1. What is the primary function of a firewall in a network?
- A) Connects multiple networks together
- B) Provides wireless connectivity to network devices
- C) Controls access to and from a network based on predetermined security rules
- D) Routes data packets between different networks
- **Answer: C) Controls access to and from a network based on predetermined security rules**
2. What is the subnet mask for a Class C network with 8 subnets?
- A) /28
- B) /29
- C) /27
- D) /26
- **Answer: A) /28**
3. What is the purpose of assigning IP addresses to interfaces on a Cisco router?
- A) To establish a secure connection to the router
- B) To configure routing protocols
- C) To identify the router on the network
- D) To manage the router remotely
- **Answer: C) To identify the router on the network**
4. Which of the following is the correct syntax for adding a static route in Cisco IOS using the ip route
command?
- A) ip route add <destination_network> <subnet_mask> <next_hop_ip>
- B) ip route <destination_network> <next_hop_ip>
- C) route add <destination_network> <subnet_mask> <next_hop_ip>
- D) ip route <destination_network> <subnet_mask> <next_hop_ip>
- **Answer: D) ip route <destination_network> <subnet_mask> <next_hop_ip>**
5. Which command is used to enter global configuration mode on a Cisco router?
- A) configure terminal
- B) interface
- C) enable
- D) exit
- **Answer: A) configure terminal**
6. Which command is used to create a numbered standard access control list (ACL) with sequence
number 10 permitting traffic from source IP address 192.168.1.0?
- A) ip access-list standard 10 permit 192.168.1.0
- B) access-list standard 10 permit 192.168.1.0
- C) access-list permit 10 192.168.1.0
- D) access-list 10 permit 192.168.1.0
- **Answer: D) access-list 10 permit 192.168.1.0**
7. What is the purpose of ARP (Address Resolution Protocol)?
- A) To route packets between networks
- B) To encrypt data transmissions
- C) To discover the MAC address of a device on the local network
- D) To translate domain names to IP addresses
- **Answer: C) To discover the MAC address of a device on the local network**
8. What is the purpose of the subnet mask in an IP address configuration?
- A) To determine the default gateway
- B) To establish a secure connection
- C) To identify the network portion of the IP address
- D) To identify the host portion of the IP address
- **Answer: C) To identify the network portion of the IP address**
9. What command is used to enable an interface on a Cisco router?
- A) start interface
- B) activate interface
- C) no shutdown
- D) enable interface
- **Answer: C) no shutdown**
10. What is the maximum number of IP addresses available in a single IPv4 Class C network?
- A) 512
- B) 1024
- C) 256
- D) 2048
- **Answer: C) 256**
11. Which of the following IP address ranges is reserved for private networks according to RFC 1918?
- A) 172.16.0.0 - 172.31.255.255
- B) 10.0.0.0 - 10.255.255.255
- C) 192.168.0.0 - 192.168.255.255
- D) All of the above
- **Answer: D) All of the above**
12. Which command is used to remove a static route in Cisco IOS?
- A) ip route delete <destination_network>
- B) remove ip route <destination_network>
- C) delete ip route <destination_network>
- D) no ip route <destination_network>
- **Answer: D) no ip route <destination_network>**
13. What is the purpose of subnetting in IP networking?
- A) Preventing IP conflicts
- B) Increasing the number of available IP addresses
- C) Improving network performance
- D) Dividing a large network into smaller, manageable sub-networks
- **Answer: D) Dividing a large network into smaller, manageable sub-networks**
14. What is the IP address used to communicate with devices outside of the local network, often
provided by an ISP?
