Вы находитесь на странице: 1из 28

Tweet Tweet 0 0

CCNA 3 Scaling Networks Chapter 2 v5.0 Exam Answers 2014



1
Which protocol provides up to 16 instances of RSTP, combines many VLANs with the same physical and
logical topology into a common RSTP instance, and provides support for PortFast, BPDU guard, BPDU
!lter, root guard, and loop guard?
STP
Rapid PVST+
PVST+
MST*
2
Which two types of spanning tree protocols can cause suboptimal tra"c #ows because they assume
only one spanning-tree instance for the entire bridged network? (Choose two.)
STP*
RSTP*
MSTP
Rapid PVST+
PVST+
3
Refer to the exhibit. Which protocol information is being displayed in the output?
HSRP
VRRP
GLBP*
FHRP
4
Business Admin Degrees
onlinelearning101.com/Degree
Search Results -Education Options. Articles On Business Admin Degrees.
0 Like Like Share Share
Alternative Server Alternative Server
CCNA 1 v5.0 PDF
CCNA 2 v5.0 PDF
CCNA 3 v5.0 PDF
CCNA 4 v5.0 PDF
CCNA v5.0 Exam Answers PDF CCNA v5.0 Exam Answers PDF
Search Search
CCNA 1 v5.0 Routing and Switching
CCNA 2 v5.0 Routing and Switching
CCNA 200-120 Questions
CCNA 200-120 Simulation
CCNA 3 v5.0 Quiz
CCNA 3 v5.0 Routing and Switching
CCNA 4 v5.0 Routing and Switching
CCNA v5.0 Final Exams
CCNA v5.0 Final Exams Packet Tracer
IT Essentials v4.1
IT Essentials v5.0
Categories Categories
CCNA5.NET
Sign In Sign In Register Register HOME HOME CCNA v5.0 CCNA v5.0 CCNA Security CCNA Security IT-Essentials IT-Essentials Courses Courses
A network administrator is preparing the implementation of Rapid PVST+ on a production network.
How are the Rapid PVST+ link types determined on the switch interfaces?
Link types can only be con!gured on access ports con!gured with a single VLAN.
Link types must be con!gured with speci!c port con!guration commands.
Link types are determined automatically.*
Link types can only be determined if PortFast has been con!gured.
5
Which RSTP ports are connected to end devices?
root ports
designated ports
trunk ports
edge ports*
6
If no bridge priority is con!gured in PVST, which criteria is considered when electing the root bridge?
highest IP address
lowest MAC address*
lowest IP address
highest MAC address
7
Which port state will switch ports immediately transition to when con!gured for PortFast?
learning
blocking
forwarding*
listening
8
To obtain an overview of the spanning tree status of a switched network, a network engineer issues
the show spanning-tree command on a switch. Which two items of information will this command
display? (Choose two.)
The role of the ports in all VLANs.*
The IP address of the management VLAN interface.
The number of broadcasts received on each root port.
The status of native VLAN ports.
The root bridge BID.*
9
Uncategorized
! CCNA Routers and Switches
! STP
! Cisco Network Module
! Cisco 12 Port Switch
! Bridge Cisco
! CCNA Network
Find us on Facebook
CCNA v5 Final Exams
2,647 people like CCNA v5 Final Exams.
Facebook social plugin
Like Like
CCNA5.NET -> CISACAD.COM
CCNA5 - CISACAD.COM
@myccna
Expand
New Server CISACAD.COM
CCNA5 - CISACAD.COM
@myccna
8 Jul
27 Jun
Tweets Follow Follow
Tweet to @myccna
Launch PT Hide and Save PT
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
Which switch is the root bridge?
Switch_1
Switch_2
Switch_4*
Switch_3
10
Fill in the blank. Do not use abbreviations.
The spanning-tree mode rapid-pvst global con!guration command is used to enable Rapid PVST+.
11
Which STP priority con!guration would ensure that a switch would always be the root switch?
spanning-tree vlan 10 root primary
spanning-tree vlan 10 priority 4096
spanning-tree vlan 10 priority 0*
spanning-tree vlan 10 priority 61440
12
Which nonproprietary protocol provides router redundancy for a group of routers which support IPv4
LANs?
VRRPv2*
SLB
GLBP
HSRP
13
Fill in the blank.
In FHRP operation, two or more routers are represented as a single virtual router.
14
Which three components are combined to form a bridge ID?
extended system ID*
MAC address*
port ID
IP address
cost
bridge priority*
15
What is a characteristic of a Layer 2 loop?
A switch is continually forwarding the same unicast frame.
Broadcast frames are forwarded back to the sending switch.*
Routers continually forward packets to other routers.
The Time-to-Live attribute of a frame is set to in!nity.
16
Which two network design features require Spanning Tree Protocol (STP) to ensure correct network
operation? (Choose two.)
redundant links between Layer 2 switches*
removing single points of failure with multiple Layer 2 switches*
link-state dynamic routing that provides redundant routes
static default routes
implementing VLANs to contain broadcasts
17
What additional information is contained in the 12-bit extended system ID of a BPDU?
MAC address
VLAN ID*
port ID
IP address
18
What is an advantage of PVST+?
PVST+ optimizes performance on the network through load sharing.*
PVST+ requires fewer CPU cycles for all the switches in the network.
PVST+ reduces bandwidth consumption compared to traditional implementations of STP that use CST.
PVST+ optimizes performance on the network through autoselection of the root bridge.
19
What is the purpose of HSRP?
It prevents malicious hosts from connecting to trunk ports.
It enables an access port to immediately transition to the forwarding state.
It prevents a rogue switch from becoming the STP root.
It provides a continuous network connection when a router fails.*
20
In which two port states does a switch learn MAC addresses and process BPDUs in a PVST network?
(Choose two.)
listening
learning*
forwarding*
disabled
blocking
21
Place the options in the following order:
Step 4
not scored
Step 3
Step 1
Step 2
22
Refer to the exhibit. A network engineer is troubleshooting host connectivity on a LAN that uses a !rst
hop redundancy protocol. Which IPv4 gateway address should be con!gured on the host?
192.168.2.0
192.168.2.1
192.168.2.2
192.168.2.100*
23
What is the outcome of a Layer 2 broadcast storm?
CSMA/CD will cause each host to continue transmitting frames.
ARP broadcast requests are returned to the transmitting host.
Routers will take over the forwarding of frames as switches become congested.
New tra"c is discarded by the switch because it is unable to be processed.*

