Sie sind auf Seite 1von 22

CCNA ESwitching Final Practice Exam CCNA3 FINAL Exam Score 100 pdf1.

2. What happens when the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines? A new RSA key pair is created. The switch defaults to allowing Telnet connections only. The switch is no longer able to make SSH connections as an SSH client. The switch allows remote connections only after a new RSA key pair is generated.

3. What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value? All VLANs will be allowed across the trunk. Only VLAN 1 will be allowed across the trunk. Only the native VLAN will be allowed across the trunk. The switches will negotiate via VTP which VLANs to allow across the trunk.

CCNA ESwitching Final Practice Exam 4. Using the command copy tftp:backup.cfg startup-config, an administrator downloaded a saved configuration from a TFTP server to a switch. Why does the administrator not detect any changes in the switch configuration after the download completes? The command should have been copy startup-config tftp:backup.cfg. A backup configuration from a TFTP server cannot be copied directly into the startup-config. The command copy running-config startup-config should be used to save the changes on the switch. Downloading to the startup-config requires the switch to be reloaded in order for the configuration to take effect.

5.

CCNA ESwitching Final Practice Exam 6.

7. Which statement regarding the service password-encryption command is true? The service password-encryption command is entered at the privileged EXEC mode prompt. The service password-encryption command encrypts only passwords for the console and VTY ports. The service password-encryption command encrypts all previously unencrypted passwords in the running configuration. To see the passwords encrypted by the service password-encryption command, enter the no service password-encryption command.
3

CCNA ESwitching Final Practice Exam

8. Which three statements are correct concerning the default configuration of a new switch? (Choose three.) Spanning Tree Protocol is disabled. Enable password is configured as cisco. All switch ports are assigned to VLAN1. The flash directory contains the IOS image. VLAN1 is configured with a management IP address. All interfaces are set to auto-negotiation of speed and duplex.
9.

CCNA ESwitching Final Practice Exam 10.

11. What three tasks should be performed before moving a Catalyst switch to another VTP management domain? (Choose three.) Select the correct VTP mode and version. Configure the switch with the name of the new management domain. Download the VTP database from the VTP server in the new domain. Configure the VTP server in the new domain to recognize the BID of the switch. Reset the VTP counters to allow the switch to synchronize with the other switches in the new domain. Verify that the switch has a lower configuration revision number than the other switches in the new domain.

12. How does Spanning Tree Protocol aid network architecture? allows for redundant links by eliminating loops provides greater scalability by eliminating collisions reduces switch processor load by reducing broadcast traffic on trunk links reduces administrative overhead by sharing VLAN databases between switches across the network

CCNA ESwitching Final Practice Exam 13. Which type of frame contains information that is used in the election of the spanning tree root bridge? BID LSA LSU BPDU

14.

15.

CCNA ESwitching Final Practice Exam

16. After unpacking a new Linksys WRT300N wireless multifunction device, a user needs to change the default administrator password and make other configuration changes. What must the user do to access the device in order to make these changes? Use a wireless client to associate with the WRT300N and then open a HyperTerminal session with the device. Establish a wired connection with the device and then reboot the attached computer to launch the configuration software. Establish a wired connection from a computer in the same IP subnet as the WRT300N and enter the default IP address of the device into a web browser on the computer. Modify the TCP/IP properties of the computer that is connected to the WRT300N so that the computer and the WRT300N exist on the same network. Then reboot the computer to establish a connection.

17.

CCNA ESwitching Final Practice Exam 18.

19.

CCNA ESwitching Final Practice Exam 20.

21.

CCNA ESwitching Final Practice Exam 22.

23. Which parameter is a specific frequency at which a wireless access point will operate? BSS WEP SSID ad hoc channel

24. Which parameter is associated with wireless authentication? shared key SSID ad hoc channel

11

CCNA ESwitching Final Practice Exam 25.

26.

11

CCNA ESwitching Final Practice Exam 27.

28. Which statement correctly describes the spanning-tree path cost? It is calculated based on the total number of switches connected in a loop. It is calculated based on the utilization of all the switches along a given path. It is calculated based on the bridge priority of the switches along a given path. It is calculated based on the sum of the port cost value, determined by link speed, for each switch port along a given path

12

CCNA ESwitching Final Practice Exam 29.

30.

13

CCNA ESwitching Final Practice Exam 31.

32. Which three actions are performed during the boot sequence of a Cisco switch? (Choose three.) The boot loader uses the self-contained switch operating system to boot the switch. The boot loader retrieves diagnostics routines via TFTP The boot loader performs POST. The boot loader is loaded from RAM. The boot loader initializes the flash file system that is used to boot the system. The boot loader loads the default operating system if the flash-based operating system is corrupt or missing.

33.

14

CCNA ESwitching Final Practice Exam

34.

35.

36. Which statement is true about open authentication when it is enabled on an access point? requires no authentication uses a 64-bit encryption algorithm requires the use of an authentication server requires a mutually agreed upon password

15

CCNA ESwitching Final Practice Exam 37. How are data frames identified and sent to the correct VLAN when exiting an Ethernet trunk? Frames are forwarded to the correct VLAN based on the VLAN tag. Frames are always forwarded to the native VLAN when exiting a trunk. Frames are forwarded to the correct VLAN based on the source IP address. Frames are forwarded to the correct VLAN based on information in the MAC address table.

38.

16

CCNA ESwitching Final Practice Exam

39. When port security is used on a switch, which violation mode will cause an SNMP trap to be sent and traffic to be dropped when the number of secure MAC addresses for a port is reached? sticky protect restrict shutdown 40. A wireless access point can function as which type of shared medium, wired LAN device? hub switch router gateway 41.

17

CCNA ESwitching Final Practice Exam

42.

43. Which benefit is gained by designing a network with a small network diameter? lower latency improved security increased redundancy higher interface bandwidth

18

CCNA ESwitching Final Practice Exam 44.

45.

19

CCNA ESwitching Final Practice Exam

46. Which security protocol or measure would provide the greatest protection for a wireless LAN? WPA2 cloaking SSIDs shared WEP key MAC address filtering

47.

48. Which two conditions would require a VTP client to send a request advertisement to a VTP server? (Choose two.) The switch has been reset. A VLAN has been created or deleted. A five minute time period has elapsed. The name of a VLAN has been changed. The VTP domain name has been changed.

21

CCNA ESwitching Final Practice Exam 49.

21

CCNA ESwitching Final Practice Exam 50.

Good Luck

Ahmed Farouk

22