pre final ccna

Author: aaron-hull

Post on 08-Apr-2018




0 download

Embed Size (px)


  • 8/7/2019 pre final ccna


    Close Window

    Assessment System




    2. Assessment Settings 3. Take Assessment

    Take Assessment - ESwitching Practice Final Exam - CCNA Exploration: LAN Switching andWireless (Version 4.0)

    Time Remaining:

    1 Using the command copy tftp:backup.cfg startup-config, an administrator downloaded a saved config

    from a TFTP server to a switch. Why does the administrator not detect any changes in the switch config

    after the download completes?The command should have been copy startup-config tftp:backup.cfg.

    A backup configuration from a TFTP server cannot be copied directly into the startup-config.

    The command copy running-config startup-config should be used to save the changes on the switc

    Downloading to the startup-config requires the switch to be reloaded in order for the configuration toeffect.

  • 8/7/2019 pre final ccna


    Refer to the exhibit. Router R-West and switch S-West1 are connected via a single ethernet cable betwe

    router interface fa0/0 and the switch interface fa0/1. The router and switch have been configured with thcommands that are displayed in the exhibit. The network administrator enters the show interfaces trun

    command and receives the output as shown. What is the cause of the "not-trunking" status for switch po

    The trunk is established, but no VLANs have been configured to use it.

    The router is missing the dynamic trunking protocol statements necessary to form a trunk.Because the router does not support Dynamic Trunking Protocol, the trunk has not been established.

    The router, the switch, or both must be configured with the dynamic desirable option for Dynamic Protocol to establish a trunk.


    After listening for the presence of a signal on the network media, hosts A and C transmit data at the sam

    In what two ways do the hosts respond to this situation? (Choose two.)

    The hosts transmit a jam signal to ensure that all hosts on the network are aware that a collision has oBecause they are operating in full-duplex mode, the hosts resume listening for traffic in preparation f

    sending future messages.
  • 8/7/2019 pre final ccna


  • 8/7/2019 pre final ccna


    Refer to the exhibit. Computer A sends a broadcast message. Which devices will see thebroadcast?

    computer B

    computer B and Router1computer C and Router1

    computer B, computer D, computer E and Router1

    computer B, computer C, computer D, computer E and Router1computer A, computer B, computer C, computer D, computer E and Router1

    8 Why is it important that the network administrator consider the spanning-tree network diameter when ch

    the root bridge?The network diameter limitation is 9.

    BPDUs may be discarded because of expiring timers.

    The cabling distance between the switches is 100 meters.The network diameter must be set to the number of meters of the cable between the root bridge and it

    connected switch.

  • 8/7/2019 pre final ccna


    Refer to the exhibit. After receiving a console notification on Switch2, the network administrator begins

    troubleshoot the trunk link between Switch1 and Switch2. Which configuration change can be made to c

    the problem with the trunk link?Set the Fa0/1 interface on Switch2 to trunk mode.

    Change the trunk encapsulation on Switch2 Fa0/1 to dot1q.

    Change the native VLAN on Switch2 interface Fa0/1 to VLAN 100.Change the access mode VLAN on Switch2 to the default VLAN 1.


    Refer to the exhibit. The switches in the exhibit have VTP pruning enabled. What will be pruned in the V

    advertisements from switch ST-C to switch ST-1?VLAN 30
  • 8/7/2019 pre final ccna


  • 8/7/2019 pre final ccna


    a hard-wired computer on the network


    Refer to the exhibit. Users complain that they do not have connectivity to the web server that is connectSW1. What should be done to remedy the problem?

    Allow all VLANs on the trunk link.

    Configure VLAN 100 as the native VLAN for SW1.Configure the trunk port in trunk mode on SW1.

    Attach the web server to a router and configure inter-VLAN routing.

    Showing 1 of 4

    Close Window

    All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.

    Close Window

    Assessment System




    2. Assessment Settings 3. Take Assessment

    Take Assessment - ESwitching Practice Final Exam - CCNA Exploration: LAN Switching and

    Wireless (Version 4.0)

    Time Remaining:

  • 8/7/2019 pre final ccna


    Refer to the exhibit. The network administrator enters the configuration shown to allow both SSH and Tconnections to the switch. The Telnet connections fail. What is the most likely cause of this problem?

    The SSH version number is wrong.

    SSH has been configured on the wrong line.Telnet and SSH cannot be configured simultaneously.

    The transport input command is configured incorrectly.

