Close Window

Assessment System 1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - ESwitching Final Exam - CCNA Exploration: LAN Switching and Wireless (Version 4.0) Time Remaining: 1
þÿ

What provides an authentication mechanism for 802.11-based wireless networks? DSSS OFDM SSID WPA

2 Which statement describes the use of voice VLANs in Cisco IP telephony? The voice VLAN carries both tagged and untagged traffic. The voice VLAN carries untagged traffic having special QoS markings. The voice VLAN must be configured on the switch port to which the IP phone attaches. Data and voice frames are tagged with same VLAN ID between the IP phone and the switch when a VLAN is configured. 3 What is the purpose of the Spanning Tree algorithm? It propagates VLAN configurations to other switches. It restricts broadcast packets to a single VLAN. It segments a network into multiple broadcast domains. It prevents loops in a switched network with redundant paths. 4 Which statement accurately describes a switch with all access ports assigned to the same VLAN? All users are in the same broadcast domain. A router is required for communication between the users. Bandwidth is utilized more efficiently, resulting in a reduction in costs. Performance is increased by keeping all users in the same Layer 2 network. 5

Refer to the exhibit. Host A is sending a frame to host C. How does switch SWA tag the frame? It tags the frame with VLAN 1 and sends it to host C. It tags the frame with VLAN 10 and sends it to host C. It tags the frame with VLAN 99 and sends it to host C. It does not tag the frame and sends it to host C. 6 Which type of traffic can still be received on a switch interface that is in STP blocking mode? BPDU frames multicast frames broadcast frames Layer 3 packets 7

Refer to the exhibit. If switch SW1 is configured with the four VLANs as shown in the exhibit, how man physical interfaces are needed on router R1 to configure inter-VLAN routing using subinterfaces? zero

one two four 8 Which three statements are true regarding router-on-a-stick inter-VLAN routing? (Choose three. Hosts C. Host A can communicate with host B. What is the cause of this prob There is a native VLAN mismatch. but cannot communicate with host C or host D. The Fa0/11 interface of Switch1 is not configured as a trunk.) requires the use of subinterfaces on the router requires an access link between the router and Layer 2 switch more cost-efficient and scalable than using multiple physical interfaces requires each subinterface to be configured with the no shutdown command can impact performance if many VLANs compete for bandwidth on a single router interface makes troubleshooting the inter-VLAN routing configuration much less complex than when using m physical interfaces 9 Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2. and D are correctly configured with IP addresses in the subnet range for VLAN 50. 10 . The link between Switch1 and Switch2 is up but not trunked. VLAN 50 is not allowed on the trunk link between Switch1 and Switch2.

11 Which switching method provides error-free data transmission? fragment-free fast-forward integrity-checking store-and-forward 12 Refer to the exhibit. R1 does not have an active routing protocol. Users A and B are reporting intermittent connectivity problems. The IP address of computer 1 is in the wrong logical network. Router interface Fa0/0 has the wrong trunk encapsulation type configured. Pre-installation su showed strong signal strength from the AP locations to the client locations. R1 can ping computer 3 but c computer 1. Outside electrical interferen been eliminated. Change the channel on AP-B to 6 or 11. Place AP-A and AP-B on the same wireless channel. Increase the distance between the clients. What is a possible cause for this failure? S1 port Fa0/11 is in the wrong VLAN. .Refer to the exhibit. R1 is configured for traditional inter-VLAN routing. What will fix the problem? Relocate the APs closer to each other.

It will be forwarded out ports Fa0/5 and Fa0/10. VTP pruning is enabled in the VTP domain that is shown. Fa0/10.) After the end of the jam signal. Host 1 and Host 4 both transmit data at the same time. Hosts 1 and 4 are operating full duplex so no collision will exist. How will switch ST-1 ha Layer 2 broadcast traffic originating from host A on switch ST-C? It will be dropped.13 Refer to the exhibit. 15 . It will be forwarded out port Fa0/5 only. It will be forwarded out ports Fa0/5. do the hosts respond on the network? (Choose two. The hub will block the port connected to Host 4 to prevent a collision. Hosts 1 and 4 are assigned shorter backoff values to provide them priority to access the media. 14 Refer to the exhibit. a backoff algorithm is invoked. and Fa0/15. All hosts are in listen mode. If a host has data to transmit after the backoff period of that host. the host checks to determine if th is idle before transmitting.

