Sunday, June 19, 2016

Upwork SEO TEST 2018

Hello Freelancer, Get the SEO TEST of Latest version 2018. We are ready here to provide your desire upwork test answer. We already tested all exam test information Available include on here. So Dear, Why Late? Read the below full exam test and get more information from our website.



1. Which of the following image file types can be indexed by Google?
Answers:
  1. TIFF
  2. RAW
  3. WEBP
  4. PNG
2. Which of the following correctly describes what are considered to be “Doorway pages”?
Answers:
  1. Pages with a permanent redirect(301) to an external page with relevant content.
  2. Pages especially designed to link partner sites.
  3. Sets of poor-quality pages where each page is optimized for a specific keyword or phrase.
  4. None of these.
3. What would be the impact of meta keywords on Google’s ranking algorithm?
Answers:
  1. Meta keywords are not used by Google.
  2. Multiple meta keywords may bring better results in SERP.
  3. Google encourages the use of a single meta keyword for each page.
  4. Multiple meta keywords get penalized by Google.
4. Which of the following best describes the practice of “Google Bowling” from a negative SEO context?
Answers:
  1. Increasing the organic search ranking of a particular website or page by pointing hundreds or thousands of links at it, using very specific anchor text.
  2. Knocking a competitor out of the search results by pointing hundreds or thousands of low trust, low quality links at their website.
  3. Making a search engine believe that another website exists at a given URL.
  4. Using words which were traditionally associated with low quality content that caused search engines to want to demote the rankings of a page.
5. Which of the following HTTP headers tells search engines when content has been changed since the site was last crawled?
Answers:
  1. If-Modified-Since
  2. Last-Modified
  3. ETag
  4. Server
6. ]Which of the following is not a valid goal type from the perspective of Google Analytics?
Answers:
  1. Destination
  2. Duration
  3. Pages/Screens per visit
  4. Conversions
7. Which of the following best describes a blog “TrackBack”?
Answers:
  1. An automated notification that a website mentioned another website; it is a built-in feature on most popular blogging software programs.
  2. A link from one website to another. It is also called an inbound link.
  3. A method used to break a page down into multiple points on the web graph by breaking its pages down into smaller blocks.
  4. It is a method for tracking visitors on a website.
8. Which of the following practices are allowable under Google Webmaster Guidelines?
Answers:
  1. Using automated programs or services to create links to a site.
  2. Links with optimized anchor text in articles or press releases distributed on other sites.
  3. Forum commenting with optimized links in the post or signature.
  4. Advertising links that use the nofollow attribute.
9. Please choose which of the following tool belongs to the Bing Search Engine?
Answers:
  1. Keyword Planner
  2. SEO Analyzer
  3. Object Browser
  4. Open Graph Debugger
10. Which of the following rich snippet formats are supported by Google? Select all that apply.
Answers:
  1. Microdata
  2. Microformats
  3. Data Highlighter
  4. RDFa
11. Which of the following is not a valid method for verifying site ownership on Google?
Answers:
  1. HTML file verification
  2. Meta tag verification
  3. Google Analytics code verification
  4. None of these.
12. Which of the following statements is true about Sitemaps?
Answers:
  1. If a site is accessible on both the www and non-www versions of its domain, a separate Sitemap for each version must be submitted.
  2. A Sitemap file must contain no more than 50,000 URLs and must be no larger than 50MB when uncompressed.
  3. A Sitemap file should be specified under the following XML namespace: xmlns=”http://www.google.com/schemas/sitemap/0.9″.
  4. Google only accepts Sitemap files in XML format.
13. Which of the following HTML attributes can be used to provide descriptive text for site assets that a search engine crawler doesn’t typically recognize?
Answers:
  1. DESC
  2. ALT
  3. TEXT
  4. ROBOT
14. Which of the following practices may improve the Domain Authority rank of an automobile trading website?
A: Submitting the website to all directories that are available.
B: Getting backlinks from auto-niche blogs.
