final ccna 3 formaa-b- juntos

16
1. Refer to the exhibit. The network administrator needs to setup Switch1 for remote access from HostA. Theshow ip interface brief is issued on Router1 and the show interfaces trunk command is issued on theSwitch1 to verify the current status. The administrator applies the additional configuration shown in theexhibit to Switch1. However, the telnet from HostA fails. What additional commands need to be appliedto the switch? • Switch(config)# interface vlan 10 Switch(config-if)# ip address 10.1.1.250 255.255.255.0 Switch(config-if)# no shutdown Switch(config-if)# ip default-gateway 10.1.10.254 2. Refer to the exhibit. On the basis of the configuration shown, how will an Ethernet frame on port GigabitEthernet0/1 be modified? • 802.1Q encapsulation inserts a 4-byte tag field into the original Ethernet frame between the source address and type/length fields and recomputes the frame check sequence (FCS) on the modified frame. 4. Which parameter is used to uniquely identify one wireless network from another? • SSID • OFDM • WEP • DSSS

Upload: daniel-mitsutake

Post on 28-Nov-2014

27 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Final CCNA 3 FormaA-B- Juntos

1. Refer to the exhibit. The network administrator needs to setup Switch1 for remote access from HostA. Theshow ip interface brief is issued on Router1 and the show interfaces trunk command is issued on theSwitch1 to verify the current status. The administrator applies the additional configuration shown in theexhibit to Switch1. However, the telnet from HostA fails. What additional commands need to be appliedto the switch?• Switch(config)# interface vlan 10Switch(config-if)# ip address 10.1.1.250 255.255.255.0Switch(config-if)# no shutdownSwitch(config-if)# ip default-gateway 10.1.10.254

2. Refer to the exhibit. On the basis of the configuration shown, how will an Ethernet frame on port GigabitEthernet0/1 be modified?• 802.1Q encapsulation inserts a 4-byte tag field into the original Ethernet frame between the source address and type/length fields and recomputes the frame check sequence (FCS) on the modified frame.4. Which parameter is used to uniquely identify one wireless network from another?• SSID• OFDM• WEP• DSSS

Page 2: Final CCNA 3 FormaA-B- Juntos

5. Refer to the exhibit. What is the consequence if SW1 port F0/1 is configured as an edge port?• SW1 port F0/1 can generate a temporary loop.

7. Refer to the exhibit. Spanning-tree port priorities are 128 for all interfaces. The network administrator enters the spanning-tree vlan 1 root primary command on S4. Which two port results are correct? (Choose two.)• S1 Gi0/1 becomes a root port.• S2 Gi0/2 becomes a non-designated port.• S3 Gi0/1 becomes a non-designated port.• S4 Gi0/1 becomes a root port.• S4 Gi0/2 becomes a designated port.

Page 3: Final CCNA 3 FormaA-B- Juntos

10. Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and host B are on the default VLAN but are not able to exchange traffic. What should be done to fix the problem?• Allow all VLANs on the trunk link.• Remove the native VLAN from the trunk.• Include a router or switch with Layer 3 capabilities.• Configure the same native VLAN on both ends of the trunk.

12. What happens when the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines?• A new RSA key pair is created.• The switch defaults to allowing Telnet connections only.• The switch is no longer able to make SSH connections as an SSH client.• The switch allows remote connections only after a new RSA key pair is generated.

Page 4: Final CCNA 3 FormaA-B- Juntos

16. Refer to the exhibit. How does SW1 manage traffic coming from Host A?• SW1 leaves the traffic untagged and forwards it over the trunk.

Page 5: Final CCNA 3 FormaA-B- Juntos

18. Refer to the exhibit. Computer A sends a broadcast message. Which devices will see the broadcast• computer C and Router1

22. Refer to the exhibit. What does STATIC indicate in the output that is shown?• Traffic destined for MAC address 0000.c123.5432 will be forwarded to Fa0/15.

28. What are three benefits of a hierarchical network model? (Choose three.)• reduced contention for bandwidth• reduced size of the physical layout• increased fault tolerance of the network • elimination of the need for wiring closets• elimination of the need for layer three functionality• simplification of management and troubleshooting

Page 6: Final CCNA 3 FormaA-B- Juntos

29. Refer to the exhibit. Which three options correctly identify information that could be associated with this output?(Choose three.)• Interface FastEthernet3/0/0 is subinterfaced.• A non-proprietary trunking protocol is in use.• The configuration is appropriate for a router-on-a-stick network design. .

