CCNA 3 - final exam
Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect?
AS1 and AS2***
DS1 and DS2
DS1, DS2, and CS1
AS1, AS2, DS1, and DS2
Which switching method provides error-free data transmission?
Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit data at the same time. How do the hosts respond on the network? (Choose two.)
After the end of the jam signal, a backoff algorithm is invoked. ***
Hosts 1 and 4 are operating full duplex so no collision will exist.
The hub will block the port connected to Host 4 to prevent a collision.
Hosts 1 and 4 are assigned shorter backoff values to provide them priority to access the media.
If a host has data to transmit after the backoff period of that host, the host checks to determine if the line is idle before transmitting. ***
What information in an Ethernet frame is used by a Layer 2 switch to build its address table?
source IP address
source MAC address***
destination IP address
destination MAC address
Which three actions are performed during the boot sequence of a Cisco switch? (Choose three.)
The boot loader uses the self-contained switch operating system to boot the switch.
The boot loader retrieves diagnostics routines via TFTP.
The boot loader performs POST. **
The boot loader is loaded from RAM.
The boot loader initializes the flash file system that is used to boot the system. ***
The boot loader loads the default operating system if the flash-based operating system is corrupt or missing. ***
While configuring a new switch, a network administrator configures the switch as an HTTP server. What benefits does this configuration provide?
This allows the switch to host web pages for the network.
This allows remote VPN connections to the switch over the Internet.
This is required if a web server or web farm is attached to the switch.
This allows web-based configuration tools to be used with the switch. ***
Company policy requires disabling the command history buffer on network devices. An administrator enters terminal no history size at the command prompt on a Cisco Catalyst switch and receives no error messages back, but the command history buffer is still available. What is the problem?
The command contained a syntax error.
The Cisco IOS version does not support disabling the command history buffer.
The command history can only be disabled on a router, not a switch.
The size parameter reset the default buffer size but did not disable access to the buffer. ***
What is the purpose of issuing the command switchport mode access on a switch interface?
disable port security
make the port operational
override the default port behavior
force the port to be a part of a single vlan ***
What is a possible impact of setting too short an aging time in the MAC address table of a switch?
overly large address table
unnecessary flooding of packets ***
excessive timeouts of static addresses
impaired ability to dynamically learn new addresses
Refer to the exhibit. What does STATIC indicate in the output that is shown?
Switch port Fa0/24 can only work in VLAN 99.
VLAN 99 was manually added to the VLAN database.
MAC address 0001.637b.b267 was learned from the source address of a frame that was received on switch port Fa0/24.
MAC address 0001.637b.b267 was manually associated with the switch port Fa0/24. /****
Refer to the exhibit. What will be the result of the commands that are shown in the exhibit?
Only clients on VLAN 2 will be able to use DHCP for addressing.
DHCP server responses will only be permitted on interface Fa0/2.***
Only 100 clients are permitted to request DHCP addresses on VLAN 2.
Client requests for DHCP addresses will be filtered out if the requests are not received on interface Fa0/2.
Why is it advisable that a network administrator use SSH instead of Telnet when managing switches?
SSH uses TCP whereas Telnet does not.
SSH encrypts only the username and password when logging in.
SSH encrypts all remote management communications whereas Telnet does not. ***
SSH sends a clear text message steam which reduces the bandwidth use for management.
Which service should be disabled on a Cisco switch or router to prevent packet sniffers from capturing information about the device?
Refer to the exhibit. The Layer 2 switching design that is shown has been implemented in a campus environment that is using Spanning Tree Protocol. All inter-switch links that are shown are trunks. Whenever an inter-switch link fails, the network takes nearly a minute to completely converge. How can the convergence time be reduced?
Increase the capacity of the distribution and core trunk links to 10 Gb/s.
Add a trunk link that directly connects D1 and D2.
Use Layer 3 switching on the core switch.
Implement Rapid Spanning Tree Protocol. ***
Which statement is correct about STP architecture?
Spanning Tree Protocol will guarantee a loop free Layer 2 topology. ***
Spanning Tree Protocol guarantees the shortest path to destination networks.
The switch with the highest priority will be assigned the lowest BID in the root election.
The first step in the spanning-tree election process is to determine the root port.
To select designated ports, the spanning-tree algorithm must determine the longest contiguous path from the root bridge.
What identifier in the BPDU creates a unique BID for a switch?
MAC address ***
Refer to the exhibit. Each switch is shown with its MAC address. Which switch will be elected as the spanning-tree root bridge if the switches are configured with their default priority values?
switch F ***
Which device or devices should have the Spanning Tree Protocol enabled to prevent host traffic from creating a broadcast storm?
Access_S2 and Access_S3
Core_S1, Access_S2, and Access_S3 ***
Core_S1, Access_S2, Access_S3, and R1
Refer to the exhibit. What are two reasons for the Fa0/24 port being placed in the blocking state? (Choose two.)
