Unlock hundreds more features
Save your Quiz to the Dashboard
View and Export Results
Use AI to Create Quizzes and Analyse Results

Sign inSign in with Facebook
Sign inSign in with Google

Ready to Ace Your CCNA Final Exam? Try Our Free Mock Test

Take the CCNA final exam test now and gear up for the Cisco final exam!

Difficulty: Moderate
2-5mins
Learning OutcomesCheat Sheet
Paper art illustration for a CCNA mock test quiz on a golden yellow background

Ready to take your networking skills to the next level? Dive into our ccna mock test free challenge designed to help aspiring IT pros conquer the ccna final exam test and feel confident on exam day. This engaging CCNA practice exam delivers instant feedback, letting you identify your strengths and areas to review before the big Cisco final exam. Whether you're wrapping up your studies or reinforcing concepts in ccna 1 practice final modules, this ccna quiz online is your ticket to hands-on preparation. Click below to start testing your knowledge and ace every question - your path to certification begins now!

Which OSI layer is responsible for logical addressing and routing?
Data Link
Network
Transport
Session
The Network layer (Layer 3) manages logical addressing, routing, and packet forwarding between networks. Routers operate at this layer to determine best paths. Higher layers rely on it to deliver data across multiple links. Cisco OSI Model Overview
What is the default subnet mask for a Class C IPv4 address?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.252
Class C addresses use a default mask of 255.255.255.0 (/24), providing up to 254 usable host addresses. This mask reserves the first three octets for network identification. It is standard for small LANs. Subnet Masks Explained
Which device operates at the Data Link layer and forwards frames based on MAC addresses?
Router
Switch
Hub
Bridge
Switches operate at Layer 2 and forward Ethernet frames based on MAC address tables. Hubs simply repeat signals, while routers operate at Layer 3. Bridges are outdated in modern networks. Switching Fundamentals
What does DHCP stand for?
Dynamic Host Configuration Protocol
Digital Host Control Process
Dynamic Header Control Protocol
Data Host Control Protocol
DHCP automates IP address, subnet mask, gateway, and DNS assignment. It reduces manual configuration errors and simplifies network management. DHCP operates using a lease mechanism. RFC 2131
In binary, what is the decimal value of the octet 11000000?
192
128
224
64
11000000 in binary equals 128 + 64 = 192. Binary to decimal conversion sums the place values of each '1' bit. Understanding binary is key for subnetting. Binary Conversion
Which cable type is used to connect two switches directly without an uplink port?
Crossover cable
Straight-through cable
Coaxial cable
Fiber optic cable
A crossover cable swaps transmit and receive pairs, allowing direct device–device connections. Modern switches auto-MDIX but older devices require explicit crossover cables. Straight-through cables connect unlike devices. Cisco Cable Guide
What command shows the IP address and subnet mask on a Cisco router interface?
show ip route
show running-config
show ip interface brief
show version
The 'show ip interface brief' command lists interface IP addresses and status succinctly. It’s widely used for quick checks. 'show running-config' reveals full configurations but is more verbose. Cisco Interface Commands
Which wireless standard operates only in the 5 GHz band and supports up to 54 Mbps?
802.11g
802.11a
802.11b
802.11n
802.11a uses the 5 GHz band and offers up to 54 Mbps. It has less interference but shorter range than 2.4 GHz. Later standards like 802.11n improved throughput. Cisco Wireless Overview
What is the primary purpose of a default gateway on a LAN?
Forward frames within the same VLAN
Serve as a fallback DNS server
Route traffic to other networks
Provide wireless access
A default gateway routes traffic destined for outside the local subnet. Hosts send non-local packets to this address. Without it, inter-network communication fails. Default Gateway
Which protocol is used to discover the MAC address of a local IP?
DNS
ARP
ICMP
DHCP
The Address Resolution Protocol (ARP) maps IPv4 addresses to MAC addresses on a local network. Devices broadcast ARP requests to find target MACs. ARP responses provide the mapping. RFC 826
What is the purpose of PPPoE in service provider networks?
Encrypt all customer traffic
Tunnel IPsec connections
Encapsulate Ethernet frames over PPP
Replace Ethernet with ATM
PPPoE encapsulates PPP frames inside Ethernet, enabling features like authentication and dial-up sessions over DSL. It combines PPP benefits with Ethernet simplicity. ISPs use it to manage subscriber sessions. RFC 2516
Which IPv4 address is a valid private network address?
10.0.0.5
172.32.0.1
8.8.8.8
192.0.2.1
10.0.0.5 falls within the 10.0.0.0/8 private range. Private ranges are not routed on the public Internet. 172.16.0.0–172.31.255.255 and 192.168.0.0–192.168.255.255 are also private. IANA IPv4 Registry
What LED indication on a switch port typically means a good Ethernet link?
Amber solid
Green flashing
No light
Red blinking
