CCST Networking Practice Test 4

Cisco Certified Support Technician (CCST) – Networking Practice Test

1 / 20

What is the function of a DHCP relay agent?

2 / 20

A network technician needs to allow a VoIP system to function correctly over the network. What should be configured?

3 / 20

What protocol is used to synchronize time across network devices?

4 / 20

A company wants to ensure that only authorized users can physically connect their devices to the network. What should they implement?

5 / 20

What kind of device is used to extend a network connection over long distances using fiber optics?

6 / 20

What is the purpose of an IDS (Intrusion Detection System)?

7 / 20

What is the maximum transmission distance for a standard Cat6 Ethernet cable?

8 / 20

What protocol is used to securely manage network devices via a command-line interface?

9 / 20

A technician is configuring a router and wants to ensure it does not respond to ICMP echo requests from external networks. What should be configured?

10 / 20

A user reports intermittent Wi-Fi connectivity issues. What is the FIRST step in troubleshooting?

11 / 20

A company needs a secure remote access solution for employees working from home. Which technology should be implemented?

12 / 20

A network administrator wants to block access to social media websites at the firewall level. Which protocol should be used for this filtering?

13 / 20

Which command is used to display the routing table on a Windows PC?

14 / 20

Which subnet mask corresponds to a /22 subnet?

15 / 20

A network administrator is configuring an access point for a company’s employees. What should be used to ensure secure authentication?

16 / 20

What is the purpose of NAT (Network Address Translation)?

17 / 20

A technician is configuring a switch and wants to allow only specific MAC addresses to connect. Which feature should be enabled?

18 / 20

What is the purpose of the ARP (Address Resolution Protocol)?

19 / 20

A company wants to create redundant links between switches to prevent network loops. Which protocol should be used?

20 / 20

A technician is troubleshooting an issue where a user can access internal resources but cannot browse the internet. The technician verifies the device has a valid IP address and subnet mask. What should be checked next?

Your score is

The average score is 0%

0%