Tuesday, November 2, 2010

CCNA3 FINAL - ESwitching Final Exam - CCNA Exploration: LAN Switching and Wireless (Version 4.0)

Take Assessment - ESwitching Final Exam - CCNA Exploration: LAN Switching and Wireless (Version 4.0) 
November 02, 2010
           
1
 
Refer to the exhibit. An administrator documented the output of a CAM table from an Ethernet switch as shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit?

discard the frame

forward the frame out port 2

forward the frame out port 3

forward the frame out all ports

forward the frame out all ports except port 3

add station 00-00-3D-1F-11-05 to port 2 in the forwarding table


   
2


Refer to the exhibit. An administrator issues the commands as shown on SwitchB. What is the result for port Fa0/22?



The port is disabled.

Security is enabled on the port.

The port becomes a trunk port.

The port is now a member of the default VLAN.


   
3
What is one reason that SSID cloaking is not considered an effective security measure for a wireless network?

The SSID is not required to connect to a wireless network.

The SSID is broadcast in probe messages from clients that are looking for the AP.

The SSID is the same as the AP MAC address, which is sent in every message.

An attacker can spoof the SSID simply by using an SSID of NULL in all messages.


   
4


Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP address should be assigned to this new host?

192.168.1.11 /28

192.168.1.22 /28

192.168.1.33 /28

192.168.1.44 /28

192.168.1.55 /28


   
 5
While configuring a new switch, a network administrator configures the switch as an HTTP server. What benefits does this configuration provide?

This allows the switch to host web pages for the network.

This allows remote VPN connections to the switch over the Internet.

This is required if a web server or web farm is attached to the switch.

This allows web-based configuration tools to be used with the switch.


   
6


Refer to the exhibit. What will allow a host on VLAN 40 on switch X to communicate with a host in VLAN 40 on switch Y?

QoS

routing

trunking

VPN


   
7


Refer to the exhibit. A network administrator has designed and implemented a hierarchical network. What is the maximum network diameter between any two hosts on the network?

five

six

ten

twelve


   
8

A wireless client is attempting to establish a connection with a wireless access point. What process does the client use to discover the access points which are available to it?

probing

beaconing

association

authentication


   
 9
What is the benefit of the auto-MDIX feature on a Cisco Catalyst switch?

dynamically assigns a new management VLAN ID

autonegotiates IP address information for initial management connections

allows the use of straight-through patch cables regardless of connected device types

places a port immediately in the forwarding state to reduce the time for the spanning tree to reconverge


   
 10


Refer to the exhibit. After the listed commands are entered into router R1 and switch S1, the administrator enters the show interface fa0/1 trunk and gets the results shown. What is the likely problem?

The trunk is established, but no VLANs have been configured to use it.

The router is missing the dynamic trunking protocol statements necessary to form a trunk.

The trunk has not been established because the router does not support dynamic trunking protocol.

The router, the switch, or both must be configured with the dynamic desirable option for dynamic trunking protocol to establish a trunk.


   
11



Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. What should be done to fix the problem?

Configure VLANs with different VLAN IDs on switch SW2.

Reconfigure the trunk port on switch SW2 with static trunk configuration.

Introduce a Layer 3 device or a switch with Layer 3 capability in the topology.

Apply IP addresses that are in the same subnet to the interfaces used to connect SW1 and SW2.


   
12
What is the purpose of the switch command switchport access vlan 99?


to enable port security

to make the port operational

to assign the port to a particular VLAN

to designate the VLAN that does not get tagged

to assign the port to the native VLAN (VLAN 99)


   
 13


Refer to the exhibit. Which two statements are true about the operation of the interfaces? (Choose two.)

Incoming traffic with VLAN ID 0 is processed by interface fa0/0.

Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.

Both subinterfaces remain up with line protocol up, even if fa0/0 line protocol is down.

Subinterfaces use unique MAC addresses by adding the 802.1Q VLAN ID to the hardware address.

Traffic inbound on this router is processed by different subinterfaces, depending on the VLAN from which the traffic originated.


   
14


Refer to the exhibit. A network administrator needs to download a previously saved configuration file from the TFTP server to Switch1. Which command will accomplish this task?

Switch1# copy tftp://192.168.0.253/backup-confg nvram:startup-config

Switch1# copy tftp://192.168.0.254/backup-confg nvram:startup-config

Switch1# copy nvram:startup-config tftp://192.168.0.253/backup-config

Switch1# copy nvram:startup-config tftp://192.168.0.254/backup-config


   
15
What happens when the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines?

A new RSA key pair is created.

The switch defaults to allowing Telnet connections only.

The switch is no longer able to make SSH connections as an SSH client.

The switch allows remote connections only after a new RSA key pair is generated.


     Take Assessment - ESwitching Final Exam - CCNA Exploration: LAN Switching and Wireless (Version 4.0)
 www.ccna4u.org
              
   
     
16
Which statement about STP network diameter is correct?

STP diameters are restricted by convergence times.

Layer 2 root elections should be optimized by adjusting BPDU timers to match network diameter.

Using lower bandwidth connections between switches will allow STP to have a larger network diameter.

Portfast can be used to increase the allowable switched network diameter because it disables the forward delay and maximum age timers.


   
 17
In the implementation of PVST+ in a specific VLAN where all switches have default spanning tree priorities, which spanning-tree command setting could be assigned to force one of the Catalyst switches to become and remain the root bridge?

root primary

priority 8192

priority 2048

spanning-tree mode rapid pvst


   
18



Refer to the exhibit. A new switch, SW3, has been added to the network. The network administrator determines that VLAN information is not propagating to SW3. Which command will remedy the problem?

SW1(config)# vtp version 1

SW2(config)# vtp mode client

SW3(config)# vtp domain Cisco1

SW3(config)# vtp mode transparent


   
19
In an attempt to improve switch performance, a network administrator changes the MAC aging time to ten seconds. What is a likely result of this decision?

The MAC table will fill with unused addresses.

Address conflicts will cause retransmission errors.

Unnecessary flooding will slow network performance.

Timely MAC address updates will ensure rapid delivery of frames.


   
 20
What is an efficient and cost effective way to minimize the frequency and effects of broadcast storms on an Ethernet LAN?

Connect each PC directly to a router port.

Use access control lists to filter broadcasts from the network.

Divide the computers into separate VLANs on the existing switches.

Divide the computers into separate workgroups using different physical switches.


   
21
Which value determines if a switch becomes the central point of reference in the spanning tree topology?

lowest bridge ID

highest revision number

lowest numeric IP address

highest numeric MAC address


   
22



Refer to the exhibit. What is the maximum number of VLANs that can be deleted from the Switch as it is configured?

zero

four

five

eight

nine


   
 23



Refer to the exhibit. Switch SW2 was tested in a lab environment and then inserted into a production network without reloading its configuration. After the trunk link between SW1 and SW2 was brought up, all users lost connectivity to the network. What could be the source of the problem?

All the VLANs were pruned from the trunk port between SW1 and SW2.

SW1 and SW2 cannot be both set as VTP servers in the same VTP domain.

VTP configuration revision number of SW2 was higher than the configuration revision number of SW1.

The additional VLANs from SW2 created more VLANs than the VLAN database of SW1 could contain.


