80 by default for unencrypted web traffic. This port is recognized globally for web servers. Port 443 is used for HTTPS (encrypted HTTP). Reference
At which OSI layer does ARP operate?
Data Link
Network
Physical
Transport
ARP (Address Resolution Protocol) resolves IPv4 addresses to MAC addresses and operates at the Data Link layer. It encapsulates requests in Ethernet frames for physical delivery. ARP responses provide MAC information for local network communication. Reference
What function does a switch perform in a network?
Translate domain names
Forward frames based on MAC addresses
Assign IP addresses
Encrypt data
A switch examines incoming frames and forwards them to the appropriate port based on MAC address table entries. This reduces collisions and confines traffic to the correct segments. Switches operate at the Data Link layer. Reference
Which type of address is used to send a packet to all hosts in a subnet?
Anycast address
Multicast address
Broadcast address
Unicast address
A broadcast address reaches all hosts in the local subnet. For IPv4 /24, .255 is the broadcast. Multicast goes to a group, unicast to one host. Broadcast traffic is limited to the local network. Reference
How many bits are in a MAC address?
64 bits
48 bits
32 bits
128 bits
MAC addresses are 48 bits long, typically displayed as six groups of two hexadecimal digits. They uniquely identify network interfaces at the Data Link layer. The first 24 bits represent the vendor OUI and the last 24 bits the device. Reference
What is the minimum IPv4 header length in bytes?
8 bytes
20 bytes
24 bytes
32 bytes
The IPv4 header has a minimum length of 20 bytes without options. Options can increase this length in 4-byte increments. The header includes fields like version, IHL, total length, and checksum. Reference
At which OSI layer do routers primarily operate?
Session
Data Link
Transport
Network
Routers operate at the Network layer (Layer 3), forwarding packets based on IP addresses. They determine the best path for traffic between networks. Switching decisions use MAC addresses at Layer 2. Reference
Which protocol is primarily used to resolve domain names to IP addresses?
DHCP
DNS
HTTP
ARP
DNS (Domain Name System) translates human-readable domain names into IP addresses. DNS queries typically use UDP port 53. Clients cache DNS results to reduce lookup times. Reference
Which protocol uses ICMP for network diagnostics like echo requests?
Ping
SNMP
Traceroute
Telnet
Ping uses ICMP echo request and echo reply messages for reachability tests. It helps verify if a host is reachable across a network. ICMP operates at the Network layer. Reference
In the network 192.168.1.0/24, what is the broadcast address?
192.168.1.1
192.168.1.0
192.168.1.254
192.168.1.255
For a /24 network, the broadcast address sets all host bits to 1, resulting in .255. The network address is .0 and usable hosts range from .1 to .254. Broadcast traffic goes to all devices on that subnet. Reference
What does DHCP provide to hosts on a network?
IP address and network configuration
ARP entries
VLAN membership
MAC address assignments
DHCP (Dynamic Host Configuration Protocol) assigns IP addresses, subnet masks, default gateway, and DNS servers to clients automatically. It minimizes manual configuration. Leases ensure address reuse. Reference
What is the subnet mask for a /25 network?
255.255.255.128
255.255.255.192
255.255.255.0
255.255.254.0
A /25 prefix uses 25 bits for the network and 7 for hosts, which corresponds to 255.255.255.128. This allows 126 usable host addresses. The binary mask is 11111111.11111111.11111111.10000000. Reference
What does VLSM enable in IP addressing?
Automatic IP assignment
Variable subnet sizes within a network
Default routing
Address resolution
VLSM (Variable Length Subnet Masking) allows different subnets to use different mask lengths, optimizing address allocation. It prevents wasted IP space by matching subnet size to need. VLSM is essential in modern network design. Reference
Which type of NAT creates a one-to-one mapping between local and global addresses?
Dynamic NAT
NAT64
PAT
Static NAT
Static NAT maps a specific internal IP to a fixed external IP address, maintaining a one-to-one relationship. It is used for servers that need consistent addressing. Dynamic NAT, in contrast, uses a pool of addresses. Reference
What is the main purpose of a VLAN?
Encrypt network traffic
Assign IP addresses
Segment a switch into multiple broadcast domains
Route between networks
VLANs (Virtual LANs) divide a physical switch into multiple logical broadcast domains, isolating traffic. This improves security and reduces congestion. VLANs operate at Layer 2 of the OSI model. Reference
What protocol prevents switching loops in a network with redundant links?
BGP
RIP
EIGRP
Spanning Tree Protocol
STP (Spanning Tree Protocol) disables redundant paths to prevent loops at Layer 2. It elects a root bridge and blocks redundant ports. This ensures a loop-free topology. Reference
Which Cisco IOS command enters global configuration mode?
configure terminal
show running-config
interface gigabitEthernet0/0
enable
The 'configure terminal' command in privileged EXEC mode enters global configuration mode on Cisco devices. This allows configuration of interfaces and routing protocols. 'enable' only enters privileged mode. Reference
Which command displays the ARP table on a Cisco router?
show arp
show mac address-table
show ip route
show ip interface brief
