Anda di halaman 1dari 5

07/11/13

CCNA answers of all chapters and finals, CCNA Discovery, CCNA Exploration, CCNA Security : CCNA Exploration 3 final exam answers

CCNA answers of all chapters and finals, CCNA Discovery, CCNA Exploration, CCNA Security
CCNA Ex a m An s we r s 2 0 1 2 V4 . 0 , CCNA Ex p l o r a t i o n e n Di s c o v e r y , DHo m e s b An s we r s , CCNA Di s c o v e r y 2 Ds m b I S P , CCNA Di s c o v e r y 3 DRS E n t , CCNA Di s c o v e r y 4 Dc o m p Nt wk , Ci s c o Di s c o v e r y Ch a p t e r s 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , f i n a l , Ci s c o Di s c o v e r y t o e t s a n t wo o r d e n , W o r k i n g a t a S m a l l - t o - M e d i u m Bu s i n e s s o r I S P , Ne t wo r k F u n d a m e n t a l s , Ex p l o r a t i o n , F i n a l t o e t s a n t wo o r d e n , Ci s c o Di s c o v e r y 1 t o e t s a n t wo o r d e n , DRS E n t DHo m e s b f i n a l e x a m a n s we r s , DCo m p Nt wk f i n a l e x a m a n s we r s , Ds m b I S P f i n a l e x a m a n s we r s 2 0 1 2

CCNA Discovery 1 DHomesb CCNA Exploration 1 ENetwork

CCNA Discovery 2 Dsmb-or-ISP CCNA Exploration 2 ERouting

CCNA Discovery 3 DRSEnterprise CCNA Exploration 3 ESwitching

CCNA Discovery 4 DCompNetworks CCNA Exploration 4 EWAN Links

CCNAS Contact

CCNP

Cursos de Redes Cisco EAD


www.C loudC ampus.com.br C ursos 100% ONLINE de redes C isco e T.I. C ursos comeando em R$100.

Compartilhar

m aandag 24 septem ber 2012

CCNA Exploration 3 final exam answers

ESwitching Final 1 - LAN Switching and Wireless, V4.0


1. Refer to the exhibit. What happens w hen a fram e from a source MAC address different from 00a8.d2e4.ba27 reaches sw itch port 0/5? The frame is dropped. The port is shut dow n. An error message is displayed. FastEthernet port 0/5 w ill show an err-disabled message. 2. Refer to the exhibit. What w ill allow a host on VLAN 40 on sw itch X to com m unicate w ith a host in VLAN 40 on sw itch Y? QoS routing trunking VPN 3. A netw ork adm inistrator issued the erase nvram : com m and on a sw itch. What w ill be the outcom e of the com m and? It w ill clear the contents of the MAC table. It w ill clear the contents of the VLAN database. It w ill clear the contents of the startup configuration file. It w ill clear the contents of the running configuration file. 4. What type of m essage do w ireless clients transm it w hen they are searching for a specific w ireless netw ork? probe beacon associate authenticate 5. What are tw o requirem ents for configuring inter-VLAN routing using the router-on-a-stick m odel? (Choose tw o.) Each subinterface should be configured w ith its ow n IP address, subnet mask, and unique VLAN assignment. The physical interface of the router must be connected to a trunk link on the adjacent sw itch. The number of physical interfaces on the router should match the number of VLANs. Different static VLANs should be assigned to different interfaces of the router. The router should be configured as the VTP server. 6. Refer to the exhibit. A netw ork adm inistrator needs to add IP phones to the netw ork. To w hich devices should the IP phones connect? AS1 and AS2 DS1 and DS2 DS1, DS2, and CS1 AS1, AS2, DS1, and DS2 7. A netw ork adm inistrator enters the enable com m and at the Sw itch> prom pt of a new sw itch. What m ode w ill the sw itch enter? setup mode configuration mode privileged EXEC mode user EXEC mode ROMMON mode interface mode 8. Refer to the exhibit. What does the term DYNAMIC indicate in the output that is show n? This entry can only be removed from the MAC address table by a netw ork administrator. When forw arding a frame to the device w ith address 0060.5c5b.cd23, the sw itch does not have to perform a lookup to determine the final destination port. Only the device w ith MAC address 0060.5c5b.cd23 w ill be allow ed to connect to port Fa0/18. The sw itch learned this MAC address from the source address in a frame received on Fa0/18. 9. Which value determ ines if a sw itch becom es the central point of reference in the spanning tree topology? low est bridge ID

ciscotoetsantwoorden.blogspot.nl/2012/09/ccna-exploration-3-final-exam-answers.html