   
24



Refer to the exhibit. All edge ports are configured with the spanning-tree portfast command. Host1 is recently connected to port Fa0/1 on switch SW1 . Which statement is true about the status of port Fa0/1?

The port will transition into blocking state.

The port will transition immediately into forwarding state.

The port will transition into blocking state and then immediately into forwarding state.

The port will transition into blocking state and immediately transition through the listening and learning states.


   
25


Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?

This entry can only be removed from the MAC address table by a network administrator.

When forwarding a frame to the device with address 0060.5c5b.cd23, the switch does not have to perform a lookup to determine the final destination port.

Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18.

The switch learned this MAC address from the source address in a frame received on Fa0/18.


   
26
Which type of traffic can still be received on a switch interface that is in STP blocking mode?

BPDU frames

multicast frames

broadcast frames

Layer 3 packets


   
27



Refer to the exhibit. Hosts B and C attempt to transmit a frame at the same time, but a collision occurs. Which hosts will receive the collision jamming signal?

all hosts that are shown

only hosts B and C

only hosts A, B, and C

only hosts A, B, C, and D

only hosts A, D, E, and F

only hosts D, E, and F


   
 28
Which security protocol or measure would provide the greatest protection for a wireless LAN?

WPA2

cloaking SSIDs

shared WEP key

MAC address filtering


   
 29


Refer to the exhibit. Which statement is true about the status of interface Fa0/1?

The interface is not configured to transmit data.

The interface is configured to transmit data at 10 Mb/s speed.

The interface is configured to transmit data in half-duplex mode.

The interface is configured to use HDLC encapsulation to transmit data.


   
30
What is the purpose of configuring a switch port as a trunk port?

to control the broadcast domain size

to eliminate the collisions that result from multiple VLANs

to transmit data from multiple VLANs through a single port

to increase the bandwidth between the switch and its upstream device


31
In which mode is a VTP switch operating if it has been configured to only forward VTP advertisements?

client

root

server

transparent


   
 32
When implementing a router-on-a-stick, what must be configured on the router to ensure connectivity between different VLANs?

subinterfaces

routing protocol

switched virtual circuits

dynamic trunking protocol


   
33


Refer to the exhibit. VTP pruning is enabled in the VTP domain that is shown. How will switch ST-1 handle Layer 2 broadcast traffic originating from host A on switch ST-C?

It will be dropped.

It will be forwarded out port Fa0/5 only.

It will be forwarded out ports Fa0/5 and Fa0/10.

It will be forwarded out ports Fa0/5, Fa0/10, and Fa0/15.


   
 34


Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect?

AS1 and AS2

DS1 and DS2

DS1, DS2, and CS1

AS1, AS2, DS1, and DS2


   
35


Refer to the exhibit. Each switch is shown with its MAC address. Which switch will be elected as the spanning-tree root bridge if the switches are configured with their default priority values?

switch A

switch B

switch C

switch D

switch E

switch F

 36
Why is MAC address filtering considered a poor choice in securing a WLAN?

Available bandwidth is reduced.

MAC addresses are easily spoofed.

APs are more susceptible to DoS attacks.

The payload encryption is easily broken.


   
37



Refer to the exhibit. What are two reasons for the Fa0/24 port being placed in the blocking state? (Choose two.)

This switch is not the root bridge.

The Fa0/24 port is administratively down.

STP has detected links that create a loop.

There is a change in the VTP configuration.

The Fa0/24 port is overloaded with too much traffic for its configured bandwidth.


   
 38




Refer to the exhibit. Which two settings show the default value of VTP configuration on a Cisco 2960 switch? (Choose two.)

revision number

existing VLANs

operating mode

domain name

pruning mode


   
39
Company policy requires disabling the command history buffer on network devices. An administrator enters terminal no history size at the command prompt on a Cisco Catalyst switch and receives no error messages back, but the command history buffer is still available. What is the problem?

The command contained a syntax error.

The Cisco IOS version does not support disabling the command history buffer.

The command history can only be disabled on a router, not a switch.

The size parameter reset the default buffer size but did not disable access to the buffer.


   
 40



Refer to the exhibit. Which Spanning Tree Protocol version is in effect?

Per VLAN Spanning Tree (PVST)

Per VLAN Spanning Tree + (PVST+)

Common Spanning Tree (CST)

Rapid Spanning Tree Protocol (RSTP)

Multiple Spanning Tree Protocol (MSTP)


   
41



Refer to the exhibit. All switch interfaces are members of the same VLAN. What information is used by Switch1 to determine if incoming frames from the hosts should be forwarded to Router1?

the source address field in the IP header

the destination port number in the TCP header

the destination address field in the Layer 3 header

the destination address field in the Ethernet header


   
42


Refer to the exhibit. The configuration steps that are listed in the exhibit have been entered in switch S1 via the console. Subsequent attempts to telnet to the switch are not successful. What is causing the problem?

The switch must be configured with SSH version 1.

The transport input command must specify Telnet access.

The RSA keys must be returned to zero before SSH will permit Telnet access.

The ip domain-name command must also be entered in line configuration mode for the vty lines.


   
43
What provides an authentication mechanism for 802.11-based wireless networks?

DSSS

OFDM

SSID

WPA


   
44
How does a switch that is configured for 802.1Q trunking handle untagged frames that are received on a trunk port?

The frames are dropped.

The frames are assigned to the native VLAN.

The frames are assigned to the default VLAN.

The frames are assigned to the management VLAN.


   
 45
Why is it advisable that a network administrator use SSH instead of Telnet when managing switches?

SSH uses TCP whereas Telnet does not.

SSH encrypts only the username and password when logging in.

SSH encrypts all remote management communications whereas Telnet does not.

SSH sends a clear text message steam which reduces the bandwidth use for management.


46
What are two requirements for configuring inter-VLAN routing using the router-on-a-stick model? (Choose two.)

Each subinterface should be configured with its own IP address, subnet mask, and unique VLAN assignment.

The physical interface of the router must be connected to a trunk link on the adjacent switch.

The number of physical interfaces on the router should match the number of VLANs.

Different static VLANs should be assigned to different interfaces of the router.

The router should be configured as the VTP server.


   
47


Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installation surveys showed strong signal strength from the AP locations to the client locations. Outside electrical interference has been eliminated. What will fix the problem?

Relocate the APs closer to each other.

Increase the distance between the clients.

Change the channel on AP-B to 6 or 11.

Place AP-A and AP-B on the same wireless channel.


   
 48
What is a function or characteristic of the native VLAN?

It is the VLAN that supports untagged traffic on an 802.1Q trunk.

It is always assigned to VLAN 1 for backward compatibility.

It is always the same VLAN number for all trunks within an organization.

It is used as the management VLAN throughout the entire switched network.


   
49



Refer to the exhibit. Which three options correctly describe the router configuration that is shown? (Choose three.)

An IEEE standard trunking protocol is in use.

Interface Fa0/1 has been configured with subinterfaces.

The shutdown command has been applied to interface Fa0/1.

Interface Fa0/1.3 is mapped to the default management VLAN.

The configuration is appropriate for a router-on-a-stick network design.

An IP address should be applied to interface Fa0/1 for routing to occur.


