Sei sulla pagina 1di 16

KWWSDVVHVVPHQWQHWDFDGQHWYLUWXRVRGHOLYHU\SXEGRFH[DPVKWPO

Close  Window

Assessment  System

  1.  Assessment  Selection     2.  Assessment  Settings     3.  Take  Assessment  

Take  Assessment  -­  ESwitching  Practice  Final  Exam  -­  CCNA  Exploration:  LAN  Switching  and  Wireless
(Version  4.0)

Time  Remaining:  

 
1

Refer  to  the  exhibit.  Which  two  facts  can  be  confirmed  by  this  output?  (Choose  two.)
This  switch  shows  no  configuration  revision  errors.
This  switch  has  established  two-­way  communication  with  the  neighboring  devices.
This  switch  is  configured  to  advertise  its  VLAN  configuration  to  other  VTP-­enabled  switches  in  the  same  VTP  domain.
This  switch  will  drop  all  VTP  advertisements  that  come  from  the  switches  that  are  configured  in  the  same  VTP  domain.
This  switch  will  cause  no  disruption  in  the  VTP  domain  operations  if  the  rest  of  the  switches  in  the  same  VTP  domain  have  a  higher
configuration  revision  number.

2 Which  option  represents  a  topology  where  no  switching  loops  can  occur  if  STP  is  disabled?

RI 
KWWSDVVHVVPHQWQHWDFDGQHWYLUWXRVRGHOLYHU\SXEGRFH[DPVKWPO

Refer  to  the  exhibit.  After  the  listed  commands  are  entered  into  router  R1  and  switch  S1,  PC1  and  PC2  cannot  ping  each  other.  The
network  administrator  enters  the  show  interfaces  trunk  command  and  gets  the  results  that  are  shown.  What  is  the  likely  problem?
The  router  has  not  been  configured  with  a  routing  protocol.
The  trunk  is  established,  but  no  VLANs  have  been  configured  to  use  it.
The  trunk  has  not  been  established  because  the  switch  port  has  not  been  configured  for  trunking.
The  switch,  the  router,  or  both  must  be  configured  with  the  dynamic  desirable  option  for  the  Dynamic  Trunking  Protocol  to
establish  a  trunk.

4 Which  statement  is  true  about  open  authentication  when  it  is  enabled  on  an  access  point?
requires  no  authentication
uses  a  64-­bit  encryption  algorithm
requires  the  use  of  an  authentication  server
requires  a  mutually  agreed  upon  password

5 What  happens  when  the  crypto  key  zeroize  rsa  command  is  entered  on  a  switch  configured  with  the  transport  input  ssh  command  on
the  vty  lines?
A  new  RSA  key  pair  is  created.
The  switch  defaults  to  allowing  Telnet  connections  only.
The  switch  is  no  longer  able  to  make  SSH  connections  as  an  SSH  client.

RI 
KWWSDVVHVVPHQWQHWDFDGQHWYLUWXRVRGHOLYHU\SXEGRFH[DPVKWPO

The  switch  allows  remote  connections  only  after  a  new  RSA  key  pair  is  generated.

6 What  VLANs  are  allowed  across  a  trunk  when  the  range  of  allowed  VLANs  is  set  to  the  default  value?
All  VLANs  will  be  allowed  across  the  trunk.
Only  VLAN  1  will  be  allowed  across  the  trunk.
Only  the  native  VLAN  will  be  allowed  across  the  trunk.
The  switches  will  negotiate  via  VTP  which  VLANs  to  allow  across  the  trunk.