A green flashing LED usually indicates an active Ethernet link and traffic. Solid green may indicate link only. Amber often signals a lower speed or issue. No light means no link. Cisco Port LEDs
Which protocol provides automatic domain name resolution to IP addresses?
FTP
SMTP
DNS
SSH
DNS translates domain names into IP addresses. It uses hierarchical name servers for efficient lookup. DNS caching improves performance. RFC 1034
Which address does a host use to send an ARP request when the destination IP is on the same subnet?
Broadcast MAC FF:FF:FF:FF:FF:FF
Destination’s IP converted to MAC
Multicast MAC address
Source MAC address
ARP requests use the broadcast MAC FF:FF:FF:FF:FF:FF to reach all devices on the local segment. The target host responds with its MAC. Broadcast ensures the mapping is discovered. ARP Process
You need to divide 192.168.1.0/24 into four equal subnets. What is the new subnet mask?
255.255.255.192
255.255.255.224
255.255.255.240
255.255.255.128
Dividing /24 into four subnets requires borrowing 2 bits (2^2=4). The new mask is /26 (255.255.255.192). Each subnet has 64 addresses (62 usable). Subnetting Guide
Which routing protocol uses cost based on bandwidth by default?
RIP
OSPF
EIGRP
BGP
OSPF calculates cost as the inverse of bandwidth on an interface. Higher bandwidth links have lower cost. This allows OSPF to choose high-speed paths. OSPF Cost
Which VLAN type propagates VLAN information across trunk links?
VTP VLAN
Native VLAN
Management VLAN
Data VLAN
VTP (VLAN Trunking Protocol) synchronizes VLAN configurations across switches in a domain. It distributes VLAN additions, deletions, and renames automatically. VTP pruning optimizes traffic. Cisco VTP Guide
What is the primary purpose of STP (Spanning Tree Protocol)?
Balance traffic across links
Prevent layer 2 loops
Encrypt VLAN traffic
Authenticate switch ports
STP prevents switching loops by creating a loop-free topology. It blocks redundant paths while ensuring backup links. Without it, broadcast storms occur. Cisco STP Overview
Which NAT type translates inside local addresses to inside global using many-to-one mapping?
Static NAT
Dynamic NAT
PAT
NAT64
PAT (Port Address Translation) allows many-to-one translation by using ports to differentiate sessions. It conserves public IPv4 addresses. Static and dynamic NAT use one-to-one mappings. Cisco PAT
Which command enables RIP version 2 on a Cisco router?
router rip version 2
router rip
router rip version 2
ip routing rip version 2
In Cisco IOS, under 'router rip' mode, the 'version 2' command sets RIP v2. RIP v2 supports VLSM and multicasts updates. Proper syntax uses a new line. RIP Commands
What well-known port number does HTTPS use by default?
21
80
22
443
HTTPS uses TCP port 443 by default to secure HTTP traffic via SSL/TLS. HTTP uses port 80 unencrypted. SSH uses 22, and FTP uses 21. IANA Port Numbers
Which OSPF area type does not accept external routes?
Standard area
Stub area
Backbone area (0)
Not-So-Stubby Area
OSPF stub areas block external (Type 5) LSAs to reduce routing table size. They rely on a default route to the area border router. NSSA allows limited externals in Type 7 LSAs. OSPF Area Types
In IPv6, what does FE80::/10 represent?
Global unicast prefix
Unique local address
Link-local address
Multicast address
FE80::/10 identifies IPv6 link-local addresses used for neighbor discovery on a single link. They can't be routed beyond the local network. Hosts autoconfigure these addresses. RFC 4291
Which SNMP version introduced authentication and encryption?
SNMPv1
SNMPv3
SNMPv2u
SNMPv2c
SNMPv3 adds user-based authentication and encryption for secure management. Earlier versions only supported community strings in clear text. SNMPv2c improved performance but not security. RFC 3411
What is the result of the command 'switchport mode access' on a Cisco switch port?
Port becomes a trunk
Port allows multiple VLANs
Port carries only one VLAN
Port is shut down
Access mode locks the port to a single VLAN and removes trunk negotiation. Only untagged frames for that VLAN are forwarded. It’s used for end-device connections. Switchport Modes
Which DHCP message does a client send to discover servers?
DHCPREQUEST
DHCPDISCOVER
DHCPACK
DHCPOFFER
Clients send DHCPDISCOVER as a broadcast to locate available DHCP servers. Servers reply with DHCPOFFER messages. The process continues until an IP lease is granted. RFC 2131
Which EIGRP metric components are used by default?
Bandwidth and delay
Load and reliability
Hop count and MTU
Bandwidth, delay, load, reliability
EIGRP’s default composite metric uses bandwidth and delay to compute path cost. Load and reliability are optional K values set to zero by default. Hop count is not part of EIGRP’s metric. EIGRP Metrics
In OSPF, what is the function of the Designated Router (DR)?
Forward external routes between areas
Generate Type 3 LSAs
Reduce flooding by summarizing LSAs
Authenticate OSPF neighbors
The DR on multi-access networks reduces LSA flooding by acting as a central point for LSU/LSR exchanges. It learns LSAs from neighbors and multicasts updates. This optimizes topology database synchronization. DR/BDR Roles
Which command summarizes routes in OSPF on an ABR?
area 0 range
summary-address
aggregate-address
network-summary
