CCNA final _part1 doc

10 183 0
CCNA final _part1 doc

Đang tải... (xem toàn văn)

Thông tin tài liệu

Kiều Đình Luân 1 What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value? All VLANs will be allowed across the trunk. Only VLAN 1 will be allowed across the trunk. Only the native VLAN will be allowed across the trunk. The switches will negotiate via VTP which VLANs to allow across the trunk. 2 Which three actions are performed during the boot sequence of a Cisco switch? (Choose three.) The boot loader uses the self-contained switch operating system to boot the switch. The boot loader retrieves diagnostics routines via TFTP. The boot loader performs POST. The boot loader is loaded from RAM. The boot loader initializes the flash file system that is used to boot the system. The boot loader loads the default operating system if the flash-based operating system is corrupt or missing. 3 Refer to the exhibit. The switches in the exhibit have VTP pruning enabled. What will be pruned in the VTP advertisements from switch ST-C to switch ST-1? VLAN 30 VLAN 20 and VLAN 30 VLAN 1, VLAN 20, and VLAN 30 VLAN 2 through VLAN 29, and VLAN 31 through VLAN 1000 4 Which parameter is associated with wireless authentication? shared key SSID This is trial version www.adultpdf.com ad hoc channel 5 Refer to the exhibit. A wireless infrastructure has been established in a company building as shown. The design goal was to allow roaming between the three APs for handheld devices. However, the devices lose connectivity when the users roam. How can this problem be fixed? Assign different SSIDs to each AP. Reconfigure all APs to the same channel. Use the same BSSID address for each AP. Reposition the APs so that each area of signal strength overlaps the neighbor by at least 10-15%. 6 Which statement regarding the service password-encryption command is true? The service password-encryption command is entered at the privileged EXEC mode prompt. The service password-encryption command encrypts only passwords for the console and VTY ports. The service password-encryption command encrypts all previously unencrypted passwords in the running configuration. To see the passwords encrypted by the service password-encryption command, enter the no service password-encryption command. 7 This is trial version www.adultpdf.com Refer to the exhibit. What three statements describe why Host1 and Host2 are unable to communicate? (Choose three.) The switch ports are on different VLANs. The switch IP address is on the wrong subnet. The hosts are configured on different logical networks. A router is required to forward traffic between Host1 and Host2. The VLAN port assignments must be contiguous for each VLAN. The host default gateway addresses must be on the same logical network. 8 Refer to the exhibit. How is port Gi1/1 on SWT-A functioning in the spanning-tree topology? It is sending and receiving data frames. It is receiving BPDUs, but not sending data frames. It is participating in the election process by forwarding the BPDUs it receives. It is receiving BPDUs and populating the MAC address table, but not sending data. This is trial version www.adultpdf.com 9 Which benefit is gained by designing a network with a small network diameter? lower latency improved security increased redundancy higher interface bandwidth 10 Which statement is true about open authentication when it is enabled on an access point? requires no authentication uses a 64-bit encryption algorithm requires the use of an authentication server requires a mutually agreed upon password 11 When port security is used on a switch, which violation mode will cause an SNMP trap to be sent and traffic to be dropped when the number of secure MAC addresses for a port is reached? sticky protect restrict shutdown 12 Refer to the exhibit. A network administrator has designed and implemented a hierarchical network. What is the maximum network diameter between any two hosts on the network? five six ten This is trial version www.adultpdf.com twelve 13 Which security protocol or measure would provide the greatest protection for a wireless LAN? WPA2 cloaking SSIDs shared WEP key MAC address filtering 14 Refer to the exhibit. VLAN 20 was recently added on the network. Users on VLAN 20 on SW1 start complaining that they do not have connectivity to the users on the same VLAN on switch SW2. What should be done to remedy the problem? Configure the trunk port in a desirable mode on SW2. Include VLAN 20 in the list of allowed VLANs on the trunk link