Вы находитесь на странице: 1из 17

Close Window

Assessment System
1. Assessment Selection 2. Assessment Settings 3. Take Assessment
Take Assessment - ESwitching Practice Final Exam - CCNA Exploration: LAN Switchi
ng and Wireless
(Version 4.0)
Time Remaining:
1
Refer to the exhibit. Which two facts can be confirmed by this output? (Choose t
wo.)
This switch shows no configuration revision errors.
This switch has established two-way communication with the neighboring devices.
This switch is configured to advertise its VLAN configuration to other VTP-enabl
ed switches in the same VTP domain.
This switch will drop all VTP advertisements that come from the switches that ar
e configured in the same VTP domain.
This switch will cause no disruption in the VTP domain operations if the rest of
the switches in the same VTP domain have a higher
configuration revision number.
2 Which option represents a topology where no switching loops can occur if STP i
s disabled?
http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml
1 of 5 11/09/2009 02:48

3
Refer to the exhibit. After the listed commands are entered into router R1 and s
witch S1, PC1 and PC2 cannot ping each other. The
network administrator enters the show interfaces trunk command and gets the resu
lts that are shown. What is the likely problem?
The router has not been configured with a routing protocol.
The trunk is established, but no VLANs have been configured to use it.
The trunk has not been established because the switch port has not been configur
ed for trunking.
The switch, the router, or both must be configured with the dynamic desirable op
tion for the Dynamic Trunking Protocol to
establish a trunk.
4 Which statement is true about open authentication when it is enabled on an acc
ess point?
requires no authentication
uses a 64-bit encryption algorithm
requires the use of an authentication server
requires a mutually agreed upon password
5 What happens when the crypto key zeroize rsa command is entered on a switch co
nfigured with the transport input ssh command on
the vty lines?
A new RSA key pair is created.
The switch defaults to allowing Telnet connections only.
The switch is no longer able to make SSH connections as an SSH client.
http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml
2 of 5 11/09/2009 02:48

The switch allows remote connections only after a new RSA key pair is generated.
6 What VLANs are allowed across a trunk when the range of allowed VLANs is set t
o the default value?
All VLANs will be allowed across the trunk.
Only VLAN 1 will be allowed across the trunk.
Only the native VLAN will be allowed across the trunk.
The switches will negotiate via VTP which VLANs to allow across the trunk.
7
Refer to the exhibit. Which two statements are true regarding what the cost valu
e of 23 represents for Switch4? (Choose two.)
This cost represents the lowest cost path for Switch4 to the root switch.
A cost of 23 is the value being advertised out port 16 on the switch upstream (c
loser) to the root switch.
Switch4 adds the cost of a Fast Ethernet link to 23 to determine its total cost
to reach the root switch.
Switch4 is connected via a Fast Ethernet link to an upstream switch that in turn
is directly connected to the root switch via a Gigabit
Ethernet link.
The root switch is advertising a cost of 23, which is lower than any other switc
h in the VLAN0001 spanning-tree domain.
8
Refer to the exhibit. A network administrator enters the displayed commands to c
onfigure VLAN 30. What is the result of running these
commands?
VLAN 30 will be added to S1, S2, and S3, but not to S4.
VLAN 30 will be pruned from the VLAN database of S3.
VLAN 30 will be added to the VLAN database of S3 but will not be propagated to S
4, S2 or S1.
VLAN 30 will not be added to the VLAN database of S3 and an error message will b
e displayed.
9 Which statement regarding the service password-encryption command is true?
The service password-encryption command is entered at the privileged EXEC mode p
rompt.
The service password-encryption command encrypts only passwords for the console
and VTY ports.
The service password-encryption command encrypts all previously unencrypted pass
words in the running configuration.
http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml
3 of 5 11/09/2009 02:48

To see the passwords encrypted by the service password-encryption command, enter


the no service password-encryption
command.
10
Refer to the exhibit. The hosts that are attached to SW2 can ping hosts on the I
nternet but cannot browse web sites on the Internet by
the use of a web browser. What is most likely the problem?
The link between SW1 and the ISP router is down.
The link between SW1 and SW2 is not a trunk link.
Switch port Fa0/5 on SW1 was on a VLAN that was deleted.
The default gateway setting on the hosts that are attached to SW2 is incorrect.
11
Refer to the exhibit. What does LEARNING mean as it relates to the Spanning Tree P
rotocol?
The switch is sending and receiving data frames.
The switch is not receiving BPDUs, but is sending and receiving data.
http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml
4 of 5 11/09/2009 02:48

