CCNA 3 Final Exam

合集下载

CCNA02-final3

CCNA02-final3

1Which of the following are required when adding a network to the OSPF routing process conf iguration? (Choose three.)network addressloopback addressautonomous system numbersubnet maskwildcard maskarea ID2Using default settings, what is the next step in the router boot sequence after t he IOS loads from flash?Perf orm the POST routine.Search for a backup IOS in ROM.Load the bootstrap program f rom ROM.Load the running-config file from RAM.Locate and load the startup-config file from NVRAM.3Refer to the exhibit. What is the most efficient summarization of the routes attached to router R1?198.18.0.0/16198.18.48.0/21198.18.32.0/22198.18.48.0/23198.18.49.0/23198.18.52.0/224Refer to the exhibit. When troubleshooting a network, it is important to interpret the output of various router commands. On the basis of the exhibit, which three statem (Choose three.)The missing information f or Blank 1 is the command show ip route .The missing information f or Blank 1 is the command debug ip route .The missing information f or Blank 2 is the number 100.The missing information f or Blank 2 is the number 120.The missing information f or Blank 3 is the letter R.The missing information f or Blank 3 is the letter C.5Refer to the exhibit. Packets destined to which two networks will require the router to perform a recursive lookup? (Choose t wo.)10.0.0.0/864.100.0.0/16128.107.0.0/16172.16.40.0/24192.168.1.0/24192.168.2.0/246When presented with multiple valid routes to a destination, what criteria does a router use to determine which routes to add to the routing table?The router selects the routes with the best metric. All routes that hav e the same best metric are added to the routing table.The router f irst selects routes with the lowest administrative distance. The resulting routes are then prioritized by metric and the routes with the best metric arouting table.The router selects the routes with the lowest administrativ e distance. All routes with the same lowest administrative distanc e are added to the routing table.The router installs all routes in the routing table but uses the route with the best metric most when load balancing.7Refer to the exhibit. All routers in the network are running RIPv2 and EIGRP with default routing protocol settings and have interfaces configured with the bandwidths t exhibit. Which protocol will be used and how will traffic between the Router1 LAN and Router5 LAN be routed through the network?RIPv2 will load balance across both paths between Router1 and Router5.EIGRP will load balance across both paths between Router1 and Router5.RIPv2 traffic will use the path Router1, Router2, Router5 because it has the least hops.EIGRP traffic will use the path Router1, Router3, Router4, Router5 because it has the best metric.8Of the listed routing protocols, which two will propogate LSPs to all neighbors? (Choose two.)IS-ISEIGRPOSPFRIPv1RIPv29Refer to the exhibit. Routers 1 and 2 are directly connected over a serial link. Pings are f ailing between the two routers. W hat change by the administrator will correctSet the encapsulation on both routers to PPP.Decrease the bandwidth on Serial 0/1/0 on router 2 to 1544.Change the cable that connects the routers to a crossover cable.Change the IP address on Serial 0/1/0 on router 2 to 192.168.0.1/30.10Refer to the exhibit. Which three statements are true of the routing table for Router1? (Choose three.)The route to network 172.16.0.0 has an AD of 156160.Network 192.168.0.16 can best be reached using FastEthernet0/0.The AD of EIGRP routes has been manually changed to a value other than the default value.Router1 is running both the EIGRP and OSPF routing process.Network 172.17.0.0 can only be reached using a default route.No default route has been conf igured.11Which statement correctly describes a feasible successor in EIGRP?It is a primary route that is stored in the routing table.It is a backup route that is stored in the routing table.It is a primary route that is stored in the topology table.It is a backup route that is stored in the topology table.12Refer to the exhibit. A ping from R1 to 10.1.1.2 is successful, but a ping from R1 to 192.168.2.0 fails. What is the cause of this problem?There is no gateway of last resort at R1.The serial interf ace between the two routers is down.A default route is not configured on R1.The static route for 192.168.2.0 is incorrectly conf igured.13Refer to the exhibit. A network administrator has run the show interface command. The output of this command is displayed. What is the first step that is required toSwitch the cable with a known working cable.Issue the no shutdown command on the interface.Configure the interf ace as a loopback interface.Set the encapsulation for the interface.14Which two locations can be the source of the Cisco IOS that is used by a router during the bootup process? (Choose two.)flash memoryRAMNVRAMTFTP serverconfiguration register15All routers in a network are configured in a single OSPF area with the same priority value. No loopback interface has been set on any of the routers. Which secondrouters use to determine the router ID?The highest MAC address among the active interfaces of the network will be used.There will be no router ID until a loopback interf ace is configured.The highest IP address among the activ e FastEthernet interfaces that are running OSPF will be used.The highest IP address among the activ e interfaces will be used.16Refer to the exhibit. A network administrator has conf igured OSPF using the following command:network 192.168.1.32 0.0.0.31 area 0Which router interf ace will participate in OSPF?FastEthernet0/0FastEthernet0/1Serial0/0/0Serial0/0/117Refer to the exhibit. All routers are properly configured with default configurations and are running the OSPF routing protocol. The network is f ully converged. A host on th with a host on the 192.168.2.0/24 network.Which path will be used to transmit the data?The data will be transmitted v ia R3-R2.The data will be transmitted v ia R3-R1-R2.The traffic will be load-balanced between two paths — one via R3-R2, and the other via R3-R1-R2.The data will be transmitted v ia R3-R2, and the other path via R3-R1-R2 will be retained as the backup path.18Which two situations require the use of a link-state protocol? (Choose two.)Fast convergence of the network is critical.The network is very large.The network administrator has limited knowledge to configure and troubleshoot routing protocols.The network is a flat network.The capacity of the router is low.19Refer to the exhibit. What is the meaning of the highlighted value 120?It is the metric that is calculated by the routing protocol.It is the v alue that is used by the DUAL algorithm to determine the bandwidth for the link.It is the administrative distance of the routing protocol.It is the hold-down time, measured in seconds, before the next update.20In a lab test environment, a router has learned about network 172.16.1.0 through four different dynamic routing processes. Which route will be used to reach this nD 172.16.1.0/24 [90/2195456] via 192.168.200.1, 00:00:09, Serial0/0/0O 172.16.1.0/24 [110/1012] via 192.168.200.1, 00:00:22, Serial0/0/0R 172.16.1.0/24 [120/1] via 192.168.200.1, 00:00:17, Serial0/0/0I 172.16.1.0/24 [100/1192] via 192.168.200.1, 00:00:09, Serial0/0/021Which statement is true about the RIPv1 protocol?It is a link-state routing protocol.It excludes subnet information from the routing updates.It uses the DUAL algorithm to insert backup routes into the topology table.It uses classless routing as the default method on the router.22Refer to the exhibit. The 10.4.0.0 network f ails. What mechanism prevents R2 f rom receiving false update information regarding the 10.4.0.0 network?split horizonhold-down timersroute poisoningtriggered updates23Which statement is true about the metrics used by routing protocols?A metric is a value used by a particular routing protocol to compare paths to remote networks.A common metric is used by all routing protocols.The metric with the highest value is installed in the routing table.The router may use only one parameter at a time to calculate the metric.24Refer to the exhibit. Both routers are using the RIPv2 routing protocol and static routes are undef ined. R1 can ping 192.168.2.1 and 10.1.1.2, but is unable to ping 192.16 What is the reason for the ping f ailure?The serial interf ace between two routers is down.R2 is not forwarding the routing updates.The 192.168.4.0 network is not included in the RIP configuration of R2.RIPv1 needs to be configured.25Which statement correctly describes a feature of RIP?RIP is a link-state routing protocol.RIP uses only one metric—hop count— for path selection.Adv ertised routes with hop counts greater than 10 are unreachable.Messages are broadcast every 10 seconds.26Refer to the exhibit. When the show cdp neighbors command is issued f rom router C, which devices will be displayed in the output?B, DA, B, DD, SWH-2SWH-1, A, BSWH-1, SWH-2A, B, D, SWH-1, SWH-227Refer to the exhibit. Although R2 is conf igured correctly, host A is unable to access the Internet. What are two static routes that can be c onfigured on R1, either of which w (Choose two.)ip route 0.0.0.0 0.0.0.0 Fa0/0ip route 0.0.0.0 0.0.0.0 Fa0/1ip route 0.0.0.0 0.0.0.0 10.1.1.1ip route 0.0.0.0 0.0.0.0 10.1.1.2ip route 209.165.202.0 255.255.255.0 10.1.1.128Which component is typically used to connect the WIC interface of a router to a CSU/DSU?V.35 cableRJ-45 adaptercrossover cablestraight-through cable29Refer to the exhibit. Which combination of IP address and subnet mask can be used on the serial interf ace of Router2 in order to put the interf ace in the same networ interface of Router1?IP 172.16.0.18, subnet mask 255.255.255.0IP 172.16.32.15, subnet mask 255.255.255.240IP 172.16.0.18, subnet mask 255.255.255.252IP 172.16.32.18, subnet mask 255.255.255.25230Refer to the exhibit. Which host has a combination of IP address and subnet mask on the same network as Fa0/0 of Router1?host Ahost Bhost Chost D31Refer to the exhibit. OSPF is used f or the routing protocol and all interf aces are configured with the correct IP addresses and subnet masks. During testing, it is foun unable to form an adjacency with R2. What is the cause of this problem?Both routers have been configured with incorrect router IDs.Both routers have been configured in different OSPF areas.Both routers have been configured with an incorrect network type.Both routers have been configured with different hello and dead intervals.32You hav e been asked to explain converged networks to a trainee. How would you accurately describe a converged network?A network is converged when all routers have f ormed an adjacency.A network is converged immediately after a topology change has occurred.A network is converged when all routers flush the unreachable networks from their routing tables.A network is converged after all routers share the same information, calculate best paths, and update their routing tables.33 A network administrator is in charge of two separate networks that share a single building. What dev ice will be required to connect the two networks and add a comthe Internet that can be shared?hubrouteraccess pointEthernet switch34Which port should a terminal emulator be connected to in order to access a router without network connectivity?T1serialconsoleFastEthernet35Refer to the exhibit. What needs to be done to allow these two routers to connect successf ully?Add a clock rate to S0/0/0 on R1.Add an interface description to S0/0/1 on R2.Change the serial interface on R2 to S0/0/0 so that it matches R1.Change the IP address of S0/0/1 on R2 so that it is in the same subnet as R1.36Refer to the exhibit. Based on the partial output in the exhibit, why can users establish a console connection to this router without entering a password?The login command was not entered on the console line.The enable password should be an enable secret password.No username and password combination has been configured.Console connections cannot be conf igured to require users to provide passwords.37Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway?10.1.1.110.1.1.2172.16.1.1192.168.1.138Refer to the exhibit. The entire 192.168.1.0 network has been allocated to address hosts in the diagram. Utilizing VLSM with contiguous address blocks, which set of pref ixes could be used to create an addressing solution with a minimum waste of IP addresses?39What is a function of a router?It extends the Layer 2 broadcast domain.It eliminates collisions among PCs on the same local network.It provides connectivity among PCs on the same physical segment.It forwards packets to different IP networks based on Layer 3 inf ormation.40Refer to the exhibit. Which solution provides the most efficient use of router resources for forwarding traffic between BR and HQ?RIPRIPv2EIGRPstatic routes41Refer to the exhibit. A network administrator configures a static route on router R1 to reach the 192.168.1.0/24 network. Which IP address should be used as the next ip route command?192.168.1.1192.168.2.1192.135.250.1192.135.250.242Refer to the exhibit. The network is conf igured with RIPv2. However, network administrators notice that communication cannot be successfully completed f rom one L network administrator issues the show ip route command on the HQ router. Based on the output, what should be done to correct the problem?Disable the load balancing feature of RIPv2.Issue the no auto-summary command for RIPv2.Replace RIPv2 with EIGRP which supports VLSM.Make sure that the network statements include the correct subnet mask.43Which protocol is used by EIGRP to deliver and receive update packets?FTPRTPTCPTFTPUDP44Refer to the exhibit. What OSPF network statements are required for the router B to adv ertise the three networks that are attached?router ospf 1network 10.0.0.0 0.0.0.255 area 0router ospf 1network 10.1.1.0 0.3.255.255 area 0network 10.10.1.0 0.255.255.255 area 0network 10.20.1.0 0.255.255.255 area 0router ospf 1network 10.1.1.0 0.0.0.3 area 0network 10.10.1.0 0.0.255.255 area 0network 10.20.1.0 0.0.255.255 area 0router ospf 1network 10.1.1.0 0.0.0.3 area 0network 10.10.1.0 0.0.0.255 area 0network 10.20.1.0 0.0.0.255 area 045Which two v alues are used by default to calculate a metric in EIGRP? (Choose two.) loaddelayreliabilityhop countbandwidth46Refer to the exhibit. Which statement is true concerning the routing configuration?Using dy namic routing instead of static routing would hav e required f ewer configuration steps.The 10.1.1.0/24 and 10.1.2.0/24 routes have adjacent boundaries and should be summarized.Packets routed to the R2 Fast Ethernet interface require two routing table lookups.The static route will not work correctly.47Refer to the exhibit. On the basis of the show running-config output, which option correctly ref lects the routes that will be listed in the R2 routing table?48Refer to the exhibit. Which command should be issued to configure the address of the router interface that is attached to this computer?Router(config-if)# ip address 192.168.2.1 255.255.255.0Router(config-if)# ip address 192.168.2.2 255.255.255.0Router(config-if)# ip address 192.168.0.1 255.255.255.0Router(config-if)# ip address 192.168.0.2 255.255.255.049Refer to the exhibit. Which route will be removed from the routing table if manual EIGRP summarization is disabled on the Serial0/0/0 interface of Router3?0.0.0.0/0172.16.0.0/16172.16.1.0/24172.16.3.0/3050Refer to the exhibit. All interfaces are addressed and f unctioning correctly. The network administrator runs the tracert command on host A. Which two f acts could be output of this command? (Choose two.)The gateway for Host A is missing or improperly conf igured.The gateway for Host B is missing or improperly conf igured.The entry for 192.168.1.0/24 is missing f rom the routing table of R1.The entry for 192.168.1.0/24 is missing f rom the routing table of R2.The entry for 192.168.2.0/24 is missing f rom the routing table of R1.The entry for 192.168.2.0/24 is missing f rom the routing table of R2.。