31. Refer to the exhibit. A network administrator needs to implement inter-VLAN routing on a hierarchical network. On which devices should the inter-VLAN routing be configured?• Gateway and CS1

32. Which three statements are correct concerning the default configuration of a new switch? (Choose three.)• Spanning Tree Protocol is disabled.• Enable password is configured as cisco.• All switch ports are assigned to VLAN1.• The flash directory contains the IOS image. • VLAN1 is configured with a management IP address.• All interfaces are set to auto-negotiation of speed and duplex.

Page 7: Final CCNA 3 FormaA-B- Juntos

34. Refer to the exhibit. After the listed commands are entered into router R1 and switch S1, the administrator enters the show interface fa0/1 trunk and gets the results shown. What is the likely problem?• The trunk is established, but no VLANs have been configured to use it.• The trunk has not been established because the router does not support dynamic trunking protocol.• The router, the switch, or both must be configured with the dynamic desirable option for dynamic trunking protocol to establish a trunk.• The router is missing the dynamic trunking protocol statements necessary to form a trunk.36. What three tasks should be performed before moving a Catalyst switch to another VTP management domain? (Choose three.)• Select the correct VTP mode and version.• Configure the switch with the name of the new management domain. • Download the VTP database from the VTP server in the new domain.• Configure the VTP server in the new domain to recognize the BID of the switch.• Reset the VTP counters to allow the switch to synchronize with the other switches in the new domain.• Verify that the switch has a lower configuration revision number than the other switches in the new domain.

Page 8: Final CCNA 3 FormaA-B- Juntos

39. Refer to the exhibit. Which two statements are regarding what the cost value of 23 represents for Switch4? (Choose two.)• This cost represents the lowest cost path for Switch4 to the root switch.• Switch4 adds the cost of a Fast Ethernet link to 23 to determine its total cost to reach the root switch

43. Why is it important that the network administrator consider the spanning-tree network diameter when choosing the root bridge• BPDUs may be discarded because of expiring timers.

44. Refer to the exhibit. A network administrator has segmented the network into two VLANs and configured Router1 for inter-VLAN routing. A test of the network, however, shows that hosts on each VLAN can only access local resources and not resources on the other VLAN. What is the most likely cause of this problem?• Switch port Fa0/1 is not trunking.

45. What is the purpose of issuing the command switchport mode access on a switch interface?

• force the port to be a part of a single vlan

Page 9: Final CCNA 3 FormaA-B- Juntos

46. Refer to the exhibit. Which statement is regarding the information shown?• Interfaces Gi0/1 and Fa0/1 are allowed to carry data from multiple VLANs47. Which identifier is used to keep track of frames that are destined for a particular wireless client?• AID• SSID• BSSID• ESSID

48. Refer to the exhibit. What will happen when frames that contain an unknown source address reach interface fa0/24?• The incoming frames will be dropped.

50. Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?• From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.

51. What two methods can be used to remove MAC address table entries from a switch? (Choose two.)• Power cycle the switch to clear all dynamically learned addresses• The clear switching-tables command will remove statically configured entries.• The clear mac-address-table command will remove statically and dynamically configured table entries.

52. What are two benefits of the IEEE 802.11n standard over the IEEE 802.11G? (Choose two.)• requires less equipment• provides improved range• permits increased data rates• has a single-input and a single-output• needs no hardware upgrade for compatibility

Page 10: Final CCNA 3 FormaA-B- Juntos

1.Refer to the exhibit. The configuration steps that are listed in the exhibit have been entered in switch S1 via the console. Subsequent attempts to telnet to the switch are not successful. What is causing the problem?The transport input command must specify Telnet access.

2.Refer to the exhibit. How is port Gi1/1 on SWT-A functioning in the spanning-tree topology?It is sending and receiving data frames.

3.Which parameter is a specific frequency at which a wireless access point will operate?channel

5.What identifier in the BPDU creates a unique BID for a switch?MAC address

6.Refer to the exhibit. A wireless infrastructure has been established in a company building as shown. The design goal was to allow roaming between the three APs for handheld devices. However, the devices lose connectivity when the users roam. How can this problem be fixed?Reposition the APs so that each area of signal strength overlaps the neighbor by at least 10-15%.

7.Refer to the exhibit. The network administrator wants to configure Switch1 to allow SSH connections and prohibit Telnet connections. How should the network administrator change the displayed configuration to satisfy the requirement?Modify the transport input command.

9.Refer to the exhibit. A new host needs to be connected to VLAN 3. Which IP address should be assigned to this new host?

192.168.1.22 /28

192.168.1.31 /28

192.168.1.32 /28192.168.1.52 /28

192.168.1.63 /28

10.In setting up a wireless infrastructure network, which device is used to associate a client computer to the network?

an Ethernet switcha wireless access point

another wireless computer

a hard-wired computer on the network

11.Which statement about STP network diameter is correct?STP diameters are restricted by convergence times.