Remove the native VLAN from the trunk. 16 What are two benefits of the IEEE 802.) requires less equipment provides improved range permits increased data rates has a single-input and a single-output needs no hardware upgrade for compatibility 17 In which mode is a VTP switch operating if it has been configured to only forward VTP advertisements client root .11n standard over the IEEE 802. Include a router or switch with Layer 3 capabilities. What should be done to fix the problem? Allow all VLANs on the trunk link. Both switches are interconnected via a trunk link. Configure the same native VLAN on both ends of the trunk.Refer to the exhibit. Host A and host B are on the defau VLAN but are not able to exchange traffic.11G? (Choose two.

Which switch will be elected as the root bridge of the spanning tree topology? Cat-A Cat-B Cat-C Cat-D 20 Refer to the exhibit. The port is shut down. An error message is displayed.d2e4 reaches switch port 0/5? The frame is dropped. 21 What would the bridge ID be for VLAN20 if the priority is manually set to 4096? 4096 . FastEthernet port 0/5 will show an err-disabled message.server transparent 18 Which parameter is used to uniquely identify one wireless network from another? SSID OFDM WEP DSSS 19 Refer to the exhibit. What happens when a frame from a source MAC address different from 00a8.

The Layer 2 switching design that is shown has been implemented in a campus environment that is using Spanning Tree Protocol. How can the conve . The switch is no longer able to make SSH connections as an SSH client.4106 4116 32768 32788 22 What happens when the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines? A new RSA key pair is created. The switch allows remote connections only after a new RSA key pair is generated. Whe an inter-switch link fails. What mod the switch enter? setup mode configuration mode privileged EXEC mode user EXEC mode ROMMON mode interface mode 24 Refer to the exhibit. 23 A network administrator enters the enable command at the Switch> prompt of a new switch. the network takes nearly a minute to completely converge. All inter-switch links that are shown are trunks. The switch defaults to allowing Telnet connections only.

Move PC2 to a port on SW3. Move PC1 to a port on SW2. should be done to prevent this from happening? Move PC1 to a port on SW3. Add a trunk link that directly connects D1 and D2. The broadcast traffic from PC1 is consuming bandwidth on the interswitch trunks. 26 . Implement Rapid Spanning Tree Protocol. Enable pruning for VLAN10 on the VTP server.time be reduced? Increase the capacity of the distribution and core trunk links to 10 Gb/s. Use Layer 3 switching on the core switch. Associate PC1 as a member of a new VLAN. 25 Refer to the exhibit.

The enable password or enable secret password is missing from the switch configuration. Which Spanning Tree Protocol version is in effect? Per VLAN Spanning Tree (PVST) Per VLAN Spanning Tree + (PVST+) Common Spanning Tree (CST) Rapid Spanning Tree Protocol (RSTP) Multiple Spanning Tree Protocol (MSTP) 28 . The console password is missing from the switch configuration. when the senior network administrator attempted to access the switch remotel Error in authentication" console message was received.Refer to the exhibit. The service password-encryption command is missing from the switch configuration. 27 Refer to the exhibit. However. A junior network administrator was tasked to configure all VTY lines on the switch remote access. What could be the cause of the problem? The VTY line password is entered incorrectly.

Configuring one primary and one backup switch in server mode and all other switches in transparen mode will provide fault tolerance for the VLAN data and allow for efficient distribution of the VLA configurations to all switches. 20. Whic switch will become the root for VLAN 20? A B C D 29 A network administrator is implementing VTP in a large campus LAN that contains one hundred switch What are valid considerations for reliability and administration? Using server mode on a single master switch and client mode on all other switches will provide the fault tolerance for retaining VLAN information in all switches if power is lost on the network. and 30. 10.) . Using transparent mode on all switches will allow for efficient administration and prevent VLAN d loss from the loss of any single switch. Each switch is configured to participate in STP for VLANs 1. 30 What are three benefits of employing a hierarchical network design? (Choose three.Refer to the exhibit. Configuring several switches in server mode will allow all VLANs to be entered from a single swit preserve VLAN data if any of the switches or connections are lost.