on SW2. Configure VLAN 1 to be the native VLAN for both networks on SW1 and SW2. Remove VLAN 20 from the allowed VLANs on the trunk link on SW2, an action that will enable all VLANs on the trunk link. 15 This is trial version www.adultpdf.com Refer to the exhibit. Computer A sends a broadcast message. Which devices will see the broadcast? computer B computer B and Router1 computer C and Router1 computer B, computer D, computer E and Router1 computer B, computer C, computer D, computer E and Router1 computer A, computer B, computer C, computer D, computer E and Router1 Take Assessment - ESwitching Practice Final Exam - CCNA Exploration: LAN Switching and Wireless (Version 4.0) 47286 Time Remaining: 16 This is trial version www.adultpdf.com Refer to the exhibit. All switch interfaces are members of the same VLAN. What information is used by Switch1 to determine if incoming frames from the hosts should be forwarded to Router1? the source address field in the IP header the destination port number in the TCP header the destination address field in the Layer 3 header the destination address field in the Ethernet header 17 This is trial version www.adultpdf.com Refer to the exhibit. A network administrator enters the displayed commands to configure VLAN 30. What is the result of running these commands? VLAN 30 will be added to S1, S2, and S3, but not to S4. VLAN 30 will be pruned from the VLAN database of S3. VLAN 30 will be added to the VLAN database of S3 but will not be propagated to S4, S2 or S1. VLAN 30 will not be added to the VLAN database of S3 and an error message will be displayed. 18 Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology? Cat-A Cat-B This is trial version www.adultpdf.com Cat-C Cat-D 19 Refer to the exhibit. What is the result of issuing these commands? The enable password will be set. The password will be set for the first Telnet connection. The password will be set for the console connection. The password will be set for the auxiliary connection. 20 Refer to the exhibit. The switches have been configured as shown. The hosts that are connected to switch 101- 2FL are not able to communicate with the hosts in their corresponding VLANs that are connected to switch 101-3FL. What should be done to fix the problem? Configure port Fa0/2 on switch 101-3FL as a static trunk link. Introduce a Layer 3 device or a switch with Layer 3 capability into the topology. Utilize the switchport trunk allowed vlan all command on switch 101-3FL to permit the VLAN traffic. Apply IP addresses that are in the same subnet to the interfaces that are used to connect switches 101-2FL and 101-3FL. This is trial version www.adultpdf.com 21 How are data frames identified and sent to the correct VLAN when exiting an Ethernet trunk? Frames are forwarded to the correct VLAN based on the VLAN tag. Frames are always forwarded to the native VLAN when exiting a trunk. Frames are forwarded to the correct VLAN based on the source IP address. Frames are forwarded to the correct VLAN based on information in the MAC address table. 22 Which three statements are correct concerning the default configuration of a new switch? (Choose three.) Spanning Tree Protocol is disabled. Enable password is configured as cisco. All switch ports are assigned to VLAN1. The flash directory contains the IOS image. VLAN1 is configured with a management IP address. All interfaces are set to auto-negotiation of speed and duplex. 23 Refer to the exhibit. The network administrator wants to configure Switch1 to allow SSH connections and prohibit Telnet connections. How should the network administrator change the displayed configuration to satisfy the requirement? Use SSH version 1. Reconfigure the RSA key. Configure SSH on a different line. Modify the transport input command. 24 Which statement correctly describes the spanning-tree path cost? It is calculated based on the total number of switches connected in a loop. It is calculated based on the utilization of all the switches along a given path. It is calculated based on the bridge priority of the switches along a given path. It is calculated based on the sum of the port cost value, determined by link speed, for each switch port along a given path. 25 This is trial version www.adultpdf.com . computer C, computer D, computer E and Router1 Take Assessment - ESwitching Practice Final Exam - CCNA Exploration: LAN Switching and Wireless (Version 4.0) 47286 Time

Ngày đăng: 11/08/2014, 22:21

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan