Sie sind auf Seite 1von 10

Close Window

Assessment System

1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - ESwitching Practice Final Exam - CCNA Exploration: LAN Switching
and Wireless (Version 4.0)

Time Remaining:
46

Refer to the exhibit. After receiving a console notification on Switch2, the network administrator begins to
troubleshoot the trunk link between Switch1 and Switch2. Which configuration change can be made to correc
problem with the trunk link?
Set the Fa0/1 interface on Switch2 to trunk mode.
Change the trunk encapsulation on Switch2 Fa0/1 to dot1q.
Change the native VLAN on Switch2 interface Fa0/1 to VLAN 100.
Change the access mode VLAN on Switch2 to the default VLAN 1.

47

After listening for the presence of a signal on the network media, hosts A and C transmit data at the same time
what two ways do the hosts respond to this situation? (Choose two.)
The hosts transmit a jam signal to ensure that all hosts on the network are aware that a collision has occur
Because they are operating in full-duplex mode, the hosts resume listening for traffic in preparation for
sending future messages.
Because the hub will temporarily block traffic from one of the hosts, that host will be allowed to transmit
the wire is clear.
Hosts A and C are assigned shorter backoff values to provide them priority to access the media for
retransmission.
After the backoff period of a host, the host checks to determine if the line is idle before retransmitting.

48 In setting up a wireless infrastructure network, which device is used to associate a client computer to the
network?
an Ethernet switch
a wireless access point
another wireless computer
a hard-wired computer on the network

How are data frames identified and sent to the correct VLAN when exiting an Ethernet trunk?
49 Frames are forwarded to the correct VLAN based on the VLAN tag.
Frames are always forwarded to the native VLAN when exiting a trunk.
Frames are forwarded to the correct VLAN based on the source IP address.
Frames are forwarded to the correct VLAN based on information in the MAC address table.

50 After unpacking a new Linksys WRT300N wireless multifunction device, a user needs to change the default
administrator password and make other configuration changes. What must the user do to access the device in
order to make these changes?
Use a wireless client to associate with the WRT300N and then open a HyperTerminal session with the
device.
Establish a wired connection with the device and then reboot the attached computer to launch the
configuration software.
Establish a wired connection from a computer in the same IP subnet as the WRT300N and enter the defa
IP address of the device into a web browser on the computer.
Modify the TCP/IP properties of the computer that is connected to the WRT300N so that the computer a
the WRT300N exist on the same network. Then reboot the computer to establish a connection.

Showing 4 of 4 <Prev Page: Next>

Close Window
All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks.

Close Window

Assessment System

1. Assessment Selection 2. Assessment Settings 3. Take Assessment

Take Assessment - ESwitching Practice Final Exam - CCNA Exploration: LAN Switching
and Wireless (Version 4.0)

Time Remaining:
31
Refer to the exhibit. The VTP domain has been configured as shown in the exhibit. None of the configured
VLANs on SW1 and SW2 are present on SW3. What should be done to remedy the problem?
Reconfigure switches SW2 and SW3 in VTP transparent mode.
Reconfigure the VTP password to be consistent on all VTP switches.
Reconfigure all switches as VTP clients to synchronize the VLAN database information.
Reconfigure the VTP server as a VTP client and then return to VTP server mode to reset the configuration
revision number.

32

Refer to the exhibit. RTB is configured for traditional inter-VLAN routing. RTB can ping computer A but can
ping computer B. What is a possible cause of this failure?
Port Fa0/11 is in the wrong VLAN.
RTB does not have an active routing protocol.
The IP address of computer B is in the wrong logical network.
Router interface Fa0/1 has the wrong trunk encapsulation type configured.