The switch is participating in the election process by forwarding the BPDUs it r


eceives.
The switch is receiving BPDUs and populating the MAC address table, but not send
ing data.
12 What advantage does WPA2 offer over WPA?
SSID cloaking
MAC address filtering
Layer 2 payload encryption
authentication through RADIUS
13
Refer to the exhibit. A user enters the show running-config command at the promp
t with the results shown. What is the most likely
cause of the invalid input error?
The IOS has a bug.
The NVRAM is corrupt.
The command is incomplete.
The command cannot be entered in the current CLI mode.
14
Refer to the exhibit. All trunk links are operational and all VLANs are allowed
on all trunk links. An ARP request is sent by computer 5.
Which device or devices will receive this message?
only computer 4
computer 3 and RTR-A
computer 4 and RTR-A
computer 1, computer 2, computer 4, and RTR-A
computer 1, computer 2, computer 3, computer 4, and RTR-A
all of the computers and the router
15 When a unicast frame is received on a switch with STP disabled and an empty M
AC address table, how will the switch handle the frame?
The switch will drop it.
It will send it out every port.
It will send out an ARP request.
It will send it out every port except the one on which the frame was received.
Showing 1 of 4 <Prev Page: Next>
Close Window
All contents copyright 1992-2009 Cisco Systems, Inc. Privacy Statement and Trade
marks.
http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml
5 of 5 11/09/2009 02:48

Close Window
Assessment System
1. Assessment Selection 2. Assessment Settings 3. Take Assessment
Take Assessment - ESwitching Practice Final Exam - CCNA Exploration: LAN Switchi
ng and Wireless
(Version 4.0)
Time Remaining:
16
Refer to the exhibit. The switches are configured for VTP as shown. Which two st
atements correctly describe the operation of these
switches? (Choose two.)
A new VLAN can be added to Switch1 and that information will be added only to Sw
itch2.
A new VLAN can be added to Switch1 and that information will be added to Switch2
and Switch4.
An existing VLAN can be deleted from Switch4 and that VLAN will be deleted from
Switch1 and Switch2.
An existing VLAN can be deleted from Switch2 and that VLAN will be deleted from
Switch1 and Switch4.
A new VLAN can be added to Switch4 and that information will be added to Switch1
, Switch2, and Switch3.
A new VLAN can be added to Switch3 and that information will be added to Switch1
, Switch2, and Switch4.
17 What effect will the command spanning-tree link-type point-to-point have on a
rapid spanning tree port?
This port will become an edge port.
The port will rapidly transition to forwarding.
Spanning tree will be disabled on the port.
The port will stop sending and receiving BPDUs.
18
Refer to the exhibit. What will happen when frames with a source address other t
han 0019.d2e4.d9f7 enters interface Fa0/24?
Fa0/24 will become error-disabled.
The incoming frames will be dropped.
The Fa0/24 port LED will be turned off.
The security violation count will be incremented.
19 What are two drawbacks to using WEP shared key encryption? (Choose two.)
No authentication is required.
Automatic updates to the APs would often fail.
The algorithm used to encrypt the data can be broken.
Monitoring tools do not show all the connected devices.
Manually managed WEP keys are prone to be entered incorrectly.
20 What are three benefits of a hierarchical network model? (Choose three.)
reduced contention for bandwidth
reduced size of the physical layout
http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml
1 of 4 11/09/2009 02:49