CCNA Exploration 3 LAN Switching and Wireless Final Exam

CCNA Exploration 3 LAN Switching and Wireless Final Exam

Refer to the exhibit. The switches are configured for VTP as shown. Which two statements correctly describe the operation of these switches? (Choose two.)23A new VLAN can be added to Switch1 and that information will be added only to Switch2.A new VLAN can be added to Switch1 and that information will be added to Switch2 and Switch4.An existing VLAN can be deleted from Switch4 and that VLAN will be deleted from Switch1 and Switch2.An existing VLAN can be deleted from Switch2 and that VLAN will be deleted from Switch1 and Switch4.A new VLAN can be added to Switch4 and that information will be added to Switch1, Switch2, and Switch3.A new VLAN can be added to Switch3 and that information will be added to Switch1, Switch2, and Switch4.2Refer to the exhibit. Switch SW2 has been newly purchased and added to the network. What configuration should be applied to SW2 so that it participates in the same VTP domain as switch SW1, receives VLAN information from SW1, and synchronizes VLAN information?3Disable VTP pruning on SW2.Configure SW2 in VTP transparent mode.Configure SW2 with the VTP domain password.Configure SW2 as a VTP server with a higher revision number.3Refer to the exhibit. What will allow a host on VLAN 40 on switch X to communicate with a host in VLAN 40 on switch Y?3QoSroutingtrunkingVPN4Which parameter is used to uniquely identify one wireless network from another?1SSIDOFDMWEPDSSS5Refer to the exhibit. What three statements describe why Host1 and Host2 are unable to communicate? (Choose three.)134The switch ports are on different VLANs.The switch IP address is on the wrong subnet.The hosts are configured on different logical networks.A router is required to forward traffic between Host1 and Host2.The VLAN port assignments must be contiguous for each VLAN.The host default gateway addresses must be on the same logical network.6Refer to the exhibit. The network administrator enters the configuration shown to allow both SSH and Telnet connections to the switch. The Telnet connections fail. What is the most likely cause of this problem?3The SSH version number is wrong.SSH has been configured on the wrong line.Telnet and SSH cannot be configured simultaneously.The transport input command is configured incorrectly.7Refer to the exhibit. The network administrator needs to setup Switch1 for remote access from HostA. The show ip interface brief is issued on Router1 and the show interfaces trunk command is issued on the Switch1 to verify the current status. The administrator applies the additional configuration shown in the exhibit to Switch1. However, the telnet from HostA fails. What additional commands need to be applied to the switch?4Switch(config)# interface vlan 1Switch(config-if)# ip address 10.1.1.250 255.255.255.0Switch(config-if)# no shutdownSwitch(config-if)# ip default-gateway 10.1.10.254Switch(config)# interface vlan 1Switch(config-if)# ip address 10.1.50.250 255.255.255.0Switch(config-if)# no shutdownSwitch(config-if)# ip default-gateway 10.1.50.254Switch(config)# interface vlan 5Switch(config-if)# ip address 10.1.5.250 255.255.255.0Switch(config-if)# no shutdownSwitch(config-if)# ip default-gateway 10.1.5.254Switch(config)# interface vlan 10Switch(config-if)# ip address 10.1.10.250 255.255.255.0Switch(config-if)# no shutdownSwitch(config-if)# ip default-gateway 10.1.10.254Switch(config)# interface vlan 10Switch(config-if)# ip address 10.1.1.250 255.255.255.0Switch(config-if)# no shutdownSwitch(config-if)# ip default-gateway 10.1.10.254Switch(config)# interface vlan 50Switch(config-if)# ip address 10.1.10.250 255.255.255.0Switch(config-if)# no shutdownSwitch(config-if)# ip default-gateway 10.1.10.2548What three tasks should be performed before moving a Catalyst switch to another VTP management domain? (Choose three.)126Select the correct VTP mode and version.Configure the switch with the name of the new management domain.Download the VTP database from the VTP server in the new domain.Configure the VTP server in the new domain to recognize the BID of the switch.Reset the VTP counters to allow the switch to synchronize with the other switches in the new domain.Verify that the switch has a lower configuration revision number than the other switches in the new domain.9Refer to the exhibit. Computer A sends a broadcast message. Which devices will see the broadcast?3computer Bcomputer B and Router1computer C and Router1computer B, computer D, computer E and Router1computer B, computer C, computer D, computer E and Router1computer A, computer B, computer C, computer D, computer E and Router110Which three statements are correct concerning the default configuration of a new switch? (Choose three.)346Spanning Tree Protocol is disabled.Enable password is configured as cisco.All switch ports are assigned to VLAN1.The flash directory contains the IOS image.VLAN1 is configured with a management IP address.All interfaces are set to auto-negotiation of speed and duplex.11Refer to the exhibit. Switch SW2 was tested in a lab environment and then inserted into a production network without reloading its configuration. After the trunk link between SW1 and SW2 was brought up, all users lost connectivity to the network. What could be the source of the problem?3All the VLANs were pruned from the trunk port between SW1 and SW2. SW1 and SW2 cannot be both set as VTP servers in the same VTP domain.VTP configuration revision number of SW2 was higher than the configuration revision number of SW1.The additional VLANs from SW2 created more VLANs than the VLAN database of SW1 could contain.12In which mode is a VTP switch operating if it has been configured to only forward VTP advertisements?4clientrootservertransparent13Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. What should be done to fix the problem?2Configure VLANs with different VLAN IDs on switch SW2.Reconfigure the trunk port on switch SW2 with static trunk configuration.Introduce a Layer 3 device or a switch with Layer 3 capability in the topology.Apply IP addresses that are in the same subnet to the interfaces used to connect SW1 and SW2.14Refer to the exhibit. What does STATIC indicate in the output that is shown?2The switch will not allow any other device to connect to port Fa0/15.Traffic destined for MAC address 0000.c123.5432 will be forwarded to Fa0/15.This entry will be removed and refreshed every 300 seconds to keep it in the table.The switch learned this MAC address from the source address in a frame received on Fa0/15.When processing a frame, the switch does not have to perform a lookup to determine the final destination port.15Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and host B are on the default VLAN but are not able to exchange traffic. What should be done to fix the problem?4Allow all VLANs on the trunk link.Remove the native VLAN from the trunk.Include a router or switch with Layer 3 capabilities.Configure the same native VLAN on both ends of the trunk.16What are two benefits of the IEEE 802.11n standard over the IEEE 802.11G? (Choose two.)35requires less equipmentprovides improved rangepermits increased data rateshas a single-input and a single-outputneeds no hardware upgrade for compatibility17Refer to the exhibit. How does SW1 manage traffic coming from Host A?4SW1 drops the traffic because it is untagged.SW1 leaves the traffic untagged and forwards it over the trunk.SW1 tags the traffic with the lowest VLAN ID value and forwards it over the trunk link.SW1 encapsulates the traffic with 802.1Q encapsulation and forwards it over the trunk link.18Refer to the exhibit. Which two statements are true regarding what the cost value of 23 represents for Switch4? (Choose two.)13This cost represents the lowest cost path for Switch4 to the root switch.A cost of 23 is the value being advertised out port 16 on the switch upstream (closer) to the root switch.Switch4 adds the cost of a Fast Ethernet link to 23 to determine its total cost to reach the root switch.Switch4 is connected via a Fast Ethernet link to an upstream switch that in turn is directly connected to the root switch via a Gigabit Ethernet link.The root switch is advertising a cost of 23, which is lower than any other switch in the VLAN0001 spanning-tree domain.19Why is it important that the network administrator consider the spanning-tree network diameter when choosing the root bridge?2The network diameter limitation is 9.BPDUs may be discarded because of expiring timers.The cabling distance between the switches is 100 meters.The network diameter must be set to the number of meters of the cable between the root bridge and its farthest connected switch.20Refer to the exhibit. After the listed commands are entered into router R1 and switch S1, the administrator enters the show interface fa0/1 trunk and gets the results shown. What is the likely problem?2The trunk is established, but no VLANs have been configured to use it.The trunk has not been established because the router does not support dynamic trunking protocol.The router, the switch, or both must be configured with the dynamic desirable option for dynamic trunking protocol to establish a trunk.The router is missing the dynamic trunking protocol statements necessary to form a trunk.21Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP addresses should be assigned to this new host?2192.168.1.11 /28192.168.1.22 /28192.168.1.33 /28192.168.1.44 /28192.168.1.55 /2822Which statement regarding the service password-encryption command is true?3The service password-encryption command is entered at the privileged EXEC mode prompt.The service password-encryption command encrypts only passwords for the console and VTY ports.The service password-encryption command encrypts all previously unencrypted passwords in the running configuration.To see the passwords encrypted by the service password-encryption command, enter the no service password-encryption command.23What is the purpose of issuing the command switchport mode access on a switch interface?4disable port securitymake the port operationaloverride the default port behaviorforce the port to be a part of a single vlan24Refer to the exhibit. Spanning-tree port priorities are 128 for all interfaces. The network administrator enters the spanning-tree vlan 1 root primary command on S4. Which two port results are correct? (Choose two.)25S1 Gi0/1 becomes a root port.S2 Gi0/2 becomes a non-designated port.S3 Gi0/1 becomes a non-designated port.S4 Gi0/1 becomes a root port.S4 Gi0/2 becomes a designated port.25What two radio frequency bands are designated by the ITU-R as unlicensed for industrial, scientific, and medical (ISM) communities and are therefore supported by IEEE 802.11? (Choose two.)359 MHz750 MHz2.4 GHz7.7 GHz5 GHz900 GHz26Refer to the exhibit. An Ethernet switch has developed the CAM table shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit?1forward the frame out all interfaces except Interface3add station 00-00-3D-1F-11-05 to Interface2 in the forwarding tableforward the frame out Interface3discard the frameforward the frame out all interfacesforward the frame out Interface227Refer to the exhibit. A network administrator has segmented the network into two VLANs and configured Router1 for inter-VLAN routing. A test of the network, however, shows that hosts on each VLAN can only access local resources and not resources on the other VLAN. What is the most likely cause of this problem?1Switch port Fa0/1 is not trunking.Router interface Fa0/0 is possibly down.No routing protocol is configured on Router1.One of the router subinterfaces is possibly down.28Refer to the exhibit. The network administrator needs to remove the east-hosts VLAN and use the switch port from that VLAN in one of the existing VLANs. What two commands should be used when completely removing VLAN 2 from S1-Central while leaving the switch and all its interfaces operational? (Choose two.)35S1-Central# reloadS1-Central# erase flash:S1-Central(config)# no vlan 2S1-Central# delete flash:vlan.datS1-Central(config-if)# switchport access vlan 329Which three statements are true regarding router-on-a-stick inter-VLAN routing? (Choose three.)136requires the use of subinterfaces on the routerrequires an access link between the router and Layer 2 switchmore cost-efficient and scalable than using multiple physical interfacesrequires each subinterface to be configured with the no shutdown commandcan impact performance if many VLANs compete for bandwidth on a single router interfacemakes troubleshooting the inter-VLAN routing configuration much less complex than when using multiple physical interfaces30Refer to the exhibit. Which statement is true regarding the information shown?1Only one VLAN is currently configured to use the trunk links.The switch negotiated trunk links for interfaces Fa0/1 and Gi0/1.A Cisco proprietary protocol is in use for interfaces Fa0/1 and Gi0/1. Interfaces Gi0/1 and Fa0/1 are allowed to carry data from multiple VLANs.31Refer to the exhibit. What does "FORWARDING" mean in the command output shown?1The switch is sending and receiving data frames.The switch is receiving BPDUs, but not sending data frames.The switch is participating in an election process by forwarding the BPDUs it receives.The switch is receiving BPDUs and populating the MAC address table, but not sending data.32Refer to the exhibit. Each switch is shown with its MAC address. Which switch will be elected as the spanning-tree root bridge if the switches are configured with their default priority values?6switch Aswitch Bswitch Cswitch Dswitch Eswitch F33Which two statements describe Spanning Tree Protocol? (Choose two.)13 It eliminates Layer 2 loops in network topologies.It eliminates the need for redundant physical paths in network topologies. It can only be used in networks in which Layer 2 switching is in use.It can only be used in networks where both routers and switches are used together.It can only be used in networks where routers are installed.34Refer to the exhibit. What is the consequence if SW1 port F0/1 is configured as an edge port?2SW1 port F0/1 transitions to the learning state.SW1 port F0/1 can generate a temporary loop.SW1 port F0/1 becomes a non-designated port.SW1 port F0/2 no longer passes BPDUs to SW4.35Refer to the exhibit. Which three options correctly identify information that could be associated with this output?(Choose three.)123Interface FastEthernet3/0/0 is subinterfaced.A non-proprietary trunking protocol is in use.The configuration is appropriate for a router-on-a-stick network design.A shutdown command has been applied to interface FastEthernet3/0/0.Interface FastEthernet3/0/0.3 is mapped to the default management VLAN.An IP address should be applied to FastEthernet3/0/0 for correct data routing.36Refer to the exhibit. R1 is configured for traditional inter-VLAN routing. R1 can ping computer 3 but cannot ping computer 1. What is a possible cause for this failure?1S1 port Fa0/11 is in the wrong VLAN.R1 does not have an active routing protocol.The IP address of computer 1 is in the wrong logical network.Router interface Fa0/0 has the wrong trunk encapsulation type configured.37Refer to the exhibit. The switches in the exhibit have VTP pruning enabled. Which VLANs will be pruned from switch SW3?1VLAN 10 and VLAN 20VLAN 1, VLAN 10, and VLAN 20VLAN 1, VLAN 1002 through 1005VLAN 1, VLAN 10, VLAN 20, VLAN 1002 through 100538Refer to the exhibit. Which two facts can be confirmed by this output? (Choose two.)45This switch shows no configuration revision errors.This switch has established two-way communication with the neighboring devices.This switch is configured to advertise its VLAN configuration to other VTP-enabled switches in the same VTP domain.This switch will drop all VTP advertisements that come from the switches that are configured in the same VTP domain.This switch will cause no disruption in the VTP domain operations if therest of the switches in the same VTP domain have a higher configuration revision number.39Refer to the exhibit. A network administrator needs to implementinter-VLAN routing on a hierarchical network. On which devices should the inter-VLAN routing be configured?2AS1 and AS2DS1 and DS2Gateway and CS1Gateway, CS1, DS1, and DS240Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?3Associate with the access point and then open a HyperTerminal session with the access point.Physically connect to the access point and then reboot the computer to launch the configuration software.From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.Modify the TCP/IP properties of the computer connected to the access point so that it exists on the same network, and then reboot your computer to establish a connection.41What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?1All VLANs will be allowed across the trunk.Only VLAN 1 will be allowed across the trunk.Only the native VLAN will be allowed across the trunk.The switches will negotiate via VTP which VLANs to allow across the trunk.42Refer to the exhibit. What will happen when frames that contain an unknown source address reach interface fa0/24?2A syslog message will be logged.Fa0/24 will become error-disabled.The incoming frames will be dropped.The security violation count will be incremented.43Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?3Cat-ACat-BCat-CCat-D44What are three benefits of a hierarchical network model? (Choose three.)136reduced contention for bandwidthreduced size of the physical layoutincreased fault tolerance of the networkelimination of the need for wiring closetselimination of the need for layer three functionalitysimplification of management and troubleshooting45Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.85. What will the router do with this packet?5The router will forward the packet out interface FastEthernet 0/1.1.The router will forward the packet out interface FastEthernet 0/1.2.The router will forward the packet out interface FastEthernet 0/1.3.The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.The router will ignore the packet because the source and destination are on the same broadcast domain.The router will drop the packet since no network that includes the source address is attached to the router.46Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit data at the same time. How do the hosts respond on the network? (Choose two.)15After the end of the jam signal, a backoff algorithm is invoked.Hosts 1 and 4 are operating full duplex so no collision will exist. The hub will block the port connected to Host 4 to prevent a collision.Hosts 1 and 4 are assigned shorter backoff values to provide them priority to access the media.If a host has data to transmit after the backoff period of that host, the host checks to determine if the line is idle before transmitting.47Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?2only hosts A and Bonly hosts A, B, and Conly hosts A, B, C, and Donly hosts A, B, C, and E48Refer to the exhibit. Hosts PC_A and PC_B send traffic simultaneously, and the frames from the transmitting stations collide. What is the last device to receive the collision?3hub HB1switch SW1router R1switch SW2router R2switch SW449Refer to the exhibit. Which two statements are true about the operation of the interfaces? (Choose two.)25Incoming traffic with VLAN ID 0 is processed by interface fa0/0.Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.Both subinterfaces remain up with line protocol up, even if fa0/0 line protocol is down.Subinterfaces use unique MAC addresses by adding the 802.1Q VLAN ID to the hardware address.Traffic inbound on this router is processed by different subinterfaces, depending on the VLAN from which the traffic originated.50Which identifier is used to keep track of frames that are destined for a particular wireless client?2AIDSSIDBSSIDESSID51Refer to the exhibit. On the basis of the configuration shown, how will an Ethernet frame on port GigabitEthernet0/1 be modified?3802.1Q encapsulation prepends a 4-byte tag field in front of the original Ethernet frame and recomputes the frame check sequence (FCS) on the modified frame.802.1Q encapsulation inserts a 4-byte tag field into the original Ethernet frame between the source address and type/length fields and recomputes the frame check sequence (FCS) on the modified frame.802.1Q encapsulation prepends an 802.1p field in front of the original Ethernet frame and recomputes the frame check sequence (FCS) on the modified frame.802.1Q encapsulation inserts an 802.1p field into the original Ethernet frame between the source address and type/length fields and recomputes the frame check sequence (FCS) on the modified frame.52What two methods can be used to remove MAC address table entries from a switch? (Choose two.)13Power cycle the switch to clear all dynamically learned addresses.The clear switching-tables command will remove statically configured entries.The clear mac-address-table command will remove statically and dynamically configured table entries.The erase flash command will clear all statically configured table entries.Statically configured MAC addresses will automatically be removed from the address table 300 minutes after the last activity on a switch port.53What happens when the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines?4A new RSA key pair is created.The switch defaults to allowing Telnet connections only.The switch is no longer able to make SSH connections as an SSH client.The switch allows remote connections only after a new RSA key pair is generated.Date Exam was Taken: 05/17/2008。