simplifying device managem Use of a hierarchical design allows replacement of redundant devices with high-capacity network equipment. The hierarchical model allows for specialized functionality at each layer. Hierarchical design models enhance existing bandwidth through the use of link aggregation.ESwitching Final Exam . Take Assessment Take Assessment . Assessment Selection 2. <Prev Next> Page: þÿ Close Window Assessment System 1.Hierarchically designed networks can more easily be expanded to suit future needs. Privacy Statement and Trademarks.CCNA Exploration: LAN Switching and Wireless (Version 4. Assessment Settings 3.0) Time Remaining: 31 þÿ . thus allowin fully-meshed topology. A hierarchical design uses firewalls instead of complicated port-based and distribution layer security policies. The hierarchical model allows the use of high-performance switches at all design layers. Inc. Showing 2 of 4 Close Window All contents copyright 1992-2010 Cisco Systems.

Host A maintains connectivity to all members of VLAN 10. but because port Fa0/3 was unused. it is now a membe VLAN 1. because the switch provides dynamic VLAN assignment f port. because port Fa0/3 has been manually assigned to VLA Host A remains a member of VLAN 10.Refer to the exhibit. Host A is no longer a member of VLAN 10. Host A is no longer a member of VLAN 10. How will switch S2 manage traffic coming from host PC1? S2 will drop the traffic. . because it is connected to the same phy network. because the router is routing traffic between VLANs. unless it is management traffic. What would happen if the network administrator moved the network cable of Host from interface Fa0/1 to Fa0/3 on switch SW1? Host A remains a member of VLAN 10. 32 Refer to the exhibit.

SW1 will send all untagged traffic to VLAN 1. It will clear the contents of the VLAN database. It will clear the contents of the startup configuration file.S2 will tag the frame with VLAN ID 99 when it forwards it over the trunk link. What will be the outcome of t command? It will clear the contents of the MAC table. Switch SW2 was tested in a lab environment and then inserted into a production ne without reloading its configuration.1q trunk is successfully established. How does switch SW1 handle the untagged traffic that is destined for the trunk SW1 will drop all untagged traffic. which distribution layer function delineates broadcast dom routing between VLANs aggregating traffic flows providing redundant links reducing the network diameter 37 Refer to the exhibit. and an 802. 33 Refer to the exhibit. 34 A network administrator issued the erase nvram: command on a switch. After the trunk link between SW1 and SW2 was brought up. S2 will leave the traffic untagged when it forwards it over a trunk link. 35 Which switch forwarding method should be used on a network that employs frame classification based assigned Quality of Service (QoS) value? cut-through fast-forward fragment-free store-and-forward 36 In a three-layer hierarchical network design. SW1 will send untagged traffic to all VLANs that are configured on the trunk. S2 will tag the traffic with the highest VLAN ID value when it forwards it over the trunk link. It will clear the contents of the running configuration file. The commands are entered into switch SW1 as shown. all use . SW1 will send all untagged traffic to VLAN 25.

Which command will accomplish this task? Switch1# copy tftp://192. What could be the source of the problem? All the VLANs were pruned from the trunk port between SW1 and SW2. SW1 and SW2 cannot be both set as VTP servers in the same VTP domain. the administrator receives a "password required.connectivity to the network.0.254/backup-config 40 What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value? only the management VLAN all VLANs except the extended range VLANs all VLANs except 1 and 1002-1005 all VLANs 41 . VTP configuration revision number of SW2 was higher than the configuration revision number of S The additional VLANs from SW2 created more VLANs than the VLAN database of SW1 could co 38 Refer to the exhibit. What is the problem? The enable secret password was not set. S1 does not have login configured on the vty lines.168. A network administrator needs to download a previously saved configuration file f the TFTP server to Switch1.0. S1 does not have a password configured for the vty lines.253/backup-confg nvram:startup-config Switch1# copy tftp://192. After entering the commands in the exhibit.254/backup-confg nvram:startup-config Switch1# copy nvram:startup-config tftp://192. The VLAN1 interface has not be enabled with the no shutdown command.253/backup-config Switch1# copy nvram:startup-config tftp://192.168.0.168. The crypto key is not properly configured to generate passwords. but none set" message when attempting to connect to S1. 39 Refer to the exhibit.168.0.