3-Minute Chakra Test
chakrahealing.com
Take the Free Chakra Test to Find Out Which of Your Chakras Are Weak
00
December 6, 2013 by CCNA5.NET
in CCNA 3 v5.0 Routing and Switching
answers answers ccna ccna
CCNA 3 R&S: Scaling Networks Exam Answers CCNA 3 R&S: Scaling Networks Exam Answers
Comments
ccna 3 v5.0 ccna 3 v5.0 ccna exam answers ccna exam answers
ccna routing and switching ccna routing and switching ccna v5.0 ccna v5.0
ccna3 v5 exam ccna3 v5 exam cisco cisco Cisco v5.0 Cisco v5.0 exam exam
Exam Answers Exam Answers exam ccna 3 version 5.0 exam ccna 3 version 5.0
examen !nal ccna 3 v5.0 examen !nal ccna 3 v5.0
! CCNA Answers ! Exam Cisco CCNA ! Mac Address ! CCNA Full Form
Name
Email
5 " three =
Comment
Add Comment Add Comment
CCNA5.NET CCNA5.NET HOME HOME CCNA v5.0 CCNA v5.0 CCNA Security CCNA Security IT-Essentials IT-Essentials Courses Courses
Tweet Tweet 0 1
CCNA 1 Chapter 2 v5.0 Exam Answers 2014
1.
Refer to the exhibit. A switch was con!gured as shown. A ping to the default gateway was issued, but
the ping was not successful. Other switches in the same network can ping this gateway. What is a
possible reason for this?
The default gateway address must be 192.168.10.1.
The ip default-gateway command has to be issued in the VLAN interface con!guration mode.
The VLAN IP address and the default gateway IP address are not in the same network.
The no shutdown command was not issued for VLAN 1.
The local DNS server is not functioning correctly.
2.
While trying to solve a network issue, a technician made multiple changes to the current router
con!guration !le. The changes did not solve the problem and were not saved. What action can the
technician take to discard the changes and work with the !le in NVRAM?
Issue the reload command without saving the running con!guration.
Close and reopen the terminal emulation software.
Delete the vlan.dat !le and reboot the device.
Issue the copy startup-con!g running-con!g command.
3.
Why is it important to con!gure a hostname on a device?
to allow local access to the device through the console port
a Cisco router or switch only begins to operate when its hostname is set
to identify the device during remote access (SSH or telnet)
a hostname must be con!gured before any other parameters
4.
Which procedure is used to access a Cisco 2960 switch when performing an initial con!guration in a
secure environment?
Use the console port to locally access the switch from a serial or USB interface of the PC.
Use Secure Shell to remotely access the switch through the network.
Use Telnet to remotely access the switch through the network.
Use the AUX port to locally access the switch from a serial or USB interface of the PC.
10 Like Like Share Share
Alternative Server Alternative Server
CCNA 1 v5.0 PDF
CCNA 2 v5.0 PDF
CCNA 3 v5.0 PDF
CCNA 4 v5.0 PDF
CCNA v5.0 Exam Answers PDF CCNA v5.0 Exam Answers PDF
Search Search
CCNA 1 v5.0 Routing and Switching
CCNA 2 v5.0 Routing and Switching
CCNA 200-120 Questions
CCNA 200-120 Simulation
CCNA 3 v5.0 Quiz
CCNA 3 v5.0 Routing and Switching
CCNA 4 v5.0 Routing and Switching
CCNA v5.0 Final Exams
CCNA v5.0 Final Exams Packet Tracer
IT Essentials v4.1
IT Essentials v5.0
Categories Categories
CCNA5.NET
Sign In Sign In Register Register HOME HOME CCNA v5.0 CCNA v5.0 CCNA Security CCNA Security IT-Essentials IT-Essentials Courses Courses
5.
What criterion must be followed in the design of an IPv4 addressing scheme for end devices?
Each local host should be assigned an IP address with a unique network component.
Each IP address must match the address that is assigned to the host by DNS.
Each IP address must be unique within the local network.
Each IP address needs to be compatible with the MAC address.
6.
A network administrator needs to keep the user ID, password, and session contents private when
establishing remote CLI connectivity with a switch to manage it. Which access method should be
chosen?
AUX
SSH
Console
Telnet
7.
Which interface allows remote management of a Layer 2 switch?
the switch virtual interface
the console port interface
the AUX interface
the !rst Ethernet port interface
8.
What is a result of using the service password-encryption command on a Cisco network device?
All passwords in the con!guration are not shown in clear text when viewing the con!guration.
The command encrypts the banner message.
The command encrypts the enable mode password.
A network administrator who later logs into the device will be required to enter an administrator password
in order to gain access to the Cisco device.
9.
Match the di!nitions to their respective CLI hot keys and shortcuts.
Tab -> Completes abbreviated commands and parameters
Ctrl-R -> returns directly to the privileged EXEC mode
Up Arrow -> scrolls backwards through previously entered commands
Ctrl-Z -> cancels any command currently being entered and returns directly to privileged EXEC mode
Ctrl-C -> Redisplays, on a new line, the command currently being typed
10.
A network administrator is planning an IOS upgrade on several of the head o"ce routers and switches.
Which three questions must be answered before continuing with the IOS selection and upgrade?
(Choose three.)
What models of routers and switches require upgrades?
Do the routers and switches have enough RAM and #ash memory for the proposed IOS versions?
What ports are installed on the routers and switches?
Are the devices on the same LAN?
What features are required for the devices?
Do the devices have enough NVRAM to store the IOS image?
Uncategorized
" Cisco Router Switch
" Router Setup
" Cisco Password Config
" Cisco Network Module
" Cisco Configuration
" Cisco Connect
Find us on Facebook
CCNA v5 Final Exams
2,647 people like CCNA v5 Final Exams.
Facebook social plugin
Like Like
CCNA5.NET -> CISACAD.COM
CCNA5 - CISACAD.COM
@myccna
Expand
New Server CISACAD.COM
CCNA5 - CISACAD.COM
@myccna
8 Jul
27 Jun
Tweets Follow Follow
Tweet to @myccna
11. What bene!t does DHCP provide to a network?
Hosts can connect to the network and get an IP address without manual con!guration.
Duplicate addresses cannot occur on a network that issues dynamic addresses using DHCP and has static
assignments.
DHCP allows users to refer to locations by a name rather than an IP address.
Hosts always have the same IP address and are therefore always reachable.
12.
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI?
(Choose two.)
providing an error message when a wrong command is submitted
allowing the user to complete the remainder of an abbreviated command with the TAB key
displaying a list of all available commands within the current mode
selecting the best command to accomplish a task
determining which option, keyword, or argument is available for the entered command
13.
A router has a valid operating system and a con!guration stored in NVRAM. When the router boots up,
which mode will display?
global con!guration mode
user EXEC mode
setup mode
ROM monitor mode
14.
Which two features are characteristics of #ash memory? (Choose two.)
Flash receives a copy of the IOS from RAM when a device is powered on.
Flash provides nonvolatile storage.
The contents of #ash may be overwritten.
Flash is a component in Cisco switches but not in Cisco routers.
The contents of "ash may be lost during a power cycle.
15.
Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and
interfaces that can be protected with passwords. (Choose three.)
boot IOS mode
Ethernet interface
privileged EXEC mode
VTY interface
console interface
router con!guration mode
16.
Why would a Layer 2 switch need an IP address?
to enable the switch to send broadcast frames to attached PCs
to enable the switch to function as a default gateway
to enable the switch to receive frames from attached PCs
to enable the switch to be managed remotely
17.
What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?
if there is connectivity with the destination device
what type of device is at the destination
if the TCP/IP stack is functioning on the PC without putting tra#c on the wire
the path that tra#c will take to reach the destination
18.
What command can be used on a Windows PC to see the IP con!guration of that computer?
ping
show interfaces
show ip interface brief
ipcon!g
19.
Which statement is true about the running con!guration !le in a Cisco IOS device?
Manam January 30, 2014 Reply
Answer 9 is wrong. Correct aswer for 9. Match the di!nitions to their respective CLI hot keys
and shortcuts. is:
The shortcuts with their functions are as follows:
It should be deleted using the erase running-con!g command.
It is automatically saved when the router reboots.
It a$ects the operation of the device immediately when modi!ed.
It is stored in NVRAM.
20.
Match the description to the common IOS CLI access method.
21.
Which two characters are allowed as part of the hostname of a Cisco device? (Choose two.)
tab
space
question mark
numbers
underline
22.
A new network administrator has been asked to enter a banner message on a Cisco device. What is the
fastest way a network administrator could test whether the banner is properly con!gured?
Power cycle the device.
Enter CTRL-Z at the privileged mode prompt.
Exit global con!guration mode.
Exit enable mode and press Enter.
Reboot the device.