    17 Which benefit is gained by designing a network with a small networkdiameter?

    lower latencyimproved securityincreased redundancy

    higher interface bandwidth

    18 What is the correct order in which the STP components are


    designated ports, nondesignated ports, root bridge, root ports

    nondesignated ports, designated ports, root ports, root bridgeroot bridge, root ports, designated ports, nondesignated ports

    root ports, root bridge, nondesignated ports, designated ports

    19 Which configuration changes will increment the configuration revision number on the VTP


    configuring trunk links on the VTP serverconfiguring or changing the VTP password

    configuring or changing the VTP domain name

    configuring or changing the VTP version numberconfiguring or deleting a VLAN or creating a VLAN name

  • 8/7/2019 pre final ccna


  • 8/7/2019 pre final ccna


    Refer to the exhibit. Both switches are configured with default bridge priority. Which port will act as the

    root port if all links are operating at the same bandwidth?

    Fa0/1 interface of S1

    Fa0/2 interface of S1Fa0/1 interface of S2

    Fa0/2 interface of S2

    23 After unpacking a new Linksys WRT300N wireless multifunction device, a user needs to change the de

    administrator password and make other configuration changes. What must the user do to access the devi

    order to make these changes?Use a wireless client to associate with the WRT300N and then open a HyperTerminal session with the

    Establish a wired connection with the device and then reboot the attached computer to launch the

    configuration software.Establish a wired connection from a computer in the same IP subnet as the WRT300N and enter the d

    address of the device into a web browser on the computer.

    Modify the TCP/IP properties of the computer that is connected to the WRT300N so that the compute

    WRT300N exist on the same network. Then reboot the computer to establish a connection.


    Refer to the exhibit. What is the purpose of the configuration commands that are

    shown?to activate port Fa0/10to make the port a member of VLAN 30

    to activate port security on port Fa0/10

    to add VLAN 30 to the trunk that is connected to port Fa0/10

  • 8/7/2019 pre final ccna


  • 8/7/2019 pre final ccna


    27 What identifier in the BPDU creates a unique BID for a


    IP addressMAC address

    bridge priority

    VLAN IDport priority

    28 A network administrator enables sticky learning on all access mode interfaces of a Catalyst switch, saveconfiguration, then connects hosts to the switch. After the switch operates for several days, the administ

    reboots the switch without saving the running configuration. What is the result?

    All previously learned MAC addresses are lost.

    The switch reverts to non-sticky dynamic learning.Connected hosts are no longer able to communicate with the switch.

    Previously learned sticky addresses are retained in the switch configuration.


    Refer to the exhibit. The VTP domain has been configured as shown in the exhibit. None of the configuVLANs on SW1 and SW2 are present on SW3. What should be done to remedy the problem?

    Reconfigure switches SW2 and SW3 in VTP transparent mode.

    Reconfigure the VTP password to be consistent on all VTP switches.

    Reconfigure all switches as VTP clients to synchronize the VLAN database information.Reconfigure the VTP server as a VTP client and then return to VTP server mode to reset the configur

    revision number.

  • 8/7/2019 pre final ccna


    Refer to the exhibit. What three statements describe why Host1 and Host2 are unable to communicate?

    three.)The switch ports are on different VLANs.

    The switch IP address is on the wrong subnet.

    The hosts are configured on different logical networks.

    A router is required to forward traffic between Host1 and Host2.

    The VLAN port assignments must be contiguous for each VLAN.The host default gateway addresses must be on the same logical network.

    Showing 2 of 4

    Close Window

    All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.

    Close Window

    Assessment System



    2. Assessment Settings 3. Take Assessment

    Take Assessment - ESwitching Practice Final Exam - CCNA Exploration: LAN Switching and

    Wireless (Version 4.0)

    Time Remaining:

    31 Where is the information of newly created VLANs stored on aswitch?





  • 8/7/2019 pre final ccna


    Refer to the exhibit. A network administrator enters the displayed commands to configure VLAN 30. W

    result of running these commands?

    VLAN 30 will be added to S1, S2, and S3, but not to S4.VLAN 30 will be pruned from the VLAN database of S3.

    VLAN 30 will be added to the VLAN database of S3 but will not be propagated to S4, S2 or S1.

    VLAN 30 will not be added to the VLAN database of S3 and an error message will be displayed.

    33 A wireless access point can function as which type of shared medium, wired LANdevice?




  • 8/7/2019 pre final ccna


    Refer to the exhibit. RTB is configured for traditional inter-VLAN routing. RTB can ping computer A b

    ping computer B. What is a possible cause of this failure?

    Port Fa0/11 is in the wrong VLAN.RTB does not have an active routing protocol.

    The IP address of computer B is in the wrong logical network.Router interface Fa0/1 has the wrong trunk encapsulation type configured.

    35 When port security is used on a switch, which violation mode will cause an SNMP trap to be sent and tr

    be dropped when the number of secure MAC addresses for a port is reached?sticky




    36 Which service should be disabled on a Cisco switch or router to prevent packet sniffers from capturing

    information about the device?SSH




    Refer to the exhibit. Which statement is true regarding the informationshown?