Refer  to  the  exhibit.  Which  two  statements  are  true  regarding  what  the  cost  value  of  23  represents  for  Switch4?  (Choose  two.)
This  cost  represents  the  lowest  cost  path  for  Switch4  to  the  root  switch.
A  cost  of  23  is  the  value  being  advertised  out  port  16  on  the  switch  upstream  (closer)  to  the  root  switch.
Switch4  adds  the  cost  of  a  Fast  Ethernet  link  to  23  to  determine  its  total  cost  to  reach  the  root  switch.
Switch4  is  connected  via  a  Fast  Ethernet  link  to  an  upstream  switch  that  in  turn  is  directly  connected  to  the  root  switch  via  a  Gigabit
Ethernet  link.
The  root  switch  is  advertising  a  cost  of  23,  which  is  lower  than  any  other  switch  in  the  VLAN0001  spanning-­tree  domain.

Refer  to  the  exhibit.  A  network  administrator  enters  the  displayed  commands  to  configure  VLAN  30.  What  is  the  result  of  running  these
commands?
VLAN  30  will  be  added  to  S1,  S2,  and  S3,  but  not  to  S4.
VLAN  30  will  be  pruned  from  the  VLAN  database  of  S3.
VLAN  30  will  be  added  to  the  VLAN  database  of  S3  but  will  not  be  propagated  to  S4,  S2  or  S1.
VLAN  30  will  not  be  added  to  the  VLAN  database  of  S3  and  an  error  message  will  be  displayed.

9 Which  statement  regarding  the  service  password-­encryption  command  is  true?


The  service  password-­encryption  command  is  entered  at  the  privileged  EXEC  mode  prompt.
The  service  password-­encryption  command  encrypts  only  passwords  for  the  console  and  VTY  ports.
The  service  password-­encryption  command  encrypts  all  previously  unencrypted  passwords  in  the  running  configuration.

RI 
KWWSDVVHVVPHQWQHWDFDGQHWYLUWXRVRGHOLYHU\SXEGRFH[DPVKWPO

To  see  the  passwords  encrypted  by  the  service  password-­encryption  command,  enter  the  no  service  password-­encryption
command.

10

Refer  to  the  exhibit.  The  hosts  that  are  attached  to  SW2  can  ping  hosts  on  the  Internet  but  cannot  browse  web  sites  on  the  Internet  by
the  use  of  a  web  browser.  What  is  most  likely  the  problem?
The  link  between  SW1  and  the  ISP  router  is  down.
The  link  between  SW1  and  SW2  is  not  a  trunk  link.
Switch  port  Fa0/5  on  SW1  was  on  a  VLAN  that  was  deleted.
The  default  gateway  setting  on  the  hosts  that  are  attached  to  SW2  is  incorrect.

11

Refer  to  the  exhibit.  What  does  “LEARNING”  mean  as  it  relates  to  the  Spanning  Tree  Protocol?
The  switch  is  sending  and  receiving  data  frames.
The  switch  is  not  receiving  BPDUs,  but  is  sending  and  receiving  data.

RI 
KWWSDVVHVVPHQWQHWDFDGQHWYLUWXRVRGHOLYHU\SXEGRFH[DPVKWPO

The  switch  is  participating  in  the  election  process  by  forwarding  the  BPDUs  it  receives.
The  switch  is  receiving  BPDUs  and  populating  the  MAC  address  table,  but  not  sending  data.

12 What  advantage  does  WPA2  offer  over  WPA?


SSID  cloaking
MAC  address  filtering
Layer  2  payload  encryption
authentication  through  RADIUS

13

Refer  to  the  exhibit.  A  user  enters  the  show  running-­config  command  at  the  prompt  with  the  results  shown.  What  is  the  most  likely
cause  of  the  invalid  input  error?
The  IOS  has  a  bug.
The  NVRAM  is  corrupt.
The  command  is  incomplete.
The  command  cannot  be  entered  in  the  current  CLI  mode.