- A) Dynamic IP address
- B) Public IP address
- C) Private IP address
- D) Static IP address
- **Answer: B) Public IP address**
15. Which command is used to assign an IP address to a Serial interface on a Cisco router?
- A) assign ip
- B) config ip
- C) interface ip
- D) ip address
- **Answer: D) ip address**
16. What is the purpose of the "shutdown" command when configured on a router interface?
- A) To restart the interface
- B) To enable the interface
- C) To reset the interface configuration
- D) To disable the interface
- **Answer: D) To disable the interface**
17. What is the purpose of a MAC address in networking?
- A) To route packets between different networks
- B) To determine the IP address of a device
- C) To encrypt data transmissions
- D) To uniquely identify a device on a local network
- **Answer: D) To uniquely identify a device on a local network**
18. What command is used to remove an IP address from an interface on a Cisco router?
- A) delete ip address
- B) clear ip address
- C) remove ip address
- D) no ip address
- **Answer: D) no ip address**
19. What is the purpose of penetration testing in cybersecurity?
- A) Analyzing user behavior
- B) Protecting against malware
- C) Identifying vulnerabilities in systems and networks
- D) Monitoring network traffic
- **Answer: C) Identifying vulnerabilities in systems and networks**
20. What is the network address of the third subnet in a Class C network with a /28 subnet mask?
A) 192.168.1.16
B) 192.168.1.0
C) 192.168.1.32
D) 192.168.1.48
Answer: C) 192.168.1.32
Which of the following is NOT a valid IP address class?
A) Class A
B) Class B
C) Class C
D) Class D
Answer: D) Class D
In IPv4, how many bits are used to represent an IP address?
A) 32 bits
B) 64 bits
C) 128 bits
D) 256 bits
Answer: A) 32 bits
What is the maximum number of IP addresses available in a single IPv4 Class C network?
A) 256
B) 512
C) 1024
D) 2048
Answer: A) 256
What is the loopback IP address in IPv4?
A) 127.0.0.1
B) 0.0.0.0
C) 255.255.255.255
D) 192.168.0.1
Answer: A) 127.0.0.1
What is the purpose of subnetting in IP networking?
A) Increasing the number of available IP addresses
B) Improving network performance
C) Dividing a large network into smaller, manageable sub-networks
D) Preventing IP conflicts
Answer: C) Dividing a large network into smaller, manageable sub-networks
What is the IP address used to communicate with devices outside of the local network, often provided
by an ISP?
A) Private IP address
B) Public IP address
C) Dynamic IP address
D) Static IP address
Answer: B) Public IP address
Which protocol is responsible for assigning IP addresses dynamically to devices on a network?
A) HTTP
B) DHCP
C) DNS
D) FTP
Answer: B) DHCP
Which of the following is NOT a potential endpoint security threat?
A) Insider threats
B) Phishing attacks
C) Data encryption
D) Ransomware
Answer: C) Data encryption
What is the total number of available host addresses in a Class C subnet with a /28 subnet mask?
A) 16
B) 14
C) 30
D) 32
Answer: B) 14
How many subnets can be created from a Class C network with a /27 subnet mask?
A) 2
B) 4
C) 6
D) 8
Answer: D) 8
What is the network address of the first subnet in a Class C network with a /26 subnet mask?
A) 192.168.1.0
B) 192.168.1.64
C) 192.168.1.128
D) 192.168.1.192
Answer: A) 192.168.1.0
How many bits are available for host addresses in a Class C network with a /28 subnet mask?
A) 2
B) 4
C) 6
D) 8
Answer: B) 4
What is the purpose of a modem in a network?
A) Connects multiple LANs together
B) Provides wireless access to network devices
C) Converts digital signals to analog signals for transmission over telephone lines
D) Filters and forwards data packets within a local network
Answer: C) Converts digital signals to analog signals for transmission over telephone lines
What is the purpose of a hub in a network?
A) Provides wireless access to network devices
B) Routes data packets between different networks
C) Connects multiple devices within the same local area network
D) Controls access to and from a network based on predetermined security rules
Answer: C) Connects multiple devices within the same local area network
Which network device is typically used to segment a large network into smaller, more manageable parts?
A) Router
B) Switch
C) Hub
D) Firewall
Answer: A) Router
What is the purpose of a switch in a network?
A) Connects devices within the same local area network
B) Determines the best path for data packets to travel between different networks
C) Provides wireless access to network devices
D) Filters and forwards data packets within a local network
Answer: A) Connects devices within the same local area network
Which network device operates at Layer 1 (Physical Layer) of the OSI model?
A) Router
B) Switch
C) Hub
D) Repeater
Answer: D) Repeater
Which network device operates at Layer 2 (Data Link Layer) of the OSI model?
A) Router
B) Switch
C) Hub
D) Firewall
Answer: B) Switch
What is the primary function of a router in a computer network?