   
50


Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit data at the same time. How do the hosts respond on the network? (Choose two.)

After the end of the jam signal, a backoff algorithm is invoked.

Hosts 1 and 4 are operating full duplex so no collision will exist.

The hub will block the port connected to Host 4 to prevent a collision.

Hosts 1 and 4 are assigned shorter backoff values to provide them priority to access the media.

If a host has data to transmit after the backoff period of that host, the host checks to determine if the line is idle before transmitting.


   
 51
What is the purpose of VTP pruning?

to restrict traffic on specified trunk lines

to designate switches that do not participate in VTP

to advertise VTP domain information to specified switches only

to reduce the propagation of VTP advertisements in the switched network


   
 52
What operational change will occur if an 802.11b client associates with an access point that is currently supporting clients utilizing 802.11g?

The 802.11g clients will disassociate from the AP.

The 802.11g clients will operate at reduced speeds.

The 802.11b client will never gain access to the channel.

The 802.11b client will not be able to establish an IP session with any of the other 802.11g clients.

Thursday, October 28, 2010

CCNA Exploration v4 - Accessing the WAN - Exam Final Practice - Grade 100%

CCNA Exploration v4 - Accessing the WAN - Exam Final Practice - Grade 100%
Images comming soon!
1 A company is looking for a WAN solution to connect its headquarters site with four remote sites.
What advantage would dedicated leased lines provide to the customer compared to a shared
Frame Relay solution?

lower cost
lower latency and jitter
variable bandwidth capacity
fewer physical router interfaces
2
Refer to the exhibit. The network administrator is adding R1 to an existing network. As a part
of the corporate IT procedures, the administrator attempts to back up the router Cisco IOS
software of R1 and receives the output shown. The network administrator then attempts
unsuccessfully to ping the TFTP server from the console session. What should be done next to
isolate this problem?


From R2, validate that interface Fa0/0 is operational.
From the TFTP server, verify that the software on the TFTP server is operational.
From the TFTP server, confirm there is enough room on the TFTP server for the Cisco IOS
software.
From the console session, make sure that R1 has a route to the network where the TFTP
server resides.
3 Which device encodes data for transmission across the WAN service provider transmission link?
CPE
DTE
DCE
UART
4
Refer to the exhibit. An administrator has added the exhibited commands to routers A and B,
but no routing updates are exchanged between the two routers. Based on the information that is
given, what is the likely cause of the problem?

Router A is advertising the wrong network.
The authentication key strings do not match.
The serial interfaces of routers A and B are not on the same network.
The authentication key numbers do not match the EIGRP process number for both routers.
5 What are two characteristics of DSL technology? (Choose two.)
Uploads typically offer larger transfer rates than downloads.
Service providers deploy DSL in the local loop of the telephone network.
DSL download rates are reduced by large volumes of POTS voice traffic.
Filters and splitters allow POTS and DSL traffic to share the same medium.
DSL is a shared medium that allows many users to share bandwidth available from the DSLAM.
6 An administrator is unable to receive e-mail. While troubleshooting the problem, the
administrator is able to ping the local mail server IP address successfully from a remote
network and can successfully resolve the mail server name to an IP address via the use of the
nslookup command. At what layer of the OSI model is the problem most likely to be found?

www.ccna4u.org www.ccna4u.info www.ccna4u.biz www.ccna4all.com www.ccna4u.net
application
transport
network
data link
7 While troubleshooting a problem with an e-mail server, an administrator observes that the
switch port used by the server shows "up, line protocol up". The administrator cannot ping the
server. At which layer of the OSI model is the problem most likely to be found?

application layer
network layer
data link layer
physical layer
8
Refer to the exhibit. An ACL called Managers already exists on this router. What happens if the
network administrator issues the commands as shown in the exhibit?

The new ACL overwrites the existing ACL.
The network administrator will receive an error message.
The existing ACL is modified to include the new command.
A second Managers ACL is created that contains only the new command.
9
Refer to the exhibit. Why are the routers unable to establish a PPP session?
The usernames are misconfigured.
The IP addresses are on different subnets.
The clock rate is configured on the wrong end of the link.
The CHAP passwords must be different on the two routers.
Interface serial 0/0/0 on Router1 must connect to interface serial 0/0/1 on Router2.
10 A technician is talking to a colleague at a rival company and comparing DSL transfer rates
between the two companies. Both companies are in the same city, use the same service provider,
and have the same rate/service plan. What is the explanation for why Company A reports
higher download speeds than Company B?

Company B has a higher volume of POTS voice traffic than Company A.
Company B shares the conection to the DSLAM with more clients than Company A.
Company A only uses microfilters on branch locations.
Company A is closer to the service provider.
11
Refer to the exhibit. R1 is performing NAT overload for the 10.1.1.0/24 inside network. HostA
has sent a packet to Web Server. What is the destination IP address of the return packet from
Web Server when it is received at the NIC on HostA?

10.1.1.2:1234
172.30.20.1:1234
172.30.20.1:3333
192.168.1.2:80
12 Which protocol is implicitly denied at the end of an IPv4 access list?
IP
TCP
UDP
HTTP
13 A network administrator is analyzing the data from a network performance baseline. Which
condition will not be indicated in the baseline data?

the IP addressing scheme of the network
the most heavily used parts of the network
congested areas of the network
error rates in different parts of the network
14
Refer to the exhibit. An administrator is trying to connect Router1, a Cisco router, to a
non-Cisco router using a serial connection. Why is the connection failing?

A loopback is not set.
The interface has been shut down.
The wrong encapsulation is being used.
Queuing cannot be used when connecting to non-Cisco devices.
15
Refer to the exhibit. Which statement is true about the WAN switch device?
It uses a multiport internetworking device to switch traffic such as Frame Relay, ATM or
X.25 over the WAN.
It provides internetworking and WAN access interface ports that are used to connect to the service
provider network.
It provides termination for the digital signal and ensures connection integrity through error
correction and line monitoring.
It converts the digital signals produced by a computer into voice frequencies that can be
transmitted over the analog lines of the public telephone network.
16
Refer to the exhibit. Which statement is true about the status of the Frame Relay connection?
The Frame Relay connection is in the process of negotiation.
Only packets with control bit DE set are sent over the PVC. No data traffic traverses the link.
Packets marked as FECN and BECN indicate that a congestion control mechanism is enabled
on the Frame Relay PVC.
The “DLCI USAGE = LOCAL” status indicates that the PVC link is not established between the
interface S0/0/0.1 and the Frame Relay switch.
17
Refer to the exhibit. The hosts in network A all have static addresses that are assigned in the
192.168.2.0./24 network. The hosts in network B are DHCP clients in the 192.168.1.0/24
network. After router R1 has been configured with the statements as shown in the exhibit, the
DHCP clients are reporting that they cannot access any network resources. The hosts with static
addresses cannot access any resources outside network A. What is the problem?

The DHCP scope has the wrong address pool.
The interfaces on R1 are incorrectly addressed.
The assignable DCHP addresses are all excluded.
The DCHP clients are receiving the wrong default router address.
18
Refer to the exhibit. Router1 and Router2 each support separate areas of a data center, and are
connected via a crossover cable. Resources attached to Router1 are unable to connect to
resources attached to Router2. What is the likely cause?