Comments
wireless gateway
moxa.com
The easiest way to access private IP devices. Try it NOW!
55
November 4, 2013 by CCNA5.NET
in CCNA 1 v5.0 Routing and Switching
ccna 1 chapter 2 exam answers ccna 1 chapter 2 exam answers
ccna routing and switching ccna routing and switching ccna v5.0 ccna v5.0
" Router Password " Cisco Exam CCNA " Test Exam " Cisco IOS
- Tab Completes the remainder of a partially typed command or keyword
- Ctrl-R Redisplays, on a new line, the command currently being typed
- Ctrl-Z Exits con!guration mode and returns to the EXEC
- Up Arrow Allows user to scroll backward through former commands
- Ctrl-C cancels any command currently being entered and returns directly to privileged
EXEC mode
- Ctrl-Shift-6 Allows the user to interrupt an IOS process such as ping or traceroute
Dexter February 3, 2014 Reply
There is a mistake at question no.9. Here is the correct di!nitions:
Ctrl-R -> Redisplays, on a new line, the command currently being typed
Ctrl-Z -> returns directly to the privileged EXEC mode
Ctrl-C -> cancels any command currently being entered and returns directly to privileged
EXEC mode
Chaka April 21, 2014 Reply
A network administrator is planning an IOS upgrade on several of the head o#ce routers
and switches. Which three questions must be answered before continuing with the IOS
selection and upgrade? (Choose three.)Correct
Response
Your
Response
Are the devices on the same LAN?Do the devices have enough NVRAM to store the IOS
image?What models of routers and switches require upgrades?What ports are installed on
the routers and switches?Do the routers and switches have enough RAM and "ash memory
for the proposed IOS versions?What features are required for the devices?
Nick April 24, 2014 Reply
Question 21:
Underline aint the right answer. Choose dash instead.
Surya Bumi May 5, 2014 Reply
thanks for shared this exam.. i had !nish this..
i get excellent score..
Name
Email
four + 1 =
Comment
Add Comment Add Comment
CCNA5.NET CCNA5.NET HOME HOME CCNA v5.0 CCNA v5.0 CCNA Security CCNA Security IT-Essentials IT-Essentials Courses Courses
CCNA5.NET CCNA5.NET HOME HOME CCNA v5.0 CCNA v5.0 CCNA Security CCNA Security IT-Essentials IT-Essentials Courses Courses
1. Where ls lL necessary Lo use half duplex Lransmlsslon?
Cn a shared medlum where CSMA/Cu ls used