The 'show arp' command lists IPv4-to-MAC address mappings on Cisco routers. It helps troubleshoot local network connectivity issues. Switches use 'show mac address-table' instead. Reference
Which command shows the routing table on a Cisco router?
show protocols
show iparp
show ip route
show cdp neighbor
'show ip route' displays all known routes, their sources, and administrative distances on Cisco routers. It is essential for verifying routing configuration. Other show commands list different information. Reference
Which routing protocol uses cost based on bandwidth as its metric by default?
OSPF
BGP
EIGRP
RIPv2
OSPF uses cost as its metric, which is inversely proportional to the bandwidth of interfaces. Higher bandwidth interfaces have lower costs. Cost helps OSPF choose optimal paths in an area. Reference
What functionality does HSRP provide?
Layer 2 trunking
Dynamic IP addressing
Gateway redundancy for default route
Physical link aggregation
HSRP (Hot Standby Router Protocol) provides high network availability by allowing multiple routers to share a virtual IP and MAC address. One router is active while others are standby. If the active fails, a standby takes over. Reference
Which prefix identifies an IPv6 link-local address?
2001::/16
FE80::/10
FF00::/8
FC00::/7
IPv6 link-local addresses start with FE80::/10 and are used for local network segment communication. They are not routable beyond the link. SLAAC uses link-local addresses for address autoconfiguration. Reference
What is the OSI PDU name at the Network layer?
Segment
Packet
Frame
Bit
At the Network layer (Layer 3), data units are called packets. Frames are Data Link PDUs, and segments are Transport PDUs. Packets include fields like source and destination IP. Reference
Which sequence correctly describes the TCP three-way handshake?
SYN, SYN-ACK, ACK
ACK, SYN-ACK, SYN
SYN-ACK, SYN, ACK
ACK, SYN, SYN-ACK
TCP uses a three-way handshake: the client sends SYN, the server replies SYN-ACK, and the client responds with ACK. This establishes a reliable session before data transfer. It ensures both sides are ready. Reference
Which well-known port number does SSH use?
21
22
23
25
SSH uses TCP port 22 for secure shell sessions. It encrypts data for secure remote management. Telnet uses port 23 and is unencrypted. Reference
What metric does EIGRP use by default to select the best path?
Reliability
Bandwidth and delay
Hop count
Load
EIGRP uses a composite metric including bandwidth and delay by default. It can also consider reliability and load if configured. Bandwidth and delay have the highest weight in route selection. Reference
What is the default administrative distance of OSPF routes?
1
90
120
110
OSPF has a default administrative distance of 110, which determines its trustworthiness compared to other routing protocols. Lower AD values are preferred. EIGRP internal routes use AD 90, RIP uses AD 120. Reference
How many usable host IP addresses are available in a /23 network?
512
1022
254
510
A /23 mask uses 23 bits for network and 9 bits for hosts, yielding 2^9 = 512 addresses. Subtracting network and broadcast addresses leaves 510 usable hosts. This doubles the capacity of a /24. Reference
What is route summarization used for in routing protocols?
Reduce size of routing tables
Prevent route loops
Authenticate routing updates
Increase convergence time
Route summarization aggregates multiple contiguous networks into a single route advertisement, reducing routing table entries. It improves scalability and reduces bandwidth for updates. Summaries can also enhance stability. Reference
Which ACL entry permits only Telnet traffic to a server at 192.168.1.10?
access-list 10 permit tcp any any eq 23
access-list 10 permit udp any host 192.168.1.10 eq 23
access-list 10 permit icmp any host 192.168.1.10
access-list 10 permit tcp any host 192.168.1.10 eq 23
ACL entry 'permit tcp any host 192.168.1.10 eq 23' allows only TCP on port 23 (Telnet) to that host. UDP or ICMP are not permitted. ACLs process sequentially and stop at the first match. Reference
In Spanning Tree Protocol, what role does a non-root bridge port in the forwarding state have?
Root port
Designated port
Alternate port
Blocked port
Designated ports forward traffic for their segment and are selected if they have the lowest path cost to the root bridge from that LAN segment. The root port leads towards the root. Blocked ports neither send nor receive frames. Reference
What is NAT overload also known as?
Dynamic NAT
Static NAT
NAT66
Port Address Translation
NAT overload, or PAT, allows multiple private IP addresses to share a single public IP by using different source ports. It conserves global addresses. Static NAT maps one-to-one, while dynamic uses pools without port translation. Reference
Which OSPF area type does not accept external routes but allows inter-area routes?
Totally stubby
NSSA
Stub area
Backbone area
A stub area blocks external LSAs from OSPF but permits summary routes from other areas. This reduces LSA flooding and resource use on routers. NSSA allows limited external route injection. Reference
What is a key difference between RIPv1 and RIPv2?
RIPv2 supports VLSM and authentication
RIPv2 uses UDP port 520
RIPv1 supports classless routing
RIPv1 uses MD5 authentication
RIPv2 is classless, supports VLSM, and includes authentication features. RIPv1 is classful with no support for VLSM or authentication. Both use UDP port 520 for updates. Reference
What is the function of a DMZ in network design?
Provide dynamic routing
Balance network load
Encrypt internal traffic
Isolate public-facing services from internal network