C: Getting backlinks from fashion-niche blogs.
D: Using Robots to post on forums.
E: Manually posting at least 50 comments/day.
Answers:
  1. A, D and E
  2. B
  3. B, D and E
  4. All of above.
15. Which of the following is an example of “Cloaking”, which is considered a “black hat” SEO technique?
Answers:
  1. Sending a visitor to a different URL than the one they initially requested.
  2. Locating text behind an image.
  3. Serving a page of HTML text to search engines, while showing a page of images or Flash to users.
  4. Using CSS to position text off-screen.
16. Which is the correct usage of the Keyword Planner Tool in order to get a Phrase Match search volume for “New York hotels”?
Answers:
  1. New York Hotels
  2. “New York Hotels”
  3. [New York Hotels]
  4. ?New York Hotels
17. Which of the following statements is true about the effect of page load times to a page’s ranking in Google’s search results?
Answers:
  1. Page load times affect a page’s ranking, and is given the same importance as a page’s relevance to the search query.
  2. Page load times affect a page’s ranking, but is given lesser importance compared to a page’s relevance to the search query.
  3. Page load times do not affect a page’s ranking.
  4. Google gives up on crawling a page if its load time is greater than 5 seconds.
18. Which of the following is true about Google’s treatment of keyword density in a given page?
Answers:
  1. Keyword density is no longer being considered by Google’s search algorithms.
  2. Targeted keywords should be used as frequently as possible in a page to maximize PageRank.
  3. Artificially increasing keyword density offers diminishing returns and may be penalized for “keyword stuffing” if taken too far.
  4. None of these.
19. Which of the following examples are considered by Google as “auto-generated” content? Select all that apply.
Answers:
  1. Text translated by an automated tool without human review or curation before publishing
  2. Text generated from scraping Atom/RSS feeds or search results
  3. Text generated by the website’s content management system
  4. Text generated using automated synonymizing or obfuscation techniques
20. Which of the following are recommended actions to take when a website is penalized by an “Unnatural links to your site” Manual Action from Google? Select all that apply.
Answers:
  1. Removing old content from the site.
  2. Preventing links that violate Google’s guidelines from passing PageRank.
  3. Using the Google Webmaster Tools to disavow any offending links that the site management isn’t responsible for.
  4. Requesting reconsideration of the site from Google.

Finally, no more words require about the SEO TEST  information in this session of this content. If you are require knowing more, Please ask to us via our contact us form or comment box. Please make sure that, you don’t send Personal information via the Comment box. Thanks for Being with us.

Saturday, June 18, 2016

Upwork Web Development TWITTER BOOTSTRAP TEST 2018

Hello Freelancer, Get the Web Development TWITTER BOOTSTRAP of Latest version 2018. We are ready here to provide your desire upwork test answer. We already tested all exam test information Available include on here. So Dear, Why Late? Read the below full exam test and get more information from our website. 


1. Which of the following LESS variables does not belong to the Navbar component?
Answers:
  1. @navbar-margin-bottom
  2. @navbar-border-radius
  3. @navbar-padding-horizontal
  4. @navbar-default-height
2. Which of the following classes will make tables scroll up horizontally when width of the view is under 768px?
Answers:
  1. .table
  2. .table-striped
  3. .table-condensed
  4. .table-responsive
  5. .table-scrollable
3. Which of the following will set a modal window to be closed when the escape key is pressed?
Answers:
  1. Setting the option “backdrop” to true
  2. Setting the option “backdrop” to static
  3. Setting the option “keyboard” to true
  4. Setting the option “escape” to true
4. Which of the following is the correct description of the given table?
<table class=”table”>

</table>
Answers:
  1. It has light padding and only horizontal dividers with an enabled hover state on table rows within a <tbody>.
  2. It has zebra-striping enabled on any table row within the <tbody>,
  3. It has light padding and only horizontal dividers.
  4. It is compacted by cutting cell padding in half.
5. Which of the following will correctly call a dialog prompt?
Answers:
  1. $(‘#myModal’).modal()
  2. $(‘#myModal’).modal({ keyboard: false })
  3. $(‘#myModal’).modal(‘show’)
  4. All of these
6. Which of the following is not a Bootstrap component?
Answers:
  1. Glyphicons
  2. Breadcrumbs
  3. Dropdowns
  4. Pivottable
7. Which of the following colors is the default hover background color of the table row?
Answers:
  1. #f9f9f9
  2. #f5f5f5
  3. #ddd
  4. #66afe9
8. How many validation styles for states of on-form controls does Bootstrap have?
Answers:
  1. 6
  2. 5
  3. 4
  4. 3
9. Which of the following are not options of the method $().tooltip(options)?
Answers:
  1. animation
  2. delay
  3. backdrop
  4. show
10. Which of the following are helper classes?
Answers:
  1. .close
  2. .badge
  3. .caret
  4. .clearfix
11. Which of the following statements is correct about using the Collapse plugin?
A) The Transitions plugin must be included.
B) The Popover plugin must be included.
Answers:
  1. Statement A is true while Statement B is false.
  2. Statement B is true while Statement A is false.
  3. Both statements are true.
  4. Both statements are false.
12. Which of the following are not Bootstrap plugins?
Answers:
  1. transition
  2. tocible
  3. tooltip
  4. boilerplate
13. Which of the following statements are correct with regards passing options?
A) Options can be passed via data attributes or JavaScript.
B) For data attributes, the option name has to be appended to option-, as in option-animation=””.
C) For data attributes, the option name has to be appended to data-, as in data-animation=””.
D) Options can be passed only via JavaScript.
Answers:
  1. A and B
  2. A and D
  3. C
  4. A and C
14. Which type of trigger cannot be used with the “delay” option to show and hide a popover?
Answers:
  1. click
  2. hover
  3. focus
  4. manual
15. What is the default amount of time delay between automatically cycling items in a carousel?
Answers:
  1. 2000
  2. 3000
  3. 5000
  4. None of these
16. Which of the following classes are contextual classes?
Answers:
  1. .success
  2. .warning
  3. .error
  4. .danger
17. Which of the following will set a modal window to not be closed on click?
Answers:
  1. Setting the option “backdrop” to true
  2. Setting the option “backdrop” to static
  3. Setting the option “keyboard” to true
  4. None of these
18. Which of the following components is used to indicate the current page’s location within a navigational hierarchy?
Answers:
  1. navs
  2. breadcrumbs
  3. pagination
  4. navbar
  5. progress bars
19. What does the following HTML code do?
<span class=”caret”></span>
Answers:
  1. It generates a close icon for dismissing content like modals and alerts.
  2. It utilizes the micro clearfix.
  3. It indicates dropdown functionality and direction.
  4. It indicates back button functionality.
20. What does the following HTML code do?
<span class=”badge”>…</span>
Answers:
  1. It indicates dropdown functionality and direction.
  2. It utilizes the micro clearfix.
  3. It highlights new or unread items.
  4. It extends the entire viewport.
Finally no more words require about the Web Development TWITTER BOOTSTRAP  information in this session of this content. If you are require knowing more, Please ask to us via our contact us form or comment box. Please make sure that, you don’t send Personal information via the Comment box. Thanks for Being with us.

Upwork CISCO TEST 2018

Hello Freelancer, Get the CISCO TEST of Latest version 2018. We are ready here to provide your desire upwork test answer. We already tested all exam test information Available include on here. So Dear, Why Late? Read the below full exam test and get more information from our website.