14

Refer  to  the  exhibit.  All  trunk  links  are  operational  and  all  VLANs  are  allowed  on  all  trunk  links.  An  ARP  request  is  sent  by  computer  5.
Which  device  or  devices  will  receive  this  message?
only  computer  4
computer  3  and  RTR-­A
computer  4  and  RTR-­A
computer  1,  computer  2,  computer  4,  and  RTR-­A
computer  1,  computer  2,  computer  3,  computer  4,  and  RTR-­A
all  of  the  computers  and  the  router

15 When  a  unicast  frame  is  received  on  a  switch  with  STP  disabled  and  an  empty  MAC  address  table,  how  will  the  switch  handle  the  frame?
The  switch  will  drop  it.
It  will  send  it  out  every  port.
It  will  send  out  an  ARP  request.
It  will  send  it  out  every  port  except  the  one  on  which  the  frame  was  received.

Showing  1  of  4 <Prev Page:   Next>

Close  Window

All  contents  copyright  1992-­2009  Cisco  Systems,  Inc.  Privacy  Statement    and    Trademarks.

RI 
KWWSDVVHVVPHQWQHWDFDGQHWYLUWXRVRGHOLYHU\SXEGRFH[DPVKWPO

Close  Window

Assessment  System

  1.  Assessment  Selection     2.  Assessment  Settings     3.  Take  Assessment  

Take  Assessment  -­  ESwitching  Practice  Final  Exam  -­  CCNA  Exploration:  LAN  Switching  and  Wireless
(Version  4.0)

Time  Remaining:  

 
16

Refer  to  the  exhibit.  The  switches  are  configured  for  VTP  as  shown.  Which  two  statements  correctly  describe  the  operation  of  these
switches?  (Choose  two.)
A  new  VLAN  can  be  added  to  Switch1  and  that  information  will  be  added  only  to  Switch2.
A  new  VLAN  can  be  added  to  Switch1  and  that  information  will  be  added  to  Switch2  and  Switch4.
An  existing  VLAN  can  be  deleted  from  Switch4  and  that  VLAN  will  be  deleted  from  Switch1  and  Switch2.
An  existing  VLAN  can  be  deleted  from  Switch2  and  that  VLAN  will  be  deleted  from  Switch1  and  Switch4.
A  new  VLAN  can  be  added  to  Switch4  and  that  information  will  be  added  to  Switch1,  Switch2,  and  Switch3.
A  new  VLAN  can  be  added  to  Switch3  and  that  information  will  be  added  to  Switch1,  Switch2,  and  Switch4.

17 What  effect  will  the  command  spanning-­tree  link-­type  point-­to-­point  have  on  a  rapid  spanning  tree  port?
This  port  will  become  an  edge  port.
The  port  will  rapidly  transition  to  forwarding.
Spanning  tree  will  be  disabled  on  the  port.
The  port  will  stop  sending  and  receiving  BPDUs.

18

Refer  to  the  exhibit.  What  will  happen  when  frames  with  a  source  address  other  than  0019.d2e4.d9f7  enters  interface  Fa0/24?
Fa0/24  will  become  error-­disabled.
The  incoming  frames  will  be  dropped.
The  Fa0/24  port  LED  will  be  turned  off.
The  security  violation  count  will  be  incremented.

19 What  are  two  drawbacks  to  using  WEP  shared  key  encryption?  (Choose  two.)
No  authentication  is  required.
Automatic  updates  to  the  APs  would  often  fail.
The  algorithm  used  to  encrypt  the  data  can  be  broken.
Monitoring  tools  do  not  show  all  the  connected  devices.
Manually  managed  WEP  keys  are  prone  to  be  entered  incorrectly.