    Only one VLAN is currently configured to use the trunk links.
  • 8/7/2019 pre final ccna


    The switch negotiated trunk links for interfaces Fa0/1 and Gi0/1.

    A Cisco proprietary protocol is in use for interfaces Fa0/1 and Gi0/1.

    Interfaces Gi0/1 and Fa0/1 are allowed to carry data from multiple VLANs.

    38 Which statement regarding the service password-encryption command is true?

    The service password-encryption command is entered at the privileged EXEC mode prompt.

    The service password-encryption command encrypts only passwords for the console and VTY portsThe service password-encryption command encrypts all previously unencrypted passwords in the ru


    To see the passwords encrypted by the service password-encryption command, enter the no service

    password-encryption command.

    39 Which three statements are correct concerning the default configuration of a new switch? (Choose

    three.)Spanning Tree Protocol is disabled.

    Enable password is configured as cisco.

    All switch ports are assigned to VLAN1.The flash directory contains the IOS image.

    VLAN1 is configured with a management IP address.

    All interfaces are set to auto-negotiation of speed and duplex.

    40 What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default

    value?All VLANs will be allowed across the trunk.

    Only VLAN 1 will be allowed across the trunk.

    Only the native VLAN will be allowed across the trunk.

    The switches will negotiate via VTP which VLANs to allow across the trunk.

    41 A network technician is evaluating the desirable features of both access and distribution layer switches.

    two features are common to switches at these two layers? (Choose two.)QoS


    port securitylink aggregation

    application based filtering

  • 8/7/2019 pre final ccna


    Refer to the graphic. In the Wireless menu option of a Linksys integrated router, what does the Networkoption Mixed mean?

    The router supports encryption and authentication.

    The router supports both wired and wireless connections.

    The router supports 802.11b, 802.11g, and 802.11n devices.

    The router supports connectivity through infrared and radio frequencies.


    Refer to the exhibit. Assuming the bridge priority values are set to default on all switches, which switchelected as the root bridge of the spanning tree topology?




  • 8/7/2019 pre final ccna


    Refer to the exhibit. The network administrator is planning five additional VLANs to be shared through

    VTP domain on S3. What action should the administrator take before creating the additional VLANs?

    Create the VLANs on a switch in VTP server mode and allow them to propogate to the other switche

    domain.Modify the configuration revision to 10 to support the additional VLANs.

    Enable the VTP pruning mode in order to create the VLANs on S3.

    Enable the VTP v2 mode.


    Refer to the exhibit. Which two facts can be confirmed by this output? (Choose two.)

    This switch shows no configuration revision errors.

    This switch has established two-way communication with the neighboring devices.This switch is configured to advertise its VLAN configuration to other VTP-enabled switches in the s

    VTP domain.

    This switch will drop all VTP advertisements that come from the switches that are configured in the sVTP domain.

    This switch will cause no disruption in the VTP domain operations if the rest of the switches in the sa

    domain have a higher configuration revision number.

    Showing 3 of 4

    Close Window

    All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.

    Close Window','privacy');http://openlargepopup%28%27http//','trademark');','privacy');http://openlargepopup%28%27http//','trademark');
  • 8/7/2019 pre final ccna


    Assessment System




    2. Assessment Settings 3. Take Assessment

    Take Assessment - ESwitching Practice Final Exam - CCNA Exploration: LAN Switching andWireless (Version 4.0)

    Time Remaining:

    46 Which statement is accurate about fast-forward switching?

    The switch stores the first 64 bytes of the frame before forwarding.After reading the destination address, the switch immediately forwards a frame.

    The switch receives the complete frame and stores it in buffers before forwarding it.

    The switch analyzes the frame for information about its destination. After confirming the integrity of

    frame, the switch forwards it out the correct port.

    47 A network administrator is asked to connect four switches that are each configured with eight VLANs. Rthat have two FastEthernet ports each that support trunking are available. What is the minimum numberrouters needed to interconnect traffic from all of the VLANs if trunking is allowed?





    48 Which statement is correct about STP architecture?

    Spanning Tree Protocol will guarantee a loop free Layer 2 topology.

    Spanning Tree Protocol guarantees the shortest path to destination networks.The switch with the highest priority will be assigned the lowest BID in the root election.

    The first step in the spanning-tree election process is to determine the root port.

    To select designated ports, the spanning-tree algorithm must determine the longest contiguous path frroot bridge.

    49 How are data frames identified and sent to the correct VLAN when exiting an Ethernet trunk?Frames are forwarded to the correct VLAN based on the VLAN tag.

    Frames are always forwarded to the native VLAN when exiting a trunk.

    Frames are forwarded to the correct VLAN based on the source IP address.

    Frames are forwarded to the correct VLAN based on information in the MAC address table.

  • 8/7/2019 pre final ccna