思科ccna第3学期_final_第1套_V_4

思科ccna第3学期_final_第1套_V_4

What is the purpose of VLAN trunking?It improves network performance by reducing broadcast traffic.It selects the best path to transmit data in a switched network.It carries the traffic of multiple VLANs through a single link.It avoids spanning tree loops in a switched network.Refer to the exhibit. Both switches are configured with default bridge priority. Which port will act as the STP root port if all links are oper Fa0/1 interface of S1Fa0/2 interface of S1Fa0/1 interface of S2Fa0/2 interface of S2Refer to the exhibit. The network administrator wants to configure Switch1 to allow SSH connections and prohibit Telnet conne ctions. How sh administrator change the displayed configuration to satisfy the requirement?Use SSH version 1.Reconfigure the RSA key.Configure SSH on a different line.Modify the transport input command.Refer to the exhibit. Which two facts about STP can be determined from the displayed output? (Choose two.)Switch S1 has the lowest configured STP priority in the network.Switch S1 is configured as the root bridge for VLAN1.Fa0/21 is the root port of switch S1.Fa0/22 is the redundant link.Fa0/24 is considered the best path to the root bridge.Which statement correctly describes the spanning-tree path cost?It is calculated based on the total number of switches connected in a loop.It is calculated based on the utilization of all the switches along a given path.It is calculated based on the bridge priority of the switches along a given path.It is calculated based on the sum of the port cost value, determined by link speed, for each switch port along a given path What are two requirements for configuring inter-VLAN routing using the router-on-a-stick model? (Choose two.)Each subinterface should be configured with its own IP address, subnet mask, and unique VLAN assignment.The physical interface of the router must be connected to a trunk link on the adjacent switch.The number of physical interfaces on the router should match the number of VLANs.Different static VLANs should be assigned to different interfaces of the router.The router should be configured as the VTP serverRefer to the exhibit. Which two options correctly describe the router configuration that is shown? (Choose two.)Routing between the 192.168.1.0 and 192.168.3.0 networks will not succeed until a routing protocol is configured on the route r.VLANs have not been appropriately configured on the router subinterfaces.The configuration is appropriate for a router-on-a-stick network design.Trunking has been appropriately configured on the router subinterfaces.An IP address should be applied to interface Fa0/1 for routing to occurRefer to the exhibit. What is true of the configuration of switch S1?A Cisco proprietary protocol is in use for ports Fa0/1 and Fa0/3.Switch ports Fa0/1 and Fa0/3 have been configured with the switchport mode access command.Untagged frames received on ports Fa0/1 and Fa0/3 will be placed on VLAN 1.Switch ports Fa0/1 and Fa0/3 are configured to carry data from multiple VLANs.Refer to the exhibit. Switches S2 and S3 are properly connected using an ethernet cable. A network administrator has configured both s is unable to propagate VLANs to S2. What could be the reason for this?The VTP configuration revision is different on both switches.The VTP domains are different on both switches.VTP pruning is disabled.VTP v2 is disabled.Refer to the exhibit. Router R1 is properly configured for router on a stick inter-VLAN routing, but PC1 is unable to ping PC2. What needs problem?Rename VLAN1.Connect one more port of S1 to R1.Configure the Fa0/1 port of S1 as a trunk port.Move the Fa0/0 interface of R1 to another VLAN.Refer to the exhibit. Router R-West and switch S-West1 are connected via a single ethernet cable between the router interface fa0/0 an fa0/1. The router and switch have been configured with the commands that are displayed in the exhib it. The network administrator ente trunk command and receives the output as shown. What is the cause of the "not-trunking" status for switch port Fa0/1?The trunk is established, but no VLANs have been configured to use it.The router is missing the dynamic trunking protocol statements necessary to form a trunk.Because the router does not support Dynamic Trunking Protocol, the trunk has not been established.The router, the switch, or both must be configured with the dynamic desirable option for Dynamic Trunking Protocol to establish aRefer to the exhibit. All trunk links are operational and all VLANs are allowed on all trunk links. An ARP request is sent by computer 5. W receive this message?only computer 4computer 3 and RTR-Acomputer 4 and RTR-Acomputer 1, computer 2, computer 4, and RTR-Acomputer 1, computer 2, computer 3, computer 4, and RTR-Aall of the computers and the routerRefer to the exhibit. A network administrator enters the displayed commands to configure VLAN 30. What is the result of running these commVLAN 30 will be added to S1, S2, and S3, but not to S4.VLAN 30 will be pruned from the VLAN database of S3.VLAN 30 will be added to the VLAN database of S3 but will not be propagated to S4, S2 or S1.VLAN 30 will not be added to the VLAN database of S3 and an error message will be displayedRefer to the exhibit. VTP pruning is enabled in the VTP domain that is shown. How will switch ST-1 handle Layer 2 broadcast traf host A on switch ST-C?It will be dropped.It will be forwarded out port Fa0/5 only.It will be forwarded out ports Fa0/5 and Fa0/10.It will be forwarded out ports Fa0/5, Fa0/10, and Fa0/15Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit. However, hosts A and D other. What is the most likely cause of this problem?The link between the switches is up but not trunked.The Fa0/11 interface of Switch1 is not configured as a trunk.Hosts A and D are configured with IP addresses from different subnets.VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.After unpacking a new Linksys WRT300N wireless multifunction device, a user needs to change the default administrator passwor d and make other configuration changes. What must the user do to access the device in order to make these changes?Use a wireless client to associate with the WRT300N and then open a HyperTerminal session with the device.Establish a wired connection with the device and then reboot the attached computer to launch the configuration software.Establish a wired connection from a computer in the same IP subnet as the WRT300N and enter the default IP address of the device into a web browser on the computer.Modify the TCP/IP properties of the computer that is connected to the WRT300N so that the computer and the WRT300N exist on the same network. Then reboot the computer to establish a connection.Refer to the exhibit. How is port Gi1/1 on SWT-A functioning in the spanning-tree topology?It is sending and receiving data frames.It is receiving BPDUs, but not sending data frames.It is participating in the election process by forwarding the BPDUs it receives.It is receiving BPDUs and populating the MAC address table, but not sending data.Refer to the exhibit. The switches have been configured as shown. The hosts that are connected to switch 101-2FL are not able to communicate with the hosts in their corresponding VLANs that are connected to switch 101-3FL. What should be done to fix the problem?Configure port Fa0/2 on switch 101-3FL as a static trunk link.Introduce a Layer 3 device or a switch with Layer 3 capability into the topology.Utilize the switchport trunk allowed vlan all command on switch 101-3FL to permit the VLAN traffic.Apply IP addresses that are in the same subnet to the interfaces that are used to connect switches 101-2FL and 101-3FLAfter listening for the presence of a signal on the network media, hosts A and C transmit data at the same time. In what two ways do the hosts respond to this situation? (Choose two.)The hosts transmit a jam signal to ensure that all hosts on the network are aware that a collision has occured.Because they are operating in full-duplex mode, the hosts resume listening for traffic in preparation for sending future messages.Because the hub will temporarily block traffic from one of the hosts, that host will be allowed to transmit once the wire is clear.Hosts A and C are assigned shorter backoff values to provide them priority to access the media for retransmission.After the backoff period of a host, the host checks to determine if the line is idle before retransmittingRefer to the exhibit. Hosts PC_A and PC_B send traffic simultaneously, and the frames from the transmitting stations collide.What is the last device to receive the collision?hub HB1switch SW1router R1switch SW2router R2switch SW4Refer to the exhibit. Switch SW2 has been newly purchased and added to the network. What configuration should be applied to SW2 so thatit participates in the same VTP domain as switch SW1, receives VLAN information from SW1, and synchronizes VLAN information?Disable VTP pruning on SW2.Configure SW2 in VTP transparent mode.Configure SW2 with the VTP domain password.Configure SW2 as a VTP server with a higher revision numberWhen configuring a router to act as an SSH server, what should be configured before issuing the crypto key generate rsacommand?the security domain namethe VTP domain namethe IP domain namethe host nameRefer to the exhibit. The switch VTY lines have been properly configured, but PC1 is unable to remotely manage the switch. How can this problem be resolved?Configure the Fa0/1 interface of the switch in trunk mode.Configure a default gateway on the switch.Configure the native VLAN on the switch.Configure the Fa0/1 interface of the switch to allow all VLANsRefer to the exhibit. A network administrator has segmented the network into two VLANs. The connected hosts can only access r esources in their own VLAN. What is the most scalable and cost effective solution to allow inter-VLAN communication in this network?Replace S1 with a router that has one FastEthernet interface for each PC.Add a second switch and divide the PCs so that each VLAN is connected to its own switch.Configure a router with two subinterfaces on one of its FastEthernet ports and connect it to S1 using a trunk link.Connect a router to a port on S1 and assign the IP address of VLAN1 to the connecting router interfaceRefer to the exhibit. An administrator documented the output of a CAM table from an Ethernet switch as shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit?discard the frameforward the frame out port 2forward the frame out port 3forward the frame out all portsforward the frame out all ports except port 3add station 00-00-3D-1F-11-05 to port 2 in the forwarding tableWhich statement regarding the service password-encryption command is true?The service password-encryption command is entered at the privileged EXEC mode prompt.The service password-encryption command encrypts only passwords for the console and VTY ports.The service password-encryption command encrypts all previously unencrypted passwords in the running configuration.To see the passwords encrypted by the service password-encryption command, enter the no servicepassword-encryption commandWhich statement correctly describes the function of a Layer 2 switch?It performs switching and filtering based on the destination network layer address.It automatically uses STP to prevent switching loops in redundant topologies.It uses VTP to allow data from multiple VLANs to travel across a single link.It routes packets between different LAN segmentsWhich three statements are correct concerning the default configuration of a new switch? (Choose three.)It is configured in VTP server mode.STP is automatically enabled.The first VTY line is automatically configured to allow remote connections.VLAN1 is configured with a management IP address.All switch ports are assigned to VLAN1.The enable password is configured as ciscoRefer to the exhibit. How will switch S2 manage traffic coming from host PC1?S2 will drop the traffic, unless it is management traffic.S2 will tag the frame with VLAN ID 99 when it forwards it over the trunk link.S2 will leave the traffic untagged when it forwards it over a trunk link.S2 will tag the traffic with the highest VLAN ID value when it forwards it over the trunk link.Refer to the exhibit. The network administrator needs to remove the east-hosts VLAN and use the switch port from that VLAN in one of the existing VLANs. Which two sets of commands should be used when completely removing VLAN 2 from S1-Central while leaving the switch and all its interfaces operational? (Choose two.)S1-Central>enableS1-Central# reloadS1-Central>enableS1-Central# erase flash:S1-Central>enableS1-Central# delete flash:vlan.datS1-Central>enableS1-Central# configure terminalS1-Central(config)# no vlan 2S1-Central>enableS1-Central# configure terminalS1-Central(config-if)# interface fastethernet 0/1 S1-Central(config-if)# switchport access vlan 3Refer to the exhibit. The network administrator configures both switches as displayed. However, host C is unable to ping host D and host E is unable to ping host F. What action should the administrator take to enable this communication?Include a router in the topology.Associate hosts A and B with VLAN 10 instead of VLAN 1.Remove the native VLAN from the trunk.Configure one trunk port in the dynamic desirable mode.Add the switchport nonegotiate command to the configuration of S2Which two statements are correct about wireless infrastructure components? (Choose two.)An AP converts the TCP/IP data packets from their 802.11 frame encapsulation format to the 802.3 Ethernetframe format on the wired Ethernet network.A wireless AP does not require any physical connection to allow wireless clients to access the Internet.An AP is a layer 2 device, similar to a switch, that provides dedicated bandwidth to each connected wireless host.Collisions do not occur between wireless NICs and APs.The wireless router performs the roles of AP and router.Refer to the exhibit. The switches are configured for VTP as shown. Which two statements correctly describe the operation of these switches? (Choose two.)A new VLAN can be added to Switch1 and that information will be added only to Switch2.A new VLAN can be added to Switch1 and that information will be added to Switch2 and Switch4.An existing VLAN can be deleted from Switch4 and that VLAN will be deleted from Switch1 and Switch2.An existing VLAN can be deleted from Switch2 and that VLAN will be deleted from Switch1 and Switch4.A new VLAN can be added to Switch4 and that information will be added to Switch1, Switch2, and Switch3.A new VLAN can be added to Switch3 and that information will be added to Switch1, Switch2, and Switch4A new switch is to be added to an exis ting network in a remote office. The network administrator does not wantthe technicians in the remote office to be able to add new VLANs to the switch, but the switch should receive VLAN updates from the VTP domain. Which two steps must be performed to configure VTP on the new switch to meet these conditions? (Choose two.)Configure an IP address on the new switch.Configure the existing VTP domain name on the new switch.Configure all ports of both switches to access mode.Configure the new switch as a VTP client.Enable VTP pruningWhich two statements describe Spanning Tree Protocol? (Choose two.)It is only used at Layer 2.It is configured on routers.It eliminates Layer 2 loops in network topologies.It limits the number of valid MAC addresses allowed on a port.It allows VLAN information to propagate to other switches in the network.Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?Cat-ACat-BCat-CCat-DRefer to the exhibit. What three statements describe why Host1 and Host2 are unable to communicate? (Choose three.)The switch ports are on different VLANs.The switch IP address is on the wrong subnet.The hosts are configured on different logical networks.A router is required to forward traffic between Host1 and Host2.The VLAN port assignments must be contiguous for each VLAN.The host default gateway addresses must be on the same logical network.Refer to the exhibit. A new host needs to be connected to VLAN 3. Which IP address should be assigned to this new host?192.168.1.22 /28192.168.1.31 /28192.168.1.32 /28192.168.1.52 /28192.168.1.63 /28Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161. What will the router do with this packet?The router will drop the packet.The router will forward the packet out interface FastEthernet 0/1.1.The router will forward the packet out interface FastEthernet 0/1.2.The router will forward the packet out interface FastEthernet 0/1.3.The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3Refer to the exhibit. On which of the devices in this network should routing between VLANs take place?the core layer devicesthe access layer devicesthe distribution layer devicesthe core and distribution layer devicesRefer to the exhibit. The teacher host is connected to port Fa0/7 on switch STW. A student has decided to share access to the Internet by attaching a hub and laptop to STW as shown. What will be the result of the student making this connection?The Fa0/7 port of STW will be shutdown.The student will gain full access to the Internet.Both the teacher and student will be able to receive data but only the teacher will be able to send.The frames from the laptop will be dropped, but the teacher host will maintain connectivity with the network.Refer to the exhibit. In what two ways will the router handle VLAN traffic that is received on the trunk? (Choose two.)Traffic to VLAN 1 received by the router interface Fa0/0 will be dropped by the router.Because interface Fa0/0 requires an IP address, the router will not be able to route between the VLANs.Packets that are received from network 192.168.20.0 /24 will be handled by subinterface Fa0/0.20.The router will use subinterface MAC addresses to identify the VLAN traffic that is received on the physical interface.The router will continue to process traffic from the attached VLANs even if the physical interface goes downRefer to the exhibit. Switch SW-A is to be used as a temporary replacement for another switch in the VTP Studentdomain. What two pieces of information are indicated from the exhibited output? (Choose two.)The other switches in the domain can be running either VTP version 1 or 2.There is a risk that the switch may cause incorrect VLAN information to be sent through the domain.VTP will block frame forwarding on at least one redundant trunk port that is configured on this switch.VLAN configuration changes made on this switch will be sent to other devices in the VTP domain.This switch will update its VLAN configuration when VLAN changes are made on a VTP server in the same domainWhat are three benefits of employing a hierarchical network design? (Choose three.)Hierarchically designed networks can more easily be expanded to suit future needs.Hierarchical design models enhance existing bandwidth through the use of link aggregation.The hierarchical model allows for specialized functionality at each layer, simplifying devicemanagement.Use of a hierarchical design allows replacement of redundant devices with high-capacity network equipment.A hierarchical design uses firewalls instead of complicated port-based and distribution layer securitypolicies.The hierarchical model allows the use of high-performance switches at all design layers, thus allowing for a fully-meshed topologyRefer to the exhibit. Hosts A and B attempt to transmit a frame at the same time and a collision occurs. When will host D be able to transmit?immediatelyafter sending its jam signalafter host A and host B have completed transmissionafter the jam signal clears and its backoff delay expiresWhat provides an authentication mechanism for 802.11-based wireless networks?DSSSOFDMSSIDWPARefer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?WEP identifies the wireless LAN.WEP allows the access point to inform clients of its presence.WEP translates IP addresses into easy-to-remember domain names.WEP encrypts data between the wireless client and the access point.WEP ensures that only authenticated users are allowed access to the WLAN.WEP translates an internal address or group of addresses into an outside, public address.Refer to the exhibit. SW-T has been configured with a single trunking interface. Which VLANs will be allowed across the trunk?Only VLAN 1 will be allowed across the trunk.All configured VLANs will be allowed across the trunk.Only the native VLAN will be allowed across the trunk.Only the the management and native VLANs will be allowed across the trunk.Only VLANs that are configured on the VTP server in the dom ain will be allowed across the trunkRefer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?This entry can only be removed from the MAC address table by a network administrator.When forwarding a frame to the device with address 0060.5c5b.cd23, the switch does not have to perform a lookup to determine the final destination port.Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18.The switch learned this MAC address from the source address in a frame received on Fa0/18.Refer to the exhibit. What is the purpose of the configuration commands that are shown?to activate port Fa0/10to make the port a member of VLAN 30to activate port security on port Fa0/10to add VLAN 30 to the trunk that is connected to port Fa0/10。

CCNA思科第三学期ESwitchingExam正确答案

CCNA思科第三学期ESwitchingExam正确答案

单臂路由器VLAN间路由有哪三项特征?(选择三项。

)需要使用VTP需要使用子接口减少广播域的数量使用过多VLAN时会影响性能需要在路由器和至少一台交换机之间采用接入链路比用于VLAN间路由的其它方法更加经济规定至少要在路由器和交换机之间使用两个交换机端口如果将允许使用中继链路的VLAN范围设置为默认值,表示允许哪些VLAN?仅管理VLAN除扩展范围VLAN之外的所有VLAN除VLAN1和VLAN1002-1005之外的所有VLAN所有的VLAN请参见图示。

哪一个口令可让管理员进入特权执行模式?c isco1c isco2c isco3c isco请参见图示。

假设所有交换机的网桥优先级值都那么哪台交换机将当选为生成树拓扑的根桥?C at-AC at-BC at-CC at-D请参见图示。

最近安装了SW1用于取代集线器。

主机1和主机4同时设备会如何处理此事件?(选择两项。

)当冲突发生时,会调用回退算法。

由于主机1和主机4都连接到交换机,因此不会发生冲突。

交换机将根据交换机MAC地址表中的信息将数据转发到相应的端口。

主机2和主机3会获分配更短的回退值,从而获得访问介质的优先权。

为了防止再发生冲突,交换机会在设定时间内阻塞与主机2、主机3和主机4连接的端口。

请参见图示。

网络管理员需要删除并将属于该VLAN的交换机端口用到一个现有VLAN中。

如果要从S1-Central完全删除VLAN2,同时保证交换机及其所有接口工作正两组命令?(选择两项。

)S1-Central>enable S1-Central#reloadS1-Central>enable S1-Central#eraseflash:S1-Central>enable S1-Central#deleteflash:S1-Central>enable S1-Central#configureterminal S1-Central(config)#novlan2S1-Central>enable S1-Central#configureterminal S1-Central(config-if)#interfacefastethernet0/1S1-Central(config-if)#switch请参见图示。

final exam 2 CCNA 第三学期(免费下载)

final exam 2 CCNA 第三学期(免费下载)

请参见图示。

将图中列出的命令输入路由器R1 和交换机S1 后,PC1 和PC2 彼此无法ping 通。

网络管理员输入show interfaces trunk命令后获得了图中所示的结果。

问题很可能出在哪里?路由器上未配置路由协议。

已建立中继链路,但未将任何VLAN 配置为使用该中继链路。

由于交换机端口未配置为中继,因此未建立中继链路。

必须在交换机或路由器上或同时在这两台设备上配置dynamic desirable选项,动态中继协议才能建立中继链路。

2请参见图示。

哪一个口令可让管理员进入特权执行模式?Bcisco1cisco2cisco3Cisco3下列关于service password-encryption命令的说法中哪项正确?cservice password-encryption命令应在特权执行模式提示符下输入。

service password-encryption命令只加密控制台与VTY 端口的口令。

service password-encryption命令对运行配置中先前未加密的所有口令进行加密。

若要查看通过service password-encryption命令加密的口令,可输入no service password-encryption命令。

4请参见图示。

RTB 被配置为进行传统的VLAN 间路由。

RTB 可以ping 通计算机 A 但无法ping 通计算机B。

此故障的原因可能是什么?Fa0/11 端口处于错误的VLAN 中。

RTB 上没有有效的路由协议。

计算机 B 的IP 地址在错误的逻辑网络中。

路由器的Fa0/1 接口上配置了错误的中继封装类型。

5请参见图示。

最近安装了SW1 用于取代集线器。

主机1 和主机 4 同时传送数据。

网络设备会如何处理此事件?(选择两当冲突发生时,会调用回退算法。

A D由于主机 1 和主机4 都连接到交换机,因此不会发生冲突。

交换机将根据交换机MAC 地址表中的信息将数据转发到相应的端口。

ccna_第三学期期末考试

ccna_第三学期期末考试

1.VLAN 中继有何用途?通过减少广播流量提高网络性能。

选择在交换网络中传输数据的最佳路径。

通过一条链路传送多个VLAN 的流量。

避免交换网络中出现生成树环路。

请参见图示。

两台交换机都配置有默认的网桥优先级。

如果所有链路都在相同的带宽下运行,哪个端口将作为STP 根端口?S1 的Fa0/1 接口S1 的Fa0/2 接口S2 的Fa0/1 接口S2 的Fa0/2 接口请参见图示。

从图中显示的输出可以得到有关STP 的哪两项结论?(选择两项。

)交换机S1 所配置的STP 优先级值在该网络中最低。

交换机S1 被配置为VLAN1 的根桥。

Fa0/21 是交换机S1 的根端口。

Fa0/22 是冗余链路。

Fa0/24 被视为通往根桥的最佳路径。

下列哪种说法正确描述了生成树路径开销?根据环路中连接的交换机总数计算。

根据给定路径上所有交换机的使用率计算。

根据给定路径上交换机的网桥优先级计算。

根据给定路径上每个交换机端口的端口开销值(由端口速度决定)的总和计算。

使用单臂路由器模型配置VLAN 间路由有哪两项要求?(选择两项。

)每个子接口都应配置有自己的IP 地址、子网掩码和唯一的VLAN 分配。

路由器的物理接口必须连接到相邻交换机上的中继链路。

路由器的物理接口数量应该与VLAN 数量匹配。

应该将不同的静态VLAN 分配给路由器的不同接口。

路由器应该配置为VTP 服务器。

请参见图示。

下列哪两项正确描述了图中所示的路由器配置。

(选择两项。

)在路由器上配置路由协议之前,网络192.168.1.0 与网络192.168.3.0 之间无法成功路由。

路由器子接口上未正确配置VLAN。

该配置适用于单臂路由器网络设计。

路由器子接口上未正确配置中继。

应该为接口Fa0/1 分配IP 地址,否则无法进行路由请参见图示。

下列有关交换机S1 配置的说法中哪项正确?端口Fa0/1 和Fa0/3 使用的是Cisco 专有协议。

已使用switchport mode access命令配置交换机的Fa0/1 和Fa0/3 端口。

CCNA 4 - Final Exam (B)

CCNA 4 - Final Exam (B)