2. WhaL ls necessary for a swlLch Lo forward a frame only Lo Lhe lnLended desLlnaLlon?
1he desLlnaLlon MAC address musL be ln Lhe swlLch's MAC address Lable

3. A hub ln an LLherneL neLwork ls replaced wlLh a swlLch. 1hls wlll:.
lncrease Lhe number of colllslon domalns

4. Whlch funcLlon ls carrled ouL by a layer 3 swlLch buL noL by a layer 2 swlLch?
uslng l addresses Lo rouLe packeLs Lo Lhelr desLlnaLlons

3. Why ls shared memory bufferlng preferred Lo porL based bufferlng?
All of Lhe above

6. ln Lhe CLl, presslng Lhe up arrow key wlll:
Show Lhe mosL recenL enLry ln Lhe command hlsLory

7. WhaL ls sLored ln nv8AM?
SLarLup conflguraLlon

8. Whlch command speclfles LhaL access Lo Lhe web based lnLerface uses Lhe same password as prlvlleged exec
mode
lp hLLp auLhenLlcaLlon enable

9. Where should a swlLch l address and subneL mask be conflgured?
Cn a vLAn lnLerface

10. WhaL ls sLored ln nv8AM ln a Clsco rouLer
SLarLup conflg

11. WhaL happens Lo Lhe conLenL of nv8AM when a Clsco rouLer ls Lurned off
ConLenLs remaln

12. ls 8CM monlLor mode and whaL ls lL commonly used for
Allows access Lo Lhe 8CM sLarLup code whlch provldes a slmple LexL lnLerface and very llmlLed funcLlonallLy
used mosL ofLen for password recovery

13. lf Lhe lCS does noL flnd a conflg flle ln nv8AM where does lL look. lf no lCS flle can be locaLed whaL does lL do.
1he lCS searches for a 1l1 server.
lf no 1l1 server found Lhe seLup dlalog ls lnlLlaLed

14. WhaL command can be used Lo verlfy Lhe conflguraLlon reglsLer value
Show verslon

13. ln Lhe command lCS fllename c3600-d-mz.122-16a.bln, whaL does Lhe 122-16a represenL
lCS verslon number

16. WhaL command would be used Lo download a sLarLup conflg flle Lo a LfLp server
Copy SLarL LfLp

17. WhaL rouLer conflguraLlon command ls equlvalenL Lo cLrl-z
Lnd

18. WhaL are Lhe dlfferences beLween dynamlc rouLlng and sLaLlc rouLlng
!"#$%&' )*+,&#-
lnformaLlon ls learned from oLher rouLers
8ouLlng proLocols ad[usL rouLes auLomaLlcally (dynamlcally).

.,$,&' )*+,&#-
neLwork admlnlsLraLor conflgures lnformaLlon abouL remoLe neLworks manually.
1hey are used Lo reduce overhead and for securlLy
8ecause of exLra admlnlsLraLlve requlremenLs, sLaLlc rouLlng do noL have Lhe scalablllLy of dynamlc rouLlng.

19. WhaL are Lhe Lwo ways Lo speclfy Lhe nexL hop ln an lp rouLe command
1he ouLgolng lnLerface, or
1he nexL hop l address of Lhe ad[acenL rouLer

20. lf Lwo rouLlng proLocol updaLes have been recelved and have Lhe same meLrlc, whaL may make Lhe rouLlng
proLocol selecL one updaLe over Lhe oLher.
A lower admlnlsLraLlve dlsLance

21. WhaL command ls used Lo vlew Lhe rouLlng Lable
Show lp rouLe

22. WhaL are Lhe feaLures of a dlsLance vecLor rouLlng proLocol LhaL make lL dlsLlncL from llnk sLaLe rouLlng proLocols
1yplcally malnLaln only nexL hop and hop counL Lo a desLlnaLlon and do noL sLore lnLermedlaLe nodes and
llnk sLaLe
asses compleLe rouLlng Lables Lo nelghbours
8ouLlng Lables are exchanged perlodlcally

23. Where ls a border gaLeway proLocol such as 8C used
1yplcally used beLween lSs or beLween a company and an lS Lo rouLe beLween auLonomous sysLems

24. lf you saw Lhe show command response - Serlal0 ls up, llne proLocol ls down - whaL would be Lhe mosL llkely
problem
Layer 2 problem such as mlsmaLched layer 2 WAn proLocol