The crossover cable is faulty.
The IP addressing is incorrect.
There is a Layer 2 problem with the router connection.
The upper layers are experiencing an unspecified problem.
One or both of the Ethernet interfaces are not working correctly.
19 At what physical location does the responsibility for a WAN connection change from the service
provider to the user?

DMZ
local loop
CSU/DSU
demarcation point
20 Because of a remote-procedure call failure, a user is unable to access an NFS server. At what
layer of the TCP/IP model does this problem occur?

network layer
data link layer
physical layer
application layer
21 Which two functions are provided by the Local Management Interface (LMI) that is used in
Frame Relay networks? (Choose two.)

flow control
error notification
congestion notification
the mapping of DLCIs to network addresses
the sending of keepalive packets to verify operation of the PVC
22
Refer to the exhibit. A packet is being sent from Host A to Host B through the VPN tunnel
between R1 and R3. When the packet first arrives at R3, what are the source and destination IP
addresses of the packet?

Source 192.168.1.2 - Destination 192.168.4.2
Source 192.168.3.1 - Destination 192.168.3.2
Source 192.168.2.1 - Destination 192.168.3.2
Source 192.168.3.1 - Destination 192.168.4.2
23 Which protocol is used to authenticate connections over serial links securely?
CHAP
HDLC
SLIP
PAP
24
Refer to the exhibit. Branch A has a Cisco router and Branch B has a non-Cisco router that is
using IETF encapsulation . After the commands that are shown are entered, R2 and R3 fail to
establish the PVC. The R2 LMI is Cisco, and the R3 LMI is ANSI. The LMI is successfully
established at both locations. Why is the PVC failing?

The PVC to R3 must be point-to-point.
LMI types cannot be different on each end of a PVC.
A single port can only support one encapsulation type.
The IETF parameter is missing from the frame-relay map ip 192.168.1.3 203 command.
25
Refer to the exhibit. A network administrator is trying to configure a router to use SDM, but
the network administrator cannot access the SDM interface of the router. What is the cause of
the problem?

The VTY lines are misconfigured.
The HTTP timeout policy is misconfigured.
The authentication method is misconfigured.
The username and password are misconfigured.
26
Refer to the exhibit. The SSH connections between the remote user and the server are failing.
The correct configuration of NAT has been verified. What is the most likely cause of the
problem?

SSH is unable to pass through NAT.
There are incorrect access control list entries.
The access list has the incorrect port number for SSH.
The ip helper command is required on S0/0/0 to allow inbound connections.
27 What effect would the Router1(config-ext-nacl)# permit tcp 172.16.4.0 0.0.0.255 any eq www
command have when implemented inbound on the f0/0 interface?

All TCP traffic is permitted, and all other traffic is denied.
The command is rejected by the router because it is incomplete.
All traffic from 172.16.4.0/24 is permitted anywhere on any port.
Traffic originating from 172.16.4.0/24 is permitted to all TCP port 80 destinations.
28 While configuring a Frame Relay connection, when should a static Frame Relay map be used?
the remote router is a non-Cisco router
the local router is configured with subinterfaces
broadcast traffic and multicast traffic over the PVC must be controlled
globally significant rather than locally significant DLCIs are being used
29 Where will a router operating system image be copied after the copy flash: tftp command is
issued?

flash
DRAM
NVRAM
remote server
30
Refer to the exhibit. You are a network administrator who has been tasked with completing the
Frame Relay topology that interconnects two remote sites. How should the point-to-point
subinterfaces be configured on HQ to complete the topology?

HQ(config-subif)#frame-relay interface-dlci 103 on Serial 0/0/0.1
HQ(config-subif)#frame-relay interface-dlci 203 on Serial 0/0/0.2
HQ(config-subif)#frame-relay interface-dlci 301 on Serial 0/0/0.1
HQ(config-subif)# frame-relay interface-dlci 302 on Serial 0/0/0.2
HQ(config-subif)#frame-relay map ip 172.16.1.1 103 broadcast on Serial 0/0/0.1
HQ(config-subif)#frame-relay map ip 172.16.2.2 203 broadcast on Serial 0/0/0.2
HQ(config-subif)#frame-relay map ip 172.16.1.1 301 broadcast on Serial 0/0/0.1
HQ(config-subif)#frame-relay map ip 172.16.2.2 302 broadcast on Serial 0/0/0.2
31
Refer to the exhibit. A host connected to Fa0/0 is unable to acquire an IP address from the
DHCP server. The output of the debug ip dhcp server command shows "DHCPD: there is no
address pool for 10.1.1.1". What is the problem?

The 10.1.1.1 address is already configured on Fa0/0.
The default router for the 10Network pool is incorrect.
The ip helper-address must be added to Fa0/0 interface.
The pool of addresses for the 10Network pool is incorrect.
32
Refer to the exhibit. Router1 is not able to communicate with its peer that is connected to this
interface. Based on the output as shown, what is the most likely cause?

interface reset
improper LMI type
encapsulation failure
local cable unplugged
33 What will be the result of adding the command ip dhcp excluded-address 172.16.4.1 172.16.4.5
to the configuration of a local router that has been configured as a DHCP server?

Traffic that is destined for 172.16.4.1 and 172.16.4.5 will be dropped by the router.
Traffic will not be routed from clients with addresses between 172.16.4.1 and 172.16.4.5.
The DHCP server function of the router will not issue the addresses between 172.16.4.1 and
172.16.4.5.

The router will ignore all traffic that comes from the DHCP servers with addresses 172.16.4.1 and
172.16.4.5.
34
Refer to the exhibit. Which DHCP requests will R1 answer?
all DHCP requests that R1 receives
requests that are broadcast to 10.0.1.255
DNS requests with a destination of 10.0.1.3
requests that are received on the FastEthernet 0/0 interface
requests that come from any networks that are not listed as excluded
35 A router in a Frame Relay network needs to forward a message received from a host. What two
methods does the router use to identify the correct VC to forward the message? (Choose two.)

The router forwards the frame to all ports in the network and learns the address from the reply
frame.
The destination host IP address is embedded in the DLCI.
The router searches Inverse ARP tables for maps of DLCIs to IP addresses.
A table of static mappings can be searched.

The router broadcasts a request for the required IP address.
36 An administrator is configuring a dual stack router with IPv6 and IPv4 using RIPng. The
administrator receives an error message when trying to enter the IPv4 routes into RIPng. What
is the cause of the problem?

RIPng is incompatible with dual-stack technology.
All interfaces have been configured with the incorrect IPv4 addresses.
RIPv1 or RIPv2 needs to be configured in addition to RIPng to successfully use IPv4.
When IPv4 and IPv6 are configured on the same interface, all IPv4 addresses are shut down in
favor of the newer technology.
37 What are the symptoms when the s0/0/0 interface on a router is attached to an operational
CSU/DSU that is generating a clock signal, but the far end router on the point-to-point link has
not been activated?

show controllers indicates cable type DCE V.35. show interfaces s0/0/0 indicates serial down,
line protocol down.
show controllers indicates cable type DCE V.35. show interfaces s0/0/0 indicates serial up, line
protocol down.
show controllers indicates cable type DTE V.35. show interfaces s0/0/0 indicates serial up, line protocol down.
show controllers indicates cable type DTE V.35. show interfaces s0/0/0 indicates serial down,
line protocol down.
38 What three statements describe the roles of devices in a WAN? (Choose three.)
A CSU/DSU terminates a digital local loop.
A modem terminates a digital local loop.
A CSU/DSU terminates an analog local loop.
A modem terminates an analog local loop.
A router is commonly considered a DTE device.

