CCNA 3 - final exam
1
Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect?
AS1 and AS2***
DS1 and DS2
DS1, DS2, and CS1
AS1, AS2, DS1, and DS2
2
Which switching method provides error-free data transmission?
fragment-free
fast-forward
integrity-checking
store-and-forward***
3
Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit data at the same time. How do the hosts respond on the network? (Choose two.)
After the end of the jam signal, a backoff algorithm is invoked. ***
Hosts 1 and 4 are operating full duplex so no collision will exist.
The hub will block the port connected to Host 4 to prevent a collision.
Hosts 1 and 4 are assigned shorter backoff values to provide them priority to access the media.
If a host has data to transmit after the backoff period of that host, the host checks to determine if the line is idle before transmitting. ***
4
What information in an Ethernet frame is used by a Layer 2 switch to build its address table?
source IP address
source MAC address***
destination IP address
destination MAC address
5
Which three actions are performed during the boot sequence of a Cisco switch? (Choose three.)
The boot loader uses the self-contained switch operating system to boot the switch.
The boot loader retrieves diagnostics routines via TFTP.
The boot loader performs POST. **
The boot loader is loaded from RAM.
The boot loader initializes the flash file system that is used to boot the system. ***
The boot loader loads the default operating system if the flash-based operating system is corrupt or missing. ***
6
While configuring a new switch, a network administrator configures the switch as an HTTP server. What benefits does this configuration provide?
This allows the switch to host web pages for the network.
This allows remote VPN connections to the switch over the Internet.
This is required if a web server or web farm is attached to the switch.
This allows web-based configuration tools to be used with the switch. ***
7
Company policy requires disabling the command history buffer on network devices. An administrator enters terminal no history size at the command prompt on a Cisco Catalyst switch and receives no error messages back, but the command history buffer is still available. What is the problem?
The command contained a syntax error.
The Cisco IOS version does not support disabling the command history buffer.
The command history can only be disabled on a router, not a switch.
The size parameter reset the default buffer size but did not disable access to the buffer. ***
8
What is the purpose of issuing the command switchport mode access on a switch interface?
disable port security
make the port operational
override the default port behavior
force the port to be a part of a single vlan ***
9
What is a possible impact of setting too short an aging time in the MAC address table of a switch?
overly large address table
unnecessary flooding of packets ***
excessive timeouts of static addresses
impaired ability to dynamically learn new addresses
10
Refer to the exhibit. What does STATIC indicate in the output that is shown?
Switch port Fa0/24 can only work in VLAN 99.
VLAN 99 was manually added to the VLAN database.
MAC address 0001.637b.b267 was learned from the source address of a frame that was received on switch port Fa0/24.
MAC address 0001.637b.b267 was manually associated with the switch port Fa0/24. /****
11
Refer to the exhibit. What will be the result of the commands that are shown in the exhibit?
Only clients on VLAN 2 will be able to use DHCP for addressing.
DHCP server responses will only be permitted on interface Fa0/2.***
Only 100 clients are permitted to request DHCP addresses on VLAN 2.
Client requests for DHCP addresses will be filtered out if the requests are not received on interface Fa0/2.
12
Why is it advisable that a network administrator use SSH instead of Telnet when managing switches?
SSH uses TCP whereas Telnet does not.
SSH encrypts only the username and password when logging in.
SSH encrypts all remote management communications whereas Telnet does not. ***
SSH sends a clear text message steam which reduces the bandwidth use for management.
13
Which service should be disabled on a Cisco switch or router to prevent packet sniffers from capturing information about the device?
SSH
VTP
CDP ***
SNMP
14
Refer to the exhibit. The Layer 2 switching design that is shown has been implemented in a campus environment that is using Spanning Tree Protocol. All inter-switch links that are shown are trunks. Whenever an inter-switch link fails, the network takes nearly a minute to completely converge. How can the convergence time be reduced?
Increase the capacity of the distribution and core trunk links to 10 Gb/s.
Add a trunk link that directly connects D1 and D2.
Use Layer 3 switching on the core switch.
Implement Rapid Spanning Tree Protocol. ***
15
Which statement is correct about STP architecture?
Spanning Tree Protocol will guarantee a loop free Layer 2 topology. ***
Spanning Tree Protocol guarantees the shortest path to destination networks.
The switch with the highest priority will be assigned the lowest BID in the root election.
The first step in the spanning-tree election process is to determine the root port.
To select designated ports, the spanning-tree algorithm must determine the longest contiguous path from the root bridge.
16
What identifier in the BPDU creates a unique BID for a switch?
IP address
MAC address ***
bridge priority
VLAN ID
port priority
17
Refer to the exhibit. Each switch is shown with its MAC address. Which switch will be elected as the spanning-tree root bridge if the switches are configured with their default priority values?
switch A
switch B
switch C
switch D
switch E
switch F ***
18
Which device or devices should have the Spanning Tree Protocol enabled to prevent host traffic from creating a broadcast storm?
Core_S1
Access_S2 and Access_S3
Core_S1, Access_S2, and Access_S3 ***
Core_S1, Access_S2, Access_S3, and R1
19
Refer to the exhibit. What are two reasons for the Fa0/24 port being placed in the blocking state? (Choose two.)
This switch is not the root bridge.***
The Fa0/24 port is administratively down.
STP has detected links that create a loop.***
There is a change in the VTP configuration.
The Fa0/24 port is overloaded with too much traffic for its configured bandwidth.
20
Which STP port type can only appear once on a segment, and must be present in order for traffic to flow on that segment?
non-root port
disabled port
designated port ***
non-designated port
21
Refer to the exhibit. Which Spanning Tree Protocol version is in effect?
Per VLAN Spanning Tree (PVST)
Per VLAN Spanning Tree + (PVST+)
Common Spanning Tree (CST)
Rapid Spanning Tree Protocol (RSTP) ***
Multiple Spanning Tree Protocol (MSTP)
22
Refer to the exhibit. All edge ports are configured with the spanning-tree portfast command. Host1 is recently connected to port Fa0/1 on switch SW1 . Which statement is true about the status of port Fa0/1?
The port will transition into blocking state.
The port will transition immediately into forwarding state. ***
The port will transition into blocking state and then immediately into forwarding state.
The port will transition into blocking state and immediately transition through the listening and learning states.
23
Refer to the exhibit. What is the maximum number of VLANs that can be deleted from the Switch as it is configured?
zero
four ***
five
eight
nine
24
What are two characteristics of normal range VLANs? (Choose two.)
not learned by VTP
stored in vlan.dat file ***
designed for service providers
can contain ports used as trunks
identified by a VLAN ID between 1 and 1005 ***
25
How are data frames identified and sent to the correct VLAN when exiting an Ethernet trunk?
Frames are forwarded to the correct VLAN based on the VLAN tag***
Frames are always forwarded to the native VLAN when exiting a trunk.
Frames are forwarded to the correct VLAN based on the source IP address.
Frames are forwarded to the correct VLAN based on information in the MAC address table.
26
Refer to the exhibit. What is the purpose of the configuration commands that are shown?
to activate port Fa0/10
to make the port a member of VLAN 30 ***
to activate port security on port Fa0/10
to add VLAN 30 to the trunk that is connected to port Fa0/10
27
How does a switch that is configured for 802.1Q trunking handle untagged frames that are received on a trunk port?
The frames are dropped.
The frames are assigned to the native VLAN. ***
The frames are assigned to the default VLAN.
The frames are assigned to the management VLAN.
28
Refer to the exhibit. R1 is configured for traditional inter-VLAN routing. R1 can ping computer 3 but cannot ping computer 1. What is a possible cause for this failure?
S1 port Fa0/11 is in the wrong VLAN. ***
R1 does not have an active routing protocol.
The IP address of computer 1 is in the wrong logical network.
Router interface Fa0/0 has the wrong trunk encapsulation type configured.
29
Refer to the exhibit. What will allow a host on VLAN 40 on switch X to communicate with a host in VLAN 40 on switch Y?
QoS
routing
trunking ***
VPN
30
Refer to the exhibit. What is true of the configuration of switch S1?
Only VLAN 99 will be allowed to use the trunk links.
Switch ports Fa0/1 and Fa0/3 are configured with a standard trunking protocol. ***
Switch ports Fa0/1 and Fa0/3 should be configured as access ports to allow data from multiple VLANs to access switch S1.
The switch negotiated trunk links for interfaces Fa0/1 and Fa0/3 because all connected interfaces have been configured with the switchport mode dynamic auto command.
31
Refer to the exhibit. Which two statements are true about the operation of the interfaces? (Choose two.)
Incoming traffic with VLAN ID 0 is processed by interface fa0/0.
Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.***
Both subinterfaces remain up with line protocol up, even if fa0/0 line protocol is down.
Subinterfaces use unique MAC addresses by adding the 802.1Q VLAN ID to the hardware address.
Traffic inbound on this router is processed by different subinterfaces, depending on the VLAN from which the traffic originated.***
32
A network administrator is asked to connect four switches that are each configured with eight VLANs. Routers that have two FastEthernet ports each that support trunking are available. What is the minimum number of routers needed to interconnect traffic from all of the VLANs if trunking is allowed?
1 ***
2
4
8
16
33
Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.85. What will the router do with this packet?
The router will ignore the packet. ***
The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.
The router will forward the packet out interface FastEthernet 0/1.1.
The router will forward the packet out interface FastEthernet 0/1.2.
The router will forward the packet out interface FastEthernet 0/1.3.
34
What are two requirements for configuring inter-VLAN routing using the router-on-a-stick model? (Choose two.)
Each subinterface should be configured with its own IP address, subnet mask, and unique VLAN assignment. ***
The physical interface of the router must be connected to a trunk link on the adjacent switch.***
The number of physical interfaces on the router should match the number of VLANs.
Different static VLANs should be assigned to different interfaces of the router.
The router should be configured as the VTP server.
35
Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and host B are on the default VLAN but are not able to exchange traffic. What should be done to fix the problem?
Allow all VLANs on the trunk link.
Remove the native VLAN from the trunk.
Include a router or switch with Layer 3 capabilities.
Configure the same native VLAN on both ends of the trunk.***
36
Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit. However, hosts A and D cannot ping each other. What is the most likely cause of this problem?
The link between the switches is up but not trunked.
The Fa0/11 interface of Switch1 is not configured as a trunk. ***
Hosts A and D are configured with IP addresses from different subnets.
VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.
37
Refer to the exhibit. A network administrator has segmented the network into two VLANs. The connected hosts can only access resources in their own VLAN. What is the most scalable and cost effective solution to allow inter-VLAN communication in this network?
Replace S1 with a router that has one FastEthernet interface for each PC.
Add a second switch and divide the PCs so that each VLAN is connected to its own switch.
Configure a router with two subinterfaces on one of its FastEthernet ports and connect it to S1 using a trunk link. ***
Connect a router to a port on S1 and assign the IP address of VLAN1 to the connecting router interface.
38
Refer to the exhibit. After the listed commands are entered into router R1 and switch S1, the administrator enters the show interface fa0/1 trunk and gets the results shown. What is the likely problem?
The trunk is established, but no VLANs have been configured to use it.
The router is missing the dynamic trunking protocol statements necessary to form a trunk.
The trunk has not been established because the router does not support dynamic trunking protocol.***
The router, the switch, or both must be configured with the dynamic desirable option for dynamic trunking protocol to establish a trunk.
39
Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2. Hosts A, B, C, and D are correctly configured with IP addresses in the subnet range for VLAN 50. Host A can communicate with host B, but cannot communicate with host C or host D. What is the cause of this problem?
There is a native VLAN mismatch.
The Fa0/11 interface of Switch1 is not configured as a trunk.
The link between Switch1 and Switch2 is up but not trunked.
VLAN 50 is not allowed on the trunk link between Switch1 and Switch2. ***
40
Which configuration changes will increment the configuration revision number on the VTP server?
configuring trunk links on the VTP server
configuring or changing the VTP password
configuring or changing the VTP domain name
configuring or changing the VTP version number
configuring or deleting a VLAN or creating a VLAN name ***
41
What is the purpose of VTP pruning?
to restrict traffic on specified trunk lines ***
to designate switches that do not participate in VTP
to advertise VTP domain information to specified switches only
to reduce the propagation of VTP advertisements in the switched network
42
A new switch is to be added to an existing network in a remote office. The network administrator does not want the technicians in the remote office to be able to add new VLANs to the switch, but the switch should receive VLAN updates from the VTP domain. Which two steps must be performed to configure VTP on the new switch to meet these conditions? (Choose two.)
Configure an IP address on the new switch.
Configure the existing VTP domain name on the new switch.***
Configure all ports of both switches to access mode.
Configure the new switch as a VTP client. ***
Enable VTP pruning.
43
Refer to the exhibit. Switch SW2 was tested in a lab environment and then inserted into a production network without reloading its configuration. After the trunk link between SW1 and SW2 was brought up, all users lost connectivity to the network. What could be the source of the problem?
All the VLANs were pruned from the trunk port between SW1 and SW2.
SW1 and SW2 cannot be both set as VTP servers in the same VTP domain.