1/5

07/11/13

CCNA answers of all chapters and finals, CCNA Discovery, CCNA Exploration, CCNA Security : CCNA Exploration 3 final exam answers
highest revision number low est numeric IP address highest numeric MAC address 10. Refer to the exhibit. Users A and B are reporting interm ittent connectivity problem s. Preinstallation surveys show ed strong signal strength from the AP locations to the client locations. Outside electrical interference has been elim inated. What w ill fix the problem ? Relocate the APs closer to each other. Increase the distance betw een the clients. Change the channel on AP-B to 6 or 11. Place AP-A and AP-B on the same w ireless channel. 11. Refer to the exhibit. Router RA receives a packet w ith a source address of 192.168.1.65 and a destination address of 192.168.1.161. What w ill the router do w ith this packet? The router w ill drop the packet. The router w ill forw ard the packet out interface FastEthernet 0/1.1. The router w ill forw ard the packet out interface FastEthernet 0/1.2. The router w ill forw ard the packet out interface FastEthernet 0/1.3. The router w ill forw ard the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3. 12. Refer to the exhibit. R1 is configured for traditional inter-VLAN routing. R1 can ping com puter 3 but cannot ping com puter 1. What is a possible cause for this failure? S1 port Fa0/11 is in the w rong VLAN. R1 does not have an active routing protocol. The IP address of computer 1 is in the w rong logical netw ork. Router interface Fa0/0 has the w rong trunk encapsulation type configured. 13. Refer to the exhibit. A new sw itch, SW3, has been added to the netw ork. The netw ork adm inistrator determ ines that VLAN inform ation is not propagating to SW3. Which com m and w ill rem edy the problem ? SW1(config)# vtp version 1 SW2(config)# vtp mode client SW3(config)# vtp domain Cisco1 SW3(config)# vtp mode transparent 14. An adm inistrator is troubleshooting a PC on the netw ork w hich is suffering from slow and interm ittent connectivity. The PC has a ping success rate to the default gatew ay of less than half the ping attem pts. Other PCs on the sw itch can consistently ping the default gatew ay. The sw itch port is configured for auto duplex and the PC is configured for full duplex. What w ill com m only cause this problem ? The PC is set to full duplex. The sw itch port fails to autonegotiate the duplex setting and defaults to half duplex, w hich causes a duplex mismatch. The sw itch traffic is exceeding available frame buffers. The result is that frames are being dropped. The PC and the default gatew ay have different bandw idth Ethernet ports. The default gatew ay is not on the same sw itch that the PC is. 15. What is the purpose of the sw itch com m and sw itchport access vlan 99? to enable port security to make the port operational to assign the port to a particular VLAN to designate the VLAN that does not get tagged to assign the port to the native VLAN (VLAN 99) 16. Refer to the exhibit. A netw ork adm inistrator has segm ented the netw ork into tw o VLANs. The connected hosts can only access resources in their ow n VLAN. What is the m ost scalable and cost effective solution to allow inter-VLAN com m unication in this netw ork? Replace S1 w ith a router that has one FastEthernet interface for each PC. Add a second sw itch and divide the PCs so that each VLAN is connected to its ow n sw itch. Configure a router w ith tw o subinterfaces on one of its FastEthernet ports and connect it to S1 using a trunk link. Connect a router to a port on S1 and assign the IP address of VLAN1 to the connecting router interface. 17. Refer to the exhibit. A new host needs to be connected to VLAN 3. Which IP address should be assigned to this new host? 192.168.1.22 /28 192.168.1.31 /28 192.168.1.32 /28 192.168.1.52 /28 192.168.1.63 /28 18. What is the purpose of the Spanning Tree algorithm ? It propagates VLAN configurations to other sw itches. It restricts broadcast packets to a single VLAN. It segments a netw ork into multiple broadcast domains. It prevents loops in a sw itched netw ork w ith redundant paths. 19. Refer to the exhibit. What does LEARNING m ean as it relates to the Spanning Tree Protocol? The sw itch is sending and receiving data frames. The sw itch is not receiving BPDUs, but is sending and receiving data. The sw itch is participating in the election process by forw arding the BPDUs it receives. The sw itch is receiving BPDUs and populating the MAC address table, but not sending data. 20. What three tasks should be perform ed before m oving a Catalyst sw itch to another VTP m anagem ent dom ain? (Choose three.) Select the correct VTP mode and version. Configure the sw itch w ith the name of the new management domain. Dow nload the VTP database from the VTP server in the new domain. Configure the VTP server in the new domain to recognize the BID of the sw itch. Reset the VTP counters to allow the sw itch to synchronize w ith the other sw itches in the new domain. Verify that the sw itch has a low er configuration revision number than the other sw itches in the new domain. 21. Which m ethod establishes an adm inistrative connection for configuring the Linksys WRT300N w ireless access point? Associate w ith the access point and then open a HyperTerminal session w ith the access point. Physically connect to the access point and then reboot the computer to launch the configuration softw are. From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a w eb brow ser. Modify the TCP/IP properties of the computer connected to the access point so that it exists on the same netw ork, and then reboot your computer to establish a connection.