A DMZ hosts public-facing servers like web and email, isolating them from the secure internal network. This limits exposure if DMZ servers are compromised. Firewalls control traffic between DMZ and internal segments. Reference
Which console settings are standard for Cisco device access?
9600 baud, 8 data bits, even parity, 2 stop bits
57600 baud, 8 data bits, no parity, 1 stop bit
19200 baud, 7 data bits, even parity, 1 stop bit
9600 baud, 8 data bits, no parity, 1 stop bit
Cisco devices typically use 9600 bps, 8 data bits, no parity, and 1 stop bit for console connections. These settings are standard across most models. Other settings may require specific adapters. Reference
Which encapsulation protocol is default on Cisco serial interfaces?
PPP
HDLC
Ethernet
Frame Relay
Cisco's default encapsulation on serial interfaces is Cisco HDLC, proprietary to Cisco. PPP is supported and adds features like authentication and link quality monitoring. Frame Relay requires specific configuration. Reference
What distinguishes a site-to-site VPN from a remote-access VPN?
Site-to-site connects entire networks; remote-access connects individual hosts
Remote-access is unencrypted; site-to-site is encrypted
Site-to-site uses FTP; remote-access uses SSH
Remote-access requires BGP
Site-to-site VPNs create secure tunnels between entire networks, whereas remote-access VPNs connect individual clients to a network. Both use encryption protocols like IPsec. Use cases differ by scale. Reference
Which DHCP message indicates a client is requesting to extend a lease?
DHCPREQUEST
DHCPACK
DHCPOFFER
DHCPDISCOVER
DHCPREQUEST is sent by a client to request or renew a lease from a DHCP server. It follows DHCPOFFER during initial allocation or reuses message for renewal. DHCPACK confirms the lease. Reference
What mechanism allows IPv6 hosts to configure addresses without a DHCP server?
NAT64
APIPA
DHCPv4
SLAAC
SLAAC (Stateless Address Autoconfiguration) enables IPv6 hosts to generate their own addresses using router advertisements. No DHCP server is needed. It combines the prefix with the interface identifier. Reference
In BGP, what is required for two routers to become neighbors?
Matching AS numbers configured manually
Same OSPF area
Connected via a switch
DHCP IP addressing
BGP peers require manual configuration of each other's IP and matching Remote AS number. This unique manual step prevents accidental peering. BGP does not use auto-discovery like IGPs. Reference
Which SNMP version adds encryption to improve security?
SNMPv3
SNMPv2c
SNMPv1
SNMPv2u
SNMPv3 introduced authentication and encryption (e.g., AES) to secure management traffic. Earlier versions only supported community strings in plaintext. SNMPv3 is recommended for production. Reference
Why might packet fragmentation occur on a network path?
Path MTU is smaller than packet size
Incorrect VLAN
ARP timeout
Routing metric mismatch
IP fragmentation happens when a packet exceeds the Maximum Transmission Unit (MTU) of a link on the path. Routers or hosts split the packet into smaller fragments. Fragments are reassembled at the destination. Reference
Which EIGRP mechanism allows a router to immediately use a backup route without recalculating the entire topology when a primary path fails?
Split horizon
Triggered updates
Feasible successor
Route poisoning
EIGRP maintains feasible successors in its topology table as backup routes that fulfill the feasibility condition. When the primary successor fails, the router immediately promotes a feasible successor without full recomputation, enabling fast convergence. This is part of the DUAL algorithm's efficiency. Reference
Which Frame Relay LMI type is Cisco proprietary?
ITU-T
LAPF
ANSI
Cisco
Cisco LMI is a proprietary protocol used for status and management communication between routers and Frame Relay switches. ANSI and ITU-T are industry standard LMIs, while LAPF is a Data Link layer protocol. Cisco LMI provides keepalives and status updates. Reference
Which protocol is an open standard for negotiating EtherChannel bundles?
STP
VTP
PAgP
LACP
LACP (Link Aggregation Control Protocol) is an IEEE 802.3ad open standard protocol for forming and managing EtherChannel links. PAgP is Cisco proprietary. STP prevents loops, and VTP manages VLANs. Reference
When redistributing OSPF routes into EIGRP, what must be configured to ensure routes are propagated?
TTL
Route tag
Access list
Metric
EIGRP requires a metric to be assigned to routes learned from non-EIGRP sources during redistribution. Without explicitly setting the bandwidth and delay metric, the routes will not be redistributed. Route tags and ACLs control filtering but do not set metrics. Reference
What forwarding mechanism does MPLS primarily use to direct traffic?
MAC address table
Labels
IP address lookup
Port numbers
MPLS forwards packets based on short fixed-length labels instead of IP addresses. Each label corresponds to a specific path in the MPLS network, enabling fast switching. Label swapping occurs at each hop for efficient forwarding. Reference
0
{"name":"Which OSI model layer is responsible for reliable end-to-end delivery and error recovery?", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Which OSI model layer is responsible for reliable end-to-end delivery and error recovery?, Which protocol provides connectionless communication and is used for applications requiring minimal overhead?, What is the default gateway used for in an IP network?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}

