Senin, 09 Februari 2009

ccna 3 final exam version 2 part 2

18. Refer to the exhibit. The network administrator needs to remove the east-hosts VLAN and use the switch port from VLAN in one of the existing VLANs. Which two sets of commands should be used when completely removing VLAN from S1-Central while leaving the switch and all its interfaces operational? (Choose two.)

S1-Central> enable
S1-Central# reload

S1-Central> enable
S1-Central# erase flash:

S1-Central> enable
S1-Central# delete flash:vlan.dat

S1-Central> enable
S1-Central# configure terminal

S1-Central(config)# no vlan 2


S1-Central> enable

S1-Central# configure terminal

S1-Central(config-if)# interface fastethernet 0/1
S1-Central(config-if)# switchport access vlan 3


19. Which statement correctly describes a function of a Layer 2 switch?
It routes packets between different LAN segments.
It uses the destination MAC address to selectively forward a frame.
It performs switching and filtering based on the destination network layer address.
It drops a frame whose destination MAC address is not in the MAC address table.

20. Refer to the exhibit. Hosts PC_A and PC_B send traffic simultaneously, and the frames from the transmitting stations collide. What is the last device to receive the collision?
hub HB1
switch SW1
router R1
switch SW2
router R2
switch SW4

21. Refer to the exhibit. What does STATIC indicate in the output that is shown?
Switch port Fa0/24 can only work in VLAN 99.
VLAN 99 was manually added to the VLAN database.
MAC address 0001.637b.b267 was learned from the source address of a frame that was received on switch Fa0/24.
MAC address 0001.637b.b267 was manually associated with the switch port Fa0/24.

22. Which combination is required to establish a connection to initially configure the Linksys WRT300N wireless accessdevice?
a computer with a console connection to the WRT300N
a computer with a wireless connection to the WRT300N
a computer with an AUX port connection to the WRT300N
a computer configured in the same IP subnet as the WRT300N and a direct cable connection to it

23. What is the purpose of the Spanning Tree algorithm?
It propagates VLAN configurations to other switches.
It restricts broadcast packets to a single VLAN.
It segments a network into multiple broadcast domains.
It prevents loops in a switched network with redundant paths.

24. Refer to the exhibit. Which three options correctly describe the router configuration that is shown? (Choose three.)
An IEEE standard trunking protocol is in use.
Interface Fa0/1 has been configured with subinterfaces.
The shutdown command has been applied to interface Fa0/1.
Interface Fa0/1.3 is mapped to the default management VLAN.
The configuration is appropriate for a router-on-a-stick network design.
An IP address should be applied to interface Fa0/1 for routing to occur.

25. Refer to the exhibit. Computer D sends a broadcast message. Which devices will process the broadcast message?
computer E
computer D and computer E
computer D, computer E, and Router1
computer B and computer E
computer B, computer E, and Router1
computer C, computer D, and computer E
computer C, computer D, computer E, and Router1
computer A, computer B, computer C, computer D, computer E, and Router1

26. Refer to the graphic. In the Wireless menu option of a Linksys integrated router, what does the Network Mode option Mixed mean?
The router supports encryption and authentication.
The router supports both wired and wireless connections.
The router supports 802.11b, 802.11g, and 802.11n devices.
The router supports connectivity through infrared and radio frequencies.

27. Refer to the exhibit. After the listed commands are entered into router R1 and switch S1, PC1 and PC2 can ping default gateways, but not each other. The network administrator enters the show interfaces trunk command and the results that are shown. What is the likely problem?
The router has not been configured with a routing protocol.
The trunk is established, but no VLANs have been configured to use it.
The trunk has not been established because the switch port has not been configured for trunking.
The switch, the router, or both must be configured with the dynamic desirable option for the Dynamic Trunking Protocol to establish a trunk.

28. Refer to the exhibit. The network administrator wants to allow both SSH and Telnet connections to Switch1. However, SSH connections fail. What is the most likely cause of this problem?
The RSA key has been removed.
SSH has been configured on the wrong line.
The transport input command is applied incorrectly.
The domain name has been configured in the wrong configuration mode.

29. Refer to the exhibit. What does “LEARNING” mean as it relates to the Spanning Tree Protocol?
The switch is sending and receiving data frames.
The switch is not receiving BPDUs, but is sending and receiving data.
The switch is participating in the election process by forwarding the BPDUs it receives.
The switch is receiving BPDUs and populating the MAC address table, but not sending data.

30. Refer to the exhibit. An administrator documented the output of a CAM table from an Ethernet switch as shown. What action the switch take when it receives the frame shown at the bottom of the exhibit?
discard the frame
forward the frame out port 2
forward the frame out port 3
forward the frame out all ports
forward the frame out all ports except port 3
add station 00-00-3D-1F-11-05 to port 2 in the forwarding table

31. Refer to the exhibit. What happens when a frame from a source MAC address different from 00a8.d2e4.ba27 reaches switch 0/5?
The frame is dropped.
The port is shut down.
An error message is displayed.
FastEthernet port 0/5 will show an err-disabled message.

32. What are three features of router-on-a-stick, inter-VLAN routing? (Choose three.)
requires the use of VTP
requires the use of subinterfaces
reduces the number of broadcast domains
affects performance when many VLANs are used
requires an access link between the router and at least one switch
is more cost effective than other approaches to inter-VLAN routing
dictates that at least two switch ports be used between the router and the switch

33. Which two statements about a service set identifier (SSID) are true? (Choose two.)
provides strong wireless security
responsible for determining the signal strength
tells a wireless device to which WLAN it belongs
used to encrypt data sent across the wireless network
all wireless devices on the same WLAN must have the same SSID

Related Posts by Categories



0 komentar:

Posting Komentar