1. Which command/s will you use to configure static routing on a router?
Answers:
  1. Router(config)# ip route static
  2. Router(config)# ip route 0.0.0.0 0.0.0.0 172.16.0.1
  3. Router(config)# ip route 10.0.0.0 255.0.0.0 172.16.0.1
  4. Router(config)# ip route 192.168.1.0 255.255.255.0 E1
  5. Router(config)# ip route 255.255.255.255 0.0.0.0 127.0.0.1
2. Which information is exchanged by Cisco devices on which CDP is running?
Answers:
  1. Routing Tables
  2. Platform
  3. Traffic Data
  4. Capabilities List
  5. Username & Password
3. Which of the following ranges are reserved as private addresses?
Answers:
  1. 192.168.0.0 – 192.255.255.255
  2. 172.16.0.0 – 172.255.255.255
  3. 10.0.0.0 – 10.255.255.255
  4. 172.16.0.0 – 172.31.255.255
4. Which of the following are examples of the Data Link Layer?
Answers:
  1. Token Ring
  2. IP
  3. Ethernet
  4. MAC
  5. IPX
5. Which two factors are used by default for calculation of metric by EIGRP?
Answers:
  1. Bandwidth
  2. Hop Count
  3. Reliability
  4. Load
  5. Delay
6. Which of the following are frame relay LMI types?
Answers:
  1. DLCI
  2. Cisco
  3. IEEE 802.1Q
  4. Q933A
7. Which two authentication methods can be used with PPP links?
Answers:
  1. CHAP
  2. Verisign
  3. PAP
  4. MD5
8. Which of the following devices can be connected using a Rollover cable?
Answers:
  1. Router Ethernet Port to Router Ethernet Port
  2. Switch Console Port to PC COM Port
  3. Switch Ethernet Port to Switch Ethernet Port
  4. Router Ethernet Port to Switch Ethernet Port
  5. Router Console Port to PC COM Port
9. Which of the following Protocols work on Application Layer of OSI model?
Answers:
  1. HTTP
  2. FTP
  3. IP
  4. UDP
10. Which of the following techniques are used by transport layer?
Answers:
  1. Flow Control
  2. Route Update Packets
  3. Sequencing
  4. Acknowledgements
  5. Network Address
11. Which of the following frame-tagging methods can be used for creating a trunk link between Cisco and Non-Cisco switches?
Answers:
  1. ISL
  2. VTP
  3. IEEE 802.1Q
  4. IETF
12. What is the network ID of IP address 172.16.40.0/20?
Answers:
  1. 172.16.16.0
  2. 172.16.36.0
  3. 172.16.32.0
  4. 172.16.0.0
13. At which layer of OSI Model does a router work?
Answers:
  1. Presentation Layer
  2. Transport Layer
  3. Network Layer
  4. Datalink Layer
  5. Application Layer
  6. Physical Layer
  7. Session Layer
14. What is the maximum speed supported by a standard ISDN BRI?
Answers:
  1. 64 kbps
  2. 128 kbps
  3. 256 kbps
  4. 1.544 Mbps
15. Which of the following addresses is reserved for loopback tests?
Answers:
  1. 10.0.0.1
  2. 172.16.0.1
  3. 192.168.0.1
  4. 127.0.0.1
16. Which command will apply access-list 150 on interface e0 in outbound direction?
Answers:
  1. router(config-if)# ip access-list 150 out
  2. router(config-if)# ip access-class 150 out
  3. router(config-if)# ip out access-group 150
  4. router(config-if)# ip access-group 150 out
17. You executed the following command on your router:
Router(config)# router ospf 15
Which command will you execute next to complete OSPF configuration on your router?
