Вы находитесь на странице: 1из 7

Close Window

Assessment System

1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - ESwitching Final Exam - CCNA Exploration: LAN Switching and
Wireless (Version 4.0)

Time Remaining:

1 While monitoring LAN traffic, a network technician notices an excessive number of broadcasts. Which two steps could be included i
processes that are needed to reduce the number of broadcasts on the network? (Choose two.)
Replace any existing hubs with switches.

Add a Layer 3 device to route between networks.

Subnet the existing IP network to create two networks.

Increase the backbone speed by three times the current speed.

Add additional switches and spread out the number of hosts evenly between them.

2What is the purpose of VLAN trunking?


It improves network performance by reducing broadcast traffic.

It selects the best path to transmit data in a switched network.

It carries the traffic of multiple VLANs through a single link.

It avoids spanning tree loops in a switched network.

3 What advantage does cut-through switching provide?


It enables QoS

It forwards frames quickly.

It provides an analysis of frames.

It allows reduction of traffic by using error checking to drop corrupt frames.

4What provides an authentication mechanism for 802.11-based wireless networks?


DSSS

OFDM

SSID

WPA
5

Refer to the exhibit. Switch SW2 has been newly purchased and added to the network. What configuration should be applied to SW
that it participates in the same VTP domain as switch SW1, receives VLAN information from SW1, and synchronizes VLAN informa
Disable VTP pruning on SW2.

Configure SW2 in VTP transparent mode.

Configure SW2 with the VTP domain password.

Configure SW2 as a VTP server with a higher revision number.

Refer to the exhibit. The network administrator wants to allow both SSH and Telnet connections to Switch1. However, the SSH
connections fail. What is the most likely cause of this problem?
The RSA key has been removed.

SSH has been configured on the wrong line.

The transport input command is applied incorrectly.

The domain name has been configured in the wrong configuration mode.

7
Refer to the exhibit. Switches S2 and S3 are properly connected using an ethernet cable. A network administrator has configured b
switches with VTP, but S3 is unable to propagate VLANs to S2. What could be the reason for this?
The VTP configuration revision is different on both switches.

The VTP domains are different on both switches.

VTP pruning is disabled.

VTP v2 is disabled.

8In the implementation of PVST+ in a specific VLAN where all switches have default spanning tree priorities, which spanning-tree
command setting could be assigned to force one of the Catalyst switches to become and remain the root bridge?
root primary

priority 8192

priority 2048

spanning-tree mode rapid pvst

9
Refer to the exhibit. The network consists of four hubs and a switch. The hosts connected to each hub are assigned addresses in th
respective VLAN as shown. PC1 on VLAN 1 becomes infected with a virus and initiates a continuous IP broadcast. Which hubs will
receive the broadcasts?
Hub A

Hubs A and B

Hubs A and C

Hubs A, B, C, and D

Which statement accurately describes a disadvantage of using router subinterfaces for inter-VLAN routing?
10 It is more expensive than using individual router interfaces.

Routed traffic must contend for bandwidth on a single router interface.

Trunking cannot be used to connect the router to the switch.

All untagged traffic is dropped.

11
Refer to the exhibit. A network administrator is configuring RT1 for inter-VLAN routing. The switch is configured correctly and is
functional. Host1, Host2, and Host3 cannot communicate with each other. Based on the router configuration, what is causing the
problem?
Interface Fa0/0 is missing IP address configuration information.

IP addresses on the subinterfaces are incorrectly matched to the VLANs.

Each subinterface of Fa0/0 needs separate no shutdown commands.

Routers do not support 892.1Q encapsulation on subinterfaces.

12

Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installation surveys showed strong signal
strength from the AP locations to the client locations. Outside electrical interference has been eliminated. What will fix the problem?
Relocate the APs closer to each other.

Increase the distance between the clients.

Change the channel on AP-B to 6 or 11.


Place AP-A and AP-B on the same wireless channel.

13 The network administrator wants to configure a switch to pass VLAN update information to other switches in the domain but not upd
its own local VLAN database. Which two steps should the administrator perform to achieve this? (Choose two.)
Reset the VTP counters.

Configure VTP version 1 on the switch.

Configure the VTP mode of the switch to transparent.

Verify that the switch has a higher configuration revision number.

Configure the switch with the same VTP domain name as other switches in the network.

Which statement regarding the service password-encryption command is true?


14 The service password-encryption command is entered at the privileged EXEC mode prompt.

The service password-encryption command encrypts only passwords for the console and VTY ports.
The service password-encryption command encrypts all previously unencrypted passwords in the running configuration.
To see the passwords encrypted by the service password-encryption command, enter the no service password-encryptio
command.

15

Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit. However, hosts B and D
cannot ping each other. What is the most likely cause of this problem?
The link between the switches is up but not trunked.

The Fa0/11 interface of Switch1 is not configured as a trunk.


Hosts B and D are configured with IP addresses from different subnets.

VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.

Showing 1 of 4 <Prev Next>


Page:

Close Window

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks.

Вам также может понравиться