Study Outcomes

  1. Understand TCP/IP Model Layers -

    Learn the functions and data flows of each layer in the TCP/IP protocols quiz to solidify your grasp of core networking concepts.

  2. Analyze OSI Model Components -

    Break down the seven layers of the OSI model in our free OSI model practice test and distinguish their roles in data communication.

  3. Identify UDP Protocol Characteristics -

    Determine which three statements characterize UDP - choose three - to master connectionless transport behavior and its use cases.

  4. Apply Routing Principles -

    Use scenario-based CCENT exam questions free to compare static and dynamic routing methods and select optimal paths for network traffic.

  5. Evaluate Network Device Roles -

    Assess the functions of routers, switches, and other network devices to understand how they forward, filter, and manage packets.

  6. Boost CCENT Exam Preparedness -

    Receive instant feedback on your answers to identify knowledge gaps, refine your study focus, and build confidence for the CCENT practice certification.

Cheat Sheet

  1. OSI Model Layers -

    Use the mnemonic "All People Seem To Need Data Processing" to recall Physical, Data Link, Network, Transport, Session, Presentation, and Application layers. Understanding each layer's role - like MAC addressing at Layer 2 (IEEE 802.3) and encryption at Layer 6 - boosts your confidence on an OSI model practice test. Mapping real”world protocols (HTTP at Layer 7, IP at Layer 3) makes the CCENT practice exam feel like a breeze.

  2. TCP/IP Protocol Suite -

    The TCP/IP model's four layers (Link, Internet, Transport, Application) power the internet; key protocols include IP for routing, TCP for reliable sessions, and UDP for lightweight transmissions. In a TCP/IP protocols quiz, distinguish TCP's three-way handshake (SYN, SYN-ACK, ACK) from UDP's stateless design. Remember: "IP handles addressing, TCP handles tracking" - a simple phrase from RFC 791 and RFC 793 makes this stick.

  3. UDP Characteristics -

    When asked "which three statements characterize UDP? Choose three," look for: connectionless communication, no guaranteed delivery or sequencing, and minimal header overhead (8 bytes). This slim design makes UDP ideal for streaming and DNS queries but requires apps to handle errors. Confidence boost: recite the trio - "No handshake, no delivery guarantee, tiny header!"

  4. IP Subnetting Essentials -

    Mastering subnet math is vital for the CCENT practice certification - use 2^n - 2 to calculate usable hosts (e.g., /28 yields 16 addresses, 14 hosts). Practice converting dotted”decimal masks (255.255.255.240) to CIDR and back, and group bits into network versus host portions. A quick trick: turn each octet to binary and count the 1s for the prefix length.

  5. Routing Protocol Types -

    Differentiate distance”vector (RIP, hop count limit 15) from link”state (OSPF, uses Dijkstra's algorithm) to shine on CCENT exam questions free resources. Recall "RIP trips at 15 hops," and "OSPF maps the network" - this contrast clarifies convergence and scalability. Hands”on labs with packet tracers cement why routers exchange LSAs in OSPF but only periodic updates in RIP.

Powered by: Quiz Maker