Layer 2 root elections should be optimized by adjusting BPDU timers to match network diameter.

Page 11: Final CCNA 3 FormaA-B- Juntos

Using lower bandwidth connections between switches will allow STP to have a larger network diameter.

Portfast can be used to increase the allowable switched network diameter because it disables the forward delay and maximum age timers.

15.What are two requirements for configuring inter-VLAN routing using the router-on-a-stick model? (Choose two.)Each subinterface should be configured with its own IP address, subnet mask, and unique VLAN assignment.The physical interface of the router must be connected to a trunk link on the adjacent switch.

16.Refer to the exhibit. Router R1 is properly configured for router on a stick inter-VLAN routing, but PC1 is unable to ping PC2. What needs to be done to resolve the problem?

port fa0/1 is not trunking.

19.Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?

This entry can only be removed from the MAC address table by a network administrator.

When forwarding a frame to the device with address 0060.5c5b.cd23, the switch does not have to perform a lookup to determine the final destination port.The switch learned this MAC address from the source address in a frame received on Fa0/18.

22.What is an efficient and cost effective way to minimize the frequency and effects of broadcast storms on an Ethernet LAN?

Connect each PC directly to a router port.

Use access control lists to filter broadcasts from the network.Divide the computers into separate VLANs on the existingswitches.

Page 12: Final CCNA 3 FormaA-B- Juntos

Divide the computers into separate workgroups using different physical switches.

24.What is the correct order in which the STP components are chosen?

designated ports, nondesignated ports, root bridge, root ports

nondesignated ports, designated ports, root ports, root bridgeroot bridge, root ports, designated ports, nondesignated ports

root ports, root bridge, nondesignated ports, designated ports

31 Refer to the exhibit. A new switch, SW3, has been added to the network. The network administrator determines that VLAN information is not propagating to SW3. Which command will remedy the problem?

SW1(config)# vtp version 1

SW2(config)# vtp mode clientSW3(config)# vtp domain Cisco1

SW3(config)# vtp mode transparent

32 Which CLI mode allows users to access all device commands, such as those used for configuration, management, and troubleshooting?privileged EXEC mode

33

Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installation surveys showed strong signal strength from the AP locations to the client locations. Outside electrical interference has been eliminated. What will fix the problem?Change the channel on AP-B to 6 or 11.

34

A switch that is using port-based memory buffering receives two incoming frames on the same port. The destination port for the first frame that is received is busy. How will the switch handle the second frame that it received?The second frame will have to wait to be delivered even if its destination port is available.

Page 13: Final CCNA 3 FormaA-B- Juntos

37

Company policy requires disabling the command history buffer on network devices. An administrator enters terminal no history size at the command prompt on a Cisco Catalyst switch and receives no error messages back, but the command history buffer is still available. What is the problem?

The command contained a syntax error.

The Cisco IOS version does not support disabling the command history buffer.

The command history can only be disabled on a router, not a switch.The size parameter reset the default buffer size but did not disable access to the buffer.

38

Refer to the exhibit. Which two options correctly describe the router configuration that is shown? (Choose two.)

Routing between the 192.168.1.0 and 192.168.3.0 networks will not succeed until a routing protocol is configured on the router.

VLANs have not been appropriately configured on the router subinterfaces.The configuration is appropriate for a router-on-a-stick network design.Trunking has been appropriately configured on the router subinterfaces.

An IP address should be applied to interface Fa0/1 for routing to occur.

39

Refer to the exhibit. After entering the commands in the exhibit, the administrator receives a “password required, but none set” message when attempting to connect to S1. What is the problem?S1 does not have a password configured for the vty lines.

41 Refer to the exhibit. The Layer 2 switching design that is shown has been implemented in a campus environment that is using Spanning Tree Protocol. All inter-switch links that are shown are trunks. Whenever an inter-switch link fails, the network takes nearly a minute to completely converge. How can the convergence time be reduced?Implement Rapid Spanning Tree Protocol.

Page 14: Final CCNA 3 FormaA-B- Juntos

42 Refer to the exhibit. What are two reasons for the Fa0/24 port being placed in the blocking state? (Choose two.)The Fa0/24 port is administratively down.STP has detected links that create a loop.

48 Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?

WEP ensures that only authenticated users are allowed access to the WLAN.

WEP translates an internal address or group of addresses into an outside, public address.

51 What provides an authentication mechanism for 802.11-based wireless networks?

DSSS

OFDM

SSIDWPA

90% correct