Discovery V 4.0
CCNA 1 Final 1 Final 2 Chapter 9 Chapter 8 Chapter 7 Chapter 6 Chapter 5 Chapter 4 Chapter 3 Chapter 2 Chapter 1 CCNA 3 Final Chapter 9 Chapter 8 Chapter 7 Chapter 6 Chapter 5 Chapter 4 Chapter 3 Chapter 2 Chapter 1 CCNA 2 Final Chapter 8 Chapter 7 Chapter 6 Chapter 5 Chapter 4 Chapter 3 Chapter 2 Chapter 1

CCNA 4 Final 1 Final 2 Chapter 9 Chapter 8 Chapter 7 Chapter 6 Chapter 5 Chapter 4 Chapter 3 Chapter 2 Chapter 1

Exploration V4.0
CCNA 1 Final 1 Chapter 11 Chapter 10 Chapter 9 Chapter 8 Chapter 7 Chapter 6 Chapter 5 Chapter 4 Chapter 3 Chapter 2 Chapter 1 CCNA 3 Final Chapter 9 Chapter 8 Chapter 7 Chapter 6 Chapter 5 Chapter 4 Chapter 3 Chapter 2 Chapter 1 CCNA 2 Final 2 Final 1 Chapter 11 Chapter 10 Chapter 9 Chapter 8 Chapter 7 Chapter 6 Chapter 5 Chapter 4 Chapter 3 Chapter 2 Chapter 1 CCNA 4 Final 1 Final 2 Chapter 9 Chapter 8 Chapter 7 Chapter 6 Chapter 5 Chapter 4 Chapter 3 Chapter 2 Chapter 1

Links:
cisco-ccna-exam ccna-respuestas ccna-test-losungen grappige-fotos partidos de futbol live-scores europe voetbal-doelpunten voetbalcompetities evrofudal.me online-igrice uzivo-televizija prognoza-vreme livesportuitslagen evrofudbal.com operativnisistem onlinepokerpravila besplatniprogrami bannerstartpagina smesne-slike vremenska Bih

ciscotoetsantwoorden.blogspot.nl/2012/09/ccna-exploration-3-final-exam-answers.html