CCNA 4 - Final Exam (B)Posted by beotron at 9:23 PM1. Identify the factors that contribute to congestion on an Ethernet LAN. (Choose three.)• improper placement of enterprise level servers• addition of hosts to a physical segment• replacement of hubs with workgroup switches• increasing use of bandwidth intensive network applications• migration to full-duplex Ethernet within the LAN2. Which of the following are examples of TCP/IP application layer protocols? (Choose three.)• a terminal emulation protocol that supports remote console connections with various network devices • a protocol created by IBM that makes it easier for mainframes to connect t o remote offices• a protocol responsible for transporting electronic mail on TCP/IP networks and the Internet• a protocol that controls the rate at which data is sent to another computer• a protocol that exchanges network management information between a network device and a management console3. Which of the following eliminates switching loops?• hold-down timers• poison reverse• spanning tree protocol• time to live• split horizon protocol4. The show cdp neighbors command is a very useful network troubleshooting tool. Using the output in the graphic, select the statements that are true. (Choose two.)• CDP operates at the network layer of the OSI model.• The output of this command displays information about directly connected Cisco devices only.• The switch is attached to the SanJose1 FastEthernet0/21 interface.• SanJose1 is running CDP version 12.0.• SanJose1 has two fully operational, cdp-enabled Cisco switches directly connected to it.• SanJose2 is a 2600 series router running several routed protocols5. A network administrator can ping the Denver router, but gets a ‘Password Required but None Set’ message when trying to connect remotely via Telnet. Which command sequence must be applied to the Denver router to allow remote access?• Router(c onfig)# line console 0Router(config-line)# loginRouter(config-line)# password cisco• Router(config)# line vty 0 4Router(config-line)# loginRouter(config-line)# password cisco• Router(config)# line virtual terminalRouter(config-line)# enable loginRouter(config-line)# password cisco• Router(config)# line vty 0 4Router(config-line)# enable secretRouter(config-line)# password ciscoRouter(config)# enable secret ciscoRouter(config)# enable cisco6. Which of the following is associated with link-state routing protocols?• low processor overhead• poison reverse• routing loops• split horizon• shortest-path first calculations7. A router does not load its configuration after a power failure. After running the showstartup-configuration command, the adminstrator finds that the original configuration is intact. What is the cause of this problem?• The configuration register is set for 0×2100.• The configuration register is set for 0×2101.• The configuration register is set for 0×2102.• The configurati on register is set for 0×2142.• Boot system commands are not configured.• Flash memory is empty causing the router to bypass the configuration in NVRAM• Nederst på formularen8. Which commands are used to verify the content and placement of access control lists? (Choose three.) • show ip interface• show ip route• show processes• show running-config• show cdp neighbor• show access-lists9. Which of the following are required when creating a standard access control list? (Choose two.)• destination ad dress and wildcard mask• source address and wildcard mask• subnet mask and wildcard mask• access list number between 100 and 199 or 2000 and 2699• access list number between 1 and 99 or 1300 to 199910. Which of the following are keywords that can be used in an access control list to replace a dotted decimal wildcard mask? (Choose two.)• most• host• all• any• some• sum11. Refer to the diagram. All ports on Switch A are in the Sales VLAN and all ports on Switch B are in the Accounting VLAN. How many broadcast domains and how many collision domains are shown? (Choose two).• 3 collision domains• 3 broadcast domains• 5 broadcast domains• 9 collision domains• 10 collision domains• 13 collision domains12. Refer to the graphic. Using the most efficient IP addressing scheme and VLSM, which address can be configured on one of the serial interfaces?• 192.168.16.63/27• 192.168.16.158/27• 192.168.16.192/27• 192.168.16.113/30• 192.168.16.145/30• 192.168.16.193/3013. What is the purpose of the Spanning Tree Protocol (STP)?• prevents Layer 2 loops• prevents routing loops on a router• creates smaller collision domains• creates smaller broadcast domains• allows Cisco devices to exchange routing table updates14. What is the purpose of a loopback address when using the OSPF routing protocol?• activates the OSPF neighboring process• ensures a persistent router ID for the OSPF process• provides a backdoor for connectivity during the convergence process• streamlines and speeds up the convergence pr ocess15. Which statement is true regarding states of the IEEE 802.1d Spanning Tree Protocol?• Ports are manually configured to be in the forwarding state.• Ports listen and learn before going into the forwarding state.• Ports must be blocked before the y can be placed in the disabled state.• It takes 15 seconds for a port to go from blocking to forwarding16. Which sequence of commands is used to configure a loopback address on a router?• Router1(config)# interface loopback 1Router1(config-if)# ip address 192.168.1.1Router1(config)# interface serial 0/0• Router1(config-if)# loopback 1Router1(config-if)# ip address 192.168.1.1Router1(config)# interface serial 0/0• Router1(config-if)# loopback 1Router1(config-if)# ip address 192.168.1.1 255.255.255.0• Router1(config)# interface loopback 1Router1(config-if)# ip address 192.168.1.1 255.255.255.25517. Which routing protocols are classful and do not support VLSM? (Choose two.)• EIGRP• OSPF• RIP v1• RIP v2• IGRP18. Refer to the graphic. Two switches are connected together through a trunk port. SW2 displays the message shown. Which of the following will solve the duplex mismatch?• SW1(config)# interface fastethernet 0/1SW1(config-if)# duplex full• SW1(config)# interface fastethernet 0/1SW1(config-if)# full-duplex• SW2(config)# interface fastethernet 0/1SW2(config-if)# duplex full• SW2(config)# interface fastethernet 0/1SW2(config-if)# full-duplex19. Refer to the graphic. Two routers have been configured to use EIGRP. Packets are not being forwarded between the two routers. What could be the problem?• EIGRP does not support VLSM.• The routers were not configured to monitor neighbor adjacency changes.• The default bandwidth was used on the routers.• An incorrect IP address was configured on a router interface.20. According to the the provided router output, which of the following statements is true regarding PPP operation?• Only the link-establishment phase completed successfully.• Only the network-layer phase completed successfully.• Neither the link-establishment phase nor the the network-layer phase completed successfully.• Both the link-establishment and network-layer phase completed successfully21. Frame Relay is configured over a point-to-point connection between two routers. The output of the show frame-relay pvc command indicates that the status of this PVC is inactive. Which of the following devices could be the source of the problem? (Choose two.)• local router• local Frame Relay switch• remote router• remote Frame Relay switch• R3 has the following configuration:• R3# show running-config• –some output text omitted–• interface serial0/0• bandwidth 128• ip address 192.168.11.2 255.255.255.0• encapsulation frame-relay• frame-relay map ip 192.168.11.2 30 broadcast22. After the command R3# debug frame-relay packet is executed, a ping is issued from R3 to R1 but is unsuccessful. Based on the output of the debug command shown in the graphic and the router configuration, what might be problem?• No clock rate assigned.• There is an incorrect DLCI number in the map statement.• An incorrect IP address exists in the map statement.• The encapsulation command is missing the broadcast keywor d23. Which statements are true regarding the Frame Relay LMI? (Choose three.)• The LMI provides a virtual circuit (VC) status mechanism.• The LMI type must always be manually configured.• The available LMI types are NI1, DMS100 and 5ESS.• The LMI types supported by Cisco routers are CISCO and IETF.• The LMI type configured on the router must match the one used on the Frame Relay switch.• The LMI uses reserved DLCIs to exchange messages between the DTE and DCE24. Which statement describes the process that occurs in Network Address Translation (NAT) overloading?• Multiple private IP addresses are mapped to one public IP address.• The number of usable addresses assigned to a company is divided into smaller manageable groups.• A pool of IP addres ses are mapped to one or more MAC addresses.• The router acts as a DHCP server and assigns multiple public IP addresses for each private IP address configured25. Which two statements are true about the committed information rate on a Frame Relay link? (Choose two.)• The sum of the CIRs for all PVCs must be less than the port speed.• The sum of the CIRs for all PVCs must equal the port speed.• The sum of the CIRs for all PVCs can be greater than the port speed.• The DE bit will be set on frames that ar e transmitted in excess of the CIR.• Frames that are transmitted at greater than the CIR will be discarded at the source.• It is impossible to transmit frames at a rate in excess of the CIR26. Which of the following commands would be used to troubleshoot the processing of call control functions such as call setup, signaling, and termination?• show interface bri0/0• show isdn active• debug isdn q921• debug isdn q931• debug ppp negotiation• debug ppp authentication27. Which of the following statements are true regarding PPP? (Choose three.)• PPP can use synchronous and asynchronous physical media.• PPP can only be used between two Cisco devices.• PPP carries packets from several network layer protocols in LCPs.• PPP uses LCPs to establish, config ure, and test the data link connection.• PPP uses LCPs to agree on format options such as authentication, compression, and error detection28. A network administrator is evaluating authentication protocols for a PPP link. Which of the following reasons might lead to the selection of CHAP over PAP as the authentication protocol? (Choose three.) • establishes identities with a two-way handshake• uses a three-way authentication periodically during the session to reconfirm identities• control by the remote h ost of the frequency and timing of login events• transmits login information in encrypted format• uses an unpredictable variable challenge value to prevent playback attacks• makes authorized network administrator intervention a requirement to establish each session29. Why are static routes often used with ISDN DDR?• They are more stable than dynamic routing protocols.• They are more accurate than dynamic routing protocols because they are put in by a network administrator.• They are easier to modify when a faster technology is installed.• They prevent the unnecessary activation of the link30. Assuming that four bits have been borrowed to make subnets, identify the subnet network addresses. (Choose three.)• 192.168.14.8• 192.168.14.16• 192.168.14.24• 192.168.14.32• 192.168.14.148• 192.168.14.20831. A switch can be configured for three different forwarding modes based on how much of a frame is received before the forwarding process begins. Each of the numbered arrows in the accompanying graphic signifies the point in a frame where a particular forwarding mode will begin. Which one of the following groups reflects the sequence of forwarding modes signified by the numbered arrows?• 1) fast forward• 2) fragment free• 3) store-and-forward• 1) sto re-and-forward2) fragment free3) fast forward• 1) fragment free2) fast forward3) store-and-forward• 1) fast forward2) store-and-forward3) fragment free32. Which of the following commands will display a communication message on a router before the router prompt is shown?• banner motd * Property of TLC. UNAUTHORIZED USERS WILL BE PROSECUTED TO THE FULL EXTENT OF THE LAW. *• message Property of TLC. UNAUTHORIZED USERS WILL BE PROSECUTED TO THE FULL EXTENT OF THE LAW.• banner * Property of TLC. UNAU THORIZED USERS WILL BE PROSECUTED TO THE FULL EXTENT OF THE LAW. *• hostname (Property of TLC. UNAUTHORIZED USERS WILL BE PROSECUTED TO THE FULL EXTENT OF THE LAW.)• Øverst på formularen33. A router needs to be added to OSPF area 0. Which commands should be used to enable OSPF on the router? (Choose two.)• RouterA(config)# router ospf• RouterA(config)# router ospf 1• RouterA(config-router)# network 192.168.2.0 0.0.0.255 0• RouterA(config-router)# network 192.168.2.0 0.0.0.255 area 0• RouterA(config-router)# network 192.168.2.0 255.255.255.0 034. Refer to the graphic. Which of the following commands will configure router A for OSPF?• router ospf 1network 192.168.10.0• router ospf 1network 192.168.10.64 0.0.0.63 area 0network 192.168.10.192 0.0.0.3 area 0• router ospf 1network 192.168.10.64 255.255.255.192network 192.168.10.192 255.255.255.252• router ospf 1network 192.168.10.0 area 035. Which of the following protocols would exchange information between routers to share network addresses and their metrics?• TCP• RIP• CSMA/CD• Ethernet36. Which ISDN device can be directly connected to a two-wire local loop in a North American city?• a router with a serial interface• a router with an S/T interface• a router with a U interface• an ISDN terminal adapter37. The output of the show ip interfaces brief command indicates that Serial0 is up but the line protocol is down. Which of the following are possible causes for the line protocol being in the down state? (Choose two.)• The clock rate is not set on the DTE.• An incorrect default gateway is set on the router.• A network is missing from the routing protocol configuration.• The encapsulation on the Serial0 interface is incorrect.• Keepalives are not being sent by the remote device38. Which of the following is a characteristics of TCP? (Choose two.)• data transport reliability• best path determination• establishing, maintaining, and terminating virtual circuits• encapsulation of packets in a data frame with source and destination MAC addresses• best-effort datagram delivery39. Which statement is true regarding the command ip route 192.168.7.24 255.255.255.248 192.168.7.9? (Choose two.)• A packet destined for host 192.168.7.30 will be forwarded to address 192.168.7.9.• 192.168.7.9 i s the destination network for this route.• 192.168.7.24 is the next-hop router in this command.• This command is issued from the interface configuration mode.• This command is used to define a static route40. Which of the following application layer protocols use TCP? (Choose three.)• SMTP• FTP• SNMP• HTTP• TFTP• DHCP41. Which terms refer to Frame Relay congestion management mechanisms? (Choose three.)• BECN• DLCI• DE• FECN• LMI• Inverse ARP42. Which of the following router commands will verify that a path exists to a destination network?• Router# show ip interfaces brief• Router# show ip route• Router# show cdp neighbors• Router# show running-config• Router# show protocols43. When EIGRP is configured on a router, which table of DUAL information is used to calculate the best route to each destination router?• router table• topology table• DUAL table• CAM table• ARP table44. Refer to the graphic. Routers A and B have EIGRP configured and automatic summarization has been disabled on both routers. Which of the following commands is used on router A to summarize the attached routes, and to which interface is this command applied? (Choose two)• ip summary-address eigrp 1 192.168.10.64 255.255.255.192• ip area-range eigrp 1 192.168.10.80 255.255.255.224• summary-address 192.168.10.80 0.0.0.31• ip summary-address eigrp 1 192.168.10.64 0.0.0.63• serial interface on router A• serial interface on router B45. A router with two LAN interfaces, two WAN interfaces, and two loopback interfaces configured is operating with OSPF as its routing protocol. What is used by the OSPF process to assign the router ID? • the IP address of the interface configured with priority 0• the OSPF area ID configured on the interface with the highest IP addres s• the loopback with the highest IP address configured• the highest IP address on the LAN interfaces• the highest IP address configured on the WAN interfaces46. Given the IP address and subnet mask of 172.16.134.56 255.255.255.224, on which subnetwork does this address reside?• 172.0.0.0• 172.16.134.0• 172.16.134.32• 172.16.134.48• 172.16.134.47• 172.16.134.6347. Which commands show when the last IGRP routing update was received? (Choose two.)• Router# show ip protocols• Router# show version• Router# show interfaces• Router# show ip updates• Router# show ip route48. When using access control lists to filter traffic, which of the following is used to track multiple sessions occurring between hosts?• IP addresses• subnet masks• port numbers• routed protocols• routing protocols• interfaces49. Given the IP address and subnet mask of 172.16.134.64 255.255.255.224, which of the following would describe this address?• This is a useable host address.• This is a broadcast address.• This is a network address.• This is not a valid address50. The company network shown in the drawing has to be subnetted. The company has leased the ClassC IP address of 200.1.2.0. Which of the following network addresses and masks would be appropriate for one of the subnetworks?• 200.1.2.96 255.255.255.192• 200.1.2.160 255.255.255.224• 200.1.2.80 255.255.255.224• 200.1.2.32 255.255.255.240。

CCNA考试流程及注意事项(很详细)

CCNA考试流程及注意事项(很详细)

CCNA考试流程及注意事项(很详细哦)希望你能仔细看完,肯定会对你有一点点帮助1,关于CCNA备考CCNA备考主要以题库为主,当然,前期的课本还有视频是必须要看的。

现在网上流传的都是确切的V31版,题库总共有400道题左右,其中选择题占385都左右,托图题占10都左右,实验题5到左右,其中有三道ACL 、EIGRP 、VTP排错是必考题。

2,关于CCNA考试CCNA考试总共1000分,825分通过,考试时间120分钟。

总共从题库中抽取50道题,45到选择,2道实验,三道必考的实验ACL EIGRP VTP排错,其中实验在考试中占很大的比例,即使你选择和托图都对,实验也对了两道,也很可能会挂,所以实验题很重要,所以三道实验最少也得对2.5道以上。

NA考试考场流程提前预约考试,确认之后考试当天提前去考场(提前去开始提前开始的,但是不能迟到),别忘了带两个有效证件,身份证是必须的,其他一个证件可以是驾照,学生证,暂住证等等。