VTP configuration revision number of SW2 was higher than the configuration revision number of SW1.***
The additional VLANs from SW2 created more VLANs than the VLAN database of SW1 could contain.
44
Refer to the exhibit. The network administrator is planning five additional VLANs to be shared throughout the VTP domain on S3. What action should the administrator take before creating the additional VLANs?
Create the VLANs on a switch in VTP server mode and allow them to propogate to the other switches in the domain. ***
Modify the configuration revision to 10 to support the additional VLANs.
Enable the VTP pruning mode in order to create the VLANs on S3.
Enable the VTP v2 mode.
45
Refer to the exhibit. Switches S2 and S3 are properly connected using an ethernet cable. A network administrator has configured both switches with VTP, but S3 is unable to propagate VLANs to S2. What could be the reason for this?
The VTP configuration revision is different on both switches.
The VTP domains are different on both switches.***
VTP pruning is disabled.
VTP v2 is disabled.
46
A wireless LAN access point will convert traffic between which two frame encapsulation types?
802.1 and 802.11
802.3 and 802.11 ***
802.3 and 802.16
802.5 and 802.16
47
Which parameter is used to uniquely identify one wireless network from another?
SSID ***
OFDM
WEP
DSSS
48
A wireless client is attempting to establish a connection with a wireless access point. What process does the client use to discover the access points which are available to it?
probing ***
beaconing
association
authentication
49
Why is MAC address filtering considered a poor choice in securing a WLAN?
Available bandwidth is reduced.
MAC addresses are easily spoofed. ***
APs are more susceptible to DoS attacks.
The payload encryption is easily broken.
50
Which combination is required to establish a connection to initially configure the Linksys WRT300N wireless access device?
a computer with a console connection to the WRT300N
a computer with a wireless connection to the WRT300N
a computer with an AUX port connection to the WRT300N
a computer configured in the same IP subnet as the WRT300N and a direct cable connection to it ***
Showing posts with label CCNA 3. Show all posts
Showing posts with label CCNA 3. Show all posts
Sunday, July 4, 2010
CCNA 3 exploration - Final Exam (update - 2)
CCNA 3 - final exam
1.Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect?
AS1 and AS2***
DS1 and DS2 DS1,
DS2, and CS1 AS1,
AS2, DS1, and DS2
2 What advantage does cut-through switching provide?
It enables QoS It forwards frames quickly.***
It provides an analysis of frames.
It allows reduction of traffic by using error checking to drop corrupt frames.
3 Which switch forwarding method should be used on a network that employs frame
classification based on an assigned Quality of Service (QoS) value? cut-through fast-forward fragment-free store-and-forward***
4
Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?
only hosts A and B only hosts A, B, and C***
only hosts A, B, C, and D
only hosts A, B, C, and E
5
Refer to the exhibit. The network consists of four hubs and a switch. The hosts connected to each hub are assigned addresses in the respective VLAN as shown. PC1 on VLAN 1 becomes infected with a virus and initiates a continuous IP broadcast. Which hubs will receive the broadcasts?
Hub A
Hubs A andB
Hubs A and C***
Hubs A, B, C, and D
6 Which three statements are correct concerning the default configuration of a new switch? (Choose three.)
It is configured in VTP server mode.***
STP is automatically enabled.***
The first VTY line is automatically configured to allow remote connections.
VLAN1 is configured with a management IP address. All switch ports are assigned toVLAN1.****
The enable password is configured as cisco.
7 What will be the effect of the command S1# copy system:running-config tftp://172.16.2.155/tokyo-config?
The IOS will be copied to the TFTP server.
The configuration file named tokyo-config will overwrite the startup configuration file on S1.
The running configuration file on S1 will be saved via TFTP to a file named tokyo-config.***
The contents of NVRAM on S1 will become the startup configuration file on the tokyo switch.
8
Refer to the exhibit. The network administrator wants to allow both SSH and Telnet connections to Switch1. However, the SSH connections fail. What is the most likely cause of this problem? The RSA key has been removed.***
SSH has been configured on the wrong line.
The transport input command is applied incorrectly.
The domain name has been configured in the wrong configuration mode.
9 What is the benefit of the auto-MDIX feature on a Cisco Catalyst switch?
dynamically assigns a new management VLAN ID
autonegotiates IP address information for initial management connections
allows the use of straight-through patch cables regardless of connected device types***
places a port immediately in the forwarding state to reduce the time for the spanning tree to reconverge
10
Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?
This entry can only be removed from the MAC address table by a network administrator.
When forwarding a frame to the device with address 0060.5c5b.cd23, the switch does not have to perform a lookup to determine the final destination port.
Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18. The switch learned this MAC address from the source address in a frame received on Fa0/18.****
11
Refer to the exhibit. The teacher host is connected to port Fa0/7 on switch STW. A student has decided to share access to the Internet by attaching a hub and laptop to STW as shown. What will be the result of the student making this connection?
The Fa0/7 port of STW will be shutdown.
The student will gain full access to the Internet.
Both the teacher and student will be able to receive data but only the teacher will be able to send.
The frames from the laptop will be dropped, but the teacher host will maintain connectivity with the network.***
12 Which statement regarding the service password-encryption command is true?
The service password-encryption command is entered at the privileged EXEC mode prompt. The service password-encryption command encrypts only passwords for the console and VTY ports.
The service password-encryption command encrypts all previously unencrypted passwords in the running configuration.***
To see the passwords encrypted by the service password-encryption command, enter the no service password-encryption command.
13 A network administrator enables sticky learning on all access mode interfaces of a Catalyst switch, saves the configuration, then connects hosts to the switch. After the switch operates for several days, the administrator reboots the switch without saving the running configuration. What is the result?
All previously learned MAC addresses are lost.***
The switch reverts to non-sticky dynamic learning.
Connected hosts are no longer able to communicate with the switch.
Previously learned sticky addresses are retained in the switch configuration.
14
Refer to the exhibit. The Layer 2 switching design that is shown has been implemented in a campus environment that is using Spanning Tree Protocol. All inter-switch links that are shown are trunks. Whenever an inter-switch link fails, the network takes nearly a minute to completely converge. How can the convergence time be reduced?
Increase the capacity of the distribution and core trunk links to 10 Gb/s.
Add a trunk link that directly connects D1 and D2.
Use Layer 3 switching on the core switch.
Implement Rapid Spanning Tree Protocol.***
15 What is a result of improperly implementing a network with redundancy at Layer 2?
an increase of unicast and multicast errors at Layer 3
a decrease in the amount of broadcast traffic
end device malfunction because of broadcast storms***
an increase in throughput at all points in the network
16 Why is it important that the network administrator consider the spanning-tree network diameter when choosing the root bridge?
The network diameter limitation is 9.
BPDUs may be discarded because of expiring timers.***
The cabling distance between the switches is 100 meters.
The network diameter must be set to the number of meters of the cable between the root bridge and its farthest connected switch.
17
Refer to the exhibit. What does "FORWARDING" mean in the command output shown?
The switch is sending and receiving data frames.-***
The switch is receiving BPDUs, but not sending data frames. The switch is participating in an election process by forwarding the BPDUs it receives. The switch is receiving BPDUs and populating the MAC address table, but not sending data.
18
Which device or devices should have the Spanning Tree Protocol enabled to prevent host traffic from creating a broadcast storm?
Core_S1 Access_S2 and Access_S3
Core_S1, Access_S2, and Access_S3****
Core_S1, Access_S2, Access_S3, and R1
19
Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?
Cat-A Cat-B Cat-C Cat-D***
20 RSTP is enabled in a switched network that is active and converged. Which switch port type assumes a discarding state on non-root switches? root port edge port alternate port*** designated port
21 In the implementation of PVST+ in a specific VLAN where all switches have default spanning tree priorities, which spanning-tree command setting could be assigned to force one of the Catalyst switches to become and remain the root bridge? root primary-*** priority 8192 priority 2048 spanning-tree mode rapid pvst
22
Refer to the exhibit. All edge ports are configured with the spanning-tree portfast command. Host1 is recently connected to port Fa0/1 on switch SW1 . Which statement is true about the status of port Fa0/1?
The port will transition into blocking state.
The port will transition immediately into forwarding state.***
The port will transition into blocking state and then immediately into forwarding state. The port will transition into blocking state and immediately transition through the listening and learning states.
23 While monitoring LAN traffic, a network technician notices an excessive number of broadcasts. Which two steps could be included in the processes that are needed to reduce the number of broadcasts on the network? (Choose two.)
Replace any existing hubs with switches. Add a Layer 3 device to route between networks.*** Subnet the existing IP network to create two networks.***
Increase the backbone speed by three times the current speed. Add additional switches and spread out the number of hosts evenly between them.
24 How does a switch that is configured for 802.1Q trunking handle untagged frames that are received on a trunk port?
The frames are dropped.
The frames are assigned to the native VLAN.***
The frames are assigned to the default VLAN. The frames are assigned to the management VLAN.
25
Refer to the exhibit. What would happen if the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1?
Host A remains a member of VLAN 10, because the router is routing traffic between VLANs. Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30.***
Host A remains a member of VLAN 10, because the switch provides dynamic VLAN assignment for the port. Host A maintains connectivity to all members of VLAN 10, because it is connected to the same physical network. Host A is no longer a member of VLAN 10, but because port Fa0/3 was unused, it is now a member of VLAN 1.
26
Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit. However, hosts B and D cannot ping each other. What is the most likely cause of this problem?
The link between the switches is up but not trunked. The Fa0/11 interface of Switch1 is not configured as a trunk.
Hosts B and D are configured with IP addresses from different subnets.***
VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.
27
Refer to the exhibit. A network administrator issues the show interfaces fastEthernet 0/8 switchport command to check the status of the port. What can be concluded from the output? Port Fa0/8 is configured as a trunk with 802.1q encapsulation.
Port Fa0/8 is configured as a trunk in VLAN 1.
Port Fa0/8 is configured in access mode and associated with VLAN 1.***
Port Fa0/8 is configured as a trunk and VLAN 1 is a native VLAN for the trunk.
28
Refer to the exhibit. SW-T has been configured with a single trunking interface. Which VLANs will be allowed across the trunk?
Only VLAN 1 will be allowed across the trunk.
All configured VLANs will be allowed across the trunk.***
Only the native VLAN will be allowed across the trunk.
Only the the management and native VLANs will be allowed across the trunk. Only VLANs that are configured on the VTP server in the domain will be allowed across the trunk.
29
Refer to the exhibit. How will switch S2 manage traffic coming from host PC1?
S2 will drop the traffic, unless it is management traffic.
S2 will tag the frame with VLAN ID 99 when it forwards it over the trunk link.
S2 will leave the traffic untagged when it forwards it over a trunk link.***
S2 will tag the traffic with the highest VLAN ID value when it forwards it over the trunk link.
30 What is the purpose of VLAN trunking?
It improves network performance by reducing broadcast traffic. It selects the best path to transmit data in a switched network.
It carries the traffic of multiple VLANs through a single link.***
It avoids spanning tree loops in a switched network.
31 A network administrator implements inter-VLAN routing by configuring subinterfaces on a router. What is one important fact that must be considered?
The physical interface must have an IP address configured.
The subinterface numbers must match the VLAN ID number.
The no shutdown command must be issued on each subinterface.
The IP address of each router subinterface must be used as the default gateway for hosts on the corresponding VLAN.***
32
Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. What should be done to fix the problem?
Configure VLANs with different VLAN IDs on switch SW2.
Reconfigure the trunk port on switch SW2 with static trunk configuration.***
Introduce a Layer 3 device or a switch with Layer 3 capability in the topology.
Apply IP addresses that are in the same subnet to the interfaces used to connect SW1 and SW2.
33
Refer to the exhibit. Which three options correctly describe the router configuration that is shown? (Choose three.)
An IEEE standard trunking protocol is in use.***
Interface Fa0/1 has been configured with subinterfaces.***
The shutdown command has been applied to interface Fa0/1. Interface Fa0/1.3 is mapped to the default management VLAN.
The configuration is appropriate for a router-on-a-stick network design.***
An IP address should be applied to interface Fa0/1 for routing to occur.
34
Refer to the exhibit. A new host needs to be connected to VLAN 3. Which IP address should be assigned to this new host?
192.168.1.22 /28
192.168.1.31 /28
192.168.1.32 /28
192.168.1.52 /28***
192.168.1.63 /28
35
Refer to the exhibit. A network administrator is configuring RT1 for inter-VLAN routing. The switch is configured correctly and is functional. Host1, Host2, and Host3 cannot communicate with each other. Based on the router configuration, what is causing the problem?
Interface Fa0/0 is missing IP address configuration information.
IP addresses on the subinterfaces are incorrectly matched to the VLANs.***
Each subinterface of Fa0/0 needs separate no shutdown commands.
Routers do not support 892.1Q encapsulation on subinterfaces.
36
Refer to the exhibit. Router R1 is properly configured for router on a stick inter-VLAN routing, but PC1 is unable to ping PC2. What needs to be done to resolve the problem?
Rename VLAN1.