2/5

07/11/13

CCNA answers of all chapters and finals, CCNA Discovery, CCNA Exploration, CCNA Security : CCNA Exploration 3 final exam answers
22. How does a sw itch that is configured for 802.1Q trunking handle untagged fram es that are received on a trunk port? The frames are dropped. The frames are assigned to the native VLAN. The frames are assigned to the default VLAN. The frames are assigned to the management VLAN. 23. In w hich m ode is a VTP sw itch operating if it has been configured to only forw ard VTP advertisem ents? client root server transparent 24. Why is it im portant that the netw ork adm inistrator consider the spanning-tree netw ork diam eter w hen choosing the root bridge? The netw ork diameter limitation is 9. BPDUs may be discarded because of expiring timers. The cabling distance betw een the sw itches is 100 meters. The netw ork diameter must be set to the number of meters of the cable betw een the root bridge and its farthest connected sw itch. 25. Refer to the exhibit. What w ould happen if the netw ork adm inistrator m oved the netw ork cable of Host A from interface Fa0/1 to Fa0/3 on sw itch SW1? Host A remains a member of VLAN 10, because the router is routing traffic betw een VLANs. Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30. Host A remains a member of VLAN 10, because the sw itch provides dynamic VLAN assignment for the port. Host A maintains connectivity to all members of VLAN 10, because it is connected to the same physical netw ork. Host A is no longer a member of VLAN 10, but because port Fa0/3 w as unused, it is now a member of VLAN 1. 26. Which feature is uniquely found in an access layer sw itch w ithin a hierarchical netw ork m odel? link aggregation Pow er over Ethernet access control lists Layer 3 routing capabilities 27. While configuring a new sw itch, a netw ork adm inistrator configures the sw itch as an HTTP server. What benefits does this configuration provide? This allow s the sw itch to host w eb pages for the netw ork. This allow s remote VPN connections to the sw itch over the Internet. This is required if a w eb server or w eb farm is attached to the sw itch. This allow s w eb-based configuration tools to be used w ith the sw itch. 28. Refer to the exhibit. Each sw itch is configured to participate in STP for VLANs 1, 10, 20, and 30. Which sw itch w ill becom e the root for VLAN 20? A B C D 29. Using the com m and copy tftp:backup.cfg startup-config, an adm inistrator dow nloaded a saved configuration from a TFTP server to a sw itch. Why does the adm inistrator not detect any changes in the sw itch configuration after the dow nload com pletes? The command should have been copy startup-config tftp:backup.cfg. A backup configuration from a TFTP server cannot be copied directly into the startup-config. The command copy running-config startup-config should be used to save the changes on the sw itch. Dow nloading to the startup-config requires the sw itch to be reloaded in order for the configuration to take effect. 30. Refer to the exhibit. Which tw o settings show the default value of VTP configuration on a Cisco 2960 sw itch? (Choose tw o.) revision number existing VLANs operating mode domain name pruning mode 31. Why is it advisable that a netw ork adm inistrator use SSH instead of Telnet w hen m anaging sw itches? SSH uses TCP w hereas Telnet does not. SSH encrypts only the username and passw ord w hen logging in. SSH encrypts all remote management communications w hereas Telnet does not. SSH sends a clear text message steam w hich reduces the bandw idth use for management. 32. Refer to the exhibit. The Layer 2 sw itching design that is show n has been im plem ented in a cam pus environm ent that is using Spanning Tree Protocol. All inter-sw itch links that are show n are trunks. Whenever an inter-sw itch link fails, the netw ork takes nearly a m inute to com pletely converge. How can the convergence tim e be reduced? Increase the capacity of the distribution and core trunk links to 10 Gb/s. Add a trunk link that directly connects D1 and D2. Use Layer 3 sw itching on the core sw itch. Implement Rapid Spanning Tree Protocol. 33. Refer to the exhibit. A netw ork adm inistrator has segm ented the netw ork into tw o VLANs and configured R1 and S1 as displayed. How ever, PC1 is unable to access PC2. What is the likely problem ? No routing protocol is configured on R1. The Fa0/1 port of S1 is not a trunk port. The default gatew ay address is not set on S1. Only one physical link betw een S1 and R1 is configured for inter-VLAN routing. 34. Refer to the exhibit. A netw ork has already been configured w ith VTP, using DLS1 as the VTP server for the VTP dom ain Cisco. What w ill happen w hen the DLS2 sw itch is connected to the DLS1 sw itch via a trunk link? Because the VTP domain is not configured on DLS2, nothing w ill happen. Because DLS2 is in client mode, it w ill be updated w ith the VLANs that are configured on DLS1. The MD5 digest on DLS2 does not match the one on DLS1, so an error message w ill be logged to the console. Because DLS2 has a higher revision number than DLS1 has, the VLAN information on DLS1 w ill be overw ritten by the information on DLS2. 35. What inform ation in an Ethernet fram e is used by a Layer 2 sw itch to build its address table?

ciscotoetsantwoorden.blogspot.nl/2012/09/ccna-exploration-3-final-exam-answers.html