在考场之后考场MM会拿去你的证件复印,好了之后在VUE上签名,照相等。

手续办完之后就可以近考场了,注意哦,不能携带任何东西哦。

4、问卷调查考试系统分为VUE和Prometric两种,系统不同,开始的问卷调查内容也略有不同,但是不用担心,统选B相对安全,选完一道点NEXT,一直到END。

因为B选项通常表示考生水平一般,抽取的考题也不会太难。

注意:其中有一个调查是问你是否已满18周岁,一定要选已满18周岁(YES)。

最后一个调查是问你是否同意CISCO的协议,这个一定要选“同意”,如果您选“不同意”,那么你也就不用考试了。

曾经有位仁兄选了不同意,结果题目一直没有出现,一问考场,人家解释:你连CISCO的协议都不同意,你还考什么?不用考了。

要想再考,得再交一次考试费,重新注册这门考试。

协议过后,调查问卷页面右下角点END选项,考试系统自动开始从服务器抽取题目,题目前一天已由考试中心从澳洲下载完毕,暂存于服务器中。

CCNA_第三学期__期末完整版考试

CCNA_第三学期__期末完整版考试

1CCNA 第三学期 期末While monitoring LAN traffic, a network technician notices an excessive number of broadcasts. Which two steps could be included in the processes that are needed to reduce the number of broadcasts onthe network? (Choose two.)Replace any existing hubs with switches.Add a Layer 3 device to route between networks.Subnet the existing IP network to create two networks.Increase the backbone speed by three times the current speed.Add additional switches and spread out the number of hosts evenly between them.2What advantage does cut-through switching provide?It enables QoSIt forwards frames quickly.It provides an analysis of frames.It allows reduction of traffic by using error checking to drop corrupt frames.3Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?Cat-ACat-BCat-CCat-D4W hich stackable switch feature allows for interconnection of multiple switches and will provide a cost effective solution for networks that require high bandwidth and high availability?modular line cardsspecial backplane portdedicated gigabyte line portsaggregated FastEthernet ports5Refer to the exhibit. This switch is to be added to the production network. Which two facts about VLANs and VTP operation can be confirmed by this output? (Choose two.)The network administrator will be able to configure VLANs of local significance on this switch.VLANs can only be added to the VLAN database on this switch by a VTP advertisement.All VLANs that are configured on this switch will be sent to all other switches in the same VTP domain.This switch will drop all VTP advertisements that come from switches that are configured in the same VTP domain.Adding this switch to the network will cause no disruption in the VTP domain operations if the rest of the switches in the same VTP domain have a higher configuration revision number.6Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. What should be done to fix the problem?Configure VLANs with different VLAN IDs on switch SW2.Reconfigure the trunk port on switch SW2 with static trunk configuration.Introduce a Layer 3 device or a switch with Layer 3 capability in the topology.Apply IP addresses that are in the same subnet to the interfaces used to connect SW1 and SW2.7Refer to the exhibit. A new host needs to be connected to VLAN 3. Which IP address should beassigned to this new host?192.168.1.22 /28192.168.1.31 /28192.168.1.32 /28192.168.1.52 /28192.168.1.63 /288Refer to the exhibit. SW-T has been configured with a single trunking interface. Which VLANs will be allowed across the trunk?Only VLAN 1 will be allowed across the trunk.All configured VLANs will be allowed across the trunk.Only the native VLAN will be allowed across the trunk.Only the the management and native VLANs will be allowed across the trunk.Only VLANs that are configured on the VTP server in the domain will be allowed across the trunk.9Refer to the exhibit. How will switch S2 manage traffic coming from host PC1?S2 will drop the traffic, unless it is management traffic.S2 will tag the frame with VLAN ID 99 when it forwards it over the trunk link.S2 will leave the traffic untagged when it forwards it over a trunk link.S2 will tag the traffic with the highest VLAN ID value when it forwards it over the trunk link. 10Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and host B are on the default VLAN but are not able to exchange traffic. What should be done to fix the problem?Allow all VLANs on the trunk link.Remove the native VLAN from the trunk.Include a router or switch with Layer 3 capabilities.Configure the same native VLAN on both ends of the trunk.11Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?This entry can only be removed from the MAC address table by a network administrator.When forwarding a frame to the device with address 0060.5c5b.cd23, the switch does not have to perform a lookup to determine the final destination port.Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18.The switch learned this MAC address from the source address in a frame received on Fa0/18.12W hy is MAC address filtering considered a poor choice in securing a WLAN?Available bandwidth is reduced.MAC addresses are easily spoofed.APs are more susceptible to DoS attacks.The payload encryption is easily broken.13How does a switch that is configured for 802.1Q trunking handle untagged frames that are receivedon a trunk port?The frames are dropped.The frames are assigned to the native VLAN.The frames are assigned to the default VLAN.The frames are assigned to the management VLAN.14Refer to the exhibit. Which three options correctly describe the router configuration that is shown?(Choose three.)An IEEE standard trunking protocol is in use.Interface Fa0/1 has been configured with subinterfaces.The shutdown command has been applied to interface Fa0/1.Interface Fa0/1.3 is mapped to the default management VLAN.The configuration is appropriate for a router-on-a-stick network design.An IP address should be applied to interface Fa0/1 for routing to occur.15RSTP is enabled in a switched network that is active and converged. Which switch port type assumesa discarding state on non-root switches?root portedge portalternate portdesignated port16What provides an authentication mechanism for 802.11-based wireless networks?DSSSOFDMSSIDWPA17W hat is the benefit of the auto-MDIX feature on a Cisco Catalyst switch?dynamically assigns a new management VLAN IDautonegotiates IP address information for initial management connectionsallows the use of straight-through patch cables regardless of connected device typesplaces a port immediately in the forwarding state to reduce the time for the spanning tree toreconverge18Refer to the exhibit. VTP pruning is enabled in the VTP domain that is shown. How will switch ST-1 handle Layer 2 broadcast traffic originating from host A on switch ST-C?It will be dropped.It will be forwarded out port Fa0/5 only.It will be forwarded out ports Fa0/5 and Fa0/10.It will be forwarded out ports Fa0/5, Fa0/10, and Fa0/15.19Refer to the exhibit. The network administrator wants to allow both SSH and Telnet connections to Switch1. However, the SSH connections fail. What is the most likely cause of this problem?The RSA key has been removed.SSH has been configured on the wrong line.The transport input command is applied incorrectly.The domain name has been configured in the wrong configuration mode.20Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit. However, hosts B and D cannot ping each other. What is the most likely cause of this problem?The link between the switches is up but not trunked.The Fa0/11 interface of Switch1 is not configured as a trunk.Hosts B and D are configured with IP addresses from different subnets.VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.21Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?only hosts A and Bonly hosts A, B, and Conly hosts A, B, C, and Donly hosts A, B, C, and E22 A network administrator implements inter-VLAN routing by configuring subinterfaces on a router.What is one important fact that must be considered?The physical interface must have an IP address configured.The subinterface numbers must match the VLAN ID number.The no shutdown command must be issued on each subinterface.The IP address of each router subinterface must be used as the default gateway for hosts on the corresponding VLAN.23W hat is the purpose of VLAN trunking?It improves network performance by reducing broadcast traffic.It selects the best path to transmit data in a switched network.It carries the traffic of multiple VLANs through a single link.It avoids spanning tree loops in a switched network.24Which parameter is used to uniquely identify one wireless network from another?SSIDOFDMWEPDSSS25W hich layers should support QoS in a hierarchical network?only the distribution and core layersonly the access and distribution layersthe access, distribution, and core layers26Refer to the exhibit. What does "FORWARDING" mean in the command output shown?The switch is sending and receiving data frames.The switch is receiving BPDUs, but not sending data frames.The switch is participating in an election process by forwarding the BPDUs it receives.The switch is receiving BPDUs and populating the MAC address table, but not sending data.27Refer to the exhibit. A network administrator is configuring RT1 for inter-VLAN routing. The switch is configured correctly and is functional. Host1, Host2, and Host3 cannot communicate with each other.Based on the router configuration, what is causing the problem?Interface Fa0/0 is missing IP address configuration information.IP addresses on the subinterfaces are incorrectly matched to the VLANs.Each subinterface of Fa0/0 needs separate no shutdown commands.Routers do not support 892.1Q encapsulation on subinterfaces.28Which switch forwarding method should be used on a network that employs frame classification based on an assigned Quality of Service (QoS) value?cut-throughfast-forwardfragment-freestore-and-forward29Refer to the exhibit. A network administrator has segmented the network into two VLANs. The connected hosts can only access resources in their own VLAN. What is the most scalable and cost effective solution to allow inter-VLAN communication in this network?Replace S1 with a router that has one FastEthernet interface for each PC.Add a second switch and divide the PCs so that each VLAN is connected to its own switch.Configure a router with two subinterfaces on one of its FastEthernet ports and connect it to S1 using a trunk link.Connect a router to a port on S1 and assign the IP address of VLAN1 to the connecting router interface.30Refer to the exhibit. A network administrator issues the show interfaces fastEthernet 0/8switchport command to check the status of the port. What can be concluded from the output?Port Fa0/8 is configured as a trunk with 802.1q encapsulation.Port Fa0/8 is configured as a trunk in VLAN 1.Port Fa0/8 is configured in access mode and associated with VLAN 1.31What will be the effect of the command S1# copy system:running-configtftp://172.16.2.155/tokyo-config?The IOS will be copied to the TFTP server.The configuration file named tokyo-config will overwrite the startup configuration file on S1.The running configuration file on S1 will be saved via TFTP to a file named tokyo-config.The contents of NVRAM on S1 will become the startup configuration file on the tokyo switch.32W hich three statements are correct concerning the default configuration of a new switch? (Choose three.)It is configured in VTP server mode.STP is automatically enabled.The first VTY line is automatically configured to allow remote connections.VLAN1 is configured with a management IP address.All switch ports are assigned to VLAN1.The enable password is configured as cisco.33Refer to the exhibit. What would happen if the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1?Host A remains a member of VLAN 10, because the router is routing traffic between VLANs.Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30.Host A remains a member of VLAN 10, because the switch provides dynamic VLAN assignment for the port.Host A maintains connectivity to all members of VLAN 10, because it is connected to the same physical network.Host A is no longer a member of VLAN 10, but because port Fa0/3 was unused, it is now amember of VLAN 1.34Refer to the exhibit. Switches S2 and S3 are properly connected using an ethernet cable. A network administrator has configured both switches with VTP, but S3 is unable to propagate VLANs to S2.What could be the reason for this?The VTP configuration revision is different on both switches.The VTP domains are different on both switches.VTP pruning is disabled.VTP v2 is disabled.35Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installation surveys showed strong signal strength from the AP locations to the client locations. Outside electricalIncrease the distance between the clients.Change the channel on AP-B to 6 or 11.Place AP-A and AP-B on the same wireless channel.36I n which mode is a VTP switch operating if it does not allow for the creation of local VLANs but it does accept VLAN updates from other switches in the same domain?clientrootservertransparent37Refer to the exhibit. The Layer 2 switching design that is shown has been implemented in a campus environment that is using Spanning Tree Protocol. All inter-switch links that are shown are trunks.Whenever an inter-switch link fails, the network takes nearly a minute to completely converge. How can the convergence time be reduced?Increase the capacity of the distribution and core trunk links to 10 Gb/s.Use Layer 3 switching on the core switch.Implement Rapid Spanning Tree Protocol.38Refer to the exhibit. Router R1 is properly configured for router on a stick inter-VLAN routing, but PC1 is unable to ping PC2. What needs to be done to resolve the problem?Rename VLAN1.Connect one more port of S1 to R1.Configure the Fa0/1 port of S1 as a trunk port.Move the Fa0/0 interface of R1 to another VLAN.39What is a result of improperly implementing a network with redundancy at Layer 2?an increase of unicast and multicast errors at Layer 3a decrease in the amount of broadcast trafficend device malfunction because of broadcast storms40W hy is it important that the network administrator consider the spanning-tree network diameter when choosing the root bridge?The network diameter limitation is 9.BPDUs may be discarded because of expiring timers.The cabling distance between the switches is 100 meters.The network diameter must be set to the number of meters of the cable between the root bridge and its farthest connected switch.41Refer to the exhibit. A network administrator needs to add IP phones to the network. To whichdevices should the IP phones connect?AS1 and AS2DS1 and DS2DS1, DS2, and CS1AS1, AS2, DS1, and DS242Which device or devices should have the Spanning Tree Protocol enabled to prevent host traffic from creating a broadcast storm?Core_S1Access_S2 and Access_S3Core_S1, Access_S2, and Access_S3Core_S1, Access_S2, Access_S3, and R143Refer to the exhibit. All edge ports are configured with the spanning-tree portfast command. Host1 is recently connected to port Fa0/1 on switch SW1 . Which statement is true about the status of port Fa0/1?The port will transition into blocking state.The port will transition immediately into forwarding state.The port will transition into blocking state and then immediately into forwarding state.The port will transition into blocking state and immediately transition through the listening and learning states.44A network administrator enables sticky learning on all access mode interfaces of a Catalyst switch, saves the configuration, then connects hosts to the switch. After the switch operates for several days, the administrator reboots the switch without saving the running configuration. What is the result?All previously learned MAC addresses are lost.The switch reverts to non-sticky dynamic learning.Connected hosts are no longer able to communicate with the switch.Previously learned sticky addresses are retained in the switch configuration.45The network administrator wants to configure a switch to pass VLAN update information to other switches in the domain but not update its own local VLAN database. Which two steps should the administrator perform to achieve this? (Choose two.)Reset the VTP counters.Configure VTP version 1 on the switch.Configure the VTP mode of the switch to transparent.Verify that the switch has a higher configuration revision number.Configure the switch with the same VTP domain name as other switches in the network.46Which statement regarding the service password-encryption command is true?The service password-encryption command is entered at the privileged EXEC mode prompt.The service password-encryption command encrypts only passwords for the console and VTY ports.The service password-encryption command encrypts all previously unencrypted passwords in the running configuration.To see the passwords encrypted by the service password-encryption command, enter the no service password-encryption command.47Refer to the exhibit. The network consists of four hubs and a switch. The hosts connected to each hub are assigned addresses in the respective VLAN as shown. PC1 on VLAN 1 becomes infected with a virus and initiates a continuous IP broadcast. Which hubs will receive the broadcasts?Hub AHubs A and BHubs A and CHubs A, B, C, and D48 A wireless LAN access point will convert traffic between which two frame encapsulation types?802.1 and 802.11802.3 and 802.11802.3 and 802.16802.5 and 802.1649I n the implementation of PVST+ in a specific VLAN where all switches have default spanning tree priorities, which spanning-tree command setting could be assigned to force one of the Catalyst switches to become and remain the root bridge?root primarypriority 8192priority 2048spanning-tree mode rapid pvst50Refer to the exhibit. The teacher host is connected to port Fa0/7 on switch STW. A student hasdecided to share access to the Internet by attaching a hub and laptop to STW as shown. What will be the result of the student making this connection?The Fa0/7 port of STW will be shutdown.The student will gain full access to the Internet.Both the teacher and student will be able to receive data but only the teacher will be able to send.The frames from the laptop will be dropped, but the teacher host will maintain connectivity with the network.51Refer to the exhibit. Switch SW2 was tested in a lab environment and then inserted into a production network without reloading its configuration. After the trunk link between SW1 and SW2 was brought up, all users lost connectivity to the network. What could be the source of the problem?All the VLANs were pruned from the trunk port between SW1 and SW2.SW1 and SW2 cannot be both set as VTP servers in the same VTP domain.VTP configuration revision number of SW2 was higher than the configuration revision number of SW1.The additional VLANs from SW2 created more VLANs than the VLAN database of SW1 could contain.。

CCNA 1 Final Exam Answer v5

CCNA 1 Final Exam Answer v5
9. What function does pressing the Tab key have when entering a command in IOS?
It aborts the current command and returns to configuration mode. It exits configuration mode and returns to user EXEC mode. It moves the cursor to the beginning of the next line. It completes the remainder of a partially typed word in a command.
2. A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)
CCNA 1 Final Exam Answer 003 (v5.02, 2015)
My Switch(config)#? Switch(config)#? MySwitch(config)#? My(config)#? Switch#
11. Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses Telnet to connect to the switch, which password is needed to access user EXEC mode?