Connect one more port of S1 to R1. Configure the Fa0/1 port of S1 as a trunk port.***
Move the Fa0/0 interface of R1 to another VLAN.
37
Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and host B are on the default VLAN but are not able to exchange traffic. What should be done to fix the problem?
Allow all VLANs on the trunk link.
Remove the native VLAN from the trunk.
Include a router or switch with Layer 3 capabilities.
Configure the same native VLAN on both ends of the trunk.***
38
Refer to the exhibit. A network administrator has segmented the network into two VLANs. The connected hosts can only access resources in their own VLAN. What is the most scalable and cost effective solution to allow inter-VLAN communication in this network?
Replace S1 with a router that has one FastEthernet interface for each PC.
Add a second switch and divide the PCs so that each VLAN is connected to its own switch. Configure a router with two subinterfaces on one of its FastEthernet ports and connect it to S1 using a trunk link.***
Connect a router to a port on S1 and assign the IP address of VLAN1 to the connecting router interface.
39
Refer to the exhibit. This switch is to be added to the production network. Which two facts about VLANs and VTP operation can be confirmed by this output? (Choose two.)
The network administrator will be able to configure VLANs of local significance on this switch. VLANs can only be added to the VLAN database on this switch by a VTP advertisement.***
All VLANs that are configured on this switch will be sent to all other switches in the same VTP domain.
This switch will drop all VTP advertisements that come from switches that are configured in the same VTP domain.
Adding this switch to the network will cause no disruption in the VTP domain operations if the rest of the switches in the same VTP domain have a higher configuration revision number.***
40
Refer to the exhibit. VTP pruning is enabled in the VTP domain that is shown. How will switch ST-1 handle Layer 2 broadcast traffic originating from host A on switch ST-C?
It will be dropped. It will be forwarded out port Fa0/5 only.***
It will be forwarded out ports Fa0/5 and Fa0/10.
It will be forwarded out ports Fa0/5, Fa0/10, and Fa0/15.
41 In which mode is a VTP switch operating if it does not allow for the creation of local VLANs but it does accept VLAN updates from other switches in the same domain?
client***
root
server
transparent
42 The network administrator wants to configure a switch to pass VLAN update information to other switches in the domain but not update its own local VLAN database. Which two steps should the administrator perform to achieve this? (Choose two.)
Reset the VTP counters.***
Configure VTP version 1 on the switch.
Configure the VTP mode of the switch to transparent.
Verify that the switch has a higher configuration revision number.***
Configure the switch with the same VTP domain name as other switches in the network.
43
Refer to the exhibit. Switch SW2 has been newly purchased and added to the network. What configuration should be applied to SW2 so that it participates in the same VTP domain as switch SW1, receives VLAN information from SW1, and synchronizes VLAN information?
Disable VTP pruning on SW2. Configure SW2 in VTP transparent mode.***
Configure SW2 with the VTP domain password.
Configure SW2 as a VTP server with a higher revision number.
44
Refer to the exhibit. Switch SW2 was tested in a lab environment and then inserted into a production network without reloading its configuration. After the trunk link between SW1 and SW2 was brought up, all users lost connectivity to the network. What could be the source of the problem?
All the VLANs were pruned from the trunk port between SW1 and SW2.
SW1 and SW2 cannot be both set as VTP servers in the same VTP domain.
VTP configuration revision number of SW2 was higher than the configuration revision number of SW1.***
The additional VLANs from SW2 created more VLANs than the VLAN database of SW1 could contain.
45
Refer to the exhibit. Switches S2 and S3 are properly connected using an ethernet cable. A network administrator has configured both switches with VTP, but S3 is unable to propagate VLANs to S2. What could be the reason for this?
The VTP configuration revision is different on both switches.
The VTP domains are different on both switches.***
VTP pruning is disabled. VTP v2 is disabled.
46 A wireless LAN access point will convert traffic between which two frame encapsulation types?
802.1 and 802.11
802.3 and 802.11***
802.3 and 802.16
802.5 and 802.16
47 Which parameter is used to uniquely identify one wireless network from another?
SSID***
OFDM
WEP
DSSS
48 What provides an authentication mechanism for 802.11-based wireless networks?
DSSS
OFDM
SSID
WPA***
49 Why is MAC address filtering considered a poor choice in securing a WLAN?
Available bandwidth is reduced.
MAC addresses are easily spoofed.***
APs are more susceptible to DoS attacks.
The payload encryption is easily broken.
50
Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installation surveys showed strong signal strength from the AP locations to the client locations. Outside electrical interference has been eliminated. What will fix the problem?
Relocate the APs closer to each other.
Increase the distance between the clients.
Change the channel on AP-B to 6 or 11.***
Place AP-A and AP-B on the same wireless channel.
1.Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect?
AS1 and AS2***
DS1 and DS2 DS1,
DS2, and CS1 AS1,
AS2, DS1, and DS2
2 What advantage does cut-through switching provide?
It enables QoS It forwards frames quickly.***
It provides an analysis of frames.
It allows reduction of traffic by using error checking to drop corrupt frames.
3 Which switch forwarding method should be used on a network that employs frame
classification based on an assigned Quality of Service (QoS) value? cut-through fast-forward fragment-free store-and-forward***
4
Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?
only hosts A and B only hosts A, B, and C***
only hosts A, B, C, and D
only hosts A, B, C, and E
5
Refer to the exhibit. The network consists of four hubs and a switch. The hosts connected to each hub are assigned addresses in the respective VLAN as shown. PC1 on VLAN 1 becomes infected with a virus and initiates a continuous IP broadcast. Which hubs will receive the broadcasts?
Hub A
Hubs A andB
Hubs A and C***
Hubs A, B, C, and D
6 Which three statements are correct concerning the default configuration of a new switch? (Choose three.)
It is configured in VTP server mode.***
STP is automatically enabled.***
The first VTY line is automatically configured to allow remote connections.
VLAN1 is configured with a management IP address. All switch ports are assigned toVLAN1.****
The enable password is configured as cisco.
7 What will be the effect of the command S1# copy system:running-config tftp://172.16.2.155/tokyo-config?
The IOS will be copied to the TFTP server.
The configuration file named tokyo-config will overwrite the startup configuration file on S1.
The running configuration file on S1 will be saved via TFTP to a file named tokyo-config.***
The contents of NVRAM on S1 will become the startup configuration file on the tokyo switch.
8
Refer to the exhibit. The network administrator wants to allow both SSH and Telnet connections to Switch1. However, the SSH connections fail. What is the most likely cause of this problem? The RSA key has been removed.***
SSH has been configured on the wrong line.
The transport input command is applied incorrectly.
The domain name has been configured in the wrong configuration mode.
9 What is the benefit of the auto-MDIX feature on a Cisco Catalyst switch?
dynamically assigns a new management VLAN ID
autonegotiates IP address information for initial management connections
allows the use of straight-through patch cables regardless of connected device types***
places a port immediately in the forwarding state to reduce the time for the spanning tree to reconverge
10
Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?
This entry can only be removed from the MAC address table by a network administrator.
When forwarding a frame to the device with address 0060.5c5b.cd23, the switch does not have to perform a lookup to determine the final destination port.
Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18. The switch learned this MAC address from the source address in a frame received on Fa0/18.****
11
Refer to the exhibit. The teacher host is connected to port Fa0/7 on switch STW. A student has decided to share access to the Internet by attaching a hub and laptop to STW as shown. What will be the result of the student making this connection?
The Fa0/7 port of STW will be shutdown.
The student will gain full access to the Internet.
Both the teacher and student will be able to receive data but only the teacher will be able to send.
The frames from the laptop will be dropped, but the teacher host will maintain connectivity with the network.***
12 Which statement regarding the service password-encryption command is true?
The service password-encryption command is entered at the privileged EXEC mode prompt. The service password-encryption command encrypts only passwords for the console and VTY ports.
The service password-encryption command encrypts all previously unencrypted passwords in the running configuration.***
To see the passwords encrypted by the service password-encryption command, enter the no service password-encryption command.
13 A network administrator enables sticky learning on all access mode interfaces of a Catalyst switch, saves the configuration, then connects hosts to the switch. After the switch operates for several days, the administrator reboots the switch without saving the running configuration. What is the result?
All previously learned MAC addresses are lost.***
The switch reverts to non-sticky dynamic learning.
Connected hosts are no longer able to communicate with the switch.
Previously learned sticky addresses are retained in the switch configuration.
14
Refer to the exhibit. The Layer 2 switching design that is shown has been implemented in a campus environment that is using Spanning Tree Protocol. All inter-switch links that are shown are trunks. Whenever an inter-switch link fails, the network takes nearly a minute to completely converge. How can the convergence time be reduced?
Increase the capacity of the distribution and core trunk links to 10 Gb/s.
Add a trunk link that directly connects D1 and D2.
Use Layer 3 switching on the core switch.
Implement Rapid Spanning Tree Protocol.***
15 What is a result of improperly implementing a network with redundancy at Layer 2?
an increase of unicast and multicast errors at Layer 3
a decrease in the amount of broadcast traffic
end device malfunction because of broadcast storms***
an increase in throughput at all points in the network
16 Why is it important that the network administrator consider the spanning-tree network diameter when choosing the root bridge?
The network diameter limitation is 9.
BPDUs may be discarded because of expiring timers.***
The cabling distance between the switches is 100 meters.
The network diameter must be set to the number of meters of the cable between the root bridge and its farthest connected switch.
17
Refer to the exhibit. What does "FORWARDING" mean in the command output shown?
The switch is sending and receiving data frames.-***
The switch is receiving BPDUs, but not sending data frames. The switch is participating in an election process by forwarding the BPDUs it receives. The switch is receiving BPDUs and populating the MAC address table, but not sending data.
18
Which device or devices should have the Spanning Tree Protocol enabled to prevent host traffic from creating a broadcast storm?
Core_S1 Access_S2 and Access_S3
Core_S1, Access_S2, and Access_S3****
Core_S1, Access_S2, Access_S3, and R1
19
Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?
Cat-A Cat-B Cat-C Cat-D***
20 RSTP is enabled in a switched network that is active and converged. Which switch port type assumes a discarding state on non-root switches? root port edge port alternate port*** designated port
21 In the implementation of PVST+ in a specific VLAN where all switches have default spanning tree priorities, which spanning-tree command setting could be assigned to force one of the Catalyst switches to become and remain the root bridge? root primary-*** priority 8192 priority 2048 spanning-tree mode rapid pvst
22
Refer to the exhibit. All edge ports are configured with the spanning-tree portfast command. Host1 is recently connected to port Fa0/1 on switch SW1 . Which statement is true about the status of port Fa0/1?
The port will transition into blocking state.
The port will transition immediately into forwarding state.***
The port will transition into blocking state and then immediately into forwarding state. The port will transition into blocking state and immediately transition through the listening and learning states.
23 While monitoring LAN traffic, a network technician notices an excessive number of broadcasts. Which two steps could be included in the processes that are needed to reduce the number of broadcasts on the network? (Choose two.)
Replace any existing hubs with switches. Add a Layer 3 device to route between networks.*** Subnet the existing IP network to create two networks.***
Increase the backbone speed by three times the current speed. Add additional switches and spread out the number of hosts evenly between them.
24 How does a switch that is configured for 802.1Q trunking handle untagged frames that are received on a trunk port?
The frames are dropped.
The frames are assigned to the native VLAN.***
The frames are assigned to the default VLAN. The frames are assigned to the management VLAN.
25
Refer to the exhibit. What would happen if the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1?
Host A remains a member of VLAN 10, because the router is routing traffic between VLANs. Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30.***
Host A remains a member of VLAN 10, because the switch provides dynamic VLAN assignment for the port. Host A maintains connectivity to all members of VLAN 10, because it is connected to the same physical network. Host A is no longer a member of VLAN 10, but because port Fa0/3 was unused, it is now a member of VLAN 1.
26
Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit. However, hosts B and D cannot ping each other. What is the most likely cause of this problem?
The link between the switches is up but not trunked. The Fa0/11 interface of Switch1 is not configured as a trunk.
Hosts B and D are configured with IP addresses from different subnets.***
VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.
27
Refer to the exhibit. A network administrator issues the show interfaces fastEthernet 0/8 switchport command to check the status of the port. What can be concluded from the output? Port Fa0/8 is configured as a trunk with 802.1q encapsulation.
Port Fa0/8 is configured as a trunk in VLAN 1.
Port Fa0/8 is configured in access mode and associated with VLAN 1.***
Port Fa0/8 is configured as a trunk and VLAN 1 is a native VLAN for the trunk.
28
Refer to the exhibit. SW-T has been configured with a single trunking interface. Which VLANs will be allowed across the trunk?
Only VLAN 1 will be allowed across the trunk.
All configured VLANs will be allowed across the trunk.***
Only the native VLAN will be allowed across the trunk.
Only the the management and native VLANs will be allowed across the trunk. Only VLANs that are configured on the VTP server in the domain will be allowed across the trunk.
29
Refer to the exhibit. How will switch S2 manage traffic coming from host PC1?
S2 will drop the traffic, unless it is management traffic.
