Senin, 09 Februari 2009

ccna 3 final exam version 1 part 2

16. What are three benefits of employing a hierarchical network design?(choose three)
Hierarchically designed networks can more easily be expanded to suit future needs.
Hierarchical design models enhance existing bandwidth through the use of link aggregation.
The hierarchical model allows for specialized functionality at each layer, simplifying device management.
Use of a hierarchical design allows replacement of redundant devices with high-capacity network
equipment.
A hierarchical design uses firewalls instead of complicated port-based and distribution layer ecurity policies.
The hierarchical model allows the use of high-performance switches at all design layers, thus allowing for fully-meshed topology.

17. Which statements correctly describes the function of a Layer 2 switch?
It performs switching and filtering based on the destination network layer address.
It automatically uses STP to prevent switching loops in redundant topologies.
It uses VTP to allow data from multiple VLANs to travel across a single link.
It routes packets between different LAN segments.

18. Refer to the exhibit. A network administrator has segmented the network into two VLAns. The connected hosts can only access resources in their own VLAN. What th most scalable and cost effective solution to allow inter-VLAN communication in this network?
Replace S1 with a router that has one FastEthernet interface for each PC
Add a second switch and divide the PCs so that each VLAN is connected to is own switch
Configure a router with two subinterfaces on one of its FastEthernet ports and connect it to S1 using a trunk link
Connect a router to a port on S1 and assign the IP address of VLAN1 to the connecting router interface

19. When configuring a router to act as an SSH server, what should be configured before issuing the crypto key generate rsa command?
the security domain name
the VTP domain name
the IP domain name
the host name

20. Which statement correctly describes the spanning-tree path cost?
It is calculated based on the total number of switches connected in a loop
It is calculated based on the utilization of all the switches along a given path
It is calculated based on the bridge priority of the switches along a given path
It is calculated based on the sum of the port cost value, determited by link speed, for each switch port along a given path

21. What provides an authentication mechanism for 802.11-based wireless networks?
DSSS
OFDM
SSID
WPA

22. Refer to the exhibit. What is true of the configuration of switch S1?
A Cisco proprietary protocol is in use for ports Fa0/1 and Fa0/3
Switch ports Fa0/1 and Fa0/3 have been configured with the switchport mode access command
Untagged frames received on ports Fa0/1 and Fa0/3 will be placed on VLAN 1
Switch ports Fa0/1 and Fa0/3 are configured to carry data from multiple VLANs

23. Refer to the exhibit. Switch SW2 has been newly urchased and added to the network. What configuration should be applied to SW2 so that it participates in the same VTP domain as switch SW1, receives VLAN information from SW1, and synchronizes VLAN information?
Disable VTP pruning on SW2.
Configure SW2 in VTP transparent mode.
Configure SW2 with the VTP domain password.
Configure SW2 as a VTP server with a higher revision number.

24. Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit. However, hosts A and D cannot ping each other. What is the most likely cause of this problem?
The link between the switches is up but not trunked
The Fa0/11 interface of Switch1 is not configured as a trunk
Hosts A and D are configured with IP addresses from different subnets
VLAN 20 and VLAN 30 are not allowed on the trunk between the switches

25. Refer to the exhibit. A student has decided to share the tacher's access to the internet by attaching a hub and laptop to STW. What will be the result of the student making this connection?
The student will gain access to internet.
The Fa0/7 port of STW will be shutdown.
The teachers will remain connected to the network, but frames from the laptop will be dropped.
The frames from the laptop will be dropped, but the teachers host will maintain connectivity with the network.

26. Refer to the exhibit.Both switches are configured with default bridge priority. Which port will act as STP root port if all links are operating at the same bandwidth?
Fa0/1 interface of S1
Fa0/2 interface of S1
Fa0/1 interface of S2
Fa0/2 interface of S2

27. Refer to the exhibit. On which of the devices in this network should routing between VLAns take place?
the core layer devices.
the access layer devices.
the distribution layer devices.
the core and distribution layer devices.

28. Refer to the exhibit. Hosts PC_A and PC_B send traffic simultaneously, and the frames from the transmitting station collide. What is the last device to receive the collision?
hub HB1
switch SW1
router R1
switch SW2
router R2
switch SW4

29. Refer to the exhibit. Hosts A and B attempt to transmit a frame at the same time and a collision occurs. When will host D be able to transmit?
immediately.
after sending its jam signal.
after host A and host B have comleted transmission.
after the jam signal clears and its backoff delay expires.

30. Refer to the exhibit. The switch VTY lines have been properly configured, but PC1 is unable to remotely manage the switch. How can this problem be resolved?
Configure the Fa0/1 interface of the switch in trunk mode.
Configure a default gateway on the switch.
Configure the native VLAN on the switch.
Configure the Fa0/1 interface of the switch to allow all VLANs.

Related Posts by Categories



0 komentar:

Posting Komentar