20 What  are  three  benefits  of  a  hierarchical  network  model?  (Choose  three.)
reduced  contention  for  bandwidth
reduced  size  of  the  physical  layout

RI 
KWWSDVVHVVPHQWQHWDFDGQHWYLUWXRVRGHOLYHU\SXEGRFH[DPVKWPO

increased  fault  tolerance  of  the  network


elimination  of  the  need  for  wiring  closets
elimination  of  the  need  for  layer  three  functionality
simplification  of  management  and  troubleshooting

21 Which  two  statements  are  correct  about  wireless  infrastructure  components?  (Choose  two.)
An  AP  converts  the  TCP/IP  data  packets  from  their  802.11  frame  encapsulation  format  to  the  802.3  Ethernet  frame  format  on  the
wired  Ethernet  network.
A  wireless  AP  does  not  require  any  physical  connection  to  allow  wireless  clients  to  access  the  Internet.
An  AP  is  a  layer  2  device,  similar  to  a  switch,  that  provides  dedicated  bandwidth  to  each  connected  wireless  host.
Collisions  do  not  occur  between  wireless  NICs  and  APs.
The  wireless  router  performs  the  roles  of  AP  and  router.

22 What  three  tasks  should  be  performed  before  moving  a  Catalyst  switch  to  another  VTP  management  domain?  (Choose  three.)
Select  the  correct  VTP  mode  and  version.
Configure  the  switch  with  the  name  of  the  new  management  domain.
Download  the  VTP  database  from  the  VTP  server  in  the  new  domain.
Configure  the  VTP  server  in  the  new  domain  to  recognize  the  BID  of  the  switch.
Reset  the  VTP  counters  to  allow  the  switch  to  synchronize  with  the  other  switches  in  the  new  domain.
Verify  that  the  switch  has  a  lower  configuration  revision  number  than  the  other  switches  in  the  new  domain.

23

Refer  to  the  exhibit.  The  network  administrator  enters  the  configuration  shown  to  allow  both  SSH  and  Telnet  connections  to  the  switch.
The  Telnet  connections  fail.  What  is  the  most  likely  cause  of  this  problem?
The  SSH  version  number  is  wrong.
SSH  has  been  configured  on  the  wrong  line.
Telnet  and  SSH  cannot  be  configured  simultaneously.
The  transport  input  command  is  configured  incorrectly.

24 Which  statement  correctly  describes  the  spanning-­tree  path  cost?


It  is  calculated  based  on  the  total  number  of  switches  connected  in  a  loop.
It  is  calculated  based  on  the  utilization  of  all  the  switches  along  a  given  path.
It  is  calculated  based  on  the  bridge  priority  of  the  switches  along  a  given  path.
It  is  calculated  based  on  the  sum  of  the  port  cost  value,  determined  by  link  speed,  for  each  switch  port  along  a  given  path.

25

Refer  to  the  exhibit.  The  switch  VTY  lines  have  been  properly  configured,  but  PC1  is  unable  to  remotely  manage  the  switch.  How  can
this  problem  be  resolved?

RI 
KWWSDVVHVVPHQWQHWDFDGQHWYLUWXRVRGHOLYHU\SXEGRFH[DPVKWPO

Configure  the  Fa0/1  interface  of  the  switch  in  trunk  mode.
Configure  a  default  gateway  on  the  switch.
Configure  the  native  VLAN  on  the  switch.
Configure  the  Fa0/1  interface  of  the  switch  to  allow  all  VLANs.

26 A  network  administrator  is  tasked  with  implementing  a  small  wireless  network  in  an  office  to  support  only  employees  that  use  Wireless-­N
and  Wireless-­G  devices.  What  is  the  best  combination  of  SSID  naming  strategy,  network  mode,  and  beaconing  options?
Set  the  network  mode  to  Mixed,  change  the  default  SSID,  and  use  the  broadcast  option.
Set  the  network  mode  to  BG-­Mixed,  keep  the  default  SSID,  and  use  the  broadcast  option.
Set  the  network  mode  to  Mixed,  keep  the  default  SSID,  and  prevent  the  SSID  from  being  broadcast.
Set  the  network  mode  to  Mixed,  change  the  default  SSID,  and  prevent  the  SSID  from  being  broadcast.