S2 will tag the frame with VLAN ID 99 when it forwards it over the trunk link.
S2 will leave the traffic untagged when it forwards it over a trunk link.***
S2 will tag the traffic with the highest VLAN ID value when it forwards it over the trunk link.
30 What is the purpose of VLAN trunking?
It improves network performance by reducing broadcast traffic. It selects the best path to transmit data in a switched network.
It carries the traffic of multiple VLANs through a single link.***
It avoids spanning tree loops in a switched network.
31 A network administrator implements inter-VLAN routing by configuring subinterfaces on a router. What is one important fact that must be considered?
The physical interface must have an IP address configured.
The subinterface numbers must match the VLAN ID number.
The no shutdown command must be issued on each subinterface.
The IP address of each router subinterface must be used as the default gateway for hosts on the corresponding VLAN.***
32
Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. What should be done to fix the problem?
Configure VLANs with different VLAN IDs on switch SW2.
Reconfigure the trunk port on switch SW2 with static trunk configuration.***
Introduce a Layer 3 device or a switch with Layer 3 capability in the topology.
Apply IP addresses that are in the same subnet to the interfaces used to connect SW1 and SW2.
33
Refer to the exhibit. Which three options correctly describe the router configuration that is shown? (Choose three.)
An IEEE standard trunking protocol is in use.***
Interface Fa0/1 has been configured with subinterfaces.***
The shutdown command has been applied to interface Fa0/1. Interface Fa0/1.3 is mapped to the default management VLAN.
The configuration is appropriate for a router-on-a-stick network design.***
An IP address should be applied to interface Fa0/1 for routing to occur.
34
Refer to the exhibit. A new host needs to be connected to VLAN 3. Which IP address should be assigned to this new host?
192.168.1.22 /28
192.168.1.31 /28
192.168.1.32 /28
192.168.1.52 /28***
192.168.1.63 /28
35
Refer to the exhibit. A network administrator is configuring RT1 for inter-VLAN routing. The switch is configured correctly and is functional. Host1, Host2, and Host3 cannot communicate with each other. Based on the router configuration, what is causing the problem?
Interface Fa0/0 is missing IP address configuration information.
IP addresses on the subinterfaces are incorrectly matched to the VLANs.***
Each subinterface of Fa0/0 needs separate no shutdown commands.
Routers do not support 892.1Q encapsulation on subinterfaces.
36
Refer to the exhibit. Router R1 is properly configured for router on a stick inter-VLAN routing, but PC1 is unable to ping PC2. What needs to be done to resolve the problem?
Rename VLAN1.
Connect one more port of S1 to R1. Configure the Fa0/1 port of S1 as a trunk port.***
Move the Fa0/0 interface of R1 to another VLAN.
37
Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and host B are on the default VLAN but are not able to exchange traffic. What should be done to fix the problem?
Allow all VLANs on the trunk link.
Remove the native VLAN from the trunk.
Include a router or switch with Layer 3 capabilities.
Configure the same native VLAN on both ends of the trunk.***
38
Refer to the exhibit. A network administrator has segmented the network into two VLANs. The connected hosts can only access resources in their own VLAN. What is the most scalable and cost effective solution to allow inter-VLAN communication in this network?
Replace S1 with a router that has one FastEthernet interface for each PC.
Add a second switch and divide the PCs so that each VLAN is connected to its own switch. Configure a router with two subinterfaces on one of its FastEthernet ports and connect it to S1 using a trunk link.***
Connect a router to a port on S1 and assign the IP address of VLAN1 to the connecting router interface.
39
Refer to the exhibit. This switch is to be added to the production network. Which two facts about VLANs and VTP operation can be confirmed by this output? (Choose two.)
The network administrator will be able to configure VLANs of local significance on this switch. VLANs can only be added to the VLAN database on this switch by a VTP advertisement.***
All VLANs that are configured on this switch will be sent to all other switches in the same VTP domain.
This switch will drop all VTP advertisements that come from switches that are configured in the same VTP domain.
Adding this switch to the network will cause no disruption in the VTP domain operations if the rest of the switches in the same VTP domain have a higher configuration revision number.***
40
Refer to the exhibit. VTP pruning is enabled in the VTP domain that is shown. How will switch ST-1 handle Layer 2 broadcast traffic originating from host A on switch ST-C?
It will be dropped. It will be forwarded out port Fa0/5 only.***
It will be forwarded out ports Fa0/5 and Fa0/10.
It will be forwarded out ports Fa0/5, Fa0/10, and Fa0/15.
41 In which mode is a VTP switch operating if it does not allow for the creation of local VLANs but it does accept VLAN updates from other switches in the same domain?
client***
root
server
transparent
42 The network administrator wants to configure a switch to pass VLAN update information to other switches in the domain but not update its own local VLAN database. Which two steps should the administrator perform to achieve this? (Choose two.)
Reset the VTP counters.***
Configure VTP version 1 on the switch.
Configure the VTP mode of the switch to transparent.
Verify that the switch has a higher configuration revision number.***
Configure the switch with the same VTP domain name as other switches in the network.
43
Refer to the exhibit. Switch SW2 has been newly purchased and added to the network. What configuration should be applied to SW2 so that it participates in the same VTP domain as switch SW1, receives VLAN information from SW1, and synchronizes VLAN information?
Disable VTP pruning on SW2. Configure SW2 in VTP transparent mode.***
Configure SW2 with the VTP domain password.
Configure SW2 as a VTP server with a higher revision number.
44
Refer to the exhibit. Switch SW2 was tested in a lab environment and then inserted into a production network without reloading its configuration. After the trunk link between SW1 and SW2 was brought up, all users lost connectivity to the network. What could be the source of the problem?
All the VLANs were pruned from the trunk port between SW1 and SW2.
SW1 and SW2 cannot be both set as VTP servers in the same VTP domain.
VTP configuration revision number of SW2 was higher than the configuration revision number of SW1.***
The additional VLANs from SW2 created more VLANs than the VLAN database of SW1 could contain.
45
Refer to the exhibit. Switches S2 and S3 are properly connected using an ethernet cable. A network administrator has configured both switches with VTP, but S3 is unable to propagate VLANs to S2. What could be the reason for this?
The VTP configuration revision is different on both switches.
The VTP domains are different on both switches.***
VTP pruning is disabled. VTP v2 is disabled.
46 A wireless LAN access point will convert traffic between which two frame encapsulation types?
802.1 and 802.11
802.3 and 802.11***
802.3 and 802.16
802.5 and 802.16
47 Which parameter is used to uniquely identify one wireless network from another?
SSID***
OFDM
WEP
DSSS
48 What provides an authentication mechanism for 802.11-based wireless networks?
DSSS
OFDM
SSID
WPA***
49 Why is MAC address filtering considered a poor choice in securing a WLAN?
Available bandwidth is reduced.
MAC addresses are easily spoofed.***
APs are more susceptible to DoS attacks.
The payload encryption is easily broken.
50
Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installation surveys showed strong signal strength from the AP locations to the client locations. Outside electrical interference has been eliminated. What will fix the problem?
Relocate the APs closer to each other.
Increase the distance between the clients.
Change the channel on AP-B to 6 or 11.***
Place AP-A and AP-B on the same wireless channel.
CCNA 3 exploration - Final Exam (update - 1)
CCNA 3 - final exam
1
In a three-layer hierarchical network design, which distribution layer function delineates broadcast domains?
routing between VLANs***
aggregating traffic flows
providing redundant links
reducing the network diameter
2
What two methods can be used to remove MAC address table entries from a switch? (Choose two.)
Power cycle the switch to clear all dynamically learned addresses. ***
The clear switching-tables command will remove statically configured entries.
The clear mac-address-table command will remove statically and dynamically configured table entries.***
The erase flash command will clear all statically configured table entries.
Statically configured MAC addresses will automatically be removed from the address table 300 minutes after the last activity on a switch port.
3
Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?
only hosts A and B
only hosts A, B, and C ***
only hosts A, B, C, and D
only hosts A, B, C, and E
4
What impact does the use of the mdix auto configuration command have on an Ethernet interface on a switch?
automatically detects duplex settings
automatically detects interface speed
automatically detects copper cable type ***
automatically assigns the first detected MAC address to an interface
5
Which three statements are correct concerning the default configuration of a new switch? (Choose three.)
It is configured in VTP server mode.***
STP is automatically enabled. ***
The first VTY line is automatically configured to allow remote connections.
VLAN1 is configured with a management IP address.
All switch ports are assigned to VLAN1. ***
The enable password is configured as cisco.
6
While configuring a new switch, a network administrator configures the switch as an HTTP server. What benefits does this configuration provide?
This allows the switch to host web pages for the network.
This allows remote VPN connections to the switch over the Internet.
This is required if a web server or web farm is attached to the switch.
This allows web-based configuration tools to be used with the switch. ***
7
Refer to the exhibit. The configuration steps that are listed in the exhibit have been entered in switch S1 via the console. Subsequent attempts to telnet to the switch are not successful. What is causing the problem?
The switch must be configured with SSH version 1.
The transport input command must specify Telnet access. ***
The RSA keys must be returned to zero before SSH will permit Telnet access.
The ip domain-name command must also be entered in line configuration mode for the vty lines.
8
What is a possible impact of setting too short an aging time in the MAC address table of a switch?
overly large address table
unnecessary flooding of packets ***
excessive timeouts of static addresses
impaired ability to dynamically learn new addresses
9
Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?
This entry can only be removed from the MAC address table by a network administrator.
When forwarding a frame to the device with address 0060.5c5b.cd23, the switch does not have to perform a lookup to determine the final destination port.
Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18.
The switch learned this MAC address from the source address in a frame received on Fa0/18.***
10
An administrator is troubleshooting a PC on the network which is suffering from slow and intermittent connectivity. The PC has a ping success rate to the default gateway of less than half the ping attempts. Other PCs on the switch can consistently ping the default gateway. The switch port is configured for auto duplex and the PC is configured for full duplex. What will commonly cause this problem?
The PC is set to full duplex. The switch port fails to autonegotiate the duplex setting and defaults to half duplex, which causes a duplex mismatch. ***
The switch traffic is exceeding available frame buffers. The result is that frames are being dropped.
The PC and the default gateway have different bandwidth Ethernet ports.
The default gateway is not on the same switch that the PC is.
11
Using the command copy tftp:backup.cfg startup-config, an administrator downloaded a saved configuration from a TFTP server to a switch. Why does the administrator not detect any changes in the switch configuration after the download completes?
The command should have been copy startup-config tftp:backup.cfg.
A backup configuration from a TFTP server cannot be copied directly into the startup-config.
The command copy running-config startup-config should be used to save the changes on the switch.
Downloading to the startup-config requires the switch to be reloaded in order for the configuration to take effect. ****
12
Refer to the exhibit. The teacher host is connected to port Fa0/7 on switch STW. A student has decided to share access to the Internet by attaching a hub and laptop to STW as shown. What will be the result of the student making this connection?
The Fa0/7 port of STW will be shutdown.
The student will gain full access to the Internet.
Both the teacher and student will be able to receive data but only the teacher will be able to send.
The frames from the laptop will be dropped, but the teacher host will maintain connectivity with the network. ***
13
Why is it advisable that a network administrator use SSH instead of Telnet when managing switches?
SSH uses TCP whereas Telnet does not.
SSH encrypts only the username and password when logging in.
SSH encrypts all remote management communications whereas Telnet does not. ***
SSH sends a clear text message steam which reduces the bandwidth use for management.
14
Refer to the exhibit. The Layer 2 switching design that is shown has been implemented in a campus environment that is using Spanning Tree Protocol. All inter-switch links that are shown are trunks. Whenever an inter-switch link fails, the network takes nearly a minute to completely converge. How can the convergence time be reduced?
Increase the capacity of the distribution and core trunk links to 10 Gb/s.
Add a trunk link that directly connects D1 and D2.
Use Layer 3 switching on the core switch.
Implement Rapid Spanning Tree Protocol. ***
15
Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?
Cat-A
Cat-B
Cat-C ***
Cat-D
16
Refer to the exhibit. How is port Gi1/1 on SWT-A functioning in the spanning-tree topology?
It is sending and receiving data frames.***
It is receiving BPDUs, but not sending data frames.
It is participating in the election process by forwarding the BPDUs it receives.
It is receiving BPDUs and populating the MAC address table, but not sending data.
17
Which value determines if a switch becomes the central point of reference in the spanning tree topology?
lowest bridge ID ***
highest revision number
lowest numeric IP address
highest numeric MAC address
18
What is the purpose of the Spanning Tree algorithm?
It propagates VLAN configurations to other switches.
It restricts broadcast packets to a single VLAN.
It segments a network into multiple broadcast domains.
It prevents loops in a switched network with redundant paths.***
19
Which STP port type can only appear once on a segment, and must be present in order for traffic to flow on that segment?
non-root port
disabled port
designated port ***
non-designated port
20
Which type of traffic can still be received on a switch interface that is in STP blocking mode?
BPDU frames ***
multicast frames
broadcast frames
Layer 3 packets
21
Refer to the exhibit. Each switch is configured to participate in STP for VLANs 1, 10, 20, and 30. Which switch will become the root for VLAN 20?