33 Which service should be disabled on a Cisco switch or router to prevent packet sniffers from capturing
information about the device?
SSH
VTP
CDP
SNMP

34

Refer to the exhibit. Which statement is true regarding the information shown?
Only one VLAN is currently configured to use the trunk links.
The switch negotiated trunk links for interfaces Fa0/1 and Gi0/1.
A Cisco proprietary protocol is in use for interfaces Fa0/1 and Gi0/1.
Interfaces Gi0/1 and Fa0/1 are allowed to carry data from multiple VLANs.

35 What impact does the use of the mdix auto configuration command have on an Ethernet interface on a switch
automatically detects duplex settings
automatically detects interface speed
automatically detects copper cable type
automatically assigns the first detected MAC address to an interface

36
Refer to the exhibit. A network administrator enters the displayed commands to configure VLAN 30. What is
result of running these commands?
VLAN 30 will be added to S1, S2, and S3, but not to S4.
VLAN 30 will be pruned from the VLAN database of S3.
VLAN 30 will be added to the VLAN database of S3 but will not be propagated to S4, S2 or S1.
VLAN 30 will not be added to the VLAN database of S3 and an error message will be displayed.

37
Refer to the exhibit. Router R-West and switch S-West1 are connected via a single ethernet cable between th
router interface fa0/0 and the switch interface fa0/1. The router and switch have been configured with the
commands that are displayed in the exhibit. The network administrator enters the show interfaces trunk
command and receives the output as shown. What is the cause of the "not-trunking" status for switch port Fa
The trunk is established, but no VLANs have been configured to use it.
The router is missing the dynamic trunking protocol statements necessary to form a trunk.
Because the router does not support Dynamic Trunking Protocol, the trunk has not been established.
The router, the switch, or both must be configured with the dynamic desirable option for Dynamic
Trunking Protocol to establish a trunk.

38

Refer to the exhibit. The network administrator is planning five additional VLANs to be shared throughout th
VTP domain on S3. What action should the administrator take before creating the additional VLANs?
Create the VLANs on a switch in VTP server mode and allow them to propogate to the other switches in
domain.
Modify the configuration revision to 10 to support the additional VLANs.
Enable the VTP pruning mode in order to create the VLANs on S3.
Enable the VTP v2 mode.

39

Refer to the exhibit. A new host needs to be connected to VLAN 20. Which IP address should be assigned to
new host?
172.16.10.68 /27
172.16.10.99 /28
172.16.10.110 /27
172.16.30.96 /27
172.16.30.120 /28
172.16.30.146 /27

40

Refer to the graphic. In the Wireless menu option of a Linksys integrated router, what does the Network Mod
option Mixed mean?
The router supports encryption and authentication.
The router supports both wired and wireless connections.
The router supports 802.11b, 802.11g, and 802.11n devices.
The router supports connectivity through infrared and radio frequencies.

41 Which statement regarding the service password-encryption command is true?


The service password-encryption command is entered at the privileged EXEC mode prompt.
The service password-encryption command encrypts only passwords for the console and VTY ports.
The service password-encryption command encrypts all previously unencrypted passwords in the runn
configuration.
To see the passwords encrypted by the service password-encryption command, enter the no service
password-encryption command.

Which statement correctly describes the spanning-tree path cost?


42 It is calculated based on the total number of switches connected in a loop.
It is calculated based on the utilization of all the switches along a given path.
It is calculated based on the bridge priority of the switches along a given path.
It is calculated based on the sum of the port cost value, determined by link speed, for each switch port alo
a given path.

43 When port security is used on a switch, which violation mode will cause an SNMP trap to be sent and traffic
be dropped when the number of secure MAC addresses for a port is reached?
sticky
protect
restrict
shutdown

A wireless LAN access point will convert traffic between which two frame encapsulation types?
44 802.1 and 802.11
802.3 and 802.11
802.3 and 802.16
802.5 and 802.16

45 A wireless access point can function as which type of shared medium, wired LAN device?
hub
switch
router
gateway

Showing 3 of 4 <Prev Page: Next>

Close Window
All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks.

Das könnte Ihnen auch gefallen