increased fault tolerance of the network


elimination of the need for wiring closets
elimination of the need for layer three functionality
simplification of management and troubleshooting
21 Which two statements are correct about wireless infrastructure components? (C
hoose two.)
An AP converts the TCP/IP data packets from their 802.11 frame encapsulation for
mat to the 802.3 Ethernet frame format on the
wired Ethernet network.
A wireless AP does not require any physical connection to allow wireless clients
to access the Internet.
An AP is a layer 2 device, similar to a switch, that provides dedicated bandwidt
h to each connected wireless host.
Collisions do not occur between wireless NICs and APs.
The wireless router performs the roles of AP and router.
22 What three tasks should be performed before moving a Catalyst switch to anoth
er VTP management domain? (Choose three.)
Select the correct VTP mode and version.
Configure the switch with the name of the new management domain.
Download the VTP database from the VTP server in the new domain.
Configure the VTP server in the new domain to recognize the BID of the switch.
Reset the VTP counters to allow the switch to synchronize with the other switche
s in the new domain.
Verify that the switch has a lower configuration revision number than the other
switches in the new domain.
23
Refer to the exhibit. The network administrator enters the configuration shown t
o allow both SSH and Telnet connections to the switch.
The Telnet connections fail. What is the most likely cause of this problem?
The SSH version number is wrong.
SSH has been configured on the wrong line.
Telnet and SSH cannot be configured simultaneously.
The transport input command is configured incorrectly.
24 Which statement correctly describes the spanning-tree path cost?
It is calculated based on the total number of switches connected in a loop.
It is calculated based on the utilization of all the switches along a given path
.
It is calculated based on the bridge priority of the switches along a given path
.
It is calculated based on the sum of the port cost value, determined by link spe
ed, for each switch port along a given path.
25
Refer to the exhibit. The switch VTY lines have been properly configured, but PC
1 is unable to remotely manage the switch. How can
this problem be resolved?
http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml
2 of 4 11/09/2009 02:49

Configure the Fa0/1 interface of the switch in trunk mode.


Configure a default gateway on the switch.
Configure the native VLAN on the switch.
Configure the Fa0/1 interface of the switch to allow all VLANs.
26 A network administrator is tasked with implementing a small wireless network
in an office to support only employees that use Wireless-N
and Wireless-G devices. What is the best combination of SSID naming strategy, ne
twork mode, and beaconing options?
Set the network mode to Mixed, change the default SSID, and use the broadcast op
tion.
Set the network mode to BG-Mixed, keep the default SSID, and use the broadcast o
ption.
Set the network mode to Mixed, keep the default SSID, and prevent the SSID from
being broadcast.
Set the network mode to Mixed, change the default SSID, and prevent the SSID fro
m being broadcast.
27 A wireless access point can function as which type of shared medium, wired LA
N device?
hub
switch
router
gateway
28
Refer to the exhibit. Which switch will be elected as the root bridge of the spa
nning tree topology?
Cat-A
Cat-B
Cat-C
Cat-D
29
http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml
3 of 4 11/09/2009 02:49

Refer to the exhibit. Router R-West and switch S-West1 are connected via a singl
e ethernet cable between the router interface fa0/0 and
the switch interface fa0/1. The router and switch have been configured with the
commands that are displayed in the exhibit. The network
administrator enters the show interfaces trunk command and receives the output a
s shown. What is the cause of the "not-trunking"
status for switch port Fa0/1?
The trunk is established, but no VLANs have been configured to use it.
The router is missing the dynamic trunking protocol statements necessary to form
a trunk.
Because the router does not support Dynamic Trunking Protocol, the trunk has not
been established.
The router, the switch, or both must be configured with the dynamic desirable op
tion for Dynamic Trunking Protocol to establish a
trunk.
30
Refer to the exhibit. SW1 is a 2960 switch with default values assigned. Which t
wo statements are true about what the cost value of 38
represents for SW1? (Choose two.)
SW1 connects via two FastEthernet links to reach the root switch.
The cost represents the numeric value for the fastest path from SW1 to the root
switch.
A cost of 38 is the value that is being advertised out port 26 on the upstream s
witch, which is closer to the root switch.
SW1 adds the cost of a FastEthernet link to 38 to determine the total cost that
is required to reach the root switch.
The root switch is advertising a cost of 38, which is lower than any other switc
h that participates in the VLAN0001 spanning-tree
domain.
SW1 connects via a FastEthernet link to an upstream switch that in turn is direc
tly connected to the root switch via a Gigabit Ethernet
link.
Showing 2 of 4 <Prev Page: Next>
Close Window
All contents copyright 1992-2009 Cisco Systems, Inc. Privacy Statement and Trade
marks.
http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml
4 of 4 11/09/2009 02:49