On an OSPF ABR, 'area X range' summarizes networks from one area into a single LSAs for another. This reduces routing table size. No redistribution is required. OSPF Summarization
Which HSRP state indicates that a router is neither active nor standby but is listening to hellos?
Active
Standby
Learn
Speak
In the Learn state, routers receive hellos but have not determined the active or standby roles. After learning the virtual IP, they proceed to Listen or Standby. 'Speak' involves participating in elections. HSRP States
What is the purpose of a GRE tunnel?
Encrypt data end-to-end
Carry multicast and non-IP traffic
Replace IPsec on WAN
Perform NAT over VPN
GRE (Generic Routing Encapsulation) tunnels encapsulate a variety of network layer protocols, including multicast and non-IP. It creates point-to-point links over IP networks. GRE itself does not encrypt traffic. RFC 2784
Which QoS mechanism delays lower-priority traffic to ensure bandwidth for high-priority traffic?
Weighted Fair Queuing
Priority Queuing
Traffic Shaping
Random Early Detection
Priority Queuing (PQ) always services the highest-priority queue first, delaying lower-priority traffic. This guarantees low latency for critical applications. WFQ allocates bandwidth fairly across flows. Cisco PQ
Which wireless security protocol uses a pre-shared key and AES encryption?
WEP
WPA
WPA2 Personal
WPA2 Enterprise
WPA2 Personal (PSK) uses a pre-shared key with AES-based CCMP for encryption. It is more secure than WPA and WEP. WPA2 Enterprise adds 802.1X authentication but also uses AES. Cisco Wireless Security
In VRRP, which router role takes over when the master fails?
Backup
Active
Standby
Secondary
In VRRP, backup routers monitor the master and elect a new master if it fails. The backup with highest priority becomes master. This ensures gateway redundancy. RFC 5798
Which tunneling protocol supports driven-by-policy dynamic tunnel creation in DMVPN?
L2TP
IPsec
GRE
PPTP
DMVPN uses mGRE (multipoint GRE) with NHRP to dynamically create tunnels on demand. IPsec provides encryption but GRE handles multipoint tunneling. This design scales well for large networks. Cisco DMVPN
Which SNMP message type is used by an agent to report an unsolicited alert to the manager?
GetRequest
Trap
GetBulk
Inform
SNMP traps are unsolicited notifications sent from agents to managers for events. Informs are acknowledged but traps are not. Managers use them to detect issues quickly. SNMP Traps
What feature lets you view mirrored traffic on a Cisco switch?
SPAN
ERSPAN
RSPAN
NetFlow
SPAN (Switched Port Analyzer) mirrors traffic from source ports to a destination port for analysis. RSPAN and ERSPAN extend this across switches or IP networks. NetFlow collects flow records, not raw packets. Cisco SPAN
Which syslog severity level indicates a critical condition?
Level 2
Level 4
Level 6
Level 0
Syslog Level 2 is 'Critical', indicating severe conditions. Level 0 is 'Emergency', and Level 1 is 'Alert'. Logs help in troubleshooting and monitoring. RFC 5424
Which protocol is used for voice traffic prioritization in QoS?
LLDP
802.1p
RSTP
GLBP
IEEE 802.1p provides Layer 2 priority tagging for QoS by marking Ethernet frames. It uses three bits in the VLAN tag to indicate priority levels. This ensures voice gets higher priority. IEEE 802.1p
Which BGP path attribute is used to select the preferred exit point when multiple exit points exist?
MED
Weight
Local Preference
AS Path
The Multi-Exit Discriminator (MED) influences inbound traffic by signaling preferred entry points to neighboring ASes. Lower MED is preferred. It’s not propagated beyond the immediate neighbor. BGP MED
When redistributing OSPF into EIGRP, which metric must be manually set?
Delay, Bandwidth, Reliability, Load
Only Bandwidth
Only Delay
Hop count
EIGRP requires a composite metric when redistributing external routes. You must specify bandwidth, delay, reliability, and load. Otherwise redistributed routes are not advertised. EIGRP Redistribution
Which MPLS label distribution protocol uses TCP for session establishment?
LDP
TDP
RSVP-TE
BGP-Labeled Unicast
LDP establishes TCP sessions on port 646 to exchange label mappings. TDP is Cisco proprietary and uses UDP. RSVP-TE reserves resources for traffic engineering. RFC 5036
Which protocol is used for dynamic multicast group membership management?
IGMP
PIM
MLD
DVMRP
IGMP (Internet Group Management Protocol) manages IPv4 hosts joining and leaving multicast groups on a local subnet. PIM uses IGMP for neighbor discovery. MLD is IGMP’s IPv6 equivalent. RFC 3376
During advanced troubleshooting, which command captures packets on a Cisco router interface?
monitor capture
debug ip packet
show ip traffic
sniffer capture
The Embedded Packet Capture feature uses 'monitor capture' to define and start captures on router interfaces. Captured data can be exported or analyzed on-device. It replaces manual SPAN on routers. Cisco EPC
0
{"name":"Which OSI layer is responsible for logical addressing and routing?", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Which OSI layer is responsible for logical addressing and routing?, What is the default subnet mask for a Class C IPv4 address?, Which device operates at the Data Link layer and forwards frames based on MAC addresses?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}

Study Outcomes

  1. Understand IP Addressing and Subnetting -

    Grasp the fundamentals of IPv4 addressing schemes and perform subnetting calculations to efficiently segment networks.

  2. Analyze Routing Protocols -

    Differentiate between key routing protocols such as RIP, OSPF, and EIGRP, and understand their roles in dynamic route determination.

  3. Apply Network Device Functions -

    Identify the core functions of routers, switches, and access points, and configure basic settings to optimize network performance.

  4. Evaluate Troubleshooting Techniques -

    Use systematic troubleshooting methodologies to diagnose and resolve common network connectivity and configuration issues.

  5. Apply Exam Strategies -

    Develop effective time management and question-analysis strategies tailored to the CCNA final exam format.

  6. Gain Confidence with Instant Feedback -

    Leverage real-time quiz scoring and detailed explanations to reinforce knowledge gaps and build readiness for the Cisco final exam.

Cheat Sheet

  1. IPv4 Addressing and Subnet Masks -

    Understand how IPv4 addresses combine a network ID and host ID using subnet masks (e.g., 192.168.1.0 with a 255.255.255.0 mask yields a /24 network with 254 usable hosts). Practicing binary-to-decimal conversion for each octet is key: remember "128-64-32-16-8-4-2-1" to calculate mask values quickly.

  2. CIDR and VLSM for Flexible IP Allocation -

    Classless Inter-Domain Routing (CIDR) and Variable Length Subnet Masking (VLSM) enable efficient use of IPv4 space by specifying prefix lengths (e.g., /26 yields 64 total addresses with 62 usable hosts). Per RFC 1519, design subnets from largest to smallest to prevent overlap - and use the mnemonic "big to small for it all" when planning VLSM schemes.

  3. Routing Tables and Longest-Prefix Match -

    Routers maintain routing tables with network prefixes and metrics, forwarding packets based on the longest-prefix match rule (e.g., a route to 10.0.0.0/8 overrides a default 0.0.0.0/0 for 10.x.x.x traffic). Compare dynamic protocol metrics - OSPF's cost (bandwidth-based) versus EIGRP's composite metric - using Cisco's official routing guides.

  4. VLAN Segmentation and 802.1Q Trunking -

    Virtual LANs partition a switch into multiple broadcast domains, boosting security and performance; IEEE 802.1Q trunks tag frames with VLAN IDs to carry traffic across switches. Remember that VLAN 1 is native by default on Cisco switches - change it for enhanced security in line with Cisco design best practices.

  5. Spanning Tree Protocol (STP) Basics -

    STP prevents Layer 2 loops by electing a root bridge (lowest Bridge ID) and placing redundant links in a blocking state, as defined in IEEE 802.1D. Use the mnemonic "Lower Bridge Is King" to recall root election, and practice adjusting bridge and port priorities to control topology.

Powered by: Quiz Maker