A
B
C
D ***
22
Refer to the exhibit. All edge ports are configured with the spanning-tree portfast command. Host1 is recently connected to port Fa0/1 on switch SW1 . Which statement is true about the status of port Fa0/1?
The port will transition into blocking state.
The port will transition immediately into forwarding state.***
The port will transition into blocking state and then immediately into forwarding state.
The port will transition into blocking state and immediately transition through the listening and learning states.
23
Which statement describes the use of voice VLANs in Cisco IP telephony?
The voice VLAN carries both tagged and untagged traffic.
The voice VLAN carries untagged traffic having special QoS markings.
The voice VLAN must be configured on the switch port to which the IP phone attaches.***
Data and voice frames are tagged with same VLAN ID between the IP phone and the switch when a voice VLAN is configured.
24
Refer to the exhibit. All trunk links are operational and all VLANs are allowed on all trunk links. An ARP request is sent by computer 5. Which device or devices will receive this message?
only computer 4
computer 3 and RTR-A***
computer 4 and RTR-A
computer 1, computer 2, computer 4, and RTR-A
computer 1, computer 2, computer 3, computer 4, and RTR-A
all of the computers and the router
25
What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?
only the management VLAN
all VLANs except the extended range VLANs
all VLANs except 1 and 1002-1005
all VLANs ***
26
Refer to the exhibit. What would happen if the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1?
Host A remains a member of VLAN 10, because the router is routing traffic between VLANs.
Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30. ***
Host A remains a member of VLAN 10, because the switch provides dynamic VLAN assignment for the port.
Host A maintains connectivity to all members of VLAN 10, because it is connected to the same physical network.
Host A is no longer a member of VLAN 10, but because port Fa0/3 was unused, it is now a member of VLAN 1.
27
Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit. However, hosts B and D cannot ping each other. What is the most likely cause of this problem?
The link between the switches is up but not trunked.
The Fa0/11 interface of Switch1 is not configured as a trunk.
Hosts B and D are configured with IP addresses from different subnets.***
VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.
28
Refer to the exhibit. What is true of the configuration of switch S1?
A Cisco proprietary protocol is in use for ports Fa0/1 and Fa0/3.
Switch ports Fa0/1 and Fa0/3 have been configured with the switchport mode access command.
Untagged frames received on ports Fa0/1 and Fa0/3 will be placed on VLAN 1.
Switch ports Fa0/1 and Fa0/3 are configured to carry data from multiple VLANs.***
29
Refer to the exhibit. How does SW1 manage traffic coming from Host A?
SW1 drops the traffic because it is untagged.
SW1 leaves the traffic untagged and forwards it over the trunk. ***
SW1 tags the traffic with the lowest VLAN ID value and forwards it over the trunk link.
SW1 encapsulates the traffic with 802.1Q encapsulation and forwards it over the trunk link.
30
Refer to the exhibit. Which two statements are true about the operation of the interfaces? (Choose two.)
Incoming traffic with VLAN ID 0 is processed by interface fa0/0.
Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.***
Both subinterfaces remain up with line protocol up, even if fa0/0 line protocol is down.
Subinterfaces use unique MAC addresses by adding the 802.1Q VLAN ID to the hardware address.
Traffic inbound on this router is processed by different subinterfaces, depending on the VLAN from which the traffic originated. ***
31
Refer to the exhibit. A company has acquired a new office in a campus environment. Switches in the existing office and the new office are directly connected by a trunk link. The VLANs and IP addressing are setup as shown in the exhibit. The computers in each office are not able to ping each other. What will fix the problem?
Use an access link between S2 and S3.
Connect S2 and S3 to a common router.***
Set the subnet mask in the new office to /24.
Configure the new office default gateway to 172.17.10.1
Change the port assignments in the new office to a different VLAN.
32
Refer to the exhibit. If switch SW1 is configured with the four VLANs as shown in the exhibit, how many physical interfaces are needed on router R1 to configure inter-VLAN routing using subinterfaces?
zero
one ***
two
four
33
Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161. What will the router do with this packet?
The router will drop the packet.***
The router will forward the packet out interface FastEthernet 0/1.1.
The router will forward the packet out interface FastEthernet 0/1.2.
The router will forward the packet out interface FastEthernet 0/1.3.
The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.
34
A network administrator configures a switch port with the command switchport mode dynamic auto. What is the resulting behavior of the switch port?
The switch port is able to trunk if the remote switch port is set to auto.
The switch port is able to trunk if the remote switch port is set to desirable.***
The switch port will be disabled if it is unable to successfully negotiate trunking.
A successful trunk will be established if the remote switch is non-Cisco but the port is configured for trunking.
35
Refer to the exhibit. Which three options correctly identify information that could be associated with this output?(Choose three.)
Interface FastEthernet3/0/0 is subinterfaced. ***
A non-proprietary trunking protocol is in use. ***
The configuration is appropriate for a router-on-a-stick network design.
A shutdown command has been applied to interface FastEthernet3/0/0. ***
Interface FastEthernet3/0/0.3 is mapped to the default management VLAN.
An IP address should be applied to FastEthernet3/0/0 for correct data routing.
36
Refer to the exhibit. Users complain that they do not have connectivity to the web server that is connected to SW1. What should be done to remedy the problem?
Allow all VLANs on the trunk link.
Configure VLAN 100 as the native VLAN for SW1.***
Configure the trunk port in trunk mode on SW1.
Attach the web server to a router and configure inter-VLAN routing.
37
Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP address should be assigned to this new host?
192.168.1.11 /28
192.168.1.22 /28 ***
192.168.1.33 /28
192.168.1.44 /28
192.168.1.55 /28
38
Refer to the exhibit. A network administrator has segmented the network into two VLANs and configured Router1 for inter-VLAN routing. A test of the network, however, shows that hosts on each VLAN can only access local resources and not resources on the other VLAN. What is the most likely cause of this problem?
Switch port Fa0/1 is not trunking. ***
Router interface Fa0/0 is possibly down.
No routing protocol is configured on Router1.
One of the router subinterfaces is possibly down.
39
Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2. Hosts A, B, C, and D are correctly configured with IP addresses in the subnet range for VLAN 50. Host A can communicate with host B, but cannot communicate with host C or host D. What is the cause of this problem?
There is a native VLAN mismatch.
The Fa0/11 interface of Switch1 is not configured as a trunk.
The link between Switch1 and Switch2 is up but not trunked.
VLAN 50 is not allowed on the trunk link between Switch1 and Switch2. ***
40
Which configuration changes will increment the configuration revision number on the VTP server?
configuring trunk links on the VTP server
configuring or changing the VTP password
configuring or changing the VTP domain name
configuring or changing the VTP version number
configuring or deleting a VLAN or creating a VLAN name ***
41
The network administrator wants to configure a switch to pass VLAN update information to other switches in the domain but not update its own local VLAN database. Which two steps should the administrator perform to achieve this? (Choose two.)
Reset the VTP counters.
Configure VTP version 1 on the switch.
Configure the VTP mode of the switch to transparent. ***
Verify that the switch has a higher configuration revision number.
Configure the switch with the same VTP domain name as other switches in the network.***
42
Refer to the exhibit. VLAN 10 has been configured on the VTP server. Users who are assigned to VLAN 10 are connected as shown in the exhibit. On the basis of the outputs that are provided, which group of users will be able to communicate with the users on VLAN 10 on SW1?
all the users who are connected only to SW2
users on VLAN 10 who are connected only to SW3***
users on VLAN 10 who are connected only to SW4
users on VLAN 10 who are connected to both SW3 and SW4
43
Refer to the exhibit. Switches S2 and S3 are properly connected using an ethernet cable. A network administrator has configured both switches with VTP, but S3 is unable to propagate VLANs to S2. What could be the reason for this?
The VTP configuration revision is different on both switches.
The VTP domains are different on both switches. ****
VTP pruning is disabled.
VTP v2 is disabled.
44
Refer to the exhibit. The VTP domain has been configured as shown in the exhibit. The network technician accidentally configured the VTP server as a VTP client. After the technician reloaded the switches, all users in the VTP domain started to complain that they lost connectivity to the users on the same VLANs that are connected to other switches. What should be done in the future to prevent losing all VLAN configurations in a VTP domain?
Configure all switches in VTP transparent mode and copy the VLAN configuration into flash.
Configure all switches in the network as VTP clients and copy the VLAN configuration into NVRAM.
Create a new domain and configure a second switch as a VTP server to take over in case of a primary VTP server failure.***
In the same domain, configure a second switch as a VTP server to take over in case of a primary VTP server failure.
45
Refer to the exhibit. Which two settings show the default value of VTP configuration on a Cisco 2960 switch? (Choose two.)
revision number***
existing VLANs
operating mode
domain name
pruning mode ***
46
What are two benefits of the IEEE 802.11n standard over the IEEE 802.11G? (Choose two.)
requires less equipment
provides improved range** *
permits increased data rates***
has a single-input and a single-output
needs no hardware upgrade for compatibility
47
Which parameter is used to uniquely identify one wireless network from another?
SSID ***
OFDM
WEP
DSSS
48
Which security protocol or measure would provide the greatest protection for a wireless LAN?
WPA2 ***
cloaking SSIDs
shared WEP key
MAC address filtering
49
Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?
Associate with the access point and then open a HyperTerminal session with the access point.
Physically connect to the access point and then reboot the computer to launch the configuration software.
From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser. ***
Modify the TCP/IP properties of the computer connected to the access point so that it exists on the same network, and then reboot your computer to establish a connection.
50
Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installation surveys showed strong signal strength from the AP locations to the client locations. Outside electrical interference has been eliminated. What will fix the problem?
Relocate the APs closer to each other.
Increase the distance between the clients.
Change the channel on AP-B to 6 or 11.***
Place AP-A and AP-B on the same wireless channel.
1
In a three-layer hierarchical network design, which distribution layer function delineates broadcast domains?
routing between VLANs***
aggregating traffic flows
providing redundant links
reducing the network diameter
2
What two methods can be used to remove MAC address table entries from a switch? (Choose two.)
Power cycle the switch to clear all dynamically learned addresses. ***
The clear switching-tables command will remove statically configured entries.
The clear mac-address-table command will remove statically and dynamically configured table entries.***
The erase flash command will clear all statically configured table entries.
Statically configured MAC addresses will automatically be removed from the address table 300 minutes after the last activity on a switch port.
3
Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?
only hosts A and B
only hosts A, B, and C ***
only hosts A, B, C, and D
only hosts A, B, C, and E
4
What impact does the use of the mdix auto configuration command have on an Ethernet interface on a switch?
automatically detects duplex settings
automatically detects interface speed
automatically detects copper cable type ***
automatically assigns the first detected MAC address to an interface
5
Which three statements are correct concerning the default configuration of a new switch? (Choose three.)
It is configured in VTP server mode.***
STP is automatically enabled. ***
The first VTY line is automatically configured to allow remote connections.
VLAN1 is configured with a management IP address.
All switch ports are assigned to VLAN1. ***
The enable password is configured as cisco.
6
While configuring a new switch, a network administrator configures the switch as an HTTP server. What benefits does this configuration provide?
This allows the switch to host web pages for the network.
This allows remote VPN connections to the switch over the Internet.
This is required if a web server or web farm is attached to the switch.
This allows web-based configuration tools to be used with the switch. ***
7
Refer to the exhibit. The configuration steps that are listed in the exhibit have been entered in switch S1 via the console. Subsequent attempts to telnet to the switch are not successful. What is causing the problem?
The switch must be configured with SSH version 1.
The transport input command must specify Telnet access. ***
The RSA keys must be returned to zero before SSH will permit Telnet access.
The ip domain-name command must also be entered in line configuration mode for the vty lines.
8
What is a possible impact of setting too short an aging time in the MAC address table of a switch?
overly large address table
unnecessary flooding of packets ***
excessive timeouts of static addresses
impaired ability to dynamically learn new addresses
9
Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?
This entry can only be removed from the MAC address table by a network administrator.
When forwarding a frame to the device with address 0060.5c5b.cd23, the switch does not have to perform a lookup to determine the final destination port.
Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18.
The switch learned this MAC address from the source address in a frame received on Fa0/18.***
10
An administrator is troubleshooting a PC on the network which is suffering from slow and intermittent connectivity. The PC has a ping success rate to the default gateway of less than half the ping attempts. Other PCs on the switch can consistently ping the default gateway. The switch port is configured for auto duplex and the PC is configured for full duplex. What will commonly cause this problem?
The PC is set to full duplex. The switch port fails to autonegotiate the duplex setting and defaults to half duplex, which causes a duplex mismatch. ***
The switch traffic is exceeding available frame buffers. The result is that frames are being dropped.
The PC and the default gateway have different bandwidth Ethernet ports.
The default gateway is not on the same switch that the PC is.
11
Using the command copy tftp:backup.cfg startup-config, an administrator downloaded a saved configuration from a TFTP server to a switch. Why does the administrator not detect any changes in the switch configuration after the download completes?