A router is commonly considered a DCE device.
39
Refer to the exhibit. Routers R1 and R2 are both configured for single area OSPF. Users who are
connected to switch S1 are unable to access database applications that run on servers that are
connected to S2. The network engineer is working remotely and only has the information that is
shown in the exhibit to direct initial troubleshooting efforts. Based on the exhibit, which OSI
layer is the most appropriate to start with for a divide-and-conquer approach?

network layer
application layer
data-link layer
physical layer
40
Refer to the exhibit. Partial results of the show access-list and show ip interface fastethernet 0/1
commands for router R3 are shown. There are no other ACLs in effect. Host A is unable to telnet to
host B. Which action will correct the problem but still restrict other traffic between the two
networks?

Modify the second entry in the list to permit tcp host 192.168.10.10 any eq telnet .
Reverse the order of the TCP protocol statements in the ACL.
Apply the ACL on the FastEthernet 0/0 interface.
Apply the ACL in the inbound direction.
41
Refer to the exhibit. What is placed in the address field in the header of a frame that will travel
from the DC office of ABC Company to the Orlando office?

MAC address of the Orlando router
MAC address of the DC router
192.168.1.25
192.168.1.26
DLCI 100
DLCI 200
42 When configuring remote access to a router, what is the significance of the no password
command on a VTY line?

Logins are prevented on that line.
No password is required to log in to that line.
The remote user is not allowed to change the password for that line.
The remote user is prompted to change the line password after connecting to the router.
43
Refer to the exhibit. The network administrator creates a standard access control list on
Router1 to prohibit traffic from the 172.16.1.0/24 network from reaching the 172.16.2.0/24
network while still permitting Internet access for all networks. On which router interface and
in which direction should it be applied?

interface Fa0/0, inbound
interface Fa0/0, outbound
interface Fa0/1, inbound
interface Fa0/1, outbound
44
Refer to the exhibit. Routers R1 and R2 have been configured with EIGRP in the same
autonomous system. Computers PC1 and PC2 are not able to ping each other. Further
investigation has revealed that the route to 192.168.10.0 is missing from the routing table on R2.
What is the cause of the problem?

The networks are not correctly summarized.
The FastEthernet interfaces on R1 are configured as passive.
The network statements on R2 are incorrectly configured.
EIGRP on R1 does not recognize the 192.168.10.0 network.
45 Which three statements accurately describe attributes of a security policy? (Choose three.)
It creates a basis for legal action if necessary.
It should not be altered once it is implemented.
It defines a process for managing security violations.
It focuses primarily on threats from outside of the organization.
It defines acceptable and unacceptable use of network resources.
It provides step-by-step procedures to harden routers and other network devices.
46 What is a major characteristic of a worm?
malicious software that copies itself into other executable programs
tricks users into running the infected software
a set of computer instructions that lies dormant until triggered by a specific event
exploits vulnerabilities with the intent of propagating itself across a network
47
Refer to the exhibit. Which two statements correctly describe how Router1 processes an FTP
request that enters interface S0/0/0 and is destined for an FTP server at IP address 192.168.1.5?
(Choose two.)

The packet does not match an access list condition.
The router matches the incoming packet to the statement that is created from the access-list 201
permit ip any any command.
The router matches the incoming packet to the statement that is created from the access-list
101 permit ip any 192.168.1.0 0.0.0.255 command.

The router matches the incoming packet to the statement that is created from the access-list 201
deny icmp 192.168.1.0 0.0.0.255 any command.
The packet is allowed into Router1.
48 A technician has been asked to run the Cisco SDM one-step lockdown on the router of a
customer. What will be the result of this process?

The router will download the latest security patches from the specified FTP server.
All security configurations that are offered by the Cisco AutoSecure feature will be automatically
implemented.
All traffic that enters the router is quarantined and checked against the possible security problems
before being forwarded.
The existing router configurations will be examined and all potential security-related
configuration changes will be automatically implemented.
49 Which statement is true about wildcard masks?
Inverting the subnet mask will always create the wildcard mask.
A wildcard mask identifies a network or subnet bit by using a "1".
The same function is performed by both a wildcard mask and a subnet mask.
When a "0" is encountered in a wildcard mask, the IP address bit must be checked.
50 What type of ACL can be used to force a user to authenticate to the router before accessing a
network?

standard
dynamic
reflexive
time-based

Sunday, March 29, 2009

CCNA2 Skill v4.0

>>download<<

Given the network as in the diagram above, you need to create subnets with the given IP address of a major IP network. As for router configuration, you need to make the IP routing among all network segments. After finishing the configuration tasks, students have to ‘capture’ the configuration to text files and give to the examiner.

Note: Regarding the overall cooperation among team members –example: IP subnneting– the examiner watches the performance of the whole team and gives the score.

Section 1: IP Planning (20 points, for all team)

Use VLSM to assign IP address for each network.

Section 2: Basic configuration (20 points, for each student)

Overall requirements: all network segments in the network diagram can connect to each other.

a) Router name: Assign the names as given to each router accordingly.

b) IP address and subnest mask: Set IP address correcly for all related interfaces.

c) Password: Console, AUX, and vty lines are password protected, password= ‘cisco’; set the secret password to ‘class’.

d) Banner and descriptions: Banner contains the name of the student who configures it; descriptions of interface contain the name of the device it connects to. Banner (motd) example: Hello, this is router 1, configured by Alice. Interface description example: Connect to router ‘saigon’.

e) Backup configuration file: back up configuration file of each router using either TFTP or Capture Text.

Section 3: Routing (40 point, for each student)

Student 1:

Use EIGRP 100 for interface serial 1, 2, loopback 0. Use OSPF for interface serial 3.

Redistribute between OSPF and EIGRP (include the default-route which R1 learnt from EIGRP).

Student 2:

Use EIGRP 100 for interfaces serial 1, 2 and loopback 1

Configure the default-route through Lo0, and propagates it into EIGRP 100.

Student 3:

Use EIGRP 100 for interfaces serial 0/0, 0/1 and loopback 0

Configure static route (one command) for all remote routes through Lo0, and propagates into EIGRP 100.

Student 4:

Use OSPF for interfaces serial 0/1, fastEthernet 0/0 and loopback 0

Configure static route (one command) for all remote routes through Lo0, and propagates into OSPF area.

Student 5:

Use OSPF for interfaces serial 0, 1 and loopback 0

Configure static route (one command) for all remote routes through Lo0, and propagates into OSPF area.

Student 6:

Use OSPF for interfaces serial 0, Ethernet 0/0 and loopback 0

Configure static route (one command) for all remote routes through Lo0, and propagates into OSPF area.