Answers:
  1. Router(config-router)# network 172.16.0.0 255.255.0.0 area 5
  2. Router(config)# network 172.16.0.0 0.0.255.255 area 5
  3. Router(config-router)# network 172.16.0.0 0.0.255.255 area 5
  4. Router(config# ip route ospf 172.16.0.0 255.255.0.0 area 5
18. What will happen if you declare an interface as passive interface in IGRP routing protocol?
Answers:
  1. The router will stop sending and receiving any dynamic updates
  2. The router will stop sending any dynamic updates but can still receive updates
  3. The interface will stop receiving any dynamic updates
  4. The interface will stop sending any dynamic updates but can still receive updates
19. Which of the following are stored in RAM?
Answers:
  1. Startup-config
  2. Running-config
  3. Routing Table
  4. All of the above
20. What will be the command for standard access control list to deny a single source address 10.15.12.2?
Answers:
  1. access-list 50 deny 10.0.0.0 255.255.255.0
  2. access-list 50 deny 10.15.12.2 0.255.255.255
  3. access-list 50 deny host 10.15.12.2
  4. access-list 50 deny 10.15.12.2 255.255.255.255
21. What is the main purpose of creating VLANs?
Answers:
  1. They create single collision domain
  2. They provide fast speed to the LANs
  3. They break up the broadcast domain
  4. None of the above
22. How many bits of a MAC address are used by OUI portion?
Answers:
  1. 32 bits
  2. 48 bits
  3. 24 bits
  4. 16 bits
23. At which layer of OSI model does a hub work?
Answers:
  1. Network Layer
  2. Application Layer
  3. Physical Layer
  4. Data Link Layer
24. Which command is used to configure the configuration-register of a router?
Answers:
  1. Router(config)# config-register 0x2102
  2. Router# config-register 0x2102
  3. Router(config-line)# config-register 0x2102
  4. Router(config-router)# config-register 0x2102
25. What is the speed of a T1 line?
Answers:
  1. 128 kbps
  2. 144 kbps
  3. 2.048 Mbps
  4. 1.544 Mbps
26. In which of the following networks, are DR and BDR elected in OSPF?
Answers:
  1. Broadcast multi-access
  2. Point-to-point
  3. Nonbroadcast multi-access
  4. Point-to-multipoint
27. Which command will you execute to use 16 subnets of a class C network with subnet mask of 255.255.255.240?
Answers:
  1. Router(config)#ip all-subnets
  2. Router(config)#ip subnet 16
  3. Router(config)#ip classless
  4. Router(config)#ip subnet-zero
28. In which of the following memories is Mini-IOS or bootloader of a router stored?
Answers:
  1. RAM
  2. ROM
  3. NVRAM
  4. Flash Memory
29. Which encapsulation method will you choose if you want to connect a Cisco router and a non Cisco router with a serial connection?
Answers:
  1. HDLC
  2. PPP
  3. LAPD
  4. LAPB
30. Which key combination is used to interrupt the boot sequence of a router?
Answers:
  1. Esc + Ctrl
  2. Ctrl + Z
  3. Ctrl + Break
  4. Alt + Ctrl + Del
31. What is the command to show Frame relay map table?
Answers:
  1. Router(config)# show frame-relay map
  2. Router# show frame-relay
  3. Router(config-router)# show frame-relay table
  4. Router# show frame-relay map
32. If a router has been configured for static routing, IGRP, OSPF, EIGRP and RIP with their default values, which routing will the router use to send data?
Answers:
  1. RIP
  2. OSPF
  3. IGRP
  4. EIGRP
  5. Static Routing
33. How many Broadcast Domains are there if two switches are connected to each other using a trunk link?
Answers:
  1. 2
  2. 1
  3. 4
  4. None
34. Which of the following commands show Cisco IOS image file name?
Answers:
  1. show startup
  2. show running
  3. show version
  4. show history
35. What is the subnetwork to which IP address 10.70.50.255/18 belongs?
Answers:
  1. 10.70.10.0
  2. 10.70.50.0
  3. 10.70.32.0
  4. 10.70.0.0
  5. 10.0.0.0
36. Which subnet mask will you use to fulfill the requirements of all the departments if you are using a class C network?
Answers:
  1. 255.255.255.0
  2. 255.255.255.252
  3. 255.255.255.224
  4. 255.255.255.192
  5. 255.255.255.128
37. State whether True or False:
You have two routers connected with point-to-point links using different encapsulation methods. They will be able to communicate with each other.