The command should have been copy startup-config tftp:backup.cfg.
A backup configuration from a TFTP server cannot be copied directly into the startup-config.
The command copy running-config startup-config should be used to save the changes on the switch.
Downloading to the startup-config requires the switch to be reloaded in order for the configuration to take effect. ****
12
Refer to the exhibit. The teacher host is connected to port Fa0/7 on switch STW. A student has decided to share access to the Internet by attaching a hub and laptop to STW as shown. What will be the result of the student making this connection?
The Fa0/7 port of STW will be shutdown.
The student will gain full access to the Internet.
Both the teacher and student will be able to receive data but only the teacher will be able to send.
The frames from the laptop will be dropped, but the teacher host will maintain connectivity with the network. ***
13
Why is it advisable that a network administrator use SSH instead of Telnet when managing switches?
SSH uses TCP whereas Telnet does not.
SSH encrypts only the username and password when logging in.
SSH encrypts all remote management communications whereas Telnet does not. ***
SSH sends a clear text message steam which reduces the bandwidth use for management.
14
Refer to the exhibit. The Layer 2 switching design that is shown has been implemented in a campus environment that is using Spanning Tree Protocol. All inter-switch links that are shown are trunks. Whenever an inter-switch link fails, the network takes nearly a minute to completely converge. How can the convergence time be reduced?
Increase the capacity of the distribution and core trunk links to 10 Gb/s.
Add a trunk link that directly connects D1 and D2.
Use Layer 3 switching on the core switch.
Implement Rapid Spanning Tree Protocol. ***
15
Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?
Cat-A
Cat-B
Cat-C ***
Cat-D
16
Refer to the exhibit. How is port Gi1/1 on SWT-A functioning in the spanning-tree topology?
It is sending and receiving data frames.***
It is receiving BPDUs, but not sending data frames.
It is participating in the election process by forwarding the BPDUs it receives.
It is receiving BPDUs and populating the MAC address table, but not sending data.
17
Which value determines if a switch becomes the central point of reference in the spanning tree topology?
lowest bridge ID ***
highest revision number
lowest numeric IP address
highest numeric MAC address
18
What is the purpose of the Spanning Tree algorithm?
It propagates VLAN configurations to other switches.
It restricts broadcast packets to a single VLAN.
It segments a network into multiple broadcast domains.
It prevents loops in a switched network with redundant paths.***
19
Which STP port type can only appear once on a segment, and must be present in order for traffic to flow on that segment?
non-root port
disabled port
designated port ***
non-designated port
20
Which type of traffic can still be received on a switch interface that is in STP blocking mode?
BPDU frames ***
multicast frames
broadcast frames
Layer 3 packets
21
Refer to the exhibit. Each switch is configured to participate in STP for VLANs 1, 10, 20, and 30. Which switch will become the root for VLAN 20?
A
B
C
D ***
22
Refer to the exhibit. All edge ports are configured with the spanning-tree portfast command. Host1 is recently connected to port Fa0/1 on switch SW1 . Which statement is true about the status of port Fa0/1?
The port will transition into blocking state.
The port will transition immediately into forwarding state.***
The port will transition into blocking state and then immediately into forwarding state.
The port will transition into blocking state and immediately transition through the listening and learning states.
23
Which statement describes the use of voice VLANs in Cisco IP telephony?
The voice VLAN carries both tagged and untagged traffic.
The voice VLAN carries untagged traffic having special QoS markings.
The voice VLAN must be configured on the switch port to which the IP phone attaches.***
Data and voice frames are tagged with same VLAN ID between the IP phone and the switch when a voice VLAN is configured.
24
Refer to the exhibit. All trunk links are operational and all VLANs are allowed on all trunk links. An ARP request is sent by computer 5. Which device or devices will receive this message?
only computer 4
computer 3 and RTR-A***
computer 4 and RTR-A
computer 1, computer 2, computer 4, and RTR-A
computer 1, computer 2, computer 3, computer 4, and RTR-A
all of the computers and the router
25
What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?
only the management VLAN
all VLANs except the extended range VLANs
all VLANs except 1 and 1002-1005
all VLANs ***
26
Refer to the exhibit. What would happen if the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1?
Host A remains a member of VLAN 10, because the router is routing traffic between VLANs.
Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30. ***
Host A remains a member of VLAN 10, because the switch provides dynamic VLAN assignment for the port.
Host A maintains connectivity to all members of VLAN 10, because it is connected to the same physical network.
Host A is no longer a member of VLAN 10, but because port Fa0/3 was unused, it is now a member of VLAN 1.
27
Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit. However, hosts B and D cannot ping each other. What is the most likely cause of this problem?
The link between the switches is up but not trunked.
The Fa0/11 interface of Switch1 is not configured as a trunk.
Hosts B and D are configured with IP addresses from different subnets.***
VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.
28
Refer to the exhibit. What is true of the configuration of switch S1?
A Cisco proprietary protocol is in use for ports Fa0/1 and Fa0/3.
Switch ports Fa0/1 and Fa0/3 have been configured with the switchport mode access command.
Untagged frames received on ports Fa0/1 and Fa0/3 will be placed on VLAN 1.
Switch ports Fa0/1 and Fa0/3 are configured to carry data from multiple VLANs.***
29
Refer to the exhibit. How does SW1 manage traffic coming from Host A?
SW1 drops the traffic because it is untagged.
SW1 leaves the traffic untagged and forwards it over the trunk. ***
SW1 tags the traffic with the lowest VLAN ID value and forwards it over the trunk link.
SW1 encapsulates the traffic with 802.1Q encapsulation and forwards it over the trunk link.
30
Refer to the exhibit. Which two statements are true about the operation of the interfaces? (Choose two.)
Incoming traffic with VLAN ID 0 is processed by interface fa0/0.
Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.***
Both subinterfaces remain up with line protocol up, even if fa0/0 line protocol is down.
Subinterfaces use unique MAC addresses by adding the 802.1Q VLAN ID to the hardware address.
Traffic inbound on this router is processed by different subinterfaces, depending on the VLAN from which the traffic originated. ***
31
Refer to the exhibit. A company has acquired a new office in a campus environment. Switches in the existing office and the new office are directly connected by a trunk link. The VLANs and IP addressing are setup as shown in the exhibit. The computers in each office are not able to ping each other. What will fix the problem?
Use an access link between S2 and S3.
Connect S2 and S3 to a common router.***
Set the subnet mask in the new office to /24.
Configure the new office default gateway to 172.17.10.1
Change the port assignments in the new office to a different VLAN.
32
Refer to the exhibit. If switch SW1 is configured with the four VLANs as shown in the exhibit, how many physical interfaces are needed on router R1 to configure inter-VLAN routing using subinterfaces?
zero
one ***
two
four
33
Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161. What will the router do with this packet?
The router will drop the packet.***
The router will forward the packet out interface FastEthernet 0/1.1.
The router will forward the packet out interface FastEthernet 0/1.2.
The router will forward the packet out interface FastEthernet 0/1.3.
The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.
34
A network administrator configures a switch port with the command switchport mode dynamic auto. What is the resulting behavior of the switch port?
The switch port is able to trunk if the remote switch port is set to auto.
The switch port is able to trunk if the remote switch port is set to desirable.***
The switch port will be disabled if it is unable to successfully negotiate trunking.
A successful trunk will be established if the remote switch is non-Cisco but the port is configured for trunking.
35
Refer to the exhibit. Which three options correctly identify information that could be associated with this output?(Choose three.)
Interface FastEthernet3/0/0 is subinterfaced. ***
A non-proprietary trunking protocol is in use. ***
The configuration is appropriate for a router-on-a-stick network design.
A shutdown command has been applied to interface FastEthernet3/0/0. ***
Interface FastEthernet3/0/0.3 is mapped to the default management VLAN.
An IP address should be applied to FastEthernet3/0/0 for correct data routing.
36
Refer to the exhibit. Users complain that they do not have connectivity to the web server that is connected to SW1. What should be done to remedy the problem?
Allow all VLANs on the trunk link.
Configure VLAN 100 as the native VLAN for SW1.***
Configure the trunk port in trunk mode on SW1.
Attach the web server to a router and configure inter-VLAN routing.
37
Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP address should be assigned to this new host?
192.168.1.11 /28
192.168.1.22 /28 ***
192.168.1.33 /28
192.168.1.44 /28
192.168.1.55 /28
38
Refer to the exhibit. A network administrator has segmented the network into two VLANs and configured Router1 for inter-VLAN routing. A test of the network, however, shows that hosts on each VLAN can only access local resources and not resources on the other VLAN. What is the most likely cause of this problem?
Switch port Fa0/1 is not trunking. ***
Router interface Fa0/0 is possibly down.
No routing protocol is configured on Router1.
One of the router subinterfaces is possibly down.
39
Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2. Hosts A, B, C, and D are correctly configured with IP addresses in the subnet range for VLAN 50. Host A can communicate with host B, but cannot communicate with host C or host D. What is the cause of this problem?
There is a native VLAN mismatch.
The Fa0/11 interface of Switch1 is not configured as a trunk.
The link between Switch1 and Switch2 is up but not trunked.
VLAN 50 is not allowed on the trunk link between Switch1 and Switch2. ***
40
Which configuration changes will increment the configuration revision number on the VTP server?
configuring trunk links on the VTP server
configuring or changing the VTP password
configuring or changing the VTP domain name
configuring or changing the VTP version number
configuring or deleting a VLAN or creating a VLAN name ***
41
The network administrator wants to configure a switch to pass VLAN update information to other switches in the domain but not update its own local VLAN database. Which two steps should the administrator perform to achieve this? (Choose two.)
Reset the VTP counters.
Configure VTP version 1 on the switch.
Configure the VTP mode of the switch to transparent. ***
Verify that the switch has a higher configuration revision number.
Configure the switch with the same VTP domain name as other switches in the network.***
42
Refer to the exhibit. VLAN 10 has been configured on the VTP server. Users who are assigned to VLAN 10 are connected as shown in the exhibit. On the basis of the outputs that are provided, which group of users will be able to communicate with the users on VLAN 10 on SW1?
all the users who are connected only to SW2
users on VLAN 10 who are connected only to SW3***
users on VLAN 10 who are connected only to SW4
users on VLAN 10 who are connected to both SW3 and SW4
43
Refer to the exhibit. Switches S2 and S3 are properly connected using an ethernet cable. A network administrator has configured both switches with VTP, but S3 is unable to propagate VLANs to S2. What could be the reason for this?
The VTP configuration revision is different on both switches.
The VTP domains are different on both switches. ****
VTP pruning is disabled.
VTP v2 is disabled.
44
Refer to the exhibit. The VTP domain has been configured as shown in the exhibit. The network technician accidentally configured the VTP server as a VTP client. After the technician reloaded the switches, all users in the VTP domain started to complain that they lost connectivity to the users on the same VLANs that are connected to other switches. What should be done in the future to prevent losing all VLAN configurations in a VTP domain?
Configure all switches in VTP transparent mode and copy the VLAN configuration into flash.
Configure all switches in the network as VTP clients and copy the VLAN configuration into NVRAM.
Create a new domain and configure a second switch as a VTP server to take over in case of a primary VTP server failure.***
In the same domain, configure a second switch as a VTP server to take over in case of a primary VTP server failure.
45
Refer to the exhibit. Which two settings show the default value of VTP configuration on a Cisco 2960 switch? (Choose two.)
revision number***
existing VLANs
operating mode
domain name
pruning mode ***
46
What are two benefits of the IEEE 802.11n standard over the IEEE 802.11G? (Choose two.)
requires less equipment
provides improved range** *
permits increased data rates***
has a single-input and a single-output
needs no hardware upgrade for compatibility
47
Which parameter is used to uniquely identify one wireless network from another?
SSID ***
OFDM
WEP
DSSS
48
Which security protocol or measure would provide the greatest protection for a wireless LAN?
WPA2 ***
cloaking SSIDs
shared WEP key
MAC address filtering
49
Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?
Associate with the access point and then open a HyperTerminal session with the access point.
Physically connect to the access point and then reboot the computer to launch the configuration software.
From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser. ***
Modify the TCP/IP properties of the computer connected to the access point so that it exists on the same network, and then reboot your computer to establish a connection.
50
Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installation surveys showed strong signal strength from the AP locations to the client locations. Outside electrical interference has been eliminated. What will fix the problem?
Relocate the APs closer to each other.
Increase the distance between the clients.
Change the channel on AP-B to 6 or 11.***
Place AP-A and AP-B on the same wireless channel.
Saturday, April 24, 2010
CCNA 3 exploration - Final Exam
CCNA 3 - final exam
1. Refer to the exhibit. The Fast Ethernet port Fa0/1 on the switch is configured for auto-negotiate speed/duplex settings, and the NIC on the machine is set to 100 Mbps, full-duplex. The log error message shown has been received. What two solutions could fix the problem? (Choose two.)
Configure the switch manually for auto-negotiate speed/duplex and the NIC on the machine for 100 Mbps, half-duplex.
**Configure both sides of the link for auto-negotiate speed/duplex settings.
**Manually configure both sides of the link for 100 Mbps, full-duplex.
Manually configure the switch for 100 Mbps, full-duplex, and the NIC on the machine for auto-negotiate.
Manually configure the switch for 1000 Mbps, full-duplex, and the NIC on the machine for auto-negotiate.
2. Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and Host B are on the default VLAN but are not able to exchange traffic. What should be done to fix the problem?
Allow all VLANs on the trunk link.
**Configure the same native VLAN on both ends of the trunk.
Include a router or switch with Layer 3 capabilities.
Remove the native VLAN from the trunk.
Configure ISL encapsulation on both ends of the trunk.
3. What are two benefits of the IEEE 802.11n standard? (Choose two.)
single-input, single-output
**improved range
requires less equipment
hardware upgrade for compatibility
**increased data rates
4. Refer to the exhibit. Switch SW2 has been newly purchased and added to the network. What configuration should be applied to SW2 so that it participates in the same VTP domain as switch SW1, receives VLAN information from SW1, and synchronizes VLAN information?
Configure SW2 as a VTP server with a higher revision number.
**Configure SW2 as a VTP client.
Configure SW2 in VTP transparent mode.
Configure SW2 with no VTP domain password.
Disable VTP pruning on SW2.
5. Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit data at the same time. How do the hosts respond on the network? (Choose two.)
Hosts 1 and 4 may be operating full duplex so no collision will exist.
The hub will block the port connected to Host 4 to prevent a collision.
**After the end of the jam signal, a backoff algorithm is invoked.
Hosts 1 and 4 are assigned shorter backoff values to provide them priority to access the media.
**If a host has data to transmit after the backoff period of that host, the host checks to determine if the line is idle, before transmitting.
6. Refer to the exhibit. Which statement is true regarding the information shown?
Only one VLAN is currently configured to use the trunk links.
Inter-VLAN routing is not functioning because the switch is still in the process of negotiating the trunk link.
**Interfaces gi0/1 and fa0/1 are carrying data from multiple VLANs.
The interfaces shown are shut down.
7. Refer to the exhibit. After the listed commands are entered into router R1 and switch S1, the administrator enters the show interface fa0/1 trunk and gets the results shown. What is the likely problem?
The trunk is established, but no VLANs have been configured to use it.
**The trunk has not been established because the router does not support dynamic trunking protocol.
The router, the switch, or both must be configured with the dynamic desirable option for dynamic trunking protocol to establish a trunk.
The router is missing the dynamic trunking protocol statements necessary to form a trunk.
8. Refer to the exhibit. Which device is the authenticator?
**access point
data server
client
RADIUS server
9. What three radio frequency bands are designated by the ITU-R as unlicensed for industrial, scientific, and medical (ISM) communities and are therefore supported by IEEE 802.11? (Choose three.)
**900 MHz
9 MHz
**2.4 GHz
5.7 GHz
**5 GHz
900 GHz
10. What three tasks should be performed before moving a Catalyst switch to a new VTP management domain? (Choose three.)
**Verify that the new switch has a lower configuration revision number than the other switches in the domain.
Reset the VTP counters to allow the switch to synchronize with the other switches in the domain.
Download the VTP database from the VTP server in the new domain.
Configure the VTP server in the domain to recognize the BID of the new switch.
**Select the correct VTP mode and version.
**Configure the switch with the name of the new management domain.
11. Which three configurations are required to allow remote access to a switch using the telnet command? (Choose three.)
**default gateway
**vty line password
console line password
HTTP server interface authentication
**IP address of the switch on the management VLAN
duplex and speed on the Ethernet port used for the connection
12. What are three benefits of a hiearchical network design model? (Choose three.)
**scalability
higher speed
mobility
**security
**manageability
cost
13. Refer to the exhibit. The network administrator has added VoIP telephones and a VoIP gateway computer to the existing switch infrastructure, and then created the VLANs. What must be done to converge the network?
Combine all traffic except management traffic to a single VLAN.
Combine all traffic including management traffic to a single VLAN.
Use Layer 3 switching to combine the voice and data traffic at S1.
**The network is already converged.
Implement a common IP addressing scheme for both VoIP phones and PCs.
14. Refer to the exhibit. R1 is configured for traditional inter-VLAN routing. R1 can ping Pc3 but cannot ping Pc1. What is a possible cause for this failure?
**S1 port fa0/11 is in the wrong VLAN.
Pc1 IP address is incorrect.
R1 does not have an active routing protocol.
Router interface fa0/0 has the wrong trunk encapsulation type configured.
15. Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP addresses should be assigned to this new host?
192.168.1.1 /26
192.168.1.11 /28
**192.168.1.22 /28
192.168.1.33 /28
192.168.1.44 /28
192.168.1.55 /28
16. Refer to the exhibit. Each switch is shown with its MAC address. Which switch will be elected as the spanning-tree root bridge if the switches are configured with their default priority values?
switch A
switch B
switch C
switch D
switch E
**switch F
17. Refer to the exhibit. All switches are configured with rapid PVST+. Port Gi0/2 on S2 is the root port. A network administrator issues the spanning-tree link-type point-to-point command on port Gi0/1 for switch S2. What is the result of this command?
**If the link between D1 and C1 fails, port Gi0/2 on S2 rapidly transitions to the forwarding state.
PortFast is enabled on Gi0/2 on S2.
Port Gi0/2 on S2 becomes a designated port.
Broadcast packets are restricted on the link between S2 and D1.
Port Gi0/2 on S2 becomes an edge port.
18. Refer to the exhibit. The switches are configured for VTP as shown. Which two statements correctly describe the operation of these switches? (Choose two.)
A new VLAN can be added to Switch1 and that information will be added only to Switch2.
An existing VLAN can be deleted from Switch2 and that VLAN will be deleted from Switch1 and Switch4.
A new VLAN can be added to Switch4 and that information will be added to Switch1, Switch2, and Switch3.
**A new VLAN can be added to Switch1 and that information will be added to Switch2 and Switch4.
A new VLAN can be added to Switch3 and that information will be added to Switch1, Switch2, and Switch4.
**An existing VLAN can be deleted from Switch4 and that VLAN will be deleted from Switch1 and Switch2.
19. Refer to the exhibit. A host attached to port Fa0/3 of the switch can communicate with the host connected to port Fa0/16, but cannot communicate with the host connected to port Fa0/2. What could account for this failure?
Fa0/3 is down.
The trunk link to the router is down.
**The VLAN0010 network address is missing from the routing table.
Fa0/2 has been assigned to the administrative VLAN.
The router does not have a functional routing protocol installed.
20. A network administrator wants to add a new switch to the existing VTP domain. The new switch will have a VLAN that the administrator does not want visible to any other switches. All other VLANs should be visible on all switches, and all VLANs should be visible to the new switch. Which solution meets the requirements with the least administrative effort?
Add the switch in server mode. After all VLANs have propagated to the new switch, change the trunked link to access mode. Add the private VLAN to the new switch.
Add the switch in server mode. Add an extended range VLAN to the new switch as the private VLAN.
Add the switch in server mode. Add the private VLAN to the new switch. Enable VTP pruning and ensure that no ports are placed in the private VLAN on any other switches.
**Add the switch in client mode. After the existing VLANs have propagated, change the switch to transparent mode. Add the private VLAN.
Add the switch in VTP transparent mode. Manually add all VLANs to the switch.
21. Refer to the exhibit. Host A sends a broadcast message. Which devices will see the broadcast?
all hosts
Host B and the router
**Host C and the router
the router, Host C, and all the hosts connected to Hub1
22. Refer to the exhibit. Which three options correctly identify information that could be associated with this output?(Choose three.)
An IP address should be applied to FastEthernet3/0/0 for correct data routing.
**Standardized trunking protocol is used.
A shutdown command has been applied to interface FastEthernet3/0/0.
**The configuration is appropriate for a router-on-a-stick network design.
**Interface FastEthernet3/0/0 is subinterfaced.
Interface FastEthernet3/0/0.3 is mapped to the default administrative VLAN.
23. Refer to the exhibit. Spanning-tree port priorities are listed beneath each interface. The network administrator enters the spanning-tree vlan 1 root primary command on S4. Which three port results are correct? (Choose three.)
**S1 Gi0/1 becomes a root port.
S3 Gi0/1 becomes a non-designated port.
S4 Gi0/1 becomes a root port.
**S4 Gi0/2 becomes a designated port.
S2 Gi0/2 becomes a non-designated port.
**S1 Gi0/2 becomes a non-designated port.
24. Refer to the exhibit. Switches C1, D1, D2, and S2 have all been configured with RSTP. S1 and S3 are not capable of rapid PVST+ and are in the default configuration. What three implications does this have for the Layer 2 network? (Choose three.)
Because S1 and S3 are not trunking, they have no spanning-tree instance.
A topology change BPDU from C1 forces the uplinks on S1 and S3 to stop forwarding traffic for twice the forward delay time.
**Port Gi0/1 on D1 and port Gi0/1 on D2 become designated ports.
**Loss of the root port link on S2 causes a rapid transition to non-designated port on S2.
**PortFast can be enabled on all ports on S1 and S3.
Gi0/1 on S1 and Gi0/1 on S3 become designated ports.
25. Refer to the exhibit. The network administrator enters the configuration shown to allow both SSH and Telnet connections to the switch. The Telnet connections fail. What is the most likely cause of this problem?
The SSH version number is wrong.
**SSH has been configured on the wrong line.
The transport input command is configured incorrectly.
Telnet and SSH cannot be configured simultaneously.
26. Refer to the exhibit. On the basis of the configuration shown, how will an Ethernet frame on port GigabitEthernet0/1 be modified?
802.1Q encapsulation prepends a 4-byte tag field in front of the original Ethernet frame and recomputes the frame check sequence (FCS) on the modified frame.
**802.1Q encapsulation inserts a 4-byte tag field into the original Ethernet frame between the source address and type or length fields.
802.1Q encapsulation prepends an 802.1p field in front of the original Ethernet frame and recomputes the frame check sequence (FCS) on the modified frame.
802.1Q encapsulation inserts an 802.1p field into the original Ethernet frame between the source address and type or length fields.
27. Refer to the exhibit. Which two statements are true regarding what the cost value of 23 represents for Switch4? (Choose two.)
**This cost represents the lowest cost path for Switch4 to the root switch.
A cost of 23 is the value being advertised out port 16 on the switch upstream (closer) to the root switch.
Switch4 adds the cost of a Fast Ethernet link to 23 to determine its total cost to reach the root switch.
**Switch4 is connected via a Fast Ethernet link to an upstream switch that in turn is directly connected to the root switch via a Gigabit Ethernet link.
The root switch is advertising a cost of 23, which is lower than any other switch in the VLAN0001 spanning-tree domain.
28. Which two statements describe Spanning Tree Protocol? (Choose two.)
**It eliminates Layer 2 loops in network topologies.
It eliminates the need for redundant physical paths in network topologies.
**It can only be used in networks in which Layer 2 switching is in use.
It can only be used in networks where both routers and switches are used together.
It can only be used in networks where routers are installed.
29. Refer to the exhibit. What three statements describe why Host1 and Host2 are unable to communicate? (Choose three.)
**A router is required to forward traffic between the hosts.
**The switch ports are on different VLANs.
The VLAN port assignments must be contiguous for each VLAN.
The host default gateway addresses must be on the same logical network.
The switch IP address is on the wrong subnet.
**The hosts are configured on different logical networks.
30. What happens when the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines?
A new RSA key pair is created.
The switch defaults to allowing Telnet connections only.
The switch is no longer able to make SSH connections as an SSH client.
**The switch allows remote connections only after a new RSA key pair is generated.
31. How can the SSID for a wireless network connection be verified?
From the Network Connections menu, choose Add Wireless Network.
From the Network Connections menu, choose Properties.
**From the Network Connections menu, choose View Wireless Network.
From the Network Connections menu, choose Support.
32. In which mode is a VTP switch operating if it has been configured to only forward VTP advertisements?
client
root
server
**transparent
nontransparent
33. Refer to the exhibit. Two Catalyst switches are connected, and both switches have ports configured for VLANs 40 and 50 as shown. What will allow hosts on the same VLAN to communicate with one another across the different switches?
**trunking
STP
VTP
routing
34. Which statement regarding the service password-encryption command is true?
It is configured in privileged EXEC mode.
It encrypts only line mode passwords.
**As soon as the service password-encryption command is entered, all currently set passwords formerly displayed in plain text are encrypted.
To see the passwords encrypted by the service password-encryption command in plain text, issue the no service password-encryption command.
35. Refer to the exhibit. What does "FORWARDING" mean in the command output shown?
The switch is receiving BPDUs, but not sending data frames.
The switch is participating in an election process by forwarding the BPDUs it receives.
**The switch is sending and receiving data frames.
The switch is receiving BPDUs and populating the MAC address table, but not sending data.
36. Why is it important that the network administrator consider the spanning-tree network diameter when choosing the root bridge?
The cabling distance between the switches is 100 meters.
The network diameter limitation is 9.
Convergence is slower as the BPDU travels away from the root.
**BPDUs may be discarded because of expiring timers.
37. Refer to the exhibit. Hosts PC_A and PC_B send traffic simultaneously, and the frames from the transmitting stations collide. How far is the collision propagated?
hub HB1
**switch SW1
switch SW2
router R1
router R2
38. Which method establishes an administrative connection to the wireless access point?
Associate with the access point and then open a HyperTerminal session with the access point.
Physically connect to the access point and then reboot the computer to launch the configuration software.
**From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.
Modify the TCP/IP properties of the computer connected to the access point so that it exists on the same network, and then reboot your computer to establish a connection.
39. Refer to the exhibit. All the VLANs configured on S2 are present on S1 but not S3. All switches are set to VTP server mode and have identical VTP domain names configured. What is the likely problem?
**The connection from S1 to S3 is not trunking.
S3 does not have a management VLAN configured.
The VLAN 99 interface on S3 is in a different subnet than S1 and S2.
S3 was joined to the network with a lower revision number than S1.
40. Refer to the exhibit. All devices in the network are interconnected via trunk links with VTP pruning enabled on all three switches. Which VLANs will be pruned from switch SW3?
**VLAN 10 and VLAN 20
VLAN 1, VLAN 10, and VLAN 20
VLAN 1, VLAN 1002 through 1005
VLAN 1, VLAN 10, VLAN 20, VLAN 1002 through 1005
41. Refer to the exhibit. A packet is received on the FastEthernet 0/1 physical interface from VLAN 1. The packet destination address is 192.168.1.85. What will the router do with this packet?
The router will ignore the packet because the source and destination are on the same broadcast domain.
The router will forward the packet out interface FastEthernet 0/1.1.
**The router will forward the packet out interface FastEthernet 0/1.2.
The router will forward the packet out interface FastEthernet 0/1.3.
The router will drop the packet since no network that includes the source address is attached to the router.
42. Refer to the exhibit. Switch SW2 was tested in a lab environment and then inserted into a production network without reloading its configuration. After the trunk link between SW1 and SW2 was brought up, all users lost connectivity to the network. What could be the source of the problem?
**The newly inserted switch has a higher VTP server revision number, which caused the VLAN information in the VTP domain to be deleted.
The newly inserted switch has pruning enabled, which causes pruning of all VLANs from the trunk port.
The newly inserted switch received more VLANs from a connected switch than the switch can support.
Switches can exchange VTP information only through an access link.
43. Refer to the exhibit. What is the consequence if SW1 port F0/0 is configured as an edge port?
SW1 port F0/0 transitions to the learning state.
**SW1 port F0/0 can generate a temporary loop while in the sync state.
SW1 port F0/0 becomes a non-designated port.
SW1 port F0/2 no longer passes BPDUs to SW4.
SW4 port F0/10 is forced into the blocking state.
44. Refer to the exhibit. An Ethernet switch has developed the CAM table shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit?
**forward the frame out all interfaces except Interface3
add station 00-00-3D-1F-11-05 to Interface2 in the forwarding table
forward the frame out Interface3
discard the frame
forward the frame out all interfaces
forward the frame out Interface2
45. Power over Ethernet (PoE) allows the switch to provide power to which two types of devices? (Choose two.)
printer
**wireless access points
desktop PC
**IP phones
Scanners
46. Refer to the exhibit. Three new VLANs have been configured to improve the performance of the network. Host A would like to send a frame destined to Host B. Which statement is true about the process of sending the frame?
Host A sends an ARP request to the default gateway configured for VLAN10 to resolve destination MAC to IP address mapping. Then the frame is sent to switch SW1 only to switch the traffic to Host B.
**Host A sends an ARP request to the default gateway for VLAN10 to resolve destination MAC to IP address mapping. Then the frame is sent to router R1 to route the traffic to the appropriate VLAN.
Host A broadcasts an ARP request to the members of all VLANs. If none of the hosts replies with a corresponding IP address, the frame is dropped.
Because Host A and Host B are connected to the same switch SW1, Host A forwards the frame to Host B directly.
47. Which command finds the next available parameter for the SwitchX# clock command with the fewest keystrokes?
SwitchX# clock?
SwitchX# clock then Tab
SwitchX# clock then Ctrl-P
**SwitchX# clock ?
SwitchX# clock then "help"
48. Which three statements are true regarding router-on-a-stick inter-VLAN routing? (Choose three.)
makes troubleshooting the inter-VLAN routing configuration much less complex than when using multiple physical interface
**requires the use of subinterfaces on the router
requires each subinterface to be configured with the no shut command
**can impact performance if many VLANs compete for bandwidth on a single router interface
requires an access link between the router and Layer 2 switch
**more cost-efficient and scalable than using multiple physical interfaces
49. Refer to the exhibit. Two switches, SW1 and SW2, are interconnected via a trunk link. Host A is on the native VLAN. How does untagged traffic coming from Host A traverse the trunk link?
SW1 tags the traffic with the lowest VLAN ID value and forwards it over the trunk link.
SW1 tags the traffic with the highest VLAN ID value and forwards it over the trunk link.
**The untagged traffic is forwarded as part of the native VLAN.
The untagged traffic is dropped because the trunk forwards only tagged frames.
SW1 encapsulates the traffic with 802.1p encapsulation and forwards it over the trunk link.
SW1 encapsulates the traffic with 802.1Q encapsulation and forwards it over the trunk link.
50. Refer to the exhibit. What encryption algorithm does the 802.11i standard employ for data encryption?
PSK
TKIP
WEP
**AES
51. A network administrator is tasked to select hardware to support a large enterprise, switched network. The system requires redundant backplane interconnections between eight high port density switches. Which hardware solution would be appropriate for this enterprise?
modular switches
fixed configuration switches
**stackable switches
uplink capable switches
link aggregated switches
52. Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?
**Cat-A
Cat-B
Cat-C
Cat-D
53. What two methods can be used to remove MAC address table entries from a switch? (Choose two.)
**Power cycle the switch to clear all dynamically learned addresses.
The clear switching-tables command will remove statically configured entries.
**The clear mac-address-table command will remove statically and dynamically configured table entries.
The erase flash command will clear all statically configured table entries.
Statically configured MAC addresses will automatically be removed from the address table 300 minutes after the last activity on a switch port.
54. Which three statements are correct concerning the default configuration of a new switch? (Choose three.)
VLAN1 is configured with a management IP address.
**All switch ports are assigned to VLAN1.
Spanning Tree Protocol is disabled.
**All interfaces are set to auto.
Enable password is configured as cisco.
**The flash directory contains the IOS image.
55. An access point supports both the 802.11g and 802.11b standards. A device that supports only 802.11b attempts to connect to the access point. What happens to the connection?
The network does not connect unless the user is within line of sight of the access point.
**The access point and all other connected users defer to the 802.11b standard.
The access point always maintains the higher standard and automatically upgrades the 802.11b device to the 802.11g speed.
Each user gets the speed supported by the wireless NIC on their mobile device.
56. Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. What should be done to fix the problem?
Introduce a Layer 3 device or a switch with Layer 3 capability in the topology.
**Reconfigure the trunk port on switch SW2 with static trunk configuration.
Configure VLANs with different VLAN IDs on switch SW2.
Trunk mode can be configured on Gigabit Ethernet interfaces only.
57. What two tasks must be performed when deleting an entire VLAN? (Choose two.)
Delete the vlan.dat file from flash.
Reboot the switch in order for the changes to take effect.
**Use the negative form of the command that was used to create the VLAN.
**Reassign the switch ports from the deleted VLAN to other VLANs if they are to be used.
Use the erase vlan command in global configuration mode.
58. How does an Ethernet switch handle traffic if the shared memory buffers and the port memory buffers are full?
The switch allocates additional buffers in NVRAM.
The switch defragments the frame and stores it in NVRAM.
The switch routes the packet to the destination port.
**The switch drops the traffic.
Friday, April 23, 2010
CCNA 3 Exploration - Chapter 7
Chapter 7 - Exam Answers
1. Which two conditions have favored adoption of 802.11g over 802.11a? (Choose two.)
• 802.11a suffers from a shorter range than 802.11g.
The 2.4 GHz frequency band is not as crowded as the 5 GHz band.
802.11a is more susceptible to RF interference from common commercial items.
802.11a uses a more expensive modulation technique than 802.11g.
• 802.11g is backward compatible with 802.11b, but 802.11a is not.
2. Which two statements concerning network security are accurate? (Choose two.)
802.11i uses 3DES for encryption.
• Open authentication uses no client or AP verification.
The 802.11i protocol is functionally identical to WPA.
• 802.11i incorporates a RADIUS server for enterprise authentication.
A wireless client first associates with an AP and then authenticates for network access.
3. Which installation method will allow connectivity for a new wireless network?
set up WEP on the access point only
• set up open access on both the access point and each device connected to it
set up full encryption on the access point while leaving each device connected to the network open
set up full encryption on each device of the WLAN while leaving the access point settings open
4. Refer to the exhibit. When configuring the wireless access point, which setting does the network administrator use to configure the unique identifier that client devices use to distinguish this wireless network from others?
Network Mode
• Network Name (SSID)
Radio Band
Wide Channel
Standard Channel
5. Which two statements are true regarding wireless security? (Choose two.)
MAC address filtering prevents the contents of wireless frames from being viewable.
Providing a wireless client with the network key allows an available network to be visible.
Disabling an access point from broadcasting the SSID prevents the access point from being discovered.
• Default SSIDs on specific manufacturer APs are generally known and may permit hostile wireless connections.
• Manually adding a network and setting the known SSID on a wireless client makes the network visible even if the SSID is not being broadcast.
6. Wireless users on a network complain about poor performance within a small area of a room. Moving away from this area in any direction improves performance dramatically. What is the first step in designing a solution to this problem?
• This might be RF channel overlap, so the technician should verify the channels in use on each wireless access point and change to non-overlapping channels.
The RF power settings might be set too low on the wireless access points servicing the room. Increase the RF output power on all wireless access points.
Install a new wireless access point in this center area to provide coverage.
Verify that the wireless access points have sufficient in-line power and connectivity to the wired network.
7. Which three devices do many wireless routers incorporate? (Choose three.)
• gateway for connecting to other network infrastructures
• built-in Ethernet switch
network management station
VTP server
• wireless access point
VPN concentrator
8. Which access method does a wireless access point use to allow for multiple user connectivity and distributed access?
CSMA/CD
token passing
• CSMA/CA
polling
9. Why is security so important in wireless networks?
Wireless networks are typically slower than wired networks.
Televisions and other devices can interfere with wireless signals.
• Wireless networks broadcast data over a medium that allows easy access.
Environmental factors such as thunderstorms can affect wireless networks.
10. Which wireless technology standard provides the most compatibility with older wireless standards, but has greater performance?
802.11a
802.11b
802.11g
• 802.11n
11. Which two statements characterize wireless network security? (Choose two.)
• A rogue access point represents a security risk for the local network.
Wireless networks offer the same security features as wired networks.
Using encryption prevents unauthorized clients from associating with an access point.
An attacker needs physical access to at least one network device to launch an attack.
• With SSID broadcast disabled, an attacker must sniff the SSID before being able to connect.
12. Which network design process identifies where to place access points?
• site survey
risk assessment
scalability design
network protocol analysis
13. What wireless security feature allows a network administrator to configure an access point with wireless NIC unique identifiers so that only these NICs can connect to the wireless network?
authentication
SSID broadcasting
• MAC address filtering
EAP (Extensible Authentication Protocol)
Radius (Remote Authentication Dial-In User Service)
14. What will a wireless client transmit to discover the available WLAN networks?
beacon
password
• probe request
association request
15. In a WLAN network, why should wireless access points be implemented with each access point using a different channel?
to keep users segregated on separate subnets
to control the amount of bandwidth that is utilized
• to keep signals from interfering with each other
to keep traffic secure
16. What purpose does authentication serve in a WLAN?
converts clear text data before transmission
indicates which channel the data should flow on
• determines that the correct host is utilizing the network
allows the host to choose which channel to use
17. What occurs when a rogue access point is added to a WLAN?
Authorized access points can transmit excess traffic to rogue access points to help alleviate congestion.
• Unauthorized users can gain access to internal servers, thus causing a security hole.
All traffic that uses the same channel as the rogue access point will be encrypted.
All traffic that uses the same channel as the rogue access point will be required to authenticate.
18. What procedure can prevent man-in-the-middle attacks?
• Force all devices on a WLAN to authenticate and monitor for any unknown devices.
Enable access points to send an SSID to each device wanting to use the network.
Configure MAC filtering on all authorized access points.
Disable SSID broadcasts.
19. Which function is provided by a wireless access point?
dynamically assigns an IP address to the host
provides local DHCP services
• converts data from 802.11 to 802.3 frame encapsulation
provides a gateway for connecting to other networks
20. Which major problem does CSMA/CA overcome in wireless networks?
bandwidth saturation
privacy concerns
• media contention
device interoperability
21. What does a wireless access point use to allow WLAN clients to learn which networks are available in a given area?
association response
• beacon
key
probe request
Subscribe to:
Posts (Atom)