Section 4: Question sheet (20 points, for each student)




www.ccna4u.net

CCNA3 Skills-based assessment lab

Thank you Ali Mahdi
CCNA3 Skills-based assessment lab

Lastest version
download

www.ccna4u.net

Wednesday, March 25, 2009

CCNA3 FINAL (91,8%)



Download

-----------4 Questions Updated 25/03/2009-----------------

1
Which statement is true about open authentication when it is enabled on an access point?

requires no authentication

uses a 64-bit encryption algorithm

requires the use of an authentication server

requires a mutually agreed upon password


2



Refer to the exhibit. The switches in the exhibit have VTP pruning enabled. What will be pruned in the VTP advertisements from switch ST-C to switch ST-1?
VLAN 30
VLAN 20 and VLAN 30
VLAN 1, VLAN 20, and VLAN 30
VLAN 2 through VLAN 29, and VLAN 31 through VLAN 1000




3



Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.35 and a destination address of 192.168.1.85. What will the router do with this packet?

The router will drop the packet.

The router will forward the packet out interface FastEthernet 0/1.1.

The router will forward the packet out interface FastEthernet 0/1.2.

The router will forward the packet out interface FastEthernet 0/1.3.

The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.




4


Refer to the exhibit. The switches are configured for VTP as shown. Which two statements correctly describe the operation of these switches? (Choose two.)

A new VLAN can be added to Switch1 and that information will be added only to Switch2.

A new VLAN can be added to Switch1 and that information will be added to Switch2 and Switch4.

An existing VLAN can be deleted from Switch4 and that VLAN will be deleted from Switch1 and Switch2.

An existing VLAN can be deleted from Switch2 and that VLAN will be deleted from Switch1 and Switch4.

A new VLAN can be added to Switch4 and that information will be added to Switch1, Switch2, and Switch3.

A new VLAN can be added to Switch3 and that information will be added to Switch1, Switch2, and Switch4.


-------------------/4 New Question----------------------------------------


1

Refer to the exhibit. The network administrator needs to setup Switch1 for remote access from HostA. The show ip interface brief is issued on Router1 and the show interfaces trunk command is issued on the
Switch1 to verify the current status. The administrator applies the additional configuration shown in the exhibit to Switch1. However, the telnet from HostA fails. What additional commands need to be applied

to the switch?


Switch(config)# interface vlan 1
Switch(config-if)# ip address 10.1.1.250 255.255.255.0
Switch(config-if)# no shutdown
Switch(config-if)# ip default-gateway 10.1.10.254

Switch(config)# interface vlan 1
Switch(config-if)# ip address 10.1.50.250 255.255.255.0
Switch(config-if)# no shutdown
Switch(config-if)# ip default-gateway 10.1.50.254


Switch(config)# interface vlan 10
Switch(config-if)# ip address 10.1.10.250 255.255.255.0
Switch(config-if)# no shutdown
Switch(config-if)# ip default-gateway 10.1.10.254



Switch(config)# interface vlan 10 ******TRUE
Switch(config-if)# ip address 10.1.1.250 255.255.255.0
Switch(config-if)# no shutdown
Switch(config-if)# ip default-gateway 10.1.10.254


Switch(config)# interface vlan 50
Switch(config-if)# ip address 10.1.10.250 255.255.255.0
Switch(config-if)# no shutdown
Switch(config-if)# ip default-gateway 10.1.10.254

2


Refer to the exhibit. On the basis of the configuration shown, how will an Ethernet frame on port GigabitEthernet0/1 be modified?

802.1Q encapsulation prepends a 4-byte tag field in front of the original Ethernet frame and recomputes the frame check sequence (FCS) on the modified frame.

802.1Q encapsulation inserts a 4-byte tag field into the original Ethernet frame between the source address and type/length fields and recomputes the frame check sequence (FCS) on the modified frame. ******TRUE
802.1Q encapsulation prepends an 802.1p field in front of the original Ethernet frame and recomputes the frame check sequence (FCS) on the modified frame.

802.1Q encapsulation inserts an 802.1p field into the original Ethernet frame between the source address and type/length fields and recomputes the frame check sequence (FCS) on the modified frame.




3
What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?
All VLANs will be allowed across the trunk. ******TRUE
Only VLAN 1 will be allowed across the trunk.
Only the native VLAN will be allowed across the trunk.
The switches will negotiate via VTP which VLANs to allow across the trunk.
4

Which parameter is used to uniquely identify one wireless network from another?
SSID ******TRUE

OFDM

WEP

DSSS

5

Refer to the exhibit. What is the consequence if SW1 port F0/1 is configured as an edge port?

SW1 port F0/1 transitions to the learning state.

SW1 port F0/1 can generate a temporary loop. ******TRUE

SW1 port F0/1 becomes a non-designated port.

SW1 port F0/2 no longer passes BPDUs to SW4.
6
Refer to the exhibit. What will allow a host on VLAN 40 on switch X to communicate with a host in VLAN 40 on switch Y?

QoS
routing
trunking ******TRUE
VPN

7

Refer to the exhibit. Spanning-tree port priorities are 128 for all interfaces. The network administrator enters the spanning-tree vlan 1 root primary command on S4. Which two port results are correct? (Choose two.)
S1 Gi0/1 becomes a root port. ******TRUE
S2 Gi0/2 becomes a non-designated port.
S3 Gi0/1 becomes a non-designated port.
S4 Gi0/1 becomes a root port.
S4 Gi0/2 becomes a designated port. ******TRUE
8
Refer to the exhibit. Which two facts can be confirmed by this output? (Choose two.)
This switch shows no configuration revision errors.
This switch has established two-way communication with the neighboring devices.
This switch is configured to advertise its VLAN configuration to other VTP-enabled switches in the same VTP domain. ******TRUE
This switch will drop all VTP advertisements that come from the switches that are configured in the same VTP domain.
This switch will cause no disruption in the VTP domain operations if the rest of the switches in the same VTP domain have a higher configuration revision number. ******TRUE
9


Refer to the exhibit. R1 is configured for traditional inter-VLAN routing. R1 can ping computer 3 but cannot ping computer 1. What is a possible cause for this failure?
S1 port Fa0/11 is in the wrong VLAN. ******TRUE
R1 does not have an active routing protocol.
The IP address of computer 1 is in the wrong logical network.
Router interface Fa0/0 has the wrong trunk encapsulation type configured.

10

Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and host B are on the default VLAN but are not able to exchange traffic. What should be done to fix the problem?
Allow all VLANs on the trunk link.
Remove the native VLAN from the trunk.
Include a router or switch with Layer 3 capabilities.
Configure the same native VLAN on both ends of the trunk. ******TRUE
11
Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. What should be done to fix the problem?
Configure VLANs with different VLAN IDs on switch SW2.
Reconfigure the trunk port on switch SW2 with static trunk configuration. ******TRUE
Introduce a Layer 3 device or a switch with Layer 3 capability in the topology.
Apply IP addresses that are in the same subnet to the interfaces used to connect SW1 and SW2.

12
What happens when the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines?
A new RSA key pair is created.
The switch defaults to allowing Telnet connections only.
The switch is no longer able to make SSH connections as an SSH client.
The switch allows remote connections only after a new RSA key pair is generated. ******TRUE

13

Refer to the exhibit. An Ethernet switch has developed the CAM table shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit?

forward the frame out all interfaces except Interface3 ******TRUE


add station 00-00-3D-1F-11-05 to Interface2 in the forwarding table

forward the frame out Interface3


discard the frame
forward the frame out all interfaces

forward the frame out Interface2
14

Which two statements describe Spanning Tree Protocol? (Choose two.)