This switch is not the root bridge.***
The Fa0/24 port is administratively down.
STP has detected links that create a loop.***
There is a change in the VTP configuration.
The Fa0/24 port is overloaded with too much traffic for its configured bandwidth.
Which STP port type can only appear once on a segment, and must be present in order for traffic to flow on that segment?
designated port ***
Refer to the exhibit. Which Spanning Tree Protocol version is in effect?
Per VLAN Spanning Tree (PVST)
Per VLAN Spanning Tree + (PVST+)
Common Spanning Tree (CST)
Rapid Spanning Tree Protocol (RSTP) ***
Multiple Spanning Tree Protocol (MSTP)
Refer to the exhibit. All edge ports are configured with the spanning-tree portfast command. Host1 is recently connected to port Fa0/1 on switch SW1 . Which statement is true about the status of port Fa0/1?
The port will transition into blocking state.
The port will transition immediately into forwarding state. ***
The port will transition into blocking state and then immediately into forwarding state.
The port will transition into blocking state and immediately transition through the listening and learning states.
Refer to the exhibit. What is the maximum number of VLANs that can be deleted from the Switch as it is configured?
What are two characteristics of normal range VLANs? (Choose two.)
not learned by VTP
stored in vlan.dat file ***
designed for service providers
can contain ports used as trunks
identified by a VLAN ID between 1 and 1005 ***
How are data frames identified and sent to the correct VLAN when exiting an Ethernet trunk?
Frames are forwarded to the correct VLAN based on the VLAN tag***
Frames are always forwarded to the native VLAN when exiting a trunk.
Frames are forwarded to the correct VLAN based on the source IP address.
Frames are forwarded to the correct VLAN based on information in the MAC address table.
Refer to the exhibit. What is the purpose of the configuration commands that are shown?
to activate port Fa0/10
to make the port a member of VLAN 30 ***
to activate port security on port Fa0/10
to add VLAN 30 to the trunk that is connected to port Fa0/10
How does a switch that is configured for 802.1Q trunking handle untagged frames that are received on a trunk port?
The frames are dropped.
The frames are assigned to the native VLAN. ***
The frames are assigned to the default VLAN.
The frames are assigned to the management VLAN.
Refer to the exhibit. R1 is configured for traditional inter-VLAN routing. R1 can ping computer 3 but cannot ping computer 1. What is a possible cause for this failure?
S1 port Fa0/11 is in the wrong VLAN. ***
R1 does not have an active routing protocol.
The IP address of computer 1 is in the wrong logical network.
Router interface Fa0/0 has the wrong trunk encapsulation type configured.
Refer to the exhibit. What will allow a host on VLAN 40 on switch X to communicate with a host in VLAN 40 on switch Y?
Refer to the exhibit. What is true of the configuration of switch S1?
Only VLAN 99 will be allowed to use the trunk links.
Switch ports Fa0/1 and Fa0/3 are configured with a standard trunking protocol. ***
Switch ports Fa0/1 and Fa0/3 should be configured as access ports to allow data from multiple VLANs to access switch S1.
The switch negotiated trunk links for interfaces Fa0/1 and Fa0/3 because all connected interfaces have been configured with the switchport mode dynamic auto command.
Refer to the exhibit. Which two statements are true about the operation of the interfaces? (Choose two.)
Incoming traffic with VLAN ID 0 is processed by interface fa0/0.
Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.***
Both subinterfaces remain up with line protocol up, even if fa0/0 line protocol is down.
Subinterfaces use unique MAC addresses by adding the 802.1Q VLAN ID to the hardware address.
Traffic inbound on this router is processed by different subinterfaces, depending on the VLAN from which the traffic originated.***
A network administrator is asked to connect four switches that are each configured with eight VLANs. Routers that have two FastEthernet ports each that support trunking are available. What is the minimum number of routers needed to interconnect traffic from all of the VLANs if trunking is allowed?
Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.85. What will the router do with this packet?
The router will ignore the packet. ***
The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.
The router will forward the packet out interface FastEthernet 0/1.1.
The router will forward the packet out interface FastEthernet 0/1.2.
The router will forward the packet out interface FastEthernet 0/1.3.
What are two requirements for configuring inter-VLAN routing using the router-on-a-stick model? (Choose two.)
Each subinterface should be configured with its own IP address, subnet mask, and unique VLAN assignment. ***
The physical interface of the router must be connected to a trunk link on the adjacent switch.***
The number of physical interfaces on the router should match the number of VLANs.
Different static VLANs should be assigned to different interfaces of the router.
The router should be configured as the VTP server.
Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and host B are on the default VLAN but are not able to exchange traffic. What should be done to fix the problem?
Allow all VLANs on the trunk link.
Remove the native VLAN from the trunk.
Include a router or switch with Layer 3 capabilities.