27 A  wireless  access  point  can  function  as  which  type  of  shared  medium,  wired  LAN  device?
hub
switch
router
gateway

28

Refer  to  the  exhibit.  Which  switch  will  be  elected  as  the  root  bridge  of  the  spanning  tree  topology?
Cat-­A
Cat-­B
Cat-­C
Cat-­D

29

RI 
KWWSDVVHVVPHQWQHWDFDGQHWYLUWXRVRGHOLYHU\SXEGRFH[DPVKWPO

Refer  to  the  exhibit.  Router  R-­West  and  switch  S-­West1  are  connected  via  a  single  ethernet  cable  between  the  router  interface  fa0/0  and
the  switch  interface  fa0/1.  The  router  and  switch  have  been  configured  with  the  commands  that  are  displayed  in  the  exhibit.  The  network
administrator  enters  the  show  interfaces  trunk  command  and  receives  the  output  as  shown.  What  is  the  cause  of  the  "not-­trunking"
status  for  switch  port  Fa0/1?
The  trunk  is  established,  but  no  VLANs  have  been  configured  to  use  it.
The  router  is  missing  the  dynamic  trunking  protocol  statements  necessary  to  form  a  trunk.
Because  the  router  does  not  support  Dynamic  Trunking  Protocol,  the  trunk  has  not  been  established.
The  router,  the  switch,  or  both  must  be  configured  with  the  dynamic  desirable  option  for  Dynamic  Trunking  Protocol  to  establish  a
trunk.

30

Refer  to  the  exhibit.  SW1  is  a  2960  switch  with  default  values  assigned.  Which  two  statements  are  true  about  what  the  cost  value  of  38
represents  for  SW1?  (Choose  two.)
SW1  connects  via  two  FastEthernet  links  to  reach  the  root  switch.
The  cost  represents  the  numeric  value  for  the  fastest  path  from  SW1  to  the  root  switch.
A  cost  of  38  is  the  value  that  is  being  advertised  out  port  26  on  the  upstream  switch,  which  is  closer  to  the  root  switch.
SW1  adds  the  cost  of  a  FastEthernet  link  to  38  to  determine  the  total  cost  that  is  required  to  reach  the  root  switch.
The  root  switch  is  advertising  a  cost  of  38,  which  is  lower  than  any  other  switch  that  participates  in  the  VLAN0001  spanning-­tree
domain.
SW1  connects  via  a  FastEthernet  link  to  an  upstream  switch  that  in  turn  is  directly  connected  to  the  root  switch  via  a  Gigabit  Ethernet
link.

Showing  2  of  4 <Prev Page:   Next>

Close  Window

All  contents  copyright  1992-­2009  Cisco  Systems,  Inc.  Privacy  Statement    and    Trademarks.

RI 
KWWSDVVHVVPHQWQHWDFDGQHWYLUWXRVRGHOLYHU\SXEGRFH[DPVKWPO

Close  Window

Assessment  System

  1.  Assessment  Selection     2.  Assessment  Settings     3.  Take  Assessment  

Take  Assessment  -­  ESwitching  Practice  Final  Exam  -­  CCNA  Exploration:  LAN  Switching  and  Wireless
(Version  4.0)

Time  Remaining:  

 
31 Which  two  statements  describe  Spanning  Tree  Protocol?  (Choose  two.)
It  is  only  used  at  Layer  2.
It  is  configured  on  routers.
It  eliminates  Layer  2  loops  in  network  topologies.
It  limits  the  number  of  valid  MAC  addresses  allowed  on  a  port.
It  allows  VLAN  information  to  propagate  to  other  switches  in  the  network.

32

Refer  to  the  exhibit.  The  network  administrator  configures  both  switches  as  displayed.  However,  host  C  is  unable  to  ping  host  D  and  host
E  is  unable  to  ping  host  F.  What  action  should  the  administrator  take  to  enable  this  communication?
Include  a  router  in  the  topology.
Associate  hosts  A  and  B  with  VLAN  10  instead  of  VLAN  1.
Remove  the  native  VLAN  from  the  trunk.
Configure  one  trunk  port  in  the  dynamic  desirable  mode.
Add  the  switchport  nonegotiate  command  to  the  configuration  of  S2.