A) Connects devices within the same local area network
B) Determines the best path for data packets to travel between different networks
C) Provides wireless access to network devices
D) Filters and forwards data packets within a local network
Answer: B) Determines the best path for data packets to travel between different networks
What is the purpose of a firewall in a network?
A) Connects multiple networks together
B) Controls access to and from a network based on predetermined security rules
C) Provides wireless connectivity to network devices
D) Routes data packets between different networks
Answer: B) Controls access to and from a network based on predetermined security rules
What is the purpose of a MAC address in networking?
A) To uniquely identify a device on a local network
B) To route packets between different networks
C) To determine the IP address of a device
D) To encrypt data transmissions
Answer: A) To uniquely identify a device on a local network
Which of the following is NOT considered an endpoint device?
A) Desktop computers
B) Servers
C) Smartphones
D) Routers
Answer: D) Routers
What is a common method of protecting endpoints from malware and other threats?
A) Installing antivirus software
B) Disabling firewalls
C) Enabling guest access
D) Running outdated operating systems
Answer: A) Installing antivirus software
What is the primary function of a router in a computer network?
A) Connects devices within the same local area network
B) Determines the best path for data packets to travel between different networks
C) Provides wireless access to network devices
D) Filters and forwards data packets within a local network
Answer: B) Determines the best path for data packets to travel between different networks
Which network device operates at Layer 2 (Data Link Layer) of the OSI model?
A) Router
B) Switch
C) Hub
D) Firewall
Answer: B) Switch
What is the primary function of a firewall in a network?
A) Connects multiple networks together
B) Controls access to and from a network based on predetermined security rules
C) Provides wireless connectivity to network devices
D) Routes data packets between different networks
Answer: B) Controls access to and from a network based on predetermined security rules
Which network device operates at Layer 1 (Physical Layer) of the OSI model?
A) Router
B) Switch
C) Hub
D) Repeater
Answer: D) Repeater
What is the purpose of a hub in a network?
A) Provides wireless access to network devices
B) Routes data packets between different networks
C) Connects multiple devices within the same local area network
D) Controls access to and from a network based on predetermined security rules
Answer: C) Connects multiple devices within the same local area network
Which network device is typically used to segment a large network into smaller, more manageable parts?
A) Router
B) Switch
C) Hub
D) Firewall
Answer: A) Router
What is the purpose of a switch in a network?
A) Connects devices within the same local area network
B) Determines the best path for data packets to travel between different networks
C) Provides wireless access to network devices
D) Filters and forwards data packets within a local network
Answer: A) Connects devices within the same local area network
1. What command is used to assign an IP address and subnet mask to a GigabitEthernet interface on a
Cisco router?
A) assign ip
B) ip address
C) set interface
D) configure terminal
Answer: B) ip address
2. What is the default subnet mask used when assigning a Class C IP address to an interface using the ip
address command?
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) It varies depending on the interface type
Answer: C) 255.255.255.0
3. Which command is used to create a numbered standard access control list (ACL) with sequence
number 10 permitting traffic from source IP address 192.168.1.0?
