Sunday, July 4, 2010

CCNA 3 exploration - Final Exam (update - 2)

CCNA 3 - final exam 


1.Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect?
AS1 and AS2***
DS1 and DS2 DS1,
DS2, and CS1 AS1,
AS2, DS1, and DS2

2 What advantage does cut-through switching provide?
It enables QoS It forwards frames quickly.***
It provides an analysis of frames.
It allows reduction of traffic by using error checking to drop corrupt frames.

3 Which switch forwarding method should be used on a network that employs frame
classification based on an assigned Quality of Service (QoS) value? cut-through fast-forward fragment-free store-and-forward***
4
Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?
only hosts A and B only hosts A, B, and C***
only hosts A, B, C, and D
only hosts A, B, C, and E
5
Refer to the exhibit. The network consists of four hubs and a switch. The hosts connected to each hub are assigned addresses in the respective VLAN as shown. PC1 on VLAN 1 becomes infected with a virus and initiates a continuous IP broadcast. Which hubs will receive the broadcasts?
Hub A
Hubs A andB
Hubs A and C***
Hubs A, B, C, and D

6 Which three statements are correct concerning the default configuration of a new switch? (Choose three.)
It is configured in VTP server mode.***
STP is automatically enabled.***
The first VTY line is automatically configured to allow remote connections.
VLAN1 is configured with a management IP address. All switch ports are assigned toVLAN1.****
The enable password is configured as cisco.

7 What will be the effect of the command S1# copy system:running-config tftp://172.16.2.155/tokyo-config?
The IOS will be copied to the TFTP server.
The configuration file named tokyo-config will overwrite the startup configuration file on S1.
The running configuration file on S1 will be saved via TFTP to a file named tokyo-config.***
The contents of NVRAM on S1 will become the startup configuration file on the tokyo switch.
8
Refer to the exhibit. The network administrator wants to allow both SSH and Telnet connections to Switch1. However, the SSH connections fail. What is the most likely cause of this problem? The RSA key has been removed.***
SSH has been configured on the wrong line.
The transport input command is applied incorrectly.
The domain name has been configured in the wrong configuration mode.

9 What is the benefit of the auto-MDIX feature on a Cisco Catalyst switch?
dynamically assigns a new management VLAN ID
autonegotiates IP address information for initial management connections
allows the use of straight-through patch cables regardless of connected device types***
places a port immediately in the forwarding state to reduce the time for the spanning tree to reconverge
10
Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?
This entry can only be removed from the MAC address table by a network administrator.
When forwarding a frame to the device with address 0060.5c5b.cd23, the switch does not have to perform a lookup to determine the final destination port.
Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18. The switch learned this MAC address from the source address in a frame received on Fa0/18.****
11
Refer to the exhibit. The teacher host is connected to port Fa0/7 on switch STW. A student has decided to share access to the Internet by attaching a hub and laptop to STW as shown. What will be the result of the student making this connection?
The Fa0/7 port of STW will be shutdown.
The student will gain full access to the Internet.
Both the teacher and student will be able to receive data but only the teacher will be able to send.
The frames from the laptop will be dropped, but the teacher host will maintain connectivity with the network.***

12 Which statement regarding the service password-encryption command is true?
The service password-encryption command is entered at the privileged EXEC mode prompt. The service password-encryption command encrypts only passwords for the console and VTY ports.
The service password-encryption command encrypts all previously unencrypted passwords in the running configuration.***
To see the passwords encrypted by the service password-encryption command, enter the no service password-encryption command.

13 A network administrator enables sticky learning on all access mode interfaces of a Catalyst switch, saves the configuration, then connects hosts to the switch. After the switch operates for several days, the administrator reboots the switch without saving the running configuration. What is the result?
All previously learned MAC addresses are lost.***
The switch reverts to non-sticky dynamic learning.
Connected hosts are no longer able to communicate with the switch.
Previously learned sticky addresses are retained in the switch configuration.

