150 CCNA Switch Configuration MCQS with Explanation

31. Which mode allows a switch to connect two VLANs and route traffic between them?

  • a) Access mode
  • b) Trunk mode
  • c) Router mode
  • d) Inter-VLAN routing

Answer: d) Inter-VLAN routing

Inter-VLAN routing allows traffic to be routed between VLANs on a switch, typically using a Layer 3 switch.

32. Fill in the blank: The _____ command enables the display of the current VLAN configuration on a switch.

  • a) show vlan
  • b) show switch
  • c) display vlan
  • d) vlan status

Answer: a) show vlan

The show vlan command displays the current VLAN configuration and status on a switch.

33. Which command is used to set the speed of a switch port to 100 Mbps?

  • a) speed 10
  • b) speed 100
  • c) speed auto
  • d) speed 1000

Answer: b) speed 100

The speed 100 command sets the speed of the switch port to 100 Mbps.

34. Which IP address is reserved for loopback testing?

  • a) 192.168.0.1
  • b) 127.0.0.1
  • c) 10.0.0.1
  • d) 172.16.0.1

Answer: b) 127.0.0.1


Explanation: The IP address 127.0.0.1 is reserved for loopback testing, which allows the network interface to communicate with itself.

35. Which of the following is true about a broadcast domain?

  • a) It is limited by switches.
  • b) It is limited by routers.
  • c) It encompasses all devices on a VLAN.
  • d) It is the same as a collision domain.

Answer: b) It is limited by routers.

Broadcast domains are separated by routers, while switches do not break broadcast domains.

36. Which protocol is used by switches to prevent loops in a network?

  • a) OSPF
  • b) RIP
  • c) STP
  • d) EIGRP

Answer: c) STP

The Spanning Tree Protocol (STP) is used by switches to prevent loops in a network.

37. Fill in the blank: The _____ command shows the MAC address table on a Cisco switch.

  • a) show mac
  • b) show mac-address-table
  • c) show address
  • d) show mac-table

Answer: b) show mac-address-table

The show mac-address-table command displays the MAC address table, showing which MAC addresses are associated with which ports.

38. Which command is used to secure a switch by filtering IP addresses?

  • a) ip filter
  • b) access-list
  • c) ip access-group
  • d) ip secure

Answer: b) access-list


The access-list command is used to create rules that filter traffic based on IP addresses, enhancing switch security.

39. Which of the following commands would you use to initiate an SSH session from one device to another?

  • a) ssh
  • b) telnet
  • c) rlogin
  • d) ftp

Answer: a) ssh

The ssh command is used to start a secure shell session for encrypted communication between devices.

40. What is the maximum number of host IP addresses in a Class C network?

  • a) 256
  • b) 254
  • c) 512
  • d) 1024

Answer: b) 254

A Class C network with a subnet mask of 255.255.255.0 allows for 254 usable host IP addresses.
We will be happy to hear your thoughts

Leave a reply