A) access-list 10 permit 192.168.1.0
B) access-list standard 10 permit 192.168.1.0
C) ip access-list standard 10 permit 192.168.1.0
D) access-list permit 10 192.168.1.0
Answer: A) access-list 10 permit 192.168.1.0
4. How are standard ACLs typically used in a network?
A) To filter traffic based on source IP address
B) To filter traffic based on destination IP address
C) To filter traffic based on both source and destination IP addresses
D) To prioritize certain types of traffic
Answer: A) To filter traffic based on source IP address
5. What command is used to apply an access control list to an interface?
A) access-group
B) apply-access-list
C) interface access-list
D) ip access-group
Answer: D) ip access-group
6. Which command is used to enter global configuration mode on a Cisco router?
A) enable
B) configure terminal
C) interface
D) exit
Answer: B) configure terminal
7. What command is used to enable an interface on a Cisco router?
A) enable interface
B) activate interface
C) no shutdown
D) start interface
Answer: C) no shutdown
8. Which of the following commands is used to view the current settings of a Cisco router?
A) show interfaces
B) show ip interface brief
C) show ip address
D) show running-config
Answer: D) show running-config
9. What is the purpose of assigning IP addresses to interfaces on a Cisco router?
A) To identify the router on the network
B) To establish a secure connection to the router
C) To configure routing protocols
D) To manage the router remotely
Answer: A) To identify the router on the network
10. Which command is used to assign an IP address to a Serial interface on a Cisco router?
A) ip address
B) assign ip
C) interface ip
D) config ip
Answer: A) ip address
11. What command is used to remove an IP address from an interface on a Cisco router?
A) remove ip address
B) no ip address
C) delete ip address
D) clear ip address
Answer: B) no ip address
12. Which of the following commands is used to view the configuration of all interfaces on a Cisco
router?
A) show interfaces
B) show ip interface brief
C) show running-config
D) show interfaces brief
Answer: C) show running-config
13. What is the purpose of the "shutdown" command when configured on a router interface?
A) To disable the interface
B) To enable the interface
C) To restart the interface
D) To reset the interface configuration
Answer: A) To disable the interface
14. What command is used to apply an access control list to filter inbound traffic on an interface?
A) ip access-group
B) access-list in
C) access-group in
D) apply access-list
Answer: A) ip access-group
15. What is the purpose of penetration testing in cybersecurity?
A) Protecting against malware
B) Monitoring network traffic
C) Identifying vulnerabilities in systems and networks
D) Analyzing user behavior
Answer: C) Identifying vulnerabilities in systems and networks
16. What command is used to remove an ACL from an interface on a Cisco router?
A) remove access-group
B) delete access-list
C) clear access-list
D) no ip access-group
Answer: D) no ip access-group
17. In a Cisco router configuration, what is the purpose of the "interface" command?
A) To enter interface configuration mode
B) To specify the IP address of the router
C) To configure routing protocols
D) To enable interface security features
Answer: A) To enter interface configuration mode
18. What is the purpose of the "ip route" command in a Cisco router configuration?
A) To configure static routes
B) To enable dynamic routing protocols
C) To display the routing table
D) To configure the router's default gateway
Answer: A) To configure static routes
19. In a Cisco router configuration, what is the purpose of the "no shutdown" command when
configuring an interface?
A) To enable the interface
B) To disable the interface
C) To reset the interface
D) To configure the interface security settings
Answer: A) To enable the interface
20. Which of the following is the correct syntax for adding a static route in Cisco IOS using the ip route
command?
A) ip route <destination_network> <subnet_mask> <next_hop_ip>
B) ip route add <destination_network> <subnet_mask> <next_hop_ip>
C) ip route <destination_network> <next_hop_ip>
D) route add <destination_network> <subnet_mask> <next_hop_ip>
Answer: A) ip route <destination_network> <subnet_mask> <next_hop_ip>
21. n Cisco IOS, what does the next-hop IP address represent in the ip route command?