Close Window
Assessment System
1. Assessment Selection 2. Assessment Settings 3. Take Assessment
Take Assessment - ESwitching Practice Final Exam - CCNA Exploration: LAN Switchi
ng and Wireless
(Version 4.0)
Time Remaining:
31 Which two statements describe Spanning Tree Protocol? (Choose two.)
It is only used at Layer 2.
It is configured on routers.
It eliminates Layer 2 loops in network topologies.
It limits the number of valid MAC addresses allowed on a port.
It allows VLAN information to propagate to other switches in the network.
32
Refer to the exhibit. The network administrator configures both switches as disp
layed. However, host C is unable to ping host D and host
E is unable to ping host F. What action should the administrator take to enable
this communication?
Include a router in the topology.
Associate hosts A and B with VLAN 10 instead of VLAN 1.
Remove the native VLAN from the trunk.
Configure one trunk port in the dynamic desirable mode.
Add the switchport nonegotiate command to the configuration of S2.
33
http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml
1 of 5 11/09/2009 02:49

Refer to the exhibit. The switch is used to allow connectivity for members withi
n the departments that are shown in the exhibit, but there
is no routing present. A user who is connected to Fa0/22 should be able to commu
nicate with users in the accounting VLAN. What
change will allow the required communication to succeed?
Connect the user to Gi0/1.
Connect the user to Fa0/6.
Add the user to the native VLAN.
Add the user to the default VLAN.
34 Which statement correctly describes a function of a Layer 2 switch?
It routes packets between different LAN segments.
It uses the destination MAC address to selectively forward a frame.
It performs switching and filtering based on the destination network layer addre
ss.
It drops a frame whose destination MAC address is not in the MAC address table.
35 How are data frames identified and sent to the correct VLAN when exiting an E
thernet trunk?
Frames are forwarded to the correct VLAN based on the VLAN tag.
Frames are always forwarded to the native VLAN when exiting a trunk.
Frames are forwarded to the correct VLAN based on the source IP address.
Frames are forwarded to the correct VLAN based on information in the MAC address
table.
36
Refer to the exhibit. SW1 has recently been installed to replace a hub. Hosts 1
and 4 both transmit data at the same time. How will this
event be handled by the network devices? (Choose two.)
When a collision occurs, a backoff algorithm is invoked.
Because hosts 1 and 4 connect to a switch, no collision will occur.
Based on information that is found in the switch MAC address table, the switch w
ill forward the data to the appropriate ports.
Hosts 2 and 3 are assigned shorter backoff values to provide them priority to ac
cess the media.
To prevent future collisions, the switch will block the ports that are connected
to host 2, host 3, and host 4 for a set time period.
37 Which three statements are correct concerning the default configuration of a
new switch? (Choose three.)
Spanning Tree Protocol is disabled.
Enable password is configured as cisco.
All switch ports are assigned to VLAN1.
The flash directory contains the IOS image.
VLAN1 is configured with a management IP address.
All interfaces are set to auto-negotiation of speed and duplex.
http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml
2 of 5 11/09/2009 02:49

38 Which two statements about a service set identifier (SSID) are true? (Choose
two.)
provides strong wireless security
responsible for determining the signal strength
tells a wireless device to which WLAN it belongs
used to encrypt data sent across the wireless network
all wireless devices on the same WLAN must have the same SSID
39 A new switch is to be added to an existing network in a remote office. The ne
twork administrator does not want the technicians in the
remote office to be able to add new VLANs to the switch, but the switch should r
eceive VLAN updates from the VTP domain. Which two
steps must be performed to configure VTP on the new switch to meet these conditi
ons? (Choose two.)
Configure an IP address on the new switch.
Configure the existing VTP domain name on the new switch.
Configure all ports of both switches to access mode.
Configure the new switch as a VTP client.
Enable VTP pruning.
40
Refer to the exhibit. What is the purpose of the configuration commands that are
shown?
to activate port Fa0/10
to make the port a member of VLAN 30
to activate port security on port Fa0/10
to add VLAN 30 to the trunk that is connected to port Fa0/10
41
Refer to the exhibit. A network administrator is reviewing the interface configu
rations on Switch1 and Switch2 prior to connecting a trunk
link between them. To avoid possible interruption of traffic and to avoid securi
ty risks, which configuration setting will need to be changed
before connecting the trunk link?
the native VLAN
the trunking modes
the access mode VLAN
the trunking encapsulation
42
http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml
3 of 5 11/09/2009 02:49