CCNA_3_Final_Exam_V4.0_Answers

CCNA_3_Final_Exam_V4.0_Answers

CCNA3 Answers – CCNA Exam – CCNA Exams1. Which security protocol or measure would provide the greatest protection for a wireless LAN?WPA2cloaking SSIDsshared WEP keyMAC address filtering2.Refer to the exhibit. All trunk links are operational and all VLANs are allowed on all trunk links. An ARP request is sent by computer 5. Which device or devices will receive this message?only computer 4computer 3 and RTR-Acomputer 4 and RTR-Acomputer 1, computer 2, computer 4, and RTR-Acomputer 1, computer 2, computer 3, computer 4, and RTR-Aall of the computers and the router3.Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?only hosts A and Bonly hosts A, B, and Conly hosts A, B, C, and Donly hosts A, B, C, and E4.Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161. What will the router do with this packet?The router will drop the packet.The router will forward the packet out interface FastEthernet 0/1.1.The router will forward the packet out interface FastEthernet 0/1.2.The router will forward the packet out interface FastEthernet 0/1.3.The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.5.Refer to the exhibit. Which two settings show the default value of VTP configuration on a Cisco 2960 switch? (Choose two.)revision numberexisting VLANsoperating modedomain namepruning mode6. Which value determines if a switch becomes the central point of reference in the spanning tree topology?lowest bridge IDhighest revision numberlowest numeric IP addresshighest numeric MAC address7. What is the purpose of the Spanning Tree algorithm?It propagates VLAN configurations to other switches.It restricts broadcast packets to a single VLAN.It segments a network into multiple broadcast domains.It prevents loops in a switched network with redundant paths.8. What are two benefits of the IEEE 802.11n standard over the IEEE 802.11G? (Choose two.)requires less equipmentprovides improved rangepermits increased data rateshas a single-input and a single-outputneeds no hardware upgrade for compatibility9.Which configuration changes will increment the configuration revision number on the VTP server?configuring trunk links on the VTP serverconfiguring or changing the VTP passwordconfiguring or changing the VTP domain nameconfiguring or changing the VTP version numberconfiguring or deleting a VLAN or creating a VLAN name10.Refer to the exhibit. A company has acquired a new office in a campus environment. Switches in the existing office and the new office are directly connected by a trunk link. The VLANs and IP addressing are setup as shown in the exhibit. The computers in each office are not able to ping each other. What will fix the problem?Use an access link between S2 and S3.Connect S2 and S3 to a common router.Set the subnet mask in the new office to /24.Configure the new office default gateway to 172.17.10.1Change the port assignments in the new office to a different VLAN.11. What is a possible impact of setting too short an aging time in the MAC address table of a switch?overly large address tableunnecessary flooding of packetsexcessive timeouts of static addressesimpaired ability to dynamically learn new addresses12.Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2. Hosts A, B, C, and D are correctly configured with IP addresses in the subnet range for VLAN 50. Host A can communicate with host B, but cannot communicate with host C or host D. What is the cause of this problem?There is a native VLAN mismatch.The Fa0/11 interface of Switch1 is not configured as a trunk.The link between Switch1 and Switch2 is up but not trunked.VLAN 50 is not allowed on the trunk link between Switch1 and Switch2.Refer to the exhibit. Users complain that they do not have connectivity to the web server that is connected to SW1. What should be done to remedy the problem?Allow all VLANs on the trunk link.Configure VLAN 100 as the native VLAN for SW1.Configure the trunk port in trunk mode on SW1.Attach the web server to a router and configure inter-VLAN routing.14. What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?only the management VLANall VLANs except the extended range VLANsall VLANs except 1 and 1002-1005all VLANs15.Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP address should be assigned to this new host?192.168.1.11 /28192.168.1.22 /28192.168.1.33 /28192.168.1.44 /28192.168.1.55 /2816. Using the command copy tftp:backup.cfg startup-config, an administrator downloaded a saved configuration from a TFTP server to a switch. Why does the administrator not detect any changes in the switch configuration after the download completes?The command should have been copy startup-config tftp:backup.cfg.A backup configuration from a TFTP server cannot be copied directly into the startup-config.The command copy running-config startup-config should be used to save the changes on the switch.Downloading to the startup-config requires the switch to be reloaded in order for the configuration to take effect.17. What two methods can be used to remove MAC address table entries froma switch? (Choose two.)Power cycle the switch to clear all dynamically learned addresses.The clear switching-tables command will remove statically configured entries.The clear mac-address-table command will remove statically and dynamically configured table entries.The erase flash command will clear all statically configured table entries.Statically configured MAC addresses will automatically be removed from the address table 300 minutes after the last activity on a switch port.18. Which type of traffic can still be received on a switch interface that is in STP blocking mode?BPDU framesmulticast framesbroadcast framesLayer 3 packets19. Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?Associate with the access point and then open a HyperTerminal session with the access point.Physically connect to the access point and then reboot the computer to launch the configuration software.From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.Modify the TCP/IP properties of the computer connected to the access point so that it exists on the same network, and then reboot your computer to establish a connection.20.Refer to the exhibit. All edge ports are configured with the spanning-tree portfast command. Host1 is recently connected to port Fa0/1 on switch SW1 . Which statement is true about the status of port Fa0/1?The port will transition into blocking state.The port will transition immediately into forwarding state.The port will transition into blocking state and then immediately into forwarding state.The port will transition into blocking state and immediately transition through the listening and learning states.21.Refer to the exhibit. What is true of the configuration of switch S1?A Cisco proprietary protocol is in use for ports Fa0/1 and Fa0/3.Switch ports Fa0/1 and Fa0/3 have been configured with the switchport mode access command.Untagged frames received on ports Fa0/1 and Fa0/3 will be placed on VLAN 1.Switch ports Fa0/1 and Fa0/3 are configured to carry data from multiple VLANs.22.Refer to the exhibit. The configuration steps that are listed in the exhibit have been entered in switch S1 via the console. Subsequent attempts to telnet to the switch are not successful. What is causing the problem?The switch must be configured with SSH version 1.The transport input command must specify Telnet access.The RSA keys must be returned to zero before SSH will permit Telnet access.The ip domain-name command must also be entered in line configuration mode for the vty lines.23.Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?Cat-ACat-BCat-CCat-D24.Refer to the exhibit. VTP has been configured with VTP pruning enabled on all switches. If HostA sends a broadcast frame to SW1, which devices will receive the frame?SW1, SW3, HostFSW1, HostB, HostCSW1, SW2, SW3, SW4, HostFSW1, SW2, SW3, SW4, all hosts25.Refer to the exhibit. Which two statements are true about the operation of the interfaces? (Choose two.)Incoming traffic with VLAN ID 0 is processed by interface fa0/0.Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.Both subinterfaces remain up with line protocol up, even if fa0/0 line protocol is down.Subinterfaces use unique MAC addresses by adding the 802.1Q VLAN ID to the hardware address.Traffic inbound on this router is processed by different subinterfaces, depending on the VLAN from which the traffic originated.26. The network administrator wants to configure a switch to pass VLAN update information to other switches in the domain but not update its own local VLAN database. Which two steps should the administrator perform to achieve this? (Choose two.)Reset the VTP counters.Configure VTP version 1 on the switch.Configure the VTP mode of the switch to transparent.Verify that the switch has a higher configuration revision number.Configure the switch with the same VTP domain name as other switches in the network.27.Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit. However, hosts B and D cannot ping each other. What is the most likely cause of this problem?The link between the switches is up but not trunked.The Fa0/11 interface of Switch1 is not configured as a trunk.Hosts B and D are configured with IP addresses from different subnets. VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.28.Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installation surveys showed strong signal strength from the AP locations to the client locations. Outside electrical interference has been eliminated. What will fix the problem?Relocate the APs closer to each other.Increase the distance between the clients.Change the channel on AP-B to 6 or 11.Place AP-A and AP-B on the same wireless channel.29. Why is it advisable that a network administrator use SSH instead of Telnet when managing switches?SSH uses TCP whereas Telnet does not.SSH encrypts only the username and password when logging in.SSH encrypts all remote management communications whereas Telnet does not.SSH sends a clear text message steam which reduces the bandwidth use for management.30.Refer to the exhibit. The teacher host is connected to port Fa0/7 on switch STW. A student has decided to share access to the Internet by attaching a hub and laptop to STW as shown. What will be the result of the student making this connection?The Fa0/7 port of STW will be shutdown.The student will gain full access to the Internet.Both the teacher and student will be able to receive data but only the teacher will be able to send.The frames from the laptop will be dropped, but the teacher host will maintain connectivity with the network.31. A network administrator configures a switch port with the command switchport mode dynamic auto. What is the resulting behavior of the switch port?The switch port is able to trunk if the remote switch port is set to auto.The switch port is able to trunk if the remote switch port is set to desirable.The switch port will be disabled if it is unable to successfully negotiate trunking.A successful trunk will be established if the remote switch is non-Cisco but the port is configured for trunking.32. Which STP port type can only appear once on a segment, and must be present in order for traffic to flow on that segment?non-root portdisabled portdesignated portnon-designated port33.Refer to the exhibit. What would happen if the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1?Host A remains a member of VLAN 10, because the router is routing traffic between VLANs.Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30.Host A remains a member of VLAN 10, because the switch provides dynamic VLAN assignment for the port.Host A maintains connectivity to all members of VLAN 10, because it is connected to the same physical network.Host A is no longer a member of VLAN 10, but because port Fa0/3 was unused, it is now a member of VLAN 1.34.Refer to the exhibit. VLAN 10 has been configured on the VTP server. Users who are assigned to VLAN 10 are connected as shown in the exhibit. On the basis of the outputs that are provided, which group of users will be able to communicate with the users on VLAN 10 on SW1?all the users who are connected only to SW2users on VLAN 10 who are connected only to SW3users on VLAN 10 who are connected only to SW4users on VLAN 10 who are connected to both SW3 and SW435.Refer to the exhibit. Which three options correctly identify information that could be associated with this output?(Choose three.)Interface FastEthernet3/0/0 is subinterfaced.A non-proprietary trunking protocol is in use.The configuration is appropriate for a router-on-a-stick network design.A shutdown command has been applied to interface FastEthernet3/0/0.Interface FastEthernet3/0/0.3 is mapped to the default management VLAN.An IP address should be applied to FastEthernet3/0/0 for correct data routing.36.Refer to the exhibit. The Layer 2 switching design that is shown has been implemented in a campus environment that is using Spanning Tree Protocol. All inter-switch links that are shown are trunks. Whenever an inter-switch link fails, the network takes nearly a minute to completely converge. How can the convergence time be reduced?Increase the capacity of the distribution and core trunk links to 10 Gb/s.Add a trunk link that directly connects D1 and D2.Use Layer 3 switching on the core switch.Implement Rapid Spanning Tree Protocol.37.Refer to the exhibit. Each switch is configured to participate in STP for VLANs 1, 10, 20, and 30. Which switch will become the root for VLAN 20?ABCD38.Refer to the exhibit. Switches S2 and S3 are properly connected using an ethernet cable. A network administrator has configured both switches with VTP, but S3 is unable to propagate VLANs to S2. What could be the reason for this?The VTP configuration revision is different on both switches.The VTP domains are different on both switches.VTP pruning is disabled.VTP v2 is disabled.39. In a three-layer hierarchical network design, which distribution layer function delineates broadcast domains?routing between VLANsaggregating traffic flowsproviding redundant linksreducing the network diameter40. Which parameter is used to uniquely identify one wireless network from another?SSIDOFDMWEPDSSS41. What is one disadvantage that 802.11a wireless has compared to 802.11g?Use of the 5GHz band requires much larger antennas.The OFDM modulation technique results in a slower data rate.There are fewer non-overlapping channels available to help reduce RF interference.The use of higher frequencies means that signals are more likely to be obstructed.42. Which three statements are correct concerning the default configuration of a new switch? (Choose three.)It is configured in VTP server mode.STP is automatically enabled.The first VTY line is automatically configured to allow remote connections.VLAN1 is configured with a management IP address.All switch ports are assigned to VLAN1.The enable password is configured as cisco.43.Refer to the exhibit. How is port Gi1/1 on SWT-A functioning in the spanning-tree topology?It is sending and receiving data frames.It is receiving BPDUs, but not sending data frames.It is participating in the election process by forwarding the BPDUs it receives.It is receiving BPDUs and populating the MAC address table, but not sending data.44. While configuring a new switch, a network administrator configures the switch as an HTTP server. What benefits does this configuration provide?This allows the switch to host web pages for the network.This allows remote VPN connections to the switch over the Internet.This is required if a web server or web farm is attached to the switch. This allows web-based configuration tools to be used with the switch.45. Which statement describes the use of voice VLANs in Cisco IP telephony? The voice VLAN carries both tagged and untagged traffic.The voice VLAN carries untagged traffic having special QoS markings.The voice VLAN must be configured on the switch port to which the IP phone attaches.Data and voice frames are tagged with same VLAN ID between the IP phone and the switch when a voice VLAN is configured.46.Refer to the exhibit. If switch SW1 is configured with the four VLANs as shown in the exhibit, how many physical interfaces are needed on router R1 to configure inter-VLAN routing using subinterfaces?zeroonetwofour47.Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?This entry can only be removed from the MAC address table by a network administrator.When forwarding a frame to the device with address 0060.5c5b.cd23, the switch does not have to perform a lookup to determine the final destination port.Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18.The switch learned this MAC address from the source address in a frame received on Fa0/18.48.Refer to the exhibit. The VTP domain has been configured as shown in the exhibit. The network technician accidentally configured the VTP server as a VTP client. After the technician reloaded the switches, all usersin the VTP domain started to complain that they lost connectivity to the users on the same VLANs that are connected to other switches. What should be done in the future to prevent losing all VLAN configurations in a VTP domain?Configure all switches in VTP transparent mode and copy the VLAN configuration into flash.Configure all switches in the network as VTP clients and copy the VLAN configuration into NVRAM.Create a new domain and configure a second switch as a VTP server to take over in case of a primary VTP server failure.In the same domain, configure a second switch as a VTP server to take over in case of a primary VTP server failure.49.Refer to the exhibit. How does SW1 manage traffic coming from Host A?SW1 drops the traffic because it is untagged.SW1 leaves the traffic untagged and forwards it over the trunk.SW1 tags the traffic with the lowest VLAN ID value and forwards it over the trunk link.SW1 encapsulates the traffic with 802.1Q encapsulation and forwards it over the trunk link.50. An administrator is troubleshooting a PC on the network which is suffering from slow and intermittent connectivity. The PC has a ping success rate to the default gateway of less than half the ping attempts. Other PCs on the switch can consistently ping the default gateway. The switch port is configured for auto duplex and the PC is configured for full duplex. What will commonly cause this problem?The PC is set to full duplex. The switch port fails to autonegotiate the duplex setting and defaults to half duplex, which causes a duplex mismatch.The switch traffic is exceeding available frame buffers. The result is that frames are being dropped.The PC and the default gateway have different bandwidth Ethernet ports.The default gateway is not on the same switch that the PC is.51.Refer to the exhibit. A network administrator has segmented the network into two VLANs and configured Router1 for inter-VLAN routing. A test of the network, however, shows that hosts on each VLAN can only access local resources and not resources on the other VLAN. What is the most likely cause of this problem?Switch port Fa0/1 is not trunking.Router interface Fa0/0 is possibly down.No routing protocol is configured on Router1.One of the router subinterfaces is possibly down.52.What impact does the use of the mdix auto configuration command have on an Ethernet interface on a switch?automatically detects duplex settingsautomatically detects interface speedautomatically detects copper cable typeautomatically assigns the first detected MAC address to an interface。

CCNA 2 Final Exam Answers V3.1

CCNA 2 Final Exam Answers V3.1

1. What are two possible reasons a router would not load a valid IOS from flash? (Choose two.)The configuration register is set to 0×2142.The first boot system command executed in the startup configuration file is boot system rom.The configuration register is set to 0×2100.The boot field is set to the hexadecimal number 2.The startup configuration file is missing or corrupt.2. What are two recommended uses of login banners? (Choose two.)to display security warning messagesto welcome any user to the routerto warn people about misusing privileged EXEC modeto identify circuits and other devices connected to the routerto announce a scheduled system shutdown3.Router A and Router B have been correctly configured to use RIP as a dynamic routing protocol and all intefaces on Router A and Router B are reporting "interface is up, line protocol is up" status. RIP is then configured onRouter C using the following commands:RouterC(config)# router ripRouterC(config-router)# network 192.168.4.0RouterC(config-router)# network 172.16.0.0If no additional routing is configured on Router A, Router B, and Router C, what will be the result?Networks 192.168.12.0/24, 192.168.4.0/24, and 172.16.0.0/16 will be unreachable from Router A.Router A will have no knowledge of network 192.168.12.0/24, but will have routes to networks 192.168.4.0/24 and 172.16.0.0/16.All networks shown in the graphic will be reachable by Router A, Router B, and Router C.Networks 192.168.4.0/24 and 172.16.0.0/16 will be unreachable from Router A and Router B.4. What are the primary functions of a router? (Choose two.) determine the best path for packetsprevent collisions on the network LANregulate flow control between sender and receiverprovide domain name resolutionforward packets to the appropriate interface5. What are some reasons to change the configuration register setting? (Choose two.)to force the system to ignore the configuration file stored in NVRAM to monitor password changesto change the POST sequenceto force the router to boot the IOS from NVRAMto force the system into ROM monitor mode6. A network administrator issues the erase startup-config command on a configured router with the configuration register set to 0×2102 and observes the following output:Erasing the nvram filesystem will remove all files! Continue? [Confirm] [OK]Erase of nvram: completeIf the router unexpectedly loses power after this sequence, what will occur when power is restored?The router will enter ROM monitor mode upon completion of the power-on self test (POST).The router will load the last known valid configuration file.The router will enter Rx-boot mode.The router will prompt the user to enter setup mode or to continue without entering setup mode.7. Why are routed protocols important to networking? (Choose two.) Routed protocols detect collisions and fragments.Routers use routed protocols to calculate the best path to a destination. Routed protocols transport data across the network.The fields and formats used within a packet are defined by routed protocols.Routed protocols are used to configure the metrics used by routing protocols.8. The main router of XYZ company has enough flash and RAM to store multiple IOS images. An administrator wants to upload a second IOS image from a TFTP server to the flash of the router. Which method will accomplish this task?Paste the IOS filename to the command line of the router while in global configuration mode. Press enter. Then issue the copy tftp flash command.Use the setup utility to load the new image to flash.Copy the IOS image file from a TFTP server using the command copy filenameip address flash .Copy the IOS image file from a TFTP server using the command copy tftp flash. When prompted, provide the IP address or name of the TFTP server and the IOS image filename.9.A network administrator has a console connection to the Fremantle router. Pings to Melville are successful, but pings to Cottesloe and Nedlands fail. What could be a first step in troubleshooting the problem?Use an extended ping from Fremantle to each router in the network.Use the show interfaces command from a Telnet session on Melville to check the connection to Cottesloe.Use the traceroute command to discover exactly which link in the network is down.Use the show cdp neighbors detail command from Fremantle to gather information about all Cisco routers in the network.10.Refer to the exhibit. The new security policy for the company allows all IP traffic from the Engineering LAN to the Internet while only web traffic from the Marketing LAN is allowed to the Internet. Which ACL can be applied in the outbound direction of Serial 0/1 on the Marketing router to implement the new security policy?access-list 197 permit ip 192.0.2.0 0.0.0.255 anyaccess-list 197 permit ip 198.18.112.0 0.0.0.255 any eq wwwaccess-list 165 permit ip 192.0.2.0 0.0.0.255 anyaccess-list 165 permit tcp 198.18.112.0 0.0.0.255 any eq wwwaccess-list 165 permit ip any anyaccess-list 137 permit ip 192.0.2.0 0.0.0.255 anyaccess-list 137 permit tcp 198.18.112.0 0.0.0.255 any eq wwwaccess-list 89 permit 192.0.2.0 0.0.0.255 anyaccess-list 89 permit tcp 198.18.112.0 0.0.0.255 any eq www11.Hosts from the Limerick LAN are not allowed access to the Shannon LAN but should be able to access the Internet. Which set of commands will create a standard ACL that will apply to traffic on the Shannon router interface Fa0/0 implementing this security?access-list 42 deny 172.19.123.0 0.0.0.255 192.0.2.0 0.0.0.255 access-list 42 permit anyaccess-list 56 deny 172.19.123.0 0.0.0.255access-list 56 permit anyaccess-list 61 deny 172.19.123.0 0.0.0.0access-list 61 permit anyaccess-list 87 deny ip any 192.0.2.0 0.0.0.255access-list 87 permit ip any12. Which of the following commands will correctly configure an extended ACL? (Choose two).Router(config)# access-list 18 permit tcp host 192.168.73.3 eq 25Router(config)# access-list 102 permit tcp 10.43.0.0 0.0.255.255 any eq 80Router(config)# access-list 187 permit tcp host 192.168.42.34 172.29.0.0 0.0.255.255 eq 23Router(config)# access-list 99 permit host 10.217.32.3Router(config)# access-list 128 permit tcp host 192.168.100.31 eq 2313. What are the results of setting the boot field bits in the configuration register to "0000"? (Choose two.)The startup-config file will be ignored at bootup.The router will load the IOS from Flash.The router will enter ROM monitor mode upon reload.The router will enter boot ROM mode and have limited capabilities. The administrator can enter the b command to manually boot the IOS.14.Refer to the exhibit. Router D interface S0 on has gone down. What is the maximum time that will elapse before Router A learns that network 168.58.14.0 is down?5 seconds13 seconds17 seconds25 seconds30 seconds77 seconds15. During initial router bootup the following line appears: "NVRAM invalid, possibly due to write erase."What are two possible reasons for this result? (Choose two.)The startup-config file was not saved to RAM before reboot.The IOS has been erased.The router has not been configured.The startup-config file cannot be located.The router will not enter initial configuration dialog.16.The Suffolk router is directly connected to the networks shown in the graphic and has a default route that points to the Richmond router. All interfaces are active and properly addressed. However, when the workstation on network 172.29.5.0/24 sends a packet to destination address 172.29.198.5, it is discarded by the Suffolk router. What can be a reason for this result?The ip classless command is not enabled on the Richmond router.The route was ignored if the Richmond router did not include the 172.29.198.0/24 network in its routing updates.The Richmond router is in a different autonomous system than the Suffolk router.The ip subnet-zero command was not configured on the Suffolk router.The ip classless command is not enabled on the Suffolk router.17. access-list 199 deny tcp 178.15.0.0 0.0.255.255 any eq 23 access-list 199 permit ip any anyAssuming this ACL is correctly applied to a router interface, which statements describe traffic on the network? (Choose two.)All FTP traffic from network 178.15.0.0 will be permitted.All Telnet traffic destined for network 178.15.0.0 will be denied.Telnet and FTP will be permitted from all hosts on network 178.15.0.0 to any destination.Telnet will not be permitted from any hosts on network 178.15.0.0 to any destination.Telnet will not be permitted to any host on network 178.15.0.0 from any destination.18.What facts can be determined from the highlighted text shown in the exhibit? (Choose two.)A weak encryption was applied to all unencrypted passwords.The enable password is now more secure than the enable secret password.An MD5 hashing algorithm was used on all encrypted passwords.Any configured user EXEC mode or Telnet passwords will be encrypted in this configuration.The service password-encryption command was used to encrypt all passwords on the router including enable secret.19. What are three features of CDP? (Choose three.)provides information on directly connected devices that have CDP enabled tests Layer 2 connectivityenabled by default on each interfaceprovides a layer of securityused for debugging Layer 4 connectivity issues20. What information can be learned during the initial router bootup? (Choose two.)the configuration register valuethe number and types of interfaces installedthe router model and the amount of memory that is availablethe amount of memory required to load the IOS and configurationthe number of interfaces with connected cables21.What can be concluded from the output shown in the exhibit? (Choose three.)This is a standard IP access list.This is an extended IP access list.The keyword host is implied in the command line access-list 99 deny 10.213.177.76.The wildcard mask must be configured for this access list to function properly.Host 10.213.177.100 will be allowed access to the Serial0/1 interface.22. Which statements are true regarding setup mode? (Choose three.)Press Ctrl-z to terminate setup mode.Enter a question mark (?) for help at any point.Press Spacebar to accept the default settings.Use setup mode to enter complex protocol features.Press Enter to accept the default settings.Press Ctrl-c to abort configuration dialog.23.Refer to the graphic. Which series of commands will create static routes that will allow Router A and Router B to deliver packets destined for LAN A and LAN B, and direct all other traffic to the Internet?RouterA(config)# ip route 10.90.3.0 255.255.255.0 192.168.3.2RouterB(config)# ip route 192.168.2.0 255.255.255.0 192.168.3.1 RouterB(config)# ip route 0.0.0.0 0.0.0.0 s0/0RouterA(config)# ip route 10.90.3.0 255.255.255.0 192.168.3.2RouterA(config)# ip route 0.0.0.0 0.0.0.0 192.168.3.2RouterB(config)# ip route 192.168.2.0 255.255.255.0 192.168.3.1RouterA(config)# ip route 0.0.0.0 0.0.0.0 192.168.3.2RouterB(config)# ip route 192.168.2.0 255.255.255.0 192.168.3.1 RouterB(config)# ip route 172.20.20.4 255.255.255.252 s0/0RouterA(config)# ip route 0.0.0.0 0.0.0.0 192.168.3.2RouterB(config)# ip route 192.168.2.0 255.255.255.0 192.168.3.1 RouterB(config)# ip route 0.0.0.0 0.0.0.0 s0/024.Which devices can be used to convert the data from a WAN router at the customer site into a form acceptable for use by the WAN service provider? (Choose three.)Ethernet switchDTEmodemhubDCE deviceCSU/DSU25.What will occur when the following ACL is applied inbound to both FastEthernet interfaces of Router A in the graphic?access-list 125 permit tcp 192.168.2.0 0.0.0.255 10.90.3.0 0.0.0.255 eq 23access-list 125 permit tcp 10.90.3.0 0.0.0.255 192.168.2.0 0.0.0.255 eq 23access-list 125 permit tcp 192.168.2.0 0.0.0.255 any eq wwwWorkstations A and B will be able to Telnet to each other. WorkstationA will be allowed to access Web servers on the Internet, while WorkstationB will be denied Internet Web access.Workstations A and B will be able to Telnet to each other. All other traffic will be denied.The ACL will have no effect because it should be applied in the outbound direction on the FastEthernet interfaces.The ACL will deny all traffic because of the implied deny ip any any statement at the end of the ACL.26. Based on this partial output of the show ip route command, which routing protocol is configured on the router?R 172.16.3.0/24 [120/3] via 172.16.2.2, 00:00:27, Serial0/0RIPEIGRPOSPFIGPBGP27.Which of the following are correct statements verified by the router output shown in the graphic? (Choose two.)Layer 3 connectivity exists between BigCity and the devices in the Device ID column.Layer 2 connectivity exists between BigCity and the devices in the Device ID column.All devices shown in the Device ID column use the TCP/IP protocol suite.All devices shown in the Device ID column can be pinged from BigCity.All devices listed in the Device ID column are directly connected to BigCity.28. A network administrator must configure a FastEthernet interface with an IP address. The configuration must also identify the remote site to which the interface is connected. Which set of commands will meet these requirements?StPetersburg(config)# banner San Jose T1StPetersburg(config)# interface fa0/0StPetersburg(config-if)# ip address 172.26.155.5 255.255.255.252StPetersburg(config)# interface fa0/0StPetersburg(config-if)# ip address 172.26.155.5 netmask255.255.255.252StPetersburg(config-if)# description San Jose T1StPetersburg(config)# interface fa0/0StPetersburg(config-if)# ip address 172.26.155.5 255.255.255.252 StPetersburg(config-if)# banner remote site San Jose T1StPetersburg(config)# interface fa0/0StPetersburg(config-if)# ip address 172.26.155.5 255.255.255.252 StPetersburg(config-if)# description San Jose T129. What are the features of a serial interface on a router? (Choose two.) enabled by defaultassigned a unique MAC addressmust be configured as a DCE in lab and production environmentsmust be configured with the default clock rate of 56000may be administratively enabled by using the no shutdown commandmust be configured with a valid IP address and subnet mask in order to forward packets30. Assuming the following ACL is correctly applied to a router interface, what can be concluded about this set of commands? (Choose two.) Router(config)# access-list 165 deny tcp 192.28.115.0 0.0.0.255 172.20.0.0 0.0.255.255 eq 23Router(config)# access-list 165 permit ip any anyThis is a standard IP access list that denies network 192.28.115.0 Telnet access to the 172.20.0.0 network.All Telnet traffic destined for 172.20.0.0 from any network will be denied access.Network 192.28.115.0 is denied Telnet access to the 172.20.0.0 network. Network 172.20.0.0 is denied Telnet access to the 192.28.115.0 network.All FTP and HTTP traffic destined for 172.20.0.0 will be permitted access.31. Which two steps describe how to create a functional physical connection between a router console and a terminal? (Choose two.)Use a crossover cable to connect the terminal serial port to the router console port.Use a rollover cable to connect the terminal NIC to the router console port.Use an RJ-45 to DB-9 adapter on the terminal serial port to connect to the cable going to the router console.Use a transceiver to connect a straight-through cable to the router console port.Use a straight-through cable to connect the router console port to the terminal NIC.Use a rollover cable to connect from a terminal serial port to the router console port.32. What critical information about the status of the router can be found in the outputs of both the show interfaces and show protocols commands? (Choose two.)the Layer 3 address of each configured interfacethe routing protocol configured to forward updates out of each interface the operational status of each interfacetraffic statistics for each interfacewhether the interface is configured as a DTE or DCE33.The following access list has been created to prevent traffic from the 192.0.2.63 host on the Sales LAN from accessing servers and hosts on the Payroll LAN.access-list 26 deny host 192.0.2.63access-list 26 permit anyRefer to the exhibit. Which group of commands will properly place the access list so that only the host on the Sales LAN is denied access to the 172.29.7.0 network but all other traffic is permitted?Payroll(config)# interface fa0/0Payroll(config-if)# ip access-group 26 outPayroll(config)# interface fa0/1Payroll(config-if)# ip access-group 26 outSales(config)# interface fa0/1Sales(config-if)# ip access-group 26 inSales(config)# interface fa0/0Sales(config-if)# ip access-group 26 out34.Refer to the exhibit. Assuming default metrics are used and the networkis fully converged, which path will RIP use to send a packet from Router A to Router F?A, D, E, FA, B, D, E, FA, C, D, E, G, FA, B, D, E, G, F35.Refer to the graphic. Communication is needed between the LAN connected to the fa0/0 interface of the Kansas router and the fa0/0 interface of the Maine router. All hosts on those LANs also need connectivity to the Internet. Which commands will allow this communication? (Choose three).Kansas(config)# ip route 192.168.6.0 255.255.255.0 172.18.64.2Kansas(config)# ip route 192.168.6.0 255.255.255.0 s0/1Kansas(config)# ip route 0.0.0.0 0.0.0.0 s0/1Maine(config)# ip route 192.168.6.0 255.255.255.0 172.18.64.1Maine(config)# ip route 0.0.0.0 0.0.0.0 s0/1Maine(config)# ip route 172.16.32.0 255.255.255.0 172.18.64.236. Why are interface descriptions used in router configurations? (Choose three).to enable support personnel to easily identify networks and customers that may be affected by a possible interface issueto provide comments on the interface without affecting the router functionalityto display access warning messages before users enter the interface configuration modeto eliminate the need to use IP addresses when using the ping and telnet commandsto identify the purpose and location of the interface37.A network administrator has enabled RIP on routersB andC in the network diagram. Which of the following commands will prevent RIP updates from being sent to Router A?A(config)# router ripA(config-router)# passive-interface S0/0B(config)# router ripB(config-router)# network 192.168.25.48B(config-router)# network 192.168.25.64A(config)# router ripA(config-router)# no network 192.168.25.32B(config)# router ripB(config-router)# passive-interface S0/0A(config)# no router rip38. What could a Cisco support technician learn from the IOS filename c2600-d-mz.121-3? (Choose three.)the format of the filethe RAM memory requirements of the filethe version number of the filethe size of the filethe device platform of the file39.While planning an IOS upgrade, the administrator issues the show version command. Based on the output in the graphic, what is the current IOS boot location?RAMNVRAMFlashROM40. A new technician must add boot system commands to one of the department routers. Which available commands will the router return as output when the command shown below is entered? (Choose two.)Router(config)# boot system ?RAMNVRAMIOSIP AddressTFTPFLASH41. From the running-config, the following configuration entries are displayed:Router(config)# line vty 0 2Router(config-line)# password g8k33prRouter(config-line)# loginWhat can be interpreted from the exhibited configuration? (Choose two.)Three Telnet lines are available for remote access.Two Telnet lines are available for remote access.Future configuration of the remaining Telnet lines will require the password to be set to g8k33pr.To login to the remote device, g8k33pr will be used as the Telnet and secret password.Remote access to this local router will require a Telnet password of g8k33pr.42. Which router component stores the information that is displayed by the show running-config command?flashNVRAMRAMROM43. What are two characteristics of the support for Telnet within Cisco IOS software? (Choose two.)Up to five separate Telnet lines are supported by default in standard edition IOS files.For security purposes, Telnet sessions are required to be established from the privileged mode.A router can host simultaneous Telnet sessions.Once established, a Telnet session can remain operational regardless of network status.Telnet tests wireless connectivity and does not require a physical connection between devices to gain remote access.44. Which router components and operations are correctly described? (Choose two.)RAM – stores the ARP cacheNVRAM – store the operating systemROM – stores the backup IOSPOST – verifies the validity of the running-configFlash – executes diagnostics at bootupDRAM – loads the bootstrap45.Given the output shown in the exhibit, in what order and location will the router search for the IOS if no boot system commands are found in the startup-config file?ROM, Flash, TFTP serverFlash, NVRAM, RAMROM, TFTP server, FlashRAM, Flash, NVRAMFlash, TFTP server, ROM46. What can a network administrator do to recover from a lost router password?perform a reload or resettelnet from another router and issue the show running-config command to view the passwordboot the router to ROM monitor mode and configure the router to ignore NVRAM when it initializesboot the router to bootROM mode and enter the b command to load the IOS manually47.Neither router in the exhibit has a host table or DNS available. The interfaces and passwords have been correctly configured. Which of the following commands will initiate a Telnet session? (Choose two.)Tottenham# telnet OxfordTottenham> telnet 198.18.139.1Oxford# connect 198.18.139.0Oxford> connect TottenhamOxford# telnet TottenhamOxford# 198.18.139.248. If a PC does not have network connectivity to a router, which router port can be used to establish communication?consoleEthernetserialVTY。

CCNA3 final 中文

CCNA3 final 中文

2可向可从可向可向可向可从4可采用哪两种方法删除交换机的关闭交换机电源并再次打开以清除所有动态获知的地址。

可采用可采用可采用在交换机端口不活动达6810分层网络设计模型具有哪三项优点?13需要配置下列哪三项才能允许用户通过默认网关vty控制台线路口令HTTP管理用于连接的以太网端口的双工和速度设置应该为所使用的是标准化中继协议。

已经在接口该配置适用于单臂路由器网络设计。

接口接口15下列关于1719在在在在此开销代表从一台上游(更接近根交换机)交换机的端口Switch4Switch4根交换机通告的开销值是2325可在S1 2729如果将会创建一个新的交换机默认为仅允许交换机不再能作为交换机仅在生成新的接入点数据服务器客户端RADIUS33下列哪两种说法正确地描述了生成树协议?它只能用于采用路由器的网络中。

35下列关于新交换机默认配置的说法中哪三项正确?37网络管理员接到为大型企业级交换网络选择硬件的任务。

39为什么网络管理员在选择根桥时必须考虑生成树网络直径?SSHSSHtransport input 不能同时配置434547下列哪种方法可用于与无线接入点建立管理连接?49S1S3S4S4S2S1当前仅将一个目前尚无法进行接口图中所示的接口处于关闭状态。

思科CCNA第三学期期末考试完整版

思科CCNA第三学期期末考试完整版

参加考试-ESwitchingFinalExam-CCNAExploration:LAN交换和无线(版本4.0)以下哪项参数用于唯一标识一个无线网络,使其与其它网络区分开来?SSIDOFDMWEPDSSS分层网络模型具有哪三项优点?(选择三项。

)带宽争用现象减少物理布局范围减小网络的容错能力提高无需配线间无需第三层功能管理和故障排除工作简化在将Catalyst交换机迁移到其它VTP管理域之前,应该进行哪三项任务?(项。

)选择正确的VTP模式和版本。

使用新管理域的名称配置交换机。

从新域中的VTP服务器上下载VTP数据库。

配置新域内的VTP服务器,使其识别该交换机的BID。

重置VTP计数器,使交换机可与新域内的其它交换机同步。

检验交换机的配置修订版号是否比新域内的其它交换机的低。

下列哪两种说法正确地描述了生成树协议?(选择两项。

)它只在第2层使用。

它在交换机上配置。

它消除了网络拓扑中的第2层环路。

它限制了端口上所允许的有效MAC地址的数量。

它使VLAN信息得以传播到网络中的其它交换机。

下列哪种方法可建立用于配置LinksysWRT300N无线接入点的管理连接?与接入点关联,然后与接入点建立超级终端会话。

以物理方式连接到接入点,然后重新启动计算机以启动配置软件。

在接入点所在的IP子网内的计算机上的web浏览器中输入接入点的默认址。

修改与接入点连接的计算机的TCP/IP属性,使其与接入点处于同一个然后重新启动计算机以建立连接。

请参见图示。

源地址并非0019.d2e4.d9f7的帧进入接口Fa0/24时会发生什么Fa0/24会变为error-disabled(错误-禁用)状态。

传入帧会被丢弃。

Fa0/24端口LED会关闭。

安全违规计数会增加。

可采用哪两种方法删除交换机的MAC地址表中的条目?(选择两项。

)关闭交换机电源并再次打开以清除所有动态获知的地址。

可采用clearswitching-tables命令删除静态配置的条目。

思科 ccna第三册final试题及答案

思科 ccna第三册final试题及答案

思科第三册final 试题及答案1请参见图示。

下列哪三种说法描述了 Host1 和 Host2 无法通信的原因?(选择三项。

)交换机端口处于不同的 VLAN 中。

交换机的 IP 地址在错误的子网中。

主机被配置在不同的逻辑网络中。

需要路由器在 Host1 与 Host2 之间转发流量。

每个 VLAN 中的 VLAN 端口必须连续分配。

主机的默认网关地址必须处于同一个逻辑网络中。

2请参见图示。

主机 PC_A 和主机 PC_B 同时发送流量,来自这两台发送站的帧发生了冲突。

最突信号的是哪台设备?集线器 HB1交换机 SW1路由器 R1交换机 SW2路由器 R2交换机 SW43请参见图示。

在生成树协议中,“学习”表示什么意思?交换机正在发送并接收数据帧。

交换机并未接收 BPDU,但正在发送并接收数据。

交换机正在通过转发收到的 BPDU 参与选举过程。

交换机正在接收 BPDU 并填充 MAC 地址表,但并未发送数据。

4请参见图示。

RTB 被配置为进行传统的 VLAN 间路由。

RTB 可以 ping 通计算机 A 但无法 pin 机 B。

此故障的原因可能是什么?Fa0/11 端口处于错误的 VLAN 中。

RTB 上没有有效的路由协议。

计算机 B 的 IP 地址在错误的逻辑网络中。

路由器的 Fa0/1 接口上配置了错误的中继封装类型。

5请参见图示。

网络管理员已将网络划分为两个 VLAN,R1 和 S1 的配置如图所示。

但是,PC1 无法问题很可能出在哪里?R1 上未配置路由协议。

S1 的 Fa0/1 端口不是中继端口。

S1 上未设置默认网关地址。

S1 和 R1 之间只配置了一条物理链路用于 VLAN 间路由。

6单臂路由器 VLAN 间路由有哪三项特征?(选择三项。

)需要使用 VTP需要使用子接口减少广播域的数量使用过多 VLAN 时会影响性能需要在路由器和至少一台交换机之间采用接入链路比用于 VLAN 间路由的其它方法更加经济规定至少要在路由器和交换机之间使用两个交换机端口7请参见图示。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