33

RI 
KWWSDVVHVVPHQWQHWDFDGQHWYLUWXRVRGHOLYHU\SXEGRFH[DPVKWPO

Refer  to  the  exhibit.  The  switch  is  used  to  allow  connectivity  for  members  within  the  departments  that  are  shown  in  the  exhibit,  but  there
is  no  routing  present.  A  user  who  is  connected  to  Fa0/22  should  be  able  to  communicate  with  users  in  the  accounting  VLAN.  What
change  will  allow  the  required  communication  to  succeed?
Connect  the  user  to  Gi0/1.
Connect  the  user  to  Fa0/6.
Add  the  user  to  the  native  VLAN.
Add  the  user  to  the  default  VLAN.

34 Which  statement  correctly  describes  a  function  of  a  Layer  2  switch?


It  routes  packets  between  different  LAN  segments.
It  uses  the  destination  MAC  address  to  selectively  forward  a  frame.
It  performs  switching  and  filtering  based  on  the  destination  network  layer  address.
It  drops  a  frame  whose  destination  MAC  address  is  not  in  the  MAC  address  table.

35 How  are  data  frames  identified  and  sent  to  the  correct  VLAN  when  exiting  an  Ethernet  trunk?
Frames  are  forwarded  to  the  correct  VLAN  based  on  the  VLAN  tag.
Frames  are  always  forwarded  to  the  native  VLAN  when  exiting  a  trunk.
Frames  are  forwarded  to  the  correct  VLAN  based  on  the  source  IP  address.
Frames  are  forwarded  to  the  correct  VLAN  based  on  information  in  the  MAC  address  table.

36

Refer  to  the  exhibit.  SW1  has  recently  been  installed  to  replace  a  hub.  Hosts  1  and  4  both  transmit  data  at  the  same  time.  How  will  this
event  be  handled  by  the  network  devices?  (Choose  two.)
When  a  collision  occurs,  a  backoff  algorithm  is  invoked.
Because  hosts  1  and  4  connect  to  a  switch,  no  collision  will  occur.
Based  on  information  that  is  found  in  the  switch  MAC  address  table,  the  switch  will  forward  the  data  to  the  appropriate  ports.
Hosts  2  and  3  are  assigned  shorter  backoff  values  to  provide  them  priority  to  access  the  media.
To  prevent  future  collisions,  the  switch  will  block  the  ports  that  are  connected  to  host  2,  host  3,  and  host  4  for  a  set  time  period.

37 Which  three  statements  are  correct  concerning  the  default  configuration  of  a  new  switch?  (Choose  three.)
Spanning  Tree  Protocol  is  disabled.
Enable  password  is  configured  as  cisco.
All  switch  ports  are  assigned  to  VLAN1.
The  flash  directory  contains  the  IOS  image.
VLAN1  is  configured  with  a  management  IP  address.
All  interfaces  are  set  to  auto-­negotiation  of  speed  and  duplex.

RI 
KWWSDVVHVVPHQWQHWDFDGQHWYLUWXRVRGHOLYHU\SXEGRFH[DPVKWPO

38 Which  two  statements  about  a  service  set  identifier  (SSID)  are  true?  (Choose  two.)
provides  strong  wireless  security
responsible  for  determining  the  signal  strength
tells  a  wireless  device  to  which  WLAN  it  belongs
used  to  encrypt  data  sent  across  the  wireless  network
all  wireless  devices  on  the  same  WLAN  must  have  the  same  SSID

39 A  new  switch  is  to  be  added  to  an  existing  network  in  a  remote  office.  The  network  administrator  does  not  want  the  technicians  in  the
remote  office  to  be  able  to  add  new  VLANs  to  the  switch,  but  the  switch  should  receive  VLAN  updates  from  the  VTP  domain.  Which  two
steps  must  be  performed  to  configure  VTP  on  the  new  switch  to  meet  these  conditions?  (Choose  two.)
Configure  an  IP  address  on  the  new  switch.
Configure  the  existing  VTP  domain  name  on  the  new  switch.
Configure  all  ports  of  both  switches  to  access  mode.
Configure  the  new  switch  as  a  VTP  client.
Enable  VTP  pruning.