14
Refer to the exhibit. The Layer 2 switching design that is shown has been implemented in a campus environment that is using Spanning Tree Protocol. All inter-switch links that are shown are trunks. Whenever an inter-switch link fails, the network takes nearly a minute to completely converge. How can the convergence time be reduced?
Increase the capacity of the distribution and core trunk links to 10 Gb/s.
Add a trunk link that directly connects D1 and D2.
Use Layer 3 switching on the core switch.
Implement Rapid Spanning Tree Protocol.***

15 What is a result of improperly implementing a network with redundancy at Layer 2?
an increase of unicast and multicast errors at Layer 3
a decrease in the amount of broadcast traffic
end device malfunction because of broadcast storms***
an increase in throughput at all points in the network

16 Why is it important that the network administrator consider the spanning-tree network diameter when choosing the root bridge?
The network diameter limitation is 9.
BPDUs may be discarded because of expiring timers.***
The cabling distance between the switches is 100 meters.
The network diameter must be set to the number of meters of the cable between the root bridge and its farthest connected switch.
17
Refer to the exhibit. What does "FORWARDING" mean in the command output shown?
The switch is sending and receiving data frames.-***
The switch is receiving BPDUs, but not sending data frames. The switch is participating in an election process by forwarding the BPDUs it receives. The switch is receiving BPDUs and populating the MAC address table, but not sending data.

18

Which device or devices should have the Spanning Tree Protocol enabled to prevent host traffic from creating a broadcast storm?
Core_S1 Access_S2 and Access_S3
Core_S1, Access_S2, and Access_S3****
Core_S1, Access_S2, Access_S3, and R1
19
Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?
Cat-A Cat-B Cat-C Cat-D***
20 RSTP is enabled in a switched network that is active and converged. Which switch port type assumes a discarding state on non-root switches? root port edge port alternate port*** designated port
21 In the implementation of PVST+ in a specific VLAN where all switches have default spanning tree priorities, which spanning-tree command setting could be assigned to force one of the Catalyst switches to become and remain the root bridge? root primary-*** priority 8192 priority 2048 spanning-tree mode rapid pvst

22
Refer to the exhibit. All edge ports are configured with the spanning-tree portfast command. Host1 is recently connected to port Fa0/1 on switch SW1 . Which statement is true about the status of port Fa0/1?
The port will transition into blocking state.
The port will transition immediately into forwarding state.***
The port will transition into blocking state and then immediately into forwarding state. The port will transition into blocking state and immediately transition through the listening and learning states.

23 While monitoring LAN traffic, a network technician notices an excessive number of broadcasts. Which two steps could be included in the processes that are needed to reduce the number of broadcasts on the network? (Choose two.)
Replace any existing hubs with switches. Add a Layer 3 device to route between networks.*** Subnet the existing IP network to create two networks.***
Increase the backbone speed by three times the current speed. Add additional switches and spread out the number of hosts evenly between them.

24 How does a switch that is configured for 802.1Q trunking handle untagged frames that are received on a trunk port?
The frames are dropped.
The frames are assigned to the native VLAN.***
The frames are assigned to the default VLAN. The frames are assigned to the management VLAN.
25
Refer to the exhibit. What would happen if the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1?
Host A remains a member of VLAN 10, because the router is routing traffic between VLANs. Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30.***
Host A remains a member of VLAN 10, because the switch provides dynamic VLAN assignment for the port. Host A maintains connectivity to all members of VLAN 10, because it is connected to the same physical network. Host A is no longer a member of VLAN 10, but because port Fa0/3 was unused, it is now a member of VLAN 1.