Answers:
  1. True
  2. False
38. Which of the following statements are true for inter VLAN communication?
Answers:
  1. A router that supports inter VLAN communication is required
  2. The router must support the same encapsulation method as supported by the switch
  3. If the router has only one Ethernet interface, sub-interfaces must be configured
  4. All of the above
39. Routing protocols use a method to advertise many networks as one network to other routers. What is that method called?
Answers:
  1. Supernetting
  2. Summarization
  3. Subnetting
  4. None of the above
40. Which command is used to disable domain lookup?
Answers:
  1. no ip domain-lookup
  2. disable domain-lookup
  3. no domain-lookup
  4. None of the above
41. If you have a subnet mask of /26 for a class C network, how many subnets and host per subnet will you get?
Answers:
  1. 4 networks and 62 hosts
  2. 16 networks and 16 hosts
  3. 2 networks and 128 hosts
  4. 62 networks and 2 hosts
  5. 6 networks and 30 hosts
42. What is the binary value of hex 9F?
Answers:
  1. 10011111
  2. 10111000
  3. 11110001
  4. 10001111
43. Which of the following must be configured on a switch to segment Broadcast Domain?
Answers:
  1. VTP
  2. PVC
  3. VLAN
  4. FTP
  5. TFTP
44. What is the OUI portion of MAC address B4-3F-95-5F-1D-09 in binary?
Answers:
  1. 10110100-00111111-10010101
  2. 11100110-11001001-01110011
  3. 11000011-10000111-11110001
  4. 00111100-10010001-10111001
45. What should be the value of configuration register in a router to boot IOS image stored in ROM?
Answers:
  1. 0x2102
  2. 0x2101
  3. 0x2142
  4. 0x101
46. What is the maximum number of hosts allowed on subnet 172.16.50.75/22?
Answers:
  1. 510
  2. 1022
  3. 4094
  4. 8190
47. Which is the default mode of operation in a VTP domain for all catalyst switches?
Answers:
  1. Client
  2. Server
  3. Transparent
  4. None of the above
48. Which command will you execute to see whether the cable attached with your router’s Serial 0 is DCE or DTE?
Answers:
  1. show controllers serial 0
  2. show interface serial 0
  3. show ip interface serial 0
  4. show interface brief serial 0
49. Which of the following statements is true regarding VLAN 1?
Answers:
  1. It is a default VLAN
  2. You cannot delete VLAN 1
  3. You cannot rename VLAN 1
  4. All of the above
50. If interface Ethernet 0 is showing that it is administratively down, what will you do to turn it on?
Answers:
  1. Change the cable connected with Ethernet 0
  2. Restart the router
  3. Execute ‘no shutdown’ command
  4. Execute ‘clock rate ‘ command
51. Which protocol is used to find the MAC address of a device whose IP address is known?
Answers:
  1. ARP
  2. SMTP
  3. IARP
  4. RARP
52. What is the full form of CSMA/CD?
Answers:
  1. Code Sense, Multiple Access with Collision Detection
  2. Carrier Sense, Multiple Access with Code Division
  3. Collision Sense, Multiple Access with Carrier Detection
  4. Carrier Sense, Multiple Access with Collision Detection
53. On which layer of the OSI model do TCP & UDP work?
Answers:
  1. Transport Layer
  2. Session Layer
  3. Presentation Layer
  4. Network Layer
54. What is the command to configure PPP encapsulation on serial 0?
Answers:
  1. Router(config)# configure encapsulation ppp
  2. Router(config)# encapsulation ppp
  3. Router(config-if)# encapsulation ppp
  4. Router# encapsulation ppp serial 0
55. Which of the following commands will prevent telnet access from all users on subnet 172.16.16.0 with subnet mask 255.255.240.0 to any destination?