1. Which address is used by an IPv6 EIGRP router as thesource for hello messages?o the 32-bit router IDo the IPv6 global unicast address that is configured on the interfaceo the all-EIGRP-routers multicast addresso the interface IPv6 link-local address2. Which two statements are correct about EIGRPacknowledgment packets? (Choose two.)o The packets are sent in response to hello packets.o The packets are used to discover neighbors that are connected on an interface.o The packets are sent as unicast.o The packets require confirmation.o The packets are unreliable.3. When are EIGRP update packets sent?o only when necessaryo when learned routes age outo every 5 seconds via multicasto every 30 seconds via broadcast4. Refer to the exhibit. Which two conclusions can be derivedfrom the output? (Choose two.)o There is one feasible successor to network 192.168.1.8/30.o The network 192.168.10.8/30 can be reached through 192.168.11.1.o The reported distance to network 192.168.1.0/24 is 41024256.o The neighbor 172.16.6.1 meets the feasibility condition to reach the 192.168.1.0/24 network.o Router R1 has two successors to the 172.16.3.0/24 network.5. Refer to the exhibit. Which route or routes will beadvertised to the router ISP if autosummarization isenabled?o10.0.0.0/8o10.1.0.0/16o10.1.0.0/28o10.1.1.0/24 10.1.2.0/24 10.1.3.0/24 10.1.4.0/286. Refer to the exhibit. What can be concluded about network192.168.1.0 in the R2 routing table?o This network has been learned from an internal router within the same area.o This network was learned through summary LSAs from an ABR.o This network is directly connected to the interface GigabitEthernet0/0.o This network should be used to forward traffic toward external networks.7. Refer to the exhibit. A company has migrated from singlearea OSPF to multiarea. However, none of the users fromnetwork 192.168.1.0/24 in the new area can be reached by anyone in the Branch1 office. From the output in theexhibit, what is the problem?o There are no interarea routes in the routing table for network 192.168.1.0.o The OSPF routing process is inactive.o The link to the new area is down.o The router has not established any adjacencies with other OSPF routers.8. When does an OSPF router become an ABR?o when the router has interfaces in different areaso when the router is configured as an ABR by the network administratoro when the router has the highest router IDo when the router has an OSPF priority of 09. What is a difference between the Cisco IOS 12 and IOS 15versions?o The IOS 12 version has commands that are not available in the 15 version.o The IOS version 15 license key is unique to each device, whereas the IOS version 12 license key is not device specific.o Every Cisco ISR G2 platform router includes a universal image in the IOS12 versions, but not the IOS 15 versions.o IOS version 12.4(20)T1 is a mainline release, whereas IOS version15.1(1)T1 is a new feature release.10. A network administrator issues the command R1(config)#license boot module c1900 technology-package securityk9 on a router. What is the effect of this command?o The IOS will prompt the user to reboot the router.o The features in the Security package are available immediately.o The IOS will prompt the user to provide a UDI in order to activate the license.o The Evaluation Right-To-Use license for the Security technology package is activated.11. A network administrator is troubleshooting slowperformance in a Layer 2 switched network. Uponexamining the IP header, the administrator notices that the TTL value is not decreasing. Why is the TTL value notdecreasing?o This is the normal behavior for a Layer 2 network.o The MAC address table is full.o The VLAN database is corrupt.o The inbound interface is set for half duplex.12. A network administrator enters the spanning-tree portfastbpduguard default command. What is the result of thiscommand being issued on a Cisco switch?o Any switch port will be error-disabled if it receives a BPDU.o Any trunk ports will be allowed to connect to the network immediately, rather than waiting to converge.o Any switch port that has been configured with PortFast will be error-disabled if it receives a BPDU.o Any switch port that receives a BPDU will ignore the BPDU message.13. An STP instance has failed and frames are flooding thenetwork. What action should be taken by the networkadministrator?o A response from the network administrator is not required because the TTL field will eventually stop the frames from flooding the network.o Spanning tree should be disabled for that STP instance until the problem is located.o Broadcast traffic should be investigated and eliminated from the network.o Redundant links should be physically removed until the STP instance is repaired.14. A network engineer is configuring a LAN with a redundantfirst hop to make better use of the available networkresources. Which protocol should the engineerimplement?o FHRPo GLBPo HSRPo VRRP15. Which mode configuration setting would allow formationof an EtherChannel link between switches SW1 and SW2 without sending negotiation traffic?o SW1: on SW2: ono SW1: desirable SW2: desirableo SW1: auto SW2: auto trunking enabled on both switcheso SW1: auto SW2: auto PortFast enabled on both switcheso SW1: passive SW2: active16. What are two requirements to be able to configure anEtherChannel between two switches? (Choose two.)o The interfaces that are involved need to be contiguous on the switch.o All the interfaces need to work at the same speed.o All the interfaces need to be working in the same duplex mode.o All interfaces need to be assigned to different VLANs.o Different allowed ranges of VLANs must exist on each end.17. When should EIGRP automatic summarization be turnedoff?o when a router has not discovered a neighbor within three minuteso when a router has more than three active interfaceso when a network contains discontiguous network addresseso when a router has less than five active interfaceso when a network addressing scheme uses VLSM18. What two conditions have to be met in order to form acluster that includes 5 access points? (Choose two.)o Clustering mode must be enabled on the APs.o At least two controllers are needed to form the cluster.o The APs have to be connected on the same network segment.o The APs must all be configured to use different radio modes.o The APs must use different cluster names.19. A network engineer is troubleshooting a newly deployedwireless network that is using the latest 802.11 standards.When users access high bandwidth services such asstreaming video, the wireless network performance ispoor. To improve performance the network engineerdecides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services.Why might this solution improve the wireless networkperformance for that type of service?o The 5 GHz band has a greater range and is therefore likely to be interference-free.o Requiring the users to switch to the 5 GHz band for streaming media is inconvenient and will result in fewer users accessing these services.o The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia.o The only users that can switch to the 5 GHz band will be those with the latest wireless NICs, which will reduce usage.20. What method of wireless authentication is dependent ona RADIUS authentication server?o WEPo WPA Personalo WPA2 Personalo WPA2 Enterprise21. Refer to the exhibit. What two pieces of information couldbe determined by a network administrator from thisoutput? (Choose two.)o R1 is participating in multiarea OSPF.o The OSPF process number that is being used is 0.o Interface Fa0/1 is not participating in the OSPF process.o R1 is the distribution point for the routers that are attached to the 10.0.0.4 network.o The metric that will be installed in the routing table for the 10.0.0.0 route will be 65 (64+1).22. A remote classroom can successfully access video-intensive streaming lectures via wired computers.However, when an 802.11n wireless access point isinstalled and used with 25 wireless laptops to access the same lectures, poor audio and video quality isexperienced. Which wireless solution would improve the performance for the laptops?o Decrease the power of the wireless transmitter.o Add another access point.o Upgrade the access point to one that can route.o Adjust the wireless NICs in the laptops to operate at 10GHz to be compatible with 802.11n.23. What are the two methods that are used by a wireless NICto discover an AP? (Choose two.)o sending an ARP requesto delivering a broadcast frameo transmitting a probe requesto initiating a three-way handshakeo receiving a broadcast beacon frame24. When will a router that is running EIGRP put a destinationnetwork in the active state?o when the EIGRP domain is convergedo when there is outgoing traffic toward the destination networko when there is an EIGRP message from the successor of the destination networko when the connection to the successor of the destination network fails and there is no feasible successor available25. Which wireless network topology is being configured by atechnician who is installing a keyboard, a mouse, andheadphones, each of which uses Bluetooth?o ad hoc modeo hotspoto infrastructure modeo mixed mode26. What is a wireless modulation technique used by 802.11WLAN standards that can implement MIMO?o BSSo DSSSo FHSSo OFDM27. Refer to the exhibit. A network administrator issues theshow ipv6 eigrp neighbors command. Which conclusion can be drawn based on the output?o The link-local addresses of neighbor routers interfaces are configured manually.o R1 has two neighbors. They connect to R1 through their S0/0/0 and S0/0/1 interfaces.o The neighbor with the link-local address FE80::5 is the first EIGRP neighbor that is learned by R1.o If R1 does not receive a hello packet from the neighbor with the link-local address FE80::5 in 2 seconds, it will declare the neighbor router is down.28. A network engineer is troubleshooting a single-areaOSPFv3 implementation across routers R1, R2, and R3.During the verification of the implementation, it is noted that the routing tables on R1 and R2 do not include theentry for a remote LAN on R3. Examination of R3 shows the following:1.that all interfaces have correct addressing2.that the routing process has been globally configured3.that correct router adjacencies have formedWhat additional action taken on R3 could solve the problem?o Enable the OSPFv3 routing process on the interface connected to the remote LAN.o Use the network command to configure the LAN network under the global routing process.o Force DR/BDR elections to occur where required.o Restart the OPSFv3 routing process.29. A network administrator in a branch office is configuringEIGRP authentication between the branch office router and the headquarters office router. Which security credential is needed for the authentication process?o a randomly generated key with the crypto key generate rsa commando the username and password configured on the headquarters office router o the hostname of the headquarters office router and a common passwordo a common key configured with the key-string command inside a key chain30. For troubleshooting missing EIGRP routes on a router,what three types of information can be collected using the show ip protocols command? (Choose three.)o any interfaces that are enabled for EIGRP authenticationo any interfaces on the router that are configured as passiveo the IP addresses that are configured on adjacent routerso any ACLs that are affecting the EIGRP routing processo networks that are unadvertised by the EIGRP routing protocolo the local interface that is used to establish an adjacency with EIGRP neighbors31. Refer to the exhibit. A network technician istroubleshooting missing OSPFv3 routes on a router. What is the cause of the problem based on the commando There is a problem with the OSPFv3 adjacency between the local router and the router that is using the neighbor ID 2.2.2.2.o The local router has formed complete neighbor adjacencies, but must be in a 2WAY state for the router databases to be fully synchronized.o The dead time must be higher than 30 for all routers to form neighbor adjacencies.o The neighbor IDs are incorrect. The interfaces must use only IPv6 addresses to ensure fully synchronized routing databases.32. A network engineer is implementing security on allcompany routers. Which two commands must be issued to force authentication via the password 1C34dE for allOSPF-enabled interfaces in the backbone area of thecompany network? (Choose two.)o ip ospf message-digest-key 1 md5 1C34dEo area 1 authentication message-digesto username OSPF password 1C34dEo enable password 1C34dEo area 0 authentication message-digest33. Which port role is assigned to the switch port that has thelowest cost to reach the root bridge?o root porto non-designated porto designated porto disabled port34. Refer to the exhibit. A network administrator is attemptingto upgrade the IOS system image on a Cisco 2901 router.After the new image has been downloaded and copied to the TFTP server, what command should be issued on the router before the IOS system image is upgraded on theo dir flash:o ping 10.10.10.1o copy tftp: flash0:o ping 10.10.10.235. A set of switches is being connected in a LAN topology.Which STP bridge priority value will make it least likely for the switch to be selected as the root?o4096o32768o61440o6553536. What are two features of OSPF interarea routesummarization? (Choose two.)o ASBRs perform all OSPF summarization.o Routes within an area are summarized by the ABR.o ABRs advertise the summarized routes into the backbone.o Type 3 and type 5 LSAs are used to propagate summarized routes by default.o Route summarization results in high network traffic and router overhead.37. Refer to the exhibit. What are two results of issuing thedisplayed commands on S1, S2, and S3? (Choose two.)o S1 will automatically adjust the priority to be the lowest.o S1 will automatically adjust the priority to be the highest.o S3 can be elected as a secondary bridge.o S2 can become root bridge if S3 fails.o S2 can become root bridge if S1 fails.38. Refer to the exhibit. Which two conclusions can be drawnfrom the output? (Choose two.)o The EtherChannel is down.o The port channel ID is 2.o The port channel is a Layer 3 channel.o The bundle is fully operational.o The load-balancing method used is source port to destination port. 39. Refer to the exhibit. Interface FastEthernet 0/1 on S1 isconnected to Interface FastEthernet 0/1 on S2, andInterface FastEthernet 0/2 on S1 is connected to Interface FastEthernet 0/2 on S2. What are two errors in the presentEtherChannel configurations? (Choose two.)o The trunk mode is not allowed for EtherChannel bundles.o Two auto modes cannot form a bundle.o Desirable mode is not compatible with on mode.o The channel group is inconsistent.o The interface port channel ID should be different in both switches. 40. Which technology is an open protocol standard thatallows switches to automatically bundle physical ports into a single logical link?o Multilink PPPo DTPo LACPo PAgP41. A network administrator has configured an EtherChannelbetween two switches that are connected via four trunk links. If the physical interface for one of the trunk linkschanges to a down state, what happens to theEtherChannel?o The EtherChannel will transition to a down state.o Spanning Tree Protocol will recalculate the remaining trunk links.o The EtherChannel will remain functional.o Spanning Tree Protocol will transition the failed physical interface into forwarding mode.42. Refer to the exhibit. Based on the command outputshown, what is the status of the EtherChannel?o The EtherChannel is dynamic and is using ports Fa0/10 and Fa0/11 as passive ports.o The EtherChannel is down as evidenced by the protocol field being empty.o The EtherChannel is partially functional as indicated by the P flags for the FastEthernet ports.o The EtherChannel is in use and functional as indicated by the SU and P flags in the command output.43. Refer to the exhibit. If router B is to be configured forEIGRP AS 100, which configuration must be entered?o B(config-router)# network 192.168.10.4 0.0.0.3 B(config-router)# network 192.168.10.8 0.0.0.3o B(config-router)# network 192.168.10.4 0.0.0.3 B(config-router)# network 192.168.10.8 0.0.0.3 B(config-router)#network 192.168.10.1280.0.0.63o B(config-router)# network 192.168.10.4 255.255.255.248 B(config-router)# network 192.168.10.8 255.255.255.248 B(config-router)#network192.168.10.128 255.255.255.192o B(config-router)# network 192.168.10.0 255.255.255.0o B(config-router)# network 192.168.10.4 0.0.0.3 B(config-router)# network 192.168.10.8 0.0.0.3 B(config-router)# network 192.168.10.640.0.0.63 B(config-router)# network 192.168.10.128 0.0.0.63 B(config-router)# network 192.168.10.192 0.0.0.63o B(config-router)# network 192.168.10.0 0.0.0.25544. Refer to the exhibit. When the show ip ospf neighborcommand is given from the R1# prompt, no output isshown. However, when the show ip interface briefcommand is given, all interfaces are showing up and up.What is the most likely problem?o R2 has not brought the S0/0/1 interface up yet.o R1 or R2 does not have a loopback interface that is configured yet.o The ISP has not configured a static route for the ABC Company yet.o R1 or R2 does not have a network statement for the 172.16.100.0 network.o R1 has not sent a default route down to R2 by using the default-information originate command.45. Refer to the exhibit. Which destination MAC address isused when frames are sent from the workstation to thedefault gateway?o MAC address of the forwarding routero MAC addresses of both the forwarding and standby routerso MAC address of the standby routero MAC address of the virtual router46. If a company wants to upgrade a Cisco 2800 router fromIOS 12.4T, what IOS should be recommended for a stable router platform?o12.5To13.1To14.0o15.1M47. What is the purpose of the Cisco PAK?o It is a key for enabling an IOS feature set.o It is a proprietary encryption algorithm.o It is a compression file type used when installing IOS 15 or an IOS upgrade.o It is a way to compress an existing IOS so that a newer IOS version can be co-installed on a router.48. What are two reasons to implement passive interfaces inthe EIGRP configuration of a Cisco router? (Choose two.)o to provide increased network securityo to shut down unused interfaceso to avoid unnecessary update traffico to mitigate attacks coming from the interfaceso to exclude interfaces from load balancing49. Fill in the blank.EIGRP keeps feasible successor routes inthe topology table.50. Fill in the blank.The backbone area interconnects with all other OSPF area types.51. Fill in the blank. Use the acronym.Which encryptionprotocol is used by the WPA2 shared key authentication technique? AES52. Match each OSPF LSA description with its type. (Not alloptions are used.)53. Match the CLI command prompt with the command orresponse entered when backing up Release 15 IOS imageto an IPv6 TFTP server. (Not all options are used.)54. Which characteristic would most influence a networkdesign engineer to select a multilayer switch over a Layer2 switch?o ability to build a routing tableo ability to aggregate multiple ports for maximum data throughputo ability to provide power to directly-attached devices and the switch itself o ability to have multiple forwarding paths through the switched network based on VLAN number(s)55. A network designer is considering whether to implementa switch block on the company network. What is theprimary advantage of deploying a switch block?o A single core router provides all the routing between VLANs.o The failure of a switch block will not impact all end users.o This is a security feature that is available on all new Catalyst switches.o This is network application software that prevents the failure of a singleo network device.56. Which action should be taken when planning forredundancy on a hierarchical network design?o immediately replace a non-functioning module, service or device on a networko continually purchase backup equipment for the networko implement STP portfast between the switches on the networko add alternate physical paths for data to traverse the network57. Which technological factor determines the impact of afailure domain?o the number of layers of the hierarchical networko the number of users on the access layero the role of the malfunctioning deviceo the forwarding rate of the switches used on the access layer58. What are three access layer switch features that areconsidered when designing a network? (Choose three.)o broadcast traffic containmento failover capabilityo forwarding rateo port densityo Power over Etherneto speed of convergence59. What are two requirements when using out-of-bandconfiguration of a Cisco IOS network device? (Choosetwo.)o HTTP access to the deviceo a terminal emulation cliento Telnet or SSH access to the deviceo a direct connection to the console or AUX porto a connection to an operational network interface on the device60. In a large enterprise network, which two functions areperformed by routers at the distribution layer? (Choosetwo.)o connect remote networkso provide Power over Ethernet to deviceso connect users to the networko provide data traffic securityo provide a high-speed network backboneUpdated 05 April 20151. Refer to the exhibit. Which switch will be the root bridgeafter the election process is complete?CCNA3 Final Exam updated 001o S1o S2o S3o S42. Refer to the exhibit. What are the possible port roles forports A, B, C, and D in this RSTP-enabled network?CCNA3 Final Exam updated 002o alternate, root, designated, rooto designated, root, alternate, rooto alternate, designated, root, rooto designated, alternate, root, root3. Refer to the exhibit. A network administrator is configuringPVST+ for the three switches. What will be a result ofentering these commands?CCNA3 Final Exam updated 003o S1 will set the priority value for VLAN 10 to 0.o S2 will set the priority value for VLAN 10 to 24576.o S3 will set the priority value for VLAN 30 to 8192.o S1 will set the priority value for VLAN 20 to 24596.4. A network administrator is analyzing the features that aresupported by different first-hop router redundancyprotocols. Which statement is a feature that is associated with GLBP?o GLBP allows load balancing between routers.o It is nonproprietary.o It uses a virtual router master.o It works together with VRRP.5. A network administrator is analyzing the features that aresupported by different first-hop router redundancyprotocols. Which statement describes a feature that isassociated with HSRP?o HSRP uses active and standby routers.o It uses ICMP messages in order to assign the default gateway to hosts.o It allows load balancing between a group of redundant routers.o HSRP is nonproprietary.6. Which function is provided by EtherChannel?o spreading traffic across multiple physical WAN linkso dividing the bandwidth of a single link into separate time slotso enabling traffic from multiple VLANs to travel over a single Layer 2 linko creating one logical link by using multiple physical links between two LAN switches7. Which two channel group modes would place an interfacein a negotiating state using PAgP? (Choose two.)o ono desirableo activeo autoo passive8. At a local college, students are allowed to connect to thewireless network without using a password. Which mode is the access point using?o networko openo passiveo shared-key9. Which wireless encryption method is the most secure?o WPAo WEPo WPA2 with TKIPo WPA2 with AES10. Users on an IEEE 801.11n network are complaining ofslow speeds. The network administrator checks the APand verifies it is operating properly. What can be done to improve the wireless performance in the network?o Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.o Change the authentication method on the AP.o Switch to an 802.11g AP.o Set the AP to mixed mode.11. What are two methods to make the OSPF routing protocolmore secure? (Choose two.)o Use only OSPFv3.o Use MD5 authentication.o Use the enable secret command.o When feasible, create a VPN tunnel between each OSPF neighbor adjacency.o Use the passive-interface command on LAN interfaces that areconnected only to end-user devices.12. Refer to the exhibit. A network technician istroubleshooting missing OSPFv3 routes on a router. What is the cause of the problem based on the commandoutput?CCNA3 Final Exam updated 004o There is a problem with the OSPFv3 adjacency between the local router and the router that is using the neighbor ID 2.2.2.2.o The local router has formed complete neighbor adjacencies, but must be in a 2WAY state for the router databases to be fully synchronized.o The dead time must be higher than 30 for all routers to form neighbor adjacencies.o The neighbor IDs are incorrect. The interfaces must use only IPv6 addresses to ensure fully synchronized routing databases.13. Which type of OSPF LSA represents an external route andis propagated across the entire OSPF domain?o type 1o type 2o type 3o type 4o type 514. An administrator issues the router eigrp 100 command ona router. What is the number 100 used for?o as the autonomous system numbero as the number of neighbors supported by this routero as the length of time this router will wait to hear hello packets from a neighboro as the maximum bandwidth of the fastest interface on the router15. A network administrator wants to verify the default delayvalues for the interfaces on an EIGRP-enabled router.Which command will display these values?o show ip protocolso show running-configo show interfaceso show ip route16. Which two parameters does EIGRP use by default tocalculate the best path? (Choose two.)o delayo MTUo reliabilityo transmit and receive loado bandwidth17. By default, how many equal cost routes to the samedestination can be installed in the routing table of a Cisco router?o 2o4o16o3218. When a Cisco router is configured with fast-switching,how are packets distributed over equal-cost paths?o on a per-packet basiso on a per-interface basiso on a per-path-load basiso on a per-destination basis19. Refer to the exhibit. Router CiscoVille has been partiallyconfigured for EIGRP authentication. What is missing that would allow successful authentication between EIGRPneighbors?。

相关文档
最新文档