26
Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit. However, hosts B and D cannot ping each other. What is the most likely cause of this problem?
The link between the switches is up but not trunked. The Fa0/11 interface of Switch1 is not configured as a trunk.
Hosts B and D are configured with IP addresses from different subnets.***
VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.
27
Refer to the exhibit. A network administrator issues the show interfaces fastEthernet 0/8 switchport command to check the status of the port. What can be concluded from the output? Port Fa0/8 is configured as a trunk with 802.1q encapsulation.
Port Fa0/8 is configured as a trunk in VLAN 1.
Port Fa0/8 is configured in access mode and associated with VLAN 1.***
Port Fa0/8 is configured as a trunk and VLAN 1 is a native VLAN for the trunk.
28
Refer to the exhibit. SW-T has been configured with a single trunking interface. Which VLANs will be allowed across the trunk?
Only VLAN 1 will be allowed across the trunk.
All configured VLANs will be allowed across the trunk.***
Only the native VLAN will be allowed across the trunk.
Only the the management and native VLANs will be allowed across the trunk. Only VLANs that are configured on the VTP server in the domain will be allowed across the trunk.
29
Refer to the exhibit. How will switch S2 manage traffic coming from host PC1?
S2 will drop the traffic, unless it is management traffic.
S2 will tag the frame with VLAN ID 99 when it forwards it over the trunk link.
S2 will leave the traffic untagged when it forwards it over a trunk link.***
S2 will tag the traffic with the highest VLAN ID value when it forwards it over the trunk link.

30 What is the purpose of VLAN trunking?
It improves network performance by reducing broadcast traffic. It selects the best path to transmit data in a switched network.
It carries the traffic of multiple VLANs through a single link.***
It avoids spanning tree loops in a switched network.

31 A network administrator implements inter-VLAN routing by configuring subinterfaces on a router. What is one important fact that must be considered?
The physical interface must have an IP address configured.
The subinterface numbers must match the VLAN ID number.
The no shutdown command must be issued on each subinterface.
The IP address of each router subinterface must be used as the default gateway for hosts on the corresponding VLAN.***

32
Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. What should be done to fix the problem?
Configure VLANs with different VLAN IDs on switch SW2.
Reconfigure the trunk port on switch SW2 with static trunk configuration.***
Introduce a Layer 3 device or a switch with Layer 3 capability in the topology.
Apply IP addresses that are in the same subnet to the interfaces used to connect SW1 and SW2.
33
Refer to the exhibit. Which three options correctly describe the router configuration that is shown? (Choose three.)
An IEEE standard trunking protocol is in use.***
Interface Fa0/1 has been configured with subinterfaces.***
The shutdown command has been applied to interface Fa0/1. Interface Fa0/1.3 is mapped to the default management VLAN.
The configuration is appropriate for a router-on-a-stick network design.***
An IP address should be applied to interface Fa0/1 for routing to occur.
34
Refer to the exhibit. A new host needs to be connected to VLAN 3. Which IP address should be assigned to this new host?
192.168.1.22 /28
192.168.1.31 /28
192.168.1.32 /28
192.168.1.52 /28***
192.168.1.63 /28
35
Refer to the exhibit. A network administrator is configuring RT1 for inter-VLAN routing. The switch is configured correctly and is functional. Host1, Host2, and Host3 cannot communicate with each other. Based on the router configuration, what is causing the problem?
Interface Fa0/0 is missing IP address configuration information.
IP addresses on the subinterfaces are incorrectly matched to the VLANs.***
Each subinterface of Fa0/0 needs separate no shutdown commands.
Routers do not support 892.1Q encapsulation on subinterfaces.
36
Refer to the exhibit. Router R1 is properly configured for router on a stick inter-VLAN routing, but PC1 is unable to ping PC2. What needs to be done to resolve the problem?
Rename VLAN1.
Connect one more port of S1 to R1. Configure the Fa0/1 port of S1 as a trunk port.***
Move the Fa0/0 interface of R1 to another VLAN.
37
Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and host B are on the default VLAN but are not able to exchange traffic. What should be done to fix the problem?

Allow all VLANs on the trunk link.
Remove the native VLAN from the trunk.
Include a router or switch with Layer 3 capabilities.
Configure the same native VLAN on both ends of the trunk.***
38
Refer to the exhibit. A network administrator has segmented the network into two VLANs. The connected hosts can only access resources in their own VLAN. What is the most scalable and cost effective solution to allow inter-VLAN communication in this network?
Replace S1 with a router that has one FastEthernet interface for each PC.
Add a second switch and divide the PCs so that each VLAN is connected to its own switch. Configure a router with two subinterfaces on one of its FastEthernet ports and connect it to S1 using a trunk link.***
Connect a router to a port on S1 and assign the IP address of VLAN1 to the connecting router interface.
39
Refer to the exhibit. This switch is to be added to the production network. Which two facts about VLANs and VTP operation can be confirmed by this output? (Choose two.)
The network administrator will be able to configure VLANs of local significance on this switch. VLANs can only be added to the VLAN database on this switch by a VTP advertisement.***
All VLANs that are configured on this switch will be sent to all other switches in the same VTP domain.
This switch will drop all VTP advertisements that come from switches that are configured in the same VTP domain.
Adding this switch to the network will cause no disruption in the VTP domain operations if the rest of the switches in the same VTP domain have a higher configuration revision number.***
40
Refer to the exhibit. VTP pruning is enabled in the VTP domain that is shown. How will switch ST-1 handle Layer 2 broadcast traffic originating from host A on switch ST-C?
It will be dropped. It will be forwarded out port Fa0/5 only.***
It will be forwarded out ports Fa0/5 and Fa0/10.
It will be forwarded out ports Fa0/5, Fa0/10, and Fa0/15.

41 In which mode is a VTP switch operating if it does not allow for the creation of local VLANs but it does accept VLAN updates from other switches in the same domain?
client***
root
server
transparent

42 The network administrator wants to configure a switch to pass VLAN update information to other switches in the domain but not update its own local VLAN database. Which two steps should the administrator perform to achieve this? (Choose two.)
Reset the VTP counters.***
Configure VTP version 1 on the switch.
Configure the VTP mode of the switch to transparent.
Verify that the switch has a higher configuration revision number.***
Configure the switch with the same VTP domain name as other switches in the network.
43
Refer to the exhibit. Switch SW2 has been newly purchased and added to the network. What configuration should be applied to SW2 so that it participates in the same VTP domain as switch SW1, receives VLAN information from SW1, and synchronizes VLAN information?
Disable VTP pruning on SW2. Configure SW2 in VTP transparent mode.***
Configure SW2 with the VTP domain password.
Configure SW2 as a VTP server with a higher revision number.
44
Refer to the exhibit. Switch SW2 was tested in a lab environment and then inserted into a production network without reloading its configuration. After the trunk link between SW1 and SW2 was brought up, all users lost connectivity to the network. What could be the source of the problem?
All the VLANs were pruned from the trunk port between SW1 and SW2.
SW1 and SW2 cannot be both set as VTP servers in the same VTP domain.
VTP configuration revision number of SW2 was higher than the configuration revision number of SW1.***
The additional VLANs from SW2 created more VLANs than the VLAN database of SW1 could contain.
45
Refer to the exhibit. Switches S2 and S3 are properly connected using an ethernet cable. A network administrator has configured both switches with VTP, but S3 is unable to propagate VLANs to S2. What could be the reason for this?
The VTP configuration revision is different on both switches.
The VTP domains are different on both switches.***
VTP pruning is disabled. VTP v2 is disabled.
46 A wireless LAN access point will convert traffic between which two frame encapsulation types?
802.1 and 802.11
802.3 and 802.11***
802.3 and 802.16
802.5 and 802.16
47 Which parameter is used to uniquely identify one wireless network from another?
SSID***
OFDM
WEP
DSSS

48 What provides an authentication mechanism for 802.11-based wireless networks?
DSSS
OFDM
SSID
WPA***

49 Why is MAC address filtering considered a poor choice in securing a WLAN?
Available bandwidth is reduced.
MAC addresses are easily spoofed.***
APs are more susceptible to DoS attacks.
The payload encryption is easily broken.

50
Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installation surveys showed strong signal strength from the AP locations to the client locations. Outside electrical interference has been eliminated. What will fix the problem?
Relocate the APs closer to each other.
Increase the distance between the clients.
Change the channel on AP-B to 6 or 11.***
Place AP-A and AP-B on the same wireless channel. 

No comments:

Post a Comment