23. 1he plng command operaLes aL whlch layer of Lhe CSl model
Layer 3

26. WhaL ls a show command uslng a proprleLary Clsco proLocol LhaL can be used Lo faulL flnd aL layer 2
Show Cu nelghbours

27. WhaL ls Lhe counL Lo lnflnlLy problem and whaL mechanlsms do rouLlng proLocols employ Lo address lL
1he rouLlng proLocol permlLs Lhe rouLlng updaLe Lo propagaLe (loop) unLll Lhe meLrlc exceeds lLs maxlmum
allowed value.
lL ls addressed by seLLlng a flnlLe llmlL for lnflnlLy l.e Lhe 11L or by uslng holddown Llmers

28. WhaL ls spllL horlzon used for and how does lL work. WhaL Lype of rouLlng proLocols use spllL horlzon.
Pelps prevenL rouLlng loops
rohlblLs a rouLer from adverLlslng a rouLe back onLo Lhe lnLerface from whlch lL was learned Lo ensure LhaL
a rouLlng loop does noL occur.
used by dlsLance vecLor rouLlng proLocols

29. WhaL ls Lhe updaLe Llme and maxlmum hops for 8l
30 sec
13 hops

30. ln Lhe above rouLer response above whaL does 192.168.3.0/24 refer Lo
uesLlnaLlon neLwork

31. ln Lhe command - rouLer lgrp 101 - whaL does Lhe 101 refer Lo
AuLonomous sysLem number

32. WhaL are Lwo funcLlons of an ACL
ACLs enable managemenL of Lrafflc
Secure access Lo and from a neLwork

33. WhaL ls Lhe dlfference beLween a sLandard and exLended ACL
SLandard ACL speclfles only Lhe source l address
LxLended ACLs can fllLer Lrafflc based on source l, desLlnaLlon l, proLocol (l, 1C, uu and lCM) and porL
number

34. ln whaL order are ACL sLaLemenLs checked
ACL sLaLemenLs operaLe ln sequenLlal, loglcal order, from Lop Lo boLLom.

33. WhaL musL be done lf addlLlonal condlLlon sLaLemenLs are needed ln an access llsL LhaL ls noL a named access llsL
1he enLlre ACL musL be deleLed and recreaLed wlLh Lhe new condlLlon sLaLemenLs

36. WhaL ls Lhe effecL of servlce password-encrypLlon command?
lL applles weak encrypLlon Lo passwords LhaL are plaln LexL by defaulL.

37. Whlch of Lhese wlll noL produce Lhe message AuLhorlsed users Cnly ?
8anner moLd lAuLhorlsed users Cnlyl

38. A swlLch porL ls noL ln use. Why should you conflgure lL wlLh Lhe shuLdown command?
lor securlLy

39. Why ls SSP a beLLer opLlon Lhan 1elneL for remoLe access Lo a swlLch?
Messages are senL ln encrypLed form.

40. Whlch command would allow you Lo use elLher SSP or 1elneL?
1ransporL lnpuL all on Lhe vLy llnes

41. Whlch ls Lrue of Lhe password recovery process?
lL can be dlfferenL on dlfferenL models of swlLch

42. Whlch Lype of secure addresses are losL when a swlLch rebooLs?
uynamlc

43. 8y defaulL, whaL happens lf Lhere ls a swlLch porL securlLy vlolaLlon?
1he porL shuLs down and sends a syslog message
44. Whlch command ls needed before securlLy ls seL on a swlLch porL?
SwlLchporL mode access

.+/#0,,&#-
Conslder Lhe neLwork above wlLh branch offlces aL each locaLlon wlLh Lhe number of hosLs as speclfled.
SelecL a "#$%&' '%()) * +,-./01 (220,)) and subneL Lhe neLwork for all LAns and WAn connecLlons assumlng Lhe use of
subneL 0.
CalculaLe Lhe LAn subneLs wlLh subneL masks and allocaLe a subneL Lo each slLe
CalculaLe Lhe WAn subneLs wlLh subneL masks
LlsL Lhe spare subneLs wlLh subneL masks.

4ROUTING
CCNA 1 v5, CCNA 2 v5, CCNA 3 v5, CCNA 4 v5 Routing and Switching Exams Answers v5 2013- 2014, IT Essentials v5 Exam
Answers
CCNA 2 Chapter 2 v5 Routing and Switching Essentials
Exam
CCNA 2 Chapter 2 v5.0 Exam Answers Routing and Switching Essentials Basic
Switching Concepts and Conguration 2013/2014
CISCO CCNA Questions and Answers v5 Quiz TEST (Version 5.0) Chapter 2 Exam
This exam will cover material from Chapter 2 of the CCNA R&S Routing and Switching
Essentials curriculum.
1. Which interface is the default location that would contain the IP address used to manage
a 24-port Ethernet switch?
interface connected to the default gateway
Fa0/1
VLAN 99
Fa0/0
VLAN 1
_______________________________________________________________
2. Which three statements are true about using full-duplex Fast Ethernet? (Choose three.)
Performance is improved because the collision detect function is disabled on the
device.
Performance is improved because the NIC is able to detect collisions.
Full- duplex Fast Ethernet oers 100 percent eciency in both directions.
Nodes operate in full-duplex with unidirectional data ow.
Performance is improved with bidirectional data ow.
Latency is reduced because the NIC processes frames faster.
_______________________________________________________________
3
What impact does the use of the mdix auto conguration command have on an Ethernet
interface on a switch?
automatically detects interface speed
automatically assigns the rst detected MAC address to an interface
automatically detects duplex settings
automatically detects copper cable type
_______________________________________________________________
4. Which type of cable does a network administrator need to connect a PC to a switch to recover it after the Cisco
IOS software fails to load?
a coaxial cable
a crossover cable
a console cable
a straight-through cable
_______________________________________________________________
5
While troubleshooting a connectivity problem, a network administrator notices that a switch port status LED is
alternating between green and amber. What could this LED indicate?
The port has an active link with normal trac activity.
The port is administratively down.
The port is experiencing errors.
The port has no link.
A PC is using the wrong cable to connect to the port.
________________________________________________________________
6
A production switch is reloaded and nishes with a Switch> prompt. What two facts can be determined? (Choose two.)
The boot process was interrupted.
There is not enough RAM or ash on this router.
A full version of the Cisco IOS was located and loaded.
POST occurred normally.
The switch did not locate the Cisco IOS in ash, so it defaulted to ROM.
_________________________________________________________________
7
Which command displays information about the auto-MDIX setting for a specic interface??
show running-cong
show controllers
show processes
show interfaces
________________________________________________________________
8.
Refer to the exhibit. What media issue might exist on the link connected to Fa0/1 based on the show interface
command?
The interface might be congured as half-duplex.
There could be too much electrical interference and noise on the link.
There could be an issue with a faulty NIC.
The cable attaching the host to port Fa0/1 might be too long.
The bandwidth parameter on the interface might be too high.
_________________________________________________________________
9.
Refer to the exhibit. The network administrator wants to congure Switch1 to allow SSH connections and prohibit
Telnet connections. How should the network administrator change the displayed conguration to satisfy the
requirement?
Use SSH version 1.
Recongure the RSA key.
Congure SSH on a dierent line.
Modify the transport input command.
____________________________________________________________________
10
Which protocol or service sends broadcasts containing the Cisco IOS software version of the sending device, and the
packets of which can be captured by malicious hosts on the network?
DHCP
SSH
DNS
CDP
____________________________________________________________________
11
In which type of attack does a malicious node request all available IP addresses in the address pool of a DHCP server
in order to prevent legitimate hosts from obtaining network access??
DHCP snooping
MAC address ooding
CAM table overow
DHCP starvation
_________________________________________________________________
12
Which method would mitigate a MAC address ooding attack?
using ACLs to lter broadcast trac on the switch?
increasing the speed of switch ports
increasing the size of the CAM table
conguring port security
_____________________________________
13
Which two basic functions are performed by network security tools? (Choose two.)
simulating attacks against the production network to determine any existing vulnerabilities
writing a security policy document for protecting networks
educating employees about social engineering attacks
revealing the type of information an attacker is able to gather from monitoring network trac
controlling physical access to user devices
_______________________________________
14
Which action will bring an error-disabled switch port back to an operational state?
Issue the switchport mode access command on the interface.
Issue the shutdown and then no shutdown interface commands.
Remove and recongure port security on the interface.
Clear the MAC address table on the switch.
__________________________________________________________________
15.
Refer to the exhibit. Which S1 switch port interface or interfaces should be congured with the ip dhcp snooping
trust command if best practices are implemented?
only the G0/2, G0/3, and G0/4 ports
only the G0/1 and G0/24 ports
only the G0/1, G0/2, G0/3, and G0/4 ports
only unused ports
only the G0/1 port
_____________________________________
16.
Refer to the exhibit. Port Fa0/2 has already been congured appropriately. The IP phone and PC work properly. Which
switch conguration would be most appropriate for port Fa0/2 if the network administrator has the following goals?
No one is allowed to disconnect the IP phone or the PC and connect some other wired device.
If a dierent device is connected, port Fa0/2 is shut down.
The switch should automatically detect the MAC address of the IP phone and the PC and add those addresses to the
running conguration.
SWA(cong-if)# switchport port-security mac-address sticky
SWA(cong-if)# switchport port-security maximum 2
SWA(cong-if)# switchport port-security
SWA(cong-if)# switchport port-security maximum 2
SWA(cong-if)# switchport port-security mac-address sticky
SWA(cong-if)# switchport port-security violation restrict
SWA(cong-if)# switchport port-security
SWA(cong-if)# switchport port-security mac-address sticky
SWA(cong- if)# switchport port- security
SWA(cong- if)# switchport port- security maximum 2
SWA(cong- if)# switchport port- security mac- address sticky
_______________________________________________________________
17.
Refer to the exhibit. What can be determined about port security from the information that is shown?
The port has been shut down.
The port has the maximum number of MAC addresses that is supported by a Layer 2 switch port which is congured
for port security.
The port violation mode is the default for any port that has port security enabled.
The port has two attached devices.
_______________________________________________________________
18.
Refer to the exhibit. Which event will take place if there is a port security violation on switch S1 interface Fa0/1?
The interface will go into error-disabled state.
Packets with unknown source addresses will be dropped.
A syslog message is logged.
A notication is sent.
_______________________________________________________________
19
The network administrator enters the following commands on a Cisco switch:
Switch(cong)# interface vlan1
Switch(cong-if)# ip address 192.168.1.2 255.255.255.0
Switch(cong-if)# no shutdown
What is the eect of entering these commands?
All devices attached to this switch must be in the 192.168.1.0/24 subnet to communicate.
The address of the default gateway for this LAN is 192.168.1.2/24.
Users on the 192.168.1.0/24 subnet are able to ping the switch at IP address 192.168.1.2.
The switch is able to forward frames to remote networks.
________________________________________
20
Which two statements are true regarding switch port security? (Choose two.)
The three congurable violation modes all require user intervention to re-enable ports.
The three congurable violation modes all log violations via SNMP.
After entering the sticky parameter, only MAC addresses subsequently learned are converted to secure MAC
addresses.
If fewer than the maximum number of MAC addresses for a port are congured statically, dynamically learned
addresses are added to CAM until the maximum number is reached.
Dynamically learned secure MAC addresses are lost when the switch reboots.
_______________________________________________________________
21
Fill in the blank.
Full- duplex communication allows both ends of a connection to transmit and receive data simultaneously.
_______________________________
22
Fill in the blank.
When port security is enabled, a switch port uses the default violation mode of shutdown until specically
congured to use a dierent violation mode.
________________________________
23
MATCHING
Step 1. Execute POST
Step 2. Load the boot loader from ROM
Step 3. CPU register initilizations
Step 4. ash le system initialization
Step 5. Load the IOS
Step 6. Transfer switch control to the IOS
_______________________________________
24.
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
Fill in the blank.
Do not use abbreviations.What is the missing command on S1?
ip address 192.168.99.2 255.255.255.0
25.
Fill in the blank.
When port security is enabled, a switch port uses the default violation mode of until
specically congured to use a dierent violation mode.
shutdown
If no violation mode is specied when port security is enabled on a switch port, then the security violation mode
defaults to shutdown.
CCNA 2 Chapter 2 v5 Routing and Switching Essentials Exam answers, CCNA 2 RSE answers 2014
Category: CCNA 2 Routing and Switching Essentials v5 Tags: ccna 2 ch 2 v5 answers , ccna 2 ch 2 v5 exam answers ,
CCNA 2 Chapter 2 v5 RSE 2014, ccna 2 v5 chapter 2, cisco ccna answers v5
!!"#$ !&'()*+ , -+'.)/.* 0*1) #213*+1

"# $%&'(#'% #'%)*(+ ,- .-,#/ 012"304 5#6 5 7*88,-,*# &5- *77.(('69 :&,7&
&*-% ),88 ;' %&' #'<% %* %(5#-=,% 65%5>
? " &*-% %&5% &5- 65%5 %* %(5#-=,% 5#6 )&*-' ;57+*@@ A'(,*6 '<A,('- @,(-%9

:&5% ,- #'7'--5(B @*( 5# $%&'(#'% #'%)*(+ %* ;' @('' *@ 7*88,-,*#->
!"#$ &$'()*+ ,-.' -.$ /-00 1-20$3 '*4&.,5..5)& 4&1 6$ /-007 !"#$%&'()

!"#$" &'()*+ ('* &,--.*. /0 ( +1#2$" 2"'-34" (,, 5-'2+ *6$*52 2"* #7$-)#74
!"#$%
! !"#$%&$'( *"$+,'- +./(0&$'( *"$+,' $1% *"$+,' 23,", (3, !"#$%&!"#$% '() !**+,-- #- %$" #% "., '()
!""#$%% '!()$*

!"#$# &'#( ) (*+,-" .#, ,"# &),) ,' /0+1& 02 +,( 345 )&&$#(( ,)/1#6
! !"#$ &'( )#*"+( ,-. /00"())() #1 23+#$234 1"/$()5

!"# %"&' ()& %&*+,-( .&)+/0",1 "* + '#0(2) %0**&1 *1"3 ()& %&*+,-( .&)+/0",1 "* ! !"#$%! '(%) * +!"*,-*.$
!"##$%" $''()"#*
! !"# %&'()" *+,&-,.% ("# /#%%-0# (",+10" -22 3+,(% #4)#3( ("# !"#$%!"& ($)*+ ,-!./ *-/ )$0*/) 1)$(2 !*3

!"#$%&' ")*& +#' $%& ,!- )..'&// $)01& #+ ) /23$4% 3/ $%&5
! !"# %&'()













!"# %&'( )"**+,+"' -"%&+!"#
! !

!"# %&' ()"* +,&)#-)./ #&()0".1
! !

!"# %&' &()*'&+ +*,-- &'.),&'/ 0(& 1*"'&2'* 2'*3(&4+ ,2 +(5' 6%+'+ '7'2 !"#$%! !"#$%#&'() +,%$-.(+ &)(
!"!#$!%$& ()!( *+&,!(& !( $!-&, !!
! !"#$%&' )&% *%+%&),,- .%$$%& )$ /)01+* 2"++%2$1"+' $" 345'6

!"#$" #! #$%& '( )'$# *+!&, *%((&$-./ *%# .'# '( !0+$&, *%((&$-./ -. + !1-#203
! ! #$%&' &%( )' *'+%('* ,# -.' #$%&' %.'%* /# ,- ,0 -.' 12'2' ,3
!"#$#%& ()* #$+ ,-#$ .)*$ $) /,0)1, "2"#3"/3,4

!"#$" &'() '* +,#-$"#./ 0)1(+ -") ,"'2) *01&) 1.( $100#)+ '3- 1 $4$2#$ !"#$%#&%'( '*"'+,
! !"#$% '() *#$+'$)

!" $%& '$() *+ , -.*'/0 /%11,+23 4),5) , -(,/) ,+2 '0)+ '$() 63 .0,' 2% $%& !"#$
! ! #$%& '( )*+*,-&-+% &.*& /*0 ('##'1 &.- /',,*023