40

Refer  to  the  exhibit.  What  is  the  purpose  of  the  configuration  commands  that  are  shown?
to  activate  port  Fa0/10
to  make  the  port  a  member  of  VLAN  30
to  activate  port  security  on  port  Fa0/10
to  add  VLAN  30  to  the  trunk  that  is  connected  to  port  Fa0/10

41

Refer  to  the  exhibit.  A  network  administrator  is  reviewing  the  interface  configurations  on  Switch1  and  Switch2  prior  to  connecting  a  trunk
link  between  them.  To  avoid  possible  interruption  of  traffic  and  to  avoid  security  risks,  which  configuration  setting  will  need  to  be  changed
before  connecting  the  trunk  link?
the  native  VLAN
the  trunking  modes
the  access  mode  VLAN
the  trunking  encapsulation

42

RI 
KWWSDVVHVVPHQWQHWDFDGQHWYLUWXRVRGHOLYHU\SXEGRFH[DPVKWPO

Refer  to  the  exhibit.  Hosts  A,  B,  and  C  have  just  been  added  to  the  switch.  Host  A  sends  a  packet  addressed  to  host  C.  Packet  capture
software  on  host  B  indicates  that  the  packet  was  received  at  the  NIC  on  host  B.  What  caused  host  B  to  receive  the  packet  addressed  to
host  C?
The  switch  has  a  bad  route  in  the  routing  table.
New  MAC  addresses  are  sent  as  multicasts  to  help  reduce  broadcast  storms.
Spanning  Tree  Protocol  causes  all  new  MAC  addresses  to  be  forwarded  as  broadcasts.
The  switch  will  forward  packets  for  all  new  MAC  addresses  out  all  ports  except  the  port  they  were  received  on.

43

Refer  to  the  exhibit.  Both  switches  are  configured  as  displayed  and  the  native  VLAN  is  the  default.  Which  statement  is  true  about  the
frames  traveling  between  host  A  and  host  B?
They  will  travel  untagged.
They  will  be  tagged  with  VLAN  ID  1.
They  will  be  tagged  with  the  trunk  Port  VLAN  ID.
They  will  be  tagged  with  the  highest  VLAN  ID.

44

RI 
KWWSDVVHVVPHQWQHWDFDGQHWYLUWXRVRGHOLYHU\SXEGRFH[DPVKWPO

Refer  to  the  exhibit.  Company  A  has  recently  added  a  Voice  over  IP  telephone  system  to  the  Layer  2  network  that  is  shown.  All  switch
ports  are  in  VLAN  1.  Whenever  the  data  traffic  is  high,  telephone  users  complain  about  poor  voice  quality.  What  would  be  an  efficient
and  cost  effective  way  to  address  the  situation?
Pass  all  inter-­switch  traffic  through  a  router.
Create  a  separate  VLAN  for  the  VoIP  traffic.
Place  all  the  VoIP  traffic  on  different  switches.
Replace  the  trunks  between  each  switch  with  access  links  that  are  dedicated  to  voice  and  data.

45

Refer  to  the  exhibit.  How  will  Switch1  treat  untagged  frames  that  enter  interface  Fa0/1?
Untagged  frames  will  be  dropped.
Frames  will  be  tagged  and  forwarded  to  VLAN  1.
Frames  will  be  tagged  and  forwarded  to  VLAN  100.
Untagged  frames  be  be  forwarded  out  all  other  interfaces.