Configure the same native VLAN on both ends of the trunk.***
Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit. However, hosts A and D cannot ping each other. What is the most likely cause of this problem?
The link between the switches is up but not trunked.
The Fa0/11 interface of Switch1 is not configured as a trunk. ***
Hosts A and D are configured with IP addresses from different subnets.
VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.
Refer to the exhibit. A network administrator has segmented the network into two VLANs. The connected hosts can only access resources in their own VLAN. What is the most scalable and cost effective solution to allow inter-VLAN communication in this network?
Replace S1 with a router that has one FastEthernet interface for each PC.
Add a second switch and divide the PCs so that each VLAN is connected to its own switch.
Configure a router with two subinterfaces on one of its FastEthernet ports and connect it to S1 using a trunk link. ***
Connect a router to a port on S1 and assign the IP address of VLAN1 to the connecting router interface.
Refer to the exhibit. After the listed commands are entered into router R1 and switch S1, the administrator enters the show interface fa0/1 trunk and gets the results shown. What is the likely problem?
The trunk is established, but no VLANs have been configured to use it.
The router is missing the dynamic trunking protocol statements necessary to form a trunk.
The trunk has not been established because the router does not support dynamic trunking protocol.***
The router, the switch, or both must be configured with the dynamic desirable option for dynamic trunking protocol to establish a trunk.
Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2. Hosts A, B, C, and D are correctly configured with IP addresses in the subnet range for VLAN 50. Host A can communicate with host B, but cannot communicate with host C or host D. What is the cause of this problem?
There is a native VLAN mismatch.
The Fa0/11 interface of Switch1 is not configured as a trunk.
The link between Switch1 and Switch2 is up but not trunked.
VLAN 50 is not allowed on the trunk link between Switch1 and Switch2. ***
Which configuration changes will increment the configuration revision number on the VTP server?
configuring trunk links on the VTP server
configuring or changing the VTP password
configuring or changing the VTP domain name
configuring or changing the VTP version number
configuring or deleting a VLAN or creating a VLAN name ***
What is the purpose of VTP pruning?
to restrict traffic on specified trunk lines ***
to designate switches that do not participate in VTP
to advertise VTP domain information to specified switches only
to reduce the propagation of VTP advertisements in the switched network
A new switch is to be added to an existing network in a remote office. The network administrator does not want the technicians in the remote office to be able to add new VLANs to the switch, but the switch should receive VLAN updates from the VTP domain. Which two steps must be performed to configure VTP on the new switch to meet these conditions? (Choose two.)
Configure an IP address on the new switch.
Configure the existing VTP domain name on the new switch.***
Configure all ports of both switches to access mode.
Configure the new switch as a VTP client. ***
Enable VTP pruning.
Refer to the exhibit. Switch SW2 was tested in a lab environment and then inserted into a production network without reloading its configuration. After the trunk link between SW1 and SW2 was brought up, all users lost connectivity to the network. What could be the source of the problem?
All the VLANs were pruned from the trunk port between SW1 and SW2.
SW1 and SW2 cannot be both set as VTP servers in the same VTP domain.
VTP configuration revision number of SW2 was higher than the configuration revision number of SW1.***
The additional VLANs from SW2 created more VLANs than the VLAN database of SW1 could contain.
Refer to the exhibit. The network administrator is planning five additional VLANs to be shared throughout the VTP domain on S3. What action should the administrator take before creating the additional VLANs?
Create the VLANs on a switch in VTP server mode and allow them to propogate to the other switches in the domain. ***
Modify the configuration revision to 10 to support the additional VLANs.
Enable the VTP pruning mode in order to create the VLANs on S3.
Enable the VTP v2 mode.
Refer to the exhibit. Switches S2 and S3 are properly connected using an ethernet cable. A network administrator has configured both switches with VTP, but S3 is unable to propagate VLANs to S2. What could be the reason for this?
The VTP configuration revision is different on both switches.
The VTP domains are different on both switches.***
VTP pruning is disabled.
VTP v2 is disabled.
A wireless LAN access point will convert traffic between which two frame encapsulation types?
802.1 and 802.11
802.3 and 802.11 ***
802.3 and 802.16
802.5 and 802.16
Which parameter is used to uniquely identify one wireless network from another?
A wireless client is attempting to establish a connection with a wireless access point. What process does the client use to discover the access points which are available to it?
Why is MAC address filtering considered a poor choice in securing a WLAN?
Available bandwidth is reduced.
MAC addresses are easily spoofed. ***
APs are more susceptible to DoS attacks.
The payload encryption is easily broken.
Which combination is required to establish a connection to initially configure the Linksys WRT300N wireless access device?
a computer with a console connection to the WRT300N
a computer with a wireless connection to the WRT300N
a computer with an AUX port connection to the WRT300N
a computer configured in the same IP subnet as the WRT300N and a direct cable connection to it ***