!" $%& '()* &+*, -'* &. (//%0 1*$ %/ 2-/3 4 5 -% +'%0 +*)*/(3 ./*)6%&+ !"##$%&' !!"# %&' ("##)*+
!"#$%&'( '%* +,- .%&/ 0,+/ ,-1 #!%. $!2 3,$2& !"##$%&' )* +,-''.%/ 01- &"2% $,,"2 3-* ",4
! !"#$ & '

!"#$# &' ("# $)**&*+ ,-*.&+)$/(&-* "#012
! !"#

!"#$" $&''()* )++*, -& .+ #) ( ,/#-$" $&)0#123(-#&) #) &3*+3 0&3 () !"#$%$&'(!')( ') +&, !"# %&' '(#&)
!"#$%&'($)
! !" $%%" &'()'(

!"#$" $&''()* #+ ),,*,* #- .", /,0 0(+,* !"#$%&'($ *& ' +,!#(- !+ #* .$ !""#$$#% '( ! )$#*+!,# !+%
!"##$%&' #!)*+,+)' +- ./) *%00"-'1 !"#$%& (#)* +,""-.$& )%")./
! !" $%%" &'%$()%!*&%!+) ,+*&,

!"# %& %' ()*%&(+,- '. /0' ( &1%'2" 34 ())5-&& .6 &.7- %6'-58(2- .'"-5 '"(6 !"#$ &'
! !" $% &'() %)*+() "' +%) , -$..)()/" 0123 $/")(.,*) .'( !"#"$%!%#& ()*(+,%,

!"#$" $&''()* )++*, -& .+ #) ( ,/#-$" $&)0#123(-#&) #) &3*+3 0&3 () !"#$%$&'(!')( ') +&, $'& -,. .!&,"
!"#$%&'($)
! !" $%%" &'()'(

!"#$" $&''()* #+ ),,*,* #- .", /,0 0(+,* #).,1-($, &- ( +/#.$" #+ .& 0,
!""#$$#% '( ! )$#*+!,# !+% -!$$./*% $-#"010#% 0+ 23# "/,,!+%4
!"#$%& (#)* +,""-.$& )%")./
! !" $%%" &'%$()%!*&%!+) ,+*&,

!"# %& %' ()*%&(+,- '. /0' ( &1%'2" 34 ())5-&& .6 &.7- %6'-58(2- .'"-5 '"(6
!"#$ !!
! !" $% &'() %)*+() "' +%) , -$..)()/" 0123 $/")(.,*) .'( !"#"$%!%#& ()*(+,%,-

!"#$" #& '"( $)**($' )+'#), -)* $),-#./*#,. 0 &1#'$" 1#'" '"( 022*(&& )- #'& 3)$03
!"#$%! '" $()$ *$ +), -% )++%''%. /!"0 ) !%0"$% ,%$1"!23
! !"!!"#$%&'() +,%-./0C!"#$%"& !"#$!%$&$! !""#!""#!""#$

!"# %&'(#)* & )#++,+- %"+.,-#)&(,"+ (/&( ,+%0#1*2 (/* 0,+*3 !"#$%! '!()!* ! !"#!!"!!!"!"
!"#$ &'(( "#))*+ ', -./ )/$ $"'0 1.+,'2/3#$'.+ 4#15 .+ # 3./$*3 &'$"./$ 6#5'+2
!"# %&!"'() *" +&*) ,*"(-
! !"# %&'' ())* +" )(+), !"#!!"!!!"!" !" $%&'% ($ %')*+ ,%!-!.'/'&
!"!# %&'!

!"# %"&'()#*+ ,"-. / 0")(& ,/&&+* /&1 / 2+33/)+ "' -.+ 1/4 ,/&&+* "& /
!"#$%&' )&*$ +, -,. !// "&/0 -,. 1*2/ * %,0!,3! #$%%!#&'$% &$ &(! )*'&#(+
! !"# %&'( )*++#,- '"#+ '"# .&/0+ )*++#,- '"#+ '"# 1,&%1' 2&, *
!"##$%&'(

!"#$ &' $"( ())(*$ +) (,$(-&,. $"( *+//#,0'1
!"!!"#$%&'()*&$+ -./ ! !"
!"!!"#$%&'C!"#$%&'()#*+,(' "#+.' //0
! !"# %&'' (") *+ ,*'+ )" -+'(+) )" ).+ /%&)0.1

! #$%& '() *++, -$,./01%+2 &$ 3+(%, ( 24,(5/- !"#$%" '((%"!!) *+, #'- .+$ !"#$%! '()' '(*# )++%!## *#
!"#$$ &'()' *+",- "., !)#"/. -,0(("!1
! !"#$%& ()*+,- %&#."*"/ )0&" (#1& )0& .2""*"/ +3"4*/2.#)*3"5

!" $%&'()*+ ,-. /'0" 1%2(3% '$$3%11%1 2'0 ' 1.4*2, 5-3* )%'306
! !

!"# %& #&' ()*+ ,"+ -&../0% 12),-"3&4, .&%+ /--+11 5+6&4+ 1+,,)0( !"#$%&'( *+ , -*%'.
! !"# %#&'()* +,-*."/01* 20%# -+ %34'2-. %#+-1'5)#6 ,"-." %0#+ !"# %&&"' ()*+,-#. #" /) *"!0-1+,)23

!"#$" &'() *+ ,-#&$"(*!" $%&'!(") ($ *%(+, &-+.(,'!%/ *) "0% &-112+/3
!"!!"#$%&'C!"#$%&!'()*+,' *+,'C!"#$%&'( *+#C!""#$%% !!!!"!"#$%&!!"
! !"#"$%