Answers:
  1. access-list 115 deny tcp 172.16.16.0 255.255.240.0 any eq 23
  2. access-list 115 deny tcp 172.16.16.0 0.0.16.255 any eq 23
  3. access-list 115 deny tcp 172.16.16.0 0.0.15.255 any eq 21
  4. access-list 115 deny tcp 172.16.16.0 0.0.15.255 any eq 23
56. What is the binary value of hex BF?
Answers:
  1. 10100000
  2. 10111111
  3. 11111000
  4. 00111011
57. Which type of NAT uses different ports to map multiple IP addresses to a single global IP address?
Answers:
  1. Dynamic NAT
  2. NAT with overloading
  3. Static NAT
  4. All of the above
58. You are not able to create a new VLAN and cannot delete or change existing VLANs on a switch. What could be the problem?
Answers:
  1. Trunk link is not configured properly
  2. The switch is in VTP Transparent mode
  3. The switch is in VTP Client mode
  4. None of the above
59. You made some changes in your router’s configuration and executed the following command:
Router# copy run start
When you restarted your router it went into the Setup mode. What is the problem?
Answers:
  1. The command ‘copy run start’ is incorrect
  2. The NVRAM is corrupt
  3. The value of configuration register is set to 0x2142
  4. Nothing is wrong, you have to configure the router every time it restarts
60. What is the default number of commands that a router can show if you execute ‘show history’ command?
Answers:
  1. 15
  2. 10
  3. 20
  4. 256
61. In which of the following modes does a switch not participate in VTP domain, but still forwards VTP advertisements by trunk links?
Answers:
  1. Server
  2. Domain
  3. Client
  4. Transparent
62. Which of the following services can be used to set up a database of MAC addresses that can be used for dynamic addressing of VLANs?
Answers:
  1. Static VLAN
  2. VMPS
  3. STP
  4. VTP
63. What is the speed of ISDN PRI service with 30B +1D channel?
Answers:
  1. 2.048 Mbps
  2. 1.544 Mbps
  3. 144 Kbps
  4. 128 Kbps
64. Which of the following cables is not prone to electrical interferences?
Answers:
  1. Shielded Twisted Pair (STP)
  2. Unshielded Twisted Pair (UTP)
  3. Fiber Optic
  4. Copper wire
  5. Coaxial
65. Which two statements are true about CHAP authentication method?
Answers:
  1. It is more secure than PAP
  2. It is supported by HDLC
  3. It is less secure than PAP
  4. It sends authentication messages periodically during the connection
66. How many access control lists can be applied on an interface?
Answers:
  1. One access control list in each direction for each protocol
  2. Two access control lists in each direction
  3. Unlimited
  4. Access control list cannot be applied on an interface
67. Which of the following is a Multicast Address?
Answers:
  1. 127.0.0.1
  2. 192.168.1.255
  3. 10.0.0.0
  4. 224.10.1.7
68. Which command is used to view the list of all active connections made to the console and VTY ports of your router?
Answers:
  1. show session
  2. show connections
  3. show lines
  4. show users
69. Which of the following subnet masks should you use on Router A and Router B serial links so that there is minimum wastage of IP addresses?
Answers:
  1. 255.255.255.255
  2. 255.255.0.0
  3. 255.255.255.0
  4. 255.255.255.252
  5. 255.255.255.254
70. What is the full form of ISDN?
Answers:
  1. International Subscriber Digital Network
  2. International Services Digital Network
  3. Internet Services Digital Network
  4. Integrated Services Digital Network
71. Which layer of OSI model encapsulates packets into frames?
Answers:
  1. Transport Layer
  2. Data Link Layer
  3. Network Layer
  4. Physical Layer
72. What is the binary value of 157?
Answers:
  1. 11000111
  2. 10111001
  3. 11100011
  4. 10011101
73. Which of the following provides routing protocol support for IPX, Appletalk and IP networks simultaneously?
Answers:
  1. RIP v2
  2. OSPF
  3. IGRP
  4. EIGRP
74. Which of the following commands will you use to enable RIP version 2 on your router?
Answers:
  1. Router(config)# version 2
  2. Router(config-router)# version 2
  3. Router(config-if)# version 2
  4. Router# rip version 2
75. Which statement is true about RID (Router ID) in OSPF?
Answers:
  1. It is always the highest IP address of active interfaces
  2. It is the highest IP address of all configured loopback interfaces
  3. It is locally significant
  4. It is only used for election of DR
76. What is the Administrative Distance (AD) of OSPF?
Answers:
  1. 1
  2. 120
  3. 110
  4. 90
77. Which of the following devices is used to connect a non ISDN device with an ISDN network?
Answers:
  1. NT1
  2. TE2
  3. TA
  4. TE1
78. Which protocol uses port number 23?
Answers:
  1. FTP
  2. SMTP
  3. Telnet
  4. HTTP
79. What do you understand from the following commands:
access-list 110 deny tcp 192.168.10.0 0.0.0.255 any eq 21
access-list 110 permit ip any any
Answers:
  1. This access-list denies any Telnet traffic from network 192.168.10.0 255.255.255.0
  2. This access-list allows any IP traffic from any source to any destination
  3. This access-list denies any FTP traffic from network 192.168.10.0 255.255.255.0
  4. This access-list denies any FTP traffic to network 192.168.10.0 255.255.255.0
80. What is the command for copying a router’s IOS to a TFTP server?
Answers:
  1. copy ios tftp
  2. copy start tftp
  3. copy flash tftp
  4. copy flash-config tftp
81. Which of the following things are stored in RAM?
Answers:
  1. ARP Cache
  2. Running configuration
  3. Routing tables
  4. All of the above
82. What is the default value of flush timers in IGRP?
Answers:
  1. 630 seconds
  2. 90 seconds
  3. 270 seconds
  4. None of the above
83. What is the hop count limit for OSPF?
Answers:
  1. 15
  2. 255
  3. 256
  4. None
84. What is the maximum number of subnets (usable) that you can create in a class B network?
Answers:
  1. 16384
  2. 32768
  3. 65536
  4. Infinite
85. Which one of the following addresses can be used as a host address for the subnet 192.168.50.16/28?
Answers:
  1. 192.168.50.32
  2. 192.168.50.16
  3. 192.168.50.64
  4. 192.168.50.30
86. Which of the following switching methods forward the frame after reading the destination MAC address only?
Answers:
  1. Fast forward
  2. Cut-through
  3. Fragment free
  4. Store and forward
87. Which command is used to encrypt all the passwords of a router?
Answers:
  1. enable password-encryption
  2. service password-encryption
  3. encrypt passwords
  4. enable encrypt-password
88. Different routing protocols use different methods to calculate the distance to a network. What is that method called?
Answers:
  1. Administrative Distance
  2. Metric
  3. Routing Table
  4. None of the above
89. Which of the following switches support both ISL and 802.1Q encapsulation methods?
Answers:
  1. 1900
  2. 2950
  3. 3550
  4. All of the above
90. Which command will you use to configure IP address on an interface?
Answers:
  1. Router(config-if)# ip 192.168.1.1 255.255.255.0
  2. Router(config-if)# ip address 192.168.1.1
  3. Router(config-if)# ip address 192.168.1.1/24
  4. Router(config-if)# ip address 192.168.1.1 255.255.255.0
  5. Router(config-if)# ip address 192.168.1.1 subnet 255.255.255.0
91. Which of the following routing protocols are Cisco proprietary?
Answers:
  1. IGRP
  2. EIGRP
  3. OSPF
  4. RIP
92. What is the maximum number of paths supported by IGRP for load balancing?
Answers:
  1. Four
  2. Six
  3. Twelve
  4. Infinite
93. What is the decimal equivalent of binary 11001110?
Answers:
  1. 207
  2. 250
  3. 206
  4. 192
Finally no more words require about the CISCO TEST information in this session of this content. If you are require knowing more, Please ask to us via our contact us form or comment box. Please make sure that, you don’t send Personal information via the Comment box. Thanks for Being with us.