Refer to the exhibit. Hosts A, B, and C have just been added to the switch. Host
A sends a packet addressed to host C. Packet capture
software on host B indicates that the packet was received at the NIC on host B.
What caused host B to receive the packet addressed to
host C?
The switch has a bad route in the routing table.
New MAC addresses are sent as multicasts to help reduce broadcast storms.
Spanning Tree Protocol causes all new MAC addresses to be forwarded as broadcast
s.
The switch will forward packets for all new MAC addresses out all ports except t
he port they were received on.
43
Refer to the exhibit. Both switches are configured as displayed and the native V
LAN is the default. Which statement is true about the
frames traveling between host A and host B?
They will travel untagged.
They will be tagged with VLAN ID 1.
They will be tagged with the trunk Port VLAN ID.
They will be tagged with the highest VLAN ID.
44
http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml
4 of 5 11/09/2009 02:49

Refer to the exhibit. Company A has recently added a Voice over IP telephone sys
tem to the Layer 2 network that is shown. All switch
ports are in VLAN 1. Whenever the data traffic is high, telephone users complain
about poor voice quality. What would be an efficient
and cost effective way to address the situation?
Pass all inter-switch traffic through a router.
Create a separate VLAN for the VoIP traffic.
Place all the VoIP traffic on different switches.
Replace the trunks between each switch with access links that are dedicated to v
oice and data.
45
Refer to the exhibit. How will Switch1 treat untagged frames that enter interfac
e Fa0/1?
Untagged frames will be dropped.
Frames will be tagged and forwarded to VLAN 1.
Frames will be tagged and forwarded to VLAN 100.
Untagged frames be be forwarded out all other interfaces.
Showing 3 of 4 <Prev Page: Next>
Close Window
All contents copyright 1992-2009 Cisco Systems, Inc. Privacy Statement and Trade
marks.
http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml
5 of 5 11/09/2009 02:49

Close Window
Assessment System
1. Assessment Selection 2. Assessment Settings 3. Take Assessment
Take Assessment - ESwitching Practice Final Exam - CCNA Exploration: LAN Switchi
ng and Wireless
(Version 4.0)
Time Remaining:
46
Refer to the exhibit. The teacher host is connected to port Fa0/7 on switch STW.
A student has decided to share access to the Internet
by attaching a hub and laptop to STW as shown. What will be the result of the st
udent making this connection?
The Fa0/7 port of STW will be shutdown.
The student will gain full access to the Internet.
Both the teacher and student will be able to receive data but only the teacher w
ill be able to send.
The frames from the laptop will be dropped, but the teacher host will maintain c
onnectivity with the network.
47
Refer to the exhibit. What is the result of issuing these commands?
The enable password will be set.
The password will be set for the first Telnet connection.
The password will be set for the console connection.
The password will be set for the auxiliary connection.
48
Refer to the exhibit. Which statement is true regarding the information shown?
Only one VLAN is currently configured to use the trunk links.
The switch negotiated trunk links for interfaces Fa0/1 and Gi0/1.
http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml
1 of 2 11/09/2009 02:49

A Cisco proprietary protocol is in use for interfaces Fa0/1 and Gi0/1.


Interfaces Gi0/1 and Fa0/1 are allowed to carry data from multiple VLANs.
49
Refer to the exhibit. A network administrator needs to implement inter-VLAN rout
ing on a hierarchical network. On which devices should
the inter-VLAN routing be configured?
AS1 and AS2
DS1 and DS2
Gateway and CS1
Gateway, CS1, DS1, and DS2
50 After unpacking a new Linksys WRT300N wireless multifunction device, a user n
eeds to change the default administrator password and
make other configuration changes. What must the user do to access the device in
order to make these changes?
Use a wireless client to associate with the WRT300N and then open a HyperTermina
l session with the device.
Establish a wired connection with the device and then reboot the attached comput
er to launch the configuration software.
Establish a wired connection from a computer in the same IP subnet as the WRT300
N and enter the default IP address of the device
into a web browser on the computer.
Modify the TCP/IP properties of the computer that is connected to the WRT300N so
that the computer and the WRT300N exist on
the same network. Then reboot the computer to establish a connection.
Showing 4 of 4 <Prev Page: Next>
Close Window
All contents copyright 1992-2009 Cisco Systems, Inc. Privacy Statement and Trade
marks.
http://assessment.netacad.net/virtuoso/delivery/pub-doc/exam.shtml
2 of 2 11/09/2009 02:49

Вам также может понравиться