A) Destination network
B) Local interface
C) Remote router's IP address
D) Default gateway
Answer: C) Remote router's IP address
22. Which command is used to remove a static route in Cisco IOS?
A) no ip route <destination_network>
B) remove ip route <destination_network>
C) delete ip route <destination_network>
D) ip route delete <destination_network>
Answer: A) no ip route <destination_network>
23. In the command ip route 192.168.1.0 255.255.255.0 10.0.0.1, what does 192.168.1.0 represent?
A) Local interface
B) Remote network
C) Next-hop IP address
D) Subnet mask
Answer: B) Remote network
24. What is Burp Suite primarily used for?
A) Web development
B) Network monitoring
C) Web application security testing
D) Database management
Answer: C) Web application security testing
25. Which feature of Burp Suite allows for intercepting and modifying HTTP/S requests and responses?
A) Burp Repeater
B) Burp Spider
C) Burp Scanner
D) Burp Proxy
Answer: D) Burp Proxy
26. What does IP stand for in IP address?
A) Internet Protocol
B) Internal Protocol
C) Internet Provider
D) Internal Provider
Answer: A) Internet Protocol
27. Which of the following is NOT a valid IP address class?
A) Class A
B) Class B
C) Class C
D) Class D
Answer: D) Class D
28. In IPv4, how many bits are used to represent an IP address?
A) 32 bits
B) 64 bits
C) 128 bits
D) 256 bits
Answer: A) 32 bits
29. What is the maximum number of IP addresses available in a single IPv4 Class C network?
A) 256
B) 512
C) 1024
D) 2048
Answer: A) 256
30. What is the loopback IP address in IPv4?
A) 127.0.0.1
B) 0.0.0.0
C) 255.255.255.255
D) 192.168.0.1
Answer: A) 127.0.0.1
31. Which of the following IP address ranges is reserved for private networks according to RFC 1918?
A) 10.0.0.0 - 10.255.255.255
B) 172.16.0.0 - 172.31.255.255
C) 192.168.0.0 - 192.168.255.255
D) All of the above
Answer: D) All of the above
32. What is the purpose of subnetting in IP networking?
A) Increasing the number of available IP addresses
B) Improving network performance
C) Dividing a large network into smaller, manageable sub-networks
D) Preventing IP conflicts
Answer: C) Dividing a large network into smaller, manageable sub-networks
33. What is the IP address used to communicate with devices outside of the local network, often
provided by an ISP?
A) Private IP address
B) Public IP address
C) Dynamic IP address
D) Static IP address
Answer: B) Public IP address
34. Which protocol is responsible for assigning IP addresses dynamically to devices on a network?
A) HTTP
B) DHCP
C) DNS
D) FTP
Answer: B) DHCP
35. What is the purpose of the subnet mask in an IP address configuration?
A) To identify the network portion of the IP address
B) To identify the host portion of the IP address
C) To determine the default gateway
D) To establish a secure connection
Answer: A) To identify the network portion of the IP address
36. Which of the following is a valid IPv4 address?
A) 2001:db8::1
B) 192.168.256.1
C) FE80::1
D) 172.16.31.254
Answer: D) 172.16.31.254
37. How many bits are used for the network portion of an IPv4 address in Class B?
A) 8 bits
B) 16 bits
C) 24 bits
D) 32 bits
Answer: B) 16 bits
38. What is the purpose of ARP (Address Resolution Protocol)?
A) To translate domain names to IP addresses
B) To discover the MAC address of a device on the local network
C) To route packets between networks
D) To encrypt data transmissions
Answer: B) To discover the MAC address of a device on the local network
39. In CIDR notation, what does the number after the slash represent?
A) The number of available host addresses
B) The number of network bits
C) The number of subnet bits
D) The number of bits in the IP address
Answer: B) The number of network bits
40. Which protocol is used for translating domain names to IP addresses?
A) SMTP
B) DHCP
C) DNS
D) FTP
Answer: C) DNS
41. Which of the following is NOT considered an endpoint device?
A) Desktop computers
B) Servers
C) Smartphones
D) Routers
Answer: D) Routers
42. What is a common method of protecting endpoints from malware and other threats?
A) Installing antivirus software
B) Disabling firewalls
C) Enabling guest access
D) Running outdated operating systems
Answer: A) Installing antivirus software
43. Which of the following is NOT a potential endpoint security threat?
A) Insider threats
B) Phishing attacks
C) Data encryption
D) Ransomware
Answer: C) Data encryption
44. What is the total number of available host addresses in a Class C subnet with a /28 subnet mask?
a) 16
b) 14
c) 30
d) 32
Answer: b) 14
45. How many subnets can be created from a Class C network with a /27 subnet mask?
a) 2
b) 4
c) 6
d) 8
Answer: d) 8
46. What is the network address of the first subnet in a Class C network with a /26 subnet mask?
a) 192.168.1.0
b) 192.168.1.64
c) 192.168.1.128
d) 192.168.1.192
Answer: a) 192.168.1.0
47. How many bits are available for host addresses in a Class C network with a /28 subnet mask?
a) 2
b) 4
c) 6
d) 8
Answer: b) 4
48. What is the subnet mask for a Class C network with 8 subnets?
a) /26
b) /27
c) /28
d) /29
Answer: c) /28
49. How many usable host addresses are there in a Class C subnet with a /29 subnet mask?
a) 6
b) 8
c) 14
d) 30
Answer: a) 6
50. What is the network address of the third subnet in a Class C network with a /28 subnet mask?
a) 192.168.1.0
b) 192.168.1.16
c) 192.168.1.32
d) 192.168.1.48