B. C.) copier AM radio television MP3 player cordless phone microwave oven 44 . and E 42 What is a result of improperly implementing a network with redundancy at Layer 2? an increase of unicast and multicast errors at Layer 3 a decrease in the amount of broadcast traffic end device malfunction because of broadcast storms an increase in throughput at all points in the network 43 Which two devices can cause interference with the operation of a WLAN because they operate on simil frequencies? (Choose two. B. and C only hosts A. C. attempt to transmit a frame at the same time collision occurs.Refer to the exhibit. connected to hub HB1. B. Hosts A and B. and D only hosts A. Which hosts will receive the collision jamming signal? only hosts A and B only hosts A.

A test of the network.1. The router will forward the packet out interface FastEthernet 0/1. The router will forward the packet out interface FastEthernet 0/1.85.2. A network administrator has segmented the network into two VLANs and configur Router1 for inter-VLAN routing. What will the router do with this packet? The router will drop the packet. . The router will forward the packet out interface FastEthernet 0/1.168.3.1.Refer to the exhibit.3. One of the router subinterfaces is possibly down. Inc. however.2 and interface FastEthernet 0/1. The router will forward the packet out interface FastEthernet 0/1. Showing 3 of 4 Close Window <Prev Page: þÿ Next> All contents copyright 1992-2010 Cisco Systems. shows that hosts on each VLAN can o access local resources and not resources on the other VLAN.168. Router RA receives a packet with a source address of 192. What is the most likely cause of this probl Switch port Fa0/1 is not trunking. 45 Refer to the exhibit. Privacy Statement and Trademarks.1.35 and a destination address of 192. Router interface Fa0/0 is possibly down. No routing protocol is configured on Router1.

and ports Fa0/11 and Fa0/12 do not show in the command outpu (Choose two.CCNA Exploration: LAN Switching and Wireless (Version 4. The ports currently do not have any devices plugged into them.0) Time Remaining: 46 þÿ Refer to the exhibit. 47 . The ports have been assigned to the native VLAN. The VLAN that they are assigned to has been deleted.ESwitching Final Exam . The no shutdown command was not issued on these ports. Assessment Selection 2.) The ports have been configured as trunks.Close Window Assessment System 1. A network administrator issues the command shown on Switch1. Assessment Settings 3. What are two pos reasons that ports Fa0/1 through Fa0/4. Take Assessment Take Assessment .

168.b267 was manually associated with the switch port Fa0/24. VLAN 99 was manually added to the VLAN database.11 /28 192.1.637b.44 /28 192. Which IP address should be assigne this new host? 192. What does STATIC indicate in the output that is shown? Switch port Fa0/24 can only work in VLAN 99. and must be present in order for traffic to flow that segment? non-root port .1. MAC address 0001. MAC address 0001.168. A new host needs to be connected to VLAN 1.168.1.168.637b.168.33 /28 192.1. 50 Which STP port type can only appear once on a segment.1.55 /28 48 What is a possible impact of setting too short an aging time in the MAC address table of a switch? overly large address table unnecessary flooding of packets excessive timeouts of static addresses impaired ability to dynamically learn new addresses 49 Refer to the exhibit.Refer to the exhibit.b267 was learned from the source address of a frame that was received on switch port Fa0/24.22 /28 192.

What will allow a host on VLAN 40 on switch X to communicate with a host in VL 40 on switch Y? QoS routing trunking VPN 52 Which statement is true about open authentication when it is enabled on an access point? requires no authentication uses a 64-bit encryption algorithm requires the use of an authentication server requires a mutually agreed upon password Showing 4 of 4 Close Window <Prev Page: þÿ Next> All contents copyright 1992-2010 Cisco Systems. Privacy Statement and Trademarks. Inc. .disabled port designated port non-designated port 51 Refer to the exhibit.

Master your semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master your semester with Scribd & The New York Times

Cancel anytime.