Showing  3  of  4 <Prev Page:   Next>

Close  Window

All  contents  copyright  1992-­2009  Cisco  Systems,  Inc.  Privacy  Statement    and    Trademarks.

RI 
KWWSDVVHVVPHQWQHWDFDGQHWYLUWXRVRGHOLYHU\SXEGRFH[DPVKWPO

Close  Window

Assessment  System

  1.  Assessment  Selection     2.  Assessment  Settings     3.  Take  Assessment  

Take  Assessment  -­  ESwitching  Practice  Final  Exam  -­  CCNA  Exploration:  LAN  Switching  and  Wireless
(Version  4.0)

Time  Remaining:  

 
46

Refer  to  the  exhibit.  The  teacher  host  is  connected  to  port  Fa0/7  on  switch  STW.  A  student  has  decided  to  share  access  to  the  Internet
by  attaching  a  hub  and  laptop  to  STW  as  shown.  What  will  be  the  result  of  the  student  making  this  connection?
The  Fa0/7  port  of  STW  will  be  shutdown.
The  student  will  gain  full  access  to  the  Internet.
Both  the  teacher  and  student  will  be  able  to  receive  data  but  only  the  teacher  will  be  able  to  send.
The  frames  from  the  laptop  will  be  dropped,  but  the  teacher  host  will  maintain  connectivity  with  the  network.

47

Refer  to  the  exhibit.  What  is  the  result  of  issuing  these  commands?
The  enable  password  will  be  set.
The  password  will  be  set  for  the  first  Telnet  connection.
The  password  will  be  set  for  the  console  connection.
The  password  will  be  set  for  the  auxiliary  connection.

48

Refer  to  the  exhibit.  Which  statement  is  true  regarding  the  information  shown?
Only  one  VLAN  is  currently  configured  to  use  the  trunk  links.
The  switch  negotiated  trunk  links  for  interfaces  Fa0/1  and  Gi0/1.

RI 
KWWSDVVHVVPHQWQHWDFDGQHWYLUWXRVRGHOLYHU\SXEGRFH[DPVKWPO

A  Cisco  proprietary  protocol  is  in  use  for  interfaces  Fa0/1  and  Gi0/1.
Interfaces  Gi0/1  and  Fa0/1  are  allowed  to  carry  data  from  multiple  VLANs.

49

Refer  to  the  exhibit.  A  network  administrator  needs  to  implement  inter-­VLAN  routing  on  a  hierarchical  network.  On  which  devices  should
the  inter-­VLAN  routing  be  configured?
AS1  and  AS2
DS1  and  DS2
Gateway  and  CS1
Gateway,  CS1,  DS1,  and  DS2

50 After  unpacking  a  new  Linksys  WRT300N  wireless  multifunction  device,  a  user  needs  to  change  the  default  administrator  password  and
make  other  configuration  changes.  What  must  the  user  do  to  access  the  device  in  order  to  make  these  changes?
Use  a  wireless  client  to  associate  with  the  WRT300N  and  then  open  a  HyperTerminal  session  with  the  device.
Establish  a  wired  connection  with  the  device  and  then  reboot  the  attached  computer  to  launch  the  configuration  software.
Establish  a  wired  connection  from  a  computer  in  the  same  IP  subnet  as  the  WRT300N  and  enter  the  default  IP  address  of  the  device
into  a  web  browser  on  the  computer.
Modify  the  TCP/IP  properties  of  the  computer  that  is  connected  to  the  WRT300N  so  that  the  computer  and  the  WRT300N  exist  on
the  same  network.  Then  reboot  the  computer  to  establish  a  connection.

Showing  4  of  4 <Prev Page:   Next>

Close  Window

All  contents  copyright  1992-­2009  Cisco  Systems,  Inc.  Privacy  Statement    and    Trademarks.

RI 

Potrebbero piacerti anche