It eliminates Layer 2 loops in network topologies. ******TRUE
It eliminates the need for redundant physical paths in network topologies.
It can only be used in networks in which Layer 2 switching is in use. ******TRUE
It can only be used in networks where both routers and switches are used together.
It can only be used in networks where routers are installed.

15


Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP addresses should be assigned to this new host?
192.168.1.11 /28
192.168.1.22 /28 ******TRUE
192.168.1.33 /28
192.168.1.44 /28
192.168.1.55 /28
16
Refer to the exhibit. How does SW1 manage traffic coming from Host A?
SW1 drops the traffic because it is untagged.
SW1 leaves the traffic untagged and forwards it over the trunk. ******TRUE
SW1 tags the traffic with the lowest VLAN ID value and forwards it over the trunk link.
SW1 encapsulates the traffic with 802.1Q encapsulation and forwards it over the trunk link.
17

Refer to the exhibit. The switches are configured for VTP as shown. Which two statements correctly describe the operation of these switches? (Choose two.)
A new VLAN can be added to Switch1 and that information will be added only to Switch2.
A new VLAN can be added to Switch1 and that information will be added to Switch2 and Switch4. ******TRUE
An existing VLAN can be deleted from Switch4 and that VLAN will be deleted from Switch1 and Switch2. ******TRUE
An existing VLAN can be deleted from Switch2 and that VLAN will be deleted from Switch1 and Switch4.
A new VLAN can be added to Switch4 and that information will be added to Switch1, Switch2, and Switch3.
A new VLAN can be added to Switch3 and that information will be added to Switch1, Switch2, and Switch4.

18
Refer to the exhibit. Computer A sends a broadcast message. Which devices will see the broadcast?
computer B
computer B and Router1
computer C and Router1 ******TRUE
computer B, computer D, computer E and Router1
computer B, computer C, computer D, computer E and Router1
computer A, computer B, computer C, computer D, computer E and Router1
19
Refer to the exhibit. The network administrator enters the configuration shown to allow both SSH and Telnet connections to the switch. The Telnet connections fail. What is the most likely cause of this problem?

The SSH version number is wrong.

SSH has been configured on the wrong line.

Telnet and SSH cannot be configured simultaneously.

The transport input command is configured incorrectly. ******TRUE

20
Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?
Cat-A
Cat-B
Cat-C ******TRUE
Cat-D
21
Refer to the exhibit. The switches in the exhibit have VTP pruning enabled. Which VLANs will be pruned from switch SW3?
VLAN 10 and VLAN 20 ******TRUE
VLAN 1, VLAN 10, and VLAN 20
VLAN 1, VLAN 1002 through 1005
VLAN 1, VLAN 10, VLAN 20, VLAN 1002 through 1005

22

Refer to the exhibit. What does STATIC indicate in the output that is shown?

The switch will not allow any other device to connect to port Fa0/15.

Traffic destined for MAC address 0000.c123.5432 will be forwarded to Fa0/15. ******TRUE

This entry will be removed and refreshed every 300 seconds to keep it in the table.
The switch learned this MAC address from the source address in a frame received on Fa0/15.
When processing a frame, the switch does not have to perform a lookup to determine the final destination port.

23

Which three statements are ******TRUE regarding router-on-a-stick inter-VLAN routing? (Choose three.)
requires the use of subinterfaces on the router ******TRUE
requires an access link between the router and Layer 2 switch
more cost-efficient and scalable than using multiple physical interfaces ******TRUE
requires each subinterface to be configured with the no shutdown command
can impact performance if many VLANs compete for bandwidth on a single router interface ******TRUE
makes troubleshooting the inter-VLAN routing configuration much less complex than when using multiple physical interfaces

24

Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.35 and a destination address of 192.168.1.85. What will the router do with this packet?


The router will forward the packet out interface FastEthernet 0/1.1.
The router will forward the packet out interface FastEthernet 0/1.2.
The router will forward the packet out interface FastEthernet 0/1.3.
The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.
The router will ignore the packet because the source and destination are on the same broadcast domain. ******TRUE
The router will drop the packet since no network that includes the source address is attached to the router.
25

Refer to the exhibit. The network administrator needs to remove the east-hosts VLAN and use the switch port from that VLAN in one of the existing VLANs. What two commands should be used when completely removing VLAN 2 from S1-Central while leaving the switch and all its interfaces operational? (Choose two.)

S1-Central# reload
S1-Central# erase flash:
S1-Central(config)# no vlan 2 ******TRUE
S1-Central# delete flash:vlan.dat
S1-Central(config-if)# switchport access vlan 3 ******TRUE

26
Refer to the exhibit. What does "FORWARDING" mean in the command output shown?

The switch is sending and receiving data frames. ******TRUE
The switch is receiving BPDUs, but not sending data frames.
The switch is participating in an election process by forwarding the BPDUs it receives.
The switch is receiving BPDUs and populating the MAC address table, but not sending data.
27
Refer to the exhibit. Switch SW2 has been newly purchased and added to the network. What configuration should be applied to SW2 so that it participates in the same VTP domain as switch SW1, receives VLAN information from SW1, and synchronizes VLAN information?
Disable VTP pruning on SW2.
Configure SW2 in VTP transparent mode.
Configure SW2 with the VTP domain password. ******TRUE
Configure SW2 as a VTP server with a higher revision number.
28

What are three benefits of a hierarchical network model? (Choose three.)
reduced contention for bandwidth ******TRUE
reduced size of the physical layout
increased fault tolerance of the network ******TRUE
elimination of the need for wiring closets
elimination of the need for layer three functionality
simplification of management and troubleshooting ******TRUE
29
Refer to the exhibit. Which three options correctly identify information that could be associated with this output?(Choose three.)
Interface FastEthernet3/0/0 is subinterfaced. ******TRUE
A non-proprietary trunking protocol is in use. ******TRUE
The configuration is appropriate for a router-on-a-stick network design. ******TRUE
A shutdown command has been applied to interface FastEthernet3/0/0.
Interface FastEthernet3/0/0.3 is mapped to the default management VLAN.
An IP address should be applied to FastEthernet3/0/0 for correct data routing.

30
Refer to the exhibit. Switch SW2 was tested in a lab environment and then inserted into a production network without reloading its configuration. After the trunk link between SW1 and SW2 was brought up, all users lost connectivity to the network. What could be the source of the problem?
All the VLANs were pruned from the trunk port between SW1 and SW2.
SW1 and SW2 cannot be both set as VTP servers in the same VTP domain.
VTP configuration revision number of SW2 was higher than the configuration revision number of SW1. ******TRUE

The additional VLANs from SW2 created more VLANs than the VLAN database of SW1 could contain.

31

Refer to the exhibit. A network administrator needs to implement inter-VLAN routing on a hierarchical network. On which devices should the inter-VLAN routing be configured?
AS1 and AS2
DS1 and DS2
Gateway and CS1 ******TRUE
Gateway, CS1, DS1, and DS2
32

Which three statements are correct concerning the default configuration of a new switch? (Choose three.)

Spanning Tree Protocol is disabled.
Enable password is configured as cisco.
All switch ports are assigned to VLAN1. ******TRUE
The flash directory contains the IOS image. ******TRUE
VLAN1 is configured with a management IP address.
All interfaces are set to auto-negotiation of speed and duplex. ******TRUE

33

Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit data at the same time. How do the hosts respond on the network? (Choose two.)
After the end of the jam signal, a backoff algorithm is invoked. ******TRUE
Hosts 1 and 4 are operating full duplex so no collision will exist.
The hub will block the port connected to Host 4 to prevent a collision.
Hosts 1 and 4 are assigned shorter backoff values to provide them priority to access the media.
If a host has data to transmit after the backoff period of that host, the host checks to determine if the line is idle before transmitting. ******TRUE

34

Refer to the exhibit. After the listed commands are entered into router R1 and switch S1, the administrator enters the show interface fa0/1 trunk and gets the results shown. What is the likely problem?
The trunk is established, but no VLANs have been configured to use it.
The trunk has not been established because the router does not support dynamic trunking protocol. ******TRUE
The router, the switch, or both must be configured with the dynamic desirable option for dynamic trunking protocol to establish a trunk.
The router is missing the dynamic trunking protocol statements necessary to form a trunk.

35

Refer to the exhibit. Which two statements are ******TRUE about the operation of the interfaces? (Choose two.)
Incoming traffic with VLAN ID 0 is processed by interface fa0/0.
Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2. ******TRUE
Both subinterfaces remain up with line protocol up, even if fa0/0 line protocol is down.
Subinterfaces use unique MAC addresses by adding the 802.1Q VLAN ID to the hardware address.
Traffic inbound on this router is processed by different subinterfaces, depending on the VLAN from which the traffic originated. ******TRUE

36

What three tasks should be performed before moving a Catalyst switch to another VTP management domain? (Choose three.)
Select the correct VTP mode and version. ******TRUE
Configure the switch with the name of the new management domain. ******TRUE
Download the VTP database from the VTP server in the new domain.
Configure the VTP server in the new domain to recognize the BID of the switch.
Reset the VTP counters to allow the switch to synchronize with the other switches in the new domain.
Verify that the switch has a lower configuration revision number than the other switches in the new domain. ******TRUE
37


Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?
only hosts A and B
only hosts A, B, and C ******TRUE
only hosts A, B, C, and D
only hosts A, B, C, and E

38
Which statement regarding the service password-encryption command is ******TRUE?
The service password-encryption command is entered at the privileged EXEC mode prompt.
The service password-encryption command encrypts only passwords for the console and VTY ports.
The service password-encryption command encrypts all previously unencrypted passwords in the running configuration. ******TRUE
To see the passwords encrypted by the service password-encryption command, enter the no service password-encryption command.


39
Refer to the exhibit. Which two statements are ******TRUE regarding what the cost value of 23 represents for Switch4? (Choose two.)
This cost represents the lowest cost path for Switch4 to the root switch. ******TRUE
A cost of 23 is the value being advertised out port 16 on the switch upstream (closer) to the root switch.
Switch4 adds the cost of a Fast Ethernet link to 23 to determine its total cost to reach the root switch. ******TRUE
Switch4 is connected via a Fast Ethernet link to an upstream switch that in turn is directly connected to the root switch via a Gigabit Ethernet link.
The root switch is advertising a cost of 23, which is lower than any other switch in the VLAN0001 spanning-tree domain.

40

Refer to the exhibit. What three statements describe why Host1 and Host2 are unable to communicate? (Choose three.)

The switch ports are on different VLANs. ******TRUE

The switch IP address is on the wrong subnet.
The hosts are configured on different logical networks. ******TRUE
A router is required to forward traffic between Host1 and Host2. ******TRUE
The VLAN port assignments must be contiguous for each VLAN.
The host default gateway addresses must be on the same logical network.

41

Refer to the exhibit. Each switch is shown with its MAC address. Which switch will be elected as the spanning-tree root bridge if the switches are configured with their default priority values?

switch A
switch B
switch C
switch D
switch E
switch F ******TRUE
42
Refer to the exhibit. Hosts PC_A and PC_B send traffic simultaneously, and the frames from the transmitting stations collide. What is the last device to receive the collision?

hub HB1
switch SW1 ******TRUE
router R1
switch SW2
router R2
switch SW4
43
Top of Form
Why is it important that the network administrator consider the spanning-tree network diameter when choosing the root bridge?
The network diameter limitation is 9.
BPDUs may be discarded because of expiring timers. ******TRUE
The cabling distance between the switches is 100 meters.
The network diameter must be set to the number of meters of the cable between the root bridge and its farthest connected switch.

44
Refer to the exhibit. A network administrator has segmented the network into two VLANs and configured Router1 for inter-VLAN routing. A test of the network, however, shows that hosts on each VLAN can only access local resources and not resources on the other VLAN. What is the most likely cause of this problem?
Switch port Fa0/1 is not trunking. ******TRUE
Router interface Fa0/0 is possibly down.
No routing protocol is configured on Router1.
One of the router subinterfaces is possibly down.
45
What is the purpose of issuing the command switchport mode access on a switch interface?
disable port security
make the port operational
override the default port behavior
force the port to be a part of a single vlan ******TRUE

46


Refer to the exhibit. Which statement is ******TRUE regarding the information shown?
Only one VLAN is currently configured to use the trunk links.
The switch negotiated trunk links for interfaces Fa0/1 and Gi0/1.
A Cisco proprietary protocol is in use for interfaces Fa0/1 and Gi0/1.
Interfaces Gi0/1 and Fa0/1 are allowed to carry data from multiple VLANs ******TRUE.


47

Which identifier is used to keep track of frames that are destined for a particular wireless client?
AID
SSID
BSSID ******TRUE
ESSID

48


Refer to the exhibit. What will happen when frames that contain an unknown source address reach interface fa0/24?

A syslog message will be logged.
Fa0/24 will become error-disabled.
The incoming frames will be dropped. ******TRUE
The security violation count will be incremented.
49
In which mode is a VTP switch operating if it has been configured to only forward VTP advertisements?
client
root
server
transparent ******TRUE

50
Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?
Associate with the access point and then open a HyperTerminal session with the access point.
Physically connect to the access point and then reboot the computer to launch the configuration software.
From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser. ******TRUE
Modify the TCP/IP properties of the computer connected to the access point so that it exists on the same network, and then reboot your computer to establish a connection.

51
Top of Form
What two methods can be used to remove MAC address table entries from a switch? (Choose two.)
The clear switching-tables command will remove statically configured entries.
The clear mac-address-table command will remove statically and dynamically configured table entries. ******TRUE
The erase flash command will clear all statically configured table entries.
Statically configured MAC addresses will automatically be removed from the address table 300 minutes after the last activity on a switch port.

52


What are two benefits of the IEEE 802.11n standard over the IEEE 802.11G? (Choose two.)
requires less equipment
provides improved range ******TRUE
permits increased data rates ******TRUE
has a single-input and a single-output
needs no hardware upgrade for compatibility

www.ccna4u.net