Showing posts with label CCNA 3. Show all posts
Showing posts with label CCNA 3. Show all posts

Saturday, February 15, 2014

CCNA 3 Chapter 1 -2014

1. Which layer of the hierarchical network design model is refered to as the high-speed backbone of the internetwork, where high availability and redundancy are critical?
core layer

2. Which two characteristics are associated with enterprise level switches? (Choose two.)
high forwarding rate
support link aggregation

3. Which feature supports higher throughput in switched networks by combining multiple switch ports?
link aggregation

4. Which hierarchical design model layer controls the flow of network traffic using policies and delineates broadcast domains by performing routing functions between virtual LANs (VLANs)?
distribution

Friday, February 14, 2014

CCNA 3 Chapter 2 -2014

1. If a network administrator enters these commands on a switch, what will be the result?
Switch1(config-line)# line console 0
Switch1(config-line)# password cisco
Switch1(config-line)# login
to configure the privilege exec password that will be used for remote access

2. Which command line interface (CLI) mode allows users to configure switch parameters, such as the hostname and password?
global configuration mode

3. What happens when the transport input ssh command is entered on the switch vty lines?
Communication between the switch and remote users is encrypted.

4. A network administrator uses the CLI to enter a command that requires several parameters. The switch responds with "% Incomplete command". The administrator cannot remember the missing parameters. What can the administrator do to get the parameter information?
append a space and then ? to the last parameter

Thursday, February 13, 2014

CCNA 3 Chapter 3 -2014

1. Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2 and assigned hosts on the IP addresses of the VLAN in the 10.1.50.0/24 subnet range. Computer A can communicate with computer B, but not with computer C or computer D. What is the most likely cause of this problem?
VLAN 50 is not allowed to entering the trunk between Switch1 and Switch2.

2. Refer to the exhibit. The exhibited configurations do not allow the switches to form a trunk. What is the most likely cause of this problem?
The trunk cannot be negotiated with both ends set to auto.

3. Refer to the exhibit. Which two conclusions can be drawn regarding the switch that produced the output shown? (Choose two.)
The command switchport access vlan 20 was entered in interface configuration mode for Fast Ethernet interface 0/1.
Devices attached to ports fa0/5 through fa0/8 cannot communicate with devices attached to ports fa0/9 through fa0/12 without the use of a Layer 3 device.

4. What statements describe how hosts on VLANs communicate?
Hosts on different VLANs communicate through routers.

Wednesday, February 12, 2014

CCNA 3 Chapter 4 -2014

1. Which statement is true when VTP is configured on a switched network that incorporates VLANs?
VTP dynamically communicates VLAN changes to all switches in the same VTP domain.

2. Refer to the exhibit. What information can be learned from the output provided?
It verifies VTP advertisements are being exchanged.

3. Refer to the exhibit. Which two facts can be confirmed by this output? (Choose two.)
If this switch is added to an established network, the other VTP-enabled switches in the same VTP domain will consider their own VLAN information to be more recent than the VLAN information advertised by this switch.
This switch is configured to advertise its VLAN configuration to other VTP-enabled switches in the same VTP domain.

4. A network administrator is replacing a failed switch with a switch that was previously on the network. What precautionary step should the administrator take on the replacement switch to avoid incorrect VLAN information from propagating through the network?
Change the VTP domain name.

Tuesday, February 11, 2014

CCNA 3 Chapter 5 -2014

1. Which two criteria does a switch use to select the root bridge? (Choose two.)
bridge priority
base MAC address

2. Which two statements are true about the default operation of STP in a Layer 2 switched environment that has redundant connections between switches? (Choose two.)
Decisions on which port to block when two ports have equal cost depend on the port priority and identity.
Non-root switches each have only one root port.

3. Refer to the exhibit. All switches in the network have empty MAC tables. STP has been disabled on the switches in the network. How will a broadcast frame that is sent by host PC1 be handled on the network?
Switch SW1 will forward the broadcast out all switch ports, except the originating port. This will generate an endless loop in the network.

4. Which two statements describe the BIDs used in a spanning tree topology? (Choose two.)
They consist of a bridge priority and MAC address.
They are used by the switches in a spanning tree topology to elect the root bridge.

Monday, February 10, 2014

CCNA 3 Chapter 6 -2014

1. What are the steps which must be completed in order to enable inter-VLAN routing using router-on-a-stick?
Create the VLANs on the switch to include port membership assignment and configure subinterfaces on the router matching the VLANs.

2. Refer to the exhibit. R1 is routing between networks 192.168.10.0/28 and 192.168.30.0/28. PC1 can ping R1 interface F0/1, but cannot ping PC3. What is causing this failure?
The PC3 network address configuration is incorrect.

3. Which statement is true about ARP when inter-VLAN routing is being used on the network?
When router-on-a-stick inter-VLAN routing is in use, the router returns the MAC address of the physical interface in response to ARP requests.

4. In which situation could individual router physical interfaces be used for InterVLAN routing, instead of a router-on-a-stick configuration?
a network with a limited number of VLANs

Sunday, February 9, 2014

CCNA 3 Chapter 7 -2014

1. Which two statements concerning network security are accurate? (Choose two.)
Open authentication uses no client or AP verification.
802.11i incorporates a RADIUS server for enterprise authentication.

2. Which installation method will allow connectivity for a new wireless network?
set up open access on both the access point and each device connected to it

3. Which function is provided by a wireless access point?
converts data from 802.11 to 802.3 frame encapsulation

4. What procedure can prevent man-in-the-middle attacks?
Force all devices on a WLAN to authenticate and monitor for any unknown devices.

Saturday, February 8, 2014

CCNA 3 Final Exam Answers -2014

1. A wireless client is attempting to establish a connection with a wireless access point. What process does the client use to discover the access points which are available to it?
probing

2. Refer to the exhibit. Each switch is shown with its MAC address. Which switch will be elected as the spanning-tree root bridge if the switches are configured with their default priority values?
switch F

3. Refer to the exhibit. Which two switch interfaces would be RSTP edge ports? (Choose two.)
switch S3, Fa0/5
switch S4, Fa0/2

4. What is a function or characteristic of the native VLAN?
It is the VLAN that supports untagged traffic on an 802.1Q trunk.