Senin, 09 Februari 2009

ccna 3 final exam version 1 part 1

1. Which statement regarding the service password-encryption command is true?
The service password-encryption command is entered at the privileged EXEC mode prompt.
The service password-encryption command encrypts only passwords for the console and VTY ports.
The service password-encryption command encrypts all previously unencrypted passwords in the running configuration.
To see the passwords encrypted by the service password-encryption command, enter the no service password-encryption command.

2. Refer to the exhibit. What is the purpose of the configuration commands that are shown?
to activate port Fa0/10.
to make the port a member of VLAN 30.
to activate port security on port Fa0/10.
to add VLAN 30 to the trunk that is connected to port Fa0/10.

3. Refer to the exhibit. Which two options correctly describe the router configuration that is shown?(Choose two)
Routing between the 192.168.1.0 and 192.168.3.0 networks will not succeed until a routing protocol is configured on the router.
VLANs have not been appropriately configured on the router subinterfaces.
The configuration is appropriate for a router-on-a-stick network design.
Trunking has been appropriately configured on the router subinterfaces.
An IP address should be applied to interface Fa0/1 for routing to occur.

4. Refer to the exhibit. All trunk links are operational and all VLANs are allowed on all trunk links. An ARP request it sent by computer 5. Which device or devices will receive this message?
only computer 4
computer 3 and RTR-A
computer 4 and RTR-A
computer 1, computer 2, computer 4, and RTR-A
computer 1, computer 2, computer 3, computer 4, and RTR-A
all of the computers and the router

5. Refer to the exhibit. VTP pruning is enabled in the VTP domain that is shown. How will switch ST-1 handle Layer 2 broadcast traffic originating from host A on switch STC?
It will be dropped
It will be forwarded out port Fa0/5 only
It will be forwarded out ports Fa0/5 and Fa0/10
It will be forwarded out ports Fa0/5, Fa0/10, and Fa0/15

6. Which three statements are correct concerning the default configuration of a new switch?(Choose three).
It is configured in VTP server mode
STP is automatically enabled
The first VTY line is automatically configured to allow remote connections
VLAN1 is configured with a management IP address
All switch ports are assigned to VLAN1
The enable password is configured as cisco

7. Refer to the exhibit. A network administrator enters the displayed commands to configure VLAN 30. What is the result of running these commands?
VLAN 30 will be added to S1,S2,and S3,but not to S4
VLAN 30 will be pruned from the VLAN database of S3
VLAN 30 will be added to the VLAN database of S3 but will not be propagated to S4,S2 or S1
VLAN 30 will not be added to the VLAN database of S3 and an error message will be displayed

8. Refer to the exhibit. The network administrator configures both switches as displayed. Howerer, host C is unable to ping host D and host E is unable to ping host F. What ation should the administrator take to enable this communication?
Include a router in the topology
Associate hosts A and B with VLAN 10 instead of VLAN 1
Remote the native VLAN from the trunk
Configure one trunk port in the dynamic desirable mode
Add the switchport nonegotiate command to the configuration of S2

9. What are two requirements for configuring inter-VLAN routing using the router-on-astick model?(Choose two).
Each subinterface should be configured with its own Ip address, subnet mask, and unique VLAN
assignment.
The physical interface of the router must be connected to a trunk link on the adjacent switch.
The number of physical interfaces on the router should match the number of VLANs.
Different static VLANs should be assigned to different interfaces of the router.
The router should be configured as the VTP server.

10. Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?
WEP identifies the wireless LAN.
WEP allows the access point to inform clients to its presence.
WEP translates IP addresses into easy-to-remember domain names.
WEP encrypt data between the wireless client and the access point.
WEP ensures that only authenticated users are allowed acces to the WLAN.
WEP translates an internal address or group of addresses into an outside, public address.

11. Refer to the exhibit. Router R1 is properly configured for router on a stick inter- VLAN routing, but PC1 is unable to ping PC2. What needs to be one to resolve the problem?
Rename VLAN1
Connect one more port of S1 to R1
Configure the Fa0/1 port of S1 as trunk port
Move the Fa0/0 interface of R1 to another VLAN

12. Refer to the exhibit. Switches S2 and S3 are properly connected using an ethernet cable. A network administrator has configured both switches with VTP, but S3 is unable to propagate VLANs to S2. What could be the reason for this?
The VTP configuration revision is different on both switches.
The VTP domains are different on both switches.
VTP pruning is disabled.
VTP v2 is disabled.

13. Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?
This entry can only be removed from the MAC address table by a network administrator.
When forwarding a frame to the device with address 0060.5c5b.cd23,the switch does not have to perform a lookup to determine.
Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18.
The switch learned this MAC address from the source address in a frame received on Fa0/18.

14. After unpacking a new Linksys WRT300N wireless multifunction device, a user needs to change the default administrator password and make other configuration changes. What must the user doto access the device in order to make these changes?
Use a wireless client to associate with the WRT300N and then open a HyperTerminal sssion with the device.
Establish a wired connection with the device and then reboot the attached computer to launch the configuration software.
Establish a wired connection from a computer in the same IP subnet as the WRT300N and enter the default IP address of the device into a web browser on the computer.
Modify the TCP/IP properties of the computer that is connected to the WRT300N so that the computer and the WRT300N exist on the same network. Then reboot computer to establish a connection.

15. Refer to the exhibit. The switches are configured for VTP as shown. Which two statements correctly describe the operation of these switches?(Choose two).
A new VLAN can be added to Switch1 and that information will be added only to Switch2.
A new VLAN can be added to Switch1 and that information will be added to Switch2 and Switch4.
An existing VLAN can be deleted from Switch4 and that VLAN will be deleted from Switch1 and Switch2.
An existing VLAN can be deleted from Switch2 and that VLAN will be deleted from Switch1 and Switch4.
A new VLAN can be added to Switch4 and that information will be added to Switch1, Switch2, Switch3.
A new VLAN can be added to Switch3 and that information will be added to Switch1, Switch2, Switch4.

Related Posts by Categories



0 komentar:

Posting Komentar