3/5

07/11/13

CCNA answers of all chapters and finals, CCNA Discovery, CCNA Exploration, CCNA Security : CCNA Exploration 3 final exam answers
source IP address source MAC address destination IP address destination MAC address 36. A w ireless LAN access point w ill convert traffic betw een w hich tw o fram e encapsulation types? 802.1 and 802.11 802.3 and 802.11 802.3 and 802.16 802.5 and 802.16 37. A netw ork adm inistrator is asked to connect four sw itches that are each configured w ith eight VLANs. Routers that have tw o FastEthernet ports each that support trunking are available. What is the m inim um num ber of routers needed to interconnect traffic from all of the VLANs if trunking is allow ed? 1 2 4 8 16 38. Refer to the exhibit. The netw ork consists of four hubs and a sw itch. The hosts connected to each hub are assigned addresses in the respective VLAN as show n. PC1 on VLAN 1 becom es infected w ith a virus and initiates a continuous IP broadcast. Which hubs w ill receive the broadcasts? Hub A Hubs A and B Hubs A and C Hubs A, B, C, and D 39. What are tw o characteristics of norm al range VLANs? (Choose tw o.) not learned by VTP stored in vlan.dat file designed for service providers can contain ports used as trunks identified by a VLAN ID betw een 1 and 1005 40. What is the benefit of the auto-MDIX feature on a Cisco Catalyst sw itch? dynamically assigns a new management VLAN ID autonegotiates IP address information for initial management connections allow s the use of straight-through patch cables regardless of connected device types places a port immediately in the forw arding state to reduce the time for the spanning tree to reconverge 41. Refer to the exhibit. A netw ork adm inistrator is configuring RT1 for inter-VLAN routing. The sw itch is configured correctly and is functional. Host1, Host2, and Host3 cannot com m unicate w ith each other. Based on the router configuration, w hat is causing the problem ? Interface Fa0/0 is missing IP address configuration information. IP addresses on the subinterfaces are incorrectly matched to the VLANs. Each subinterface of Fa0/0 needs separate no shutdow n commands. Routers do not support 802.1Q encapsulation on subinterfaces. 42. Why is priority configured in 4096 increm ents w hen using PVST+? Use of the extended bridge ID leaves only four bits for the bridge priority. It is only a recommended value and could be any number betw een 1 and 65535. PVST+ requires the use of values that can be divided equally into 32768 and not leave a remainder. The MAC address uses eight bytes of the bridge ID leaving only tw o bytes for the bridge priority value. 43. Refer to the exhibit. The netw ork adm inistrator needs to rem ove the east-hosts VLAN and use the sw itch port from that VLAN in one of the existing VLANs. Which tw o sets of com m ands should be used w hen com pletely rem oving VLAN 2 from S1-Central w hile leaving the sw itch and all its interfaces operational? (Choose tw o.) S1-Central# reload S1-Central# erase flash: S1-Central# delete flash:vlan.dat S1-Central# configure terminal S1-Central(config)# no vlan 2 S1-Central# configure terminal S1-Central(config)# interface fastethernet 0/1 S1-Central(config-if)# sw itchport access vlan 3 44. What benefit does 802.1x provide to a w ireless netw ork? increased w ireless range faster w ireless throughput centralized user authentication quality of service to differentiate high priority traffic 45. Which configuration changes w ill increm ent the configuration revision num ber on the VTP server? configuring trunk links on the VTP server configuring or changing the VTP passw ord configuring or changing the VTP domain name configuring or changing the VTP version number configuring or deleting a VLAN or creating a VLAN name 46. Refer to the exhibit. The hosts connected to sw itch SW1 are not able to com m unicate w ith the hosts in the sam e VLANs connected to sw itch SW2. What should be done to fix the problem ? Configure VLANs w ith different VLAN IDs on sw itch SW2. Reconfigure the trunk port on sw itch SW2 w ith static trunk configuration. Introduce a Layer 3 device or a sw itch w ith Layer 3 capability in the topology. Apply IP addresses that are in the same subnet to the interfaces used to connect SW1 and SW2. 47. What operational change w ill occur if an 802.11b client associates w ith an access point that is currently supporting clients utilizing 802.11g? The 802.11g clients w ill disassociate from the AP. The 802.11g clients w ill operate at reduced speeds. The 802.11b client w ill never gain access to the channel. The 802.11b client w ill not be able to establish an IP session w ith any of the other 802.11g clients. 48. What does TKIP have in com m on w ith AES? Both encrypt Layer 2 payloads.

ciscotoetsantwoorden.blogspot.nl/2012/09/ccna-exploration-3-final-exam-answers.html

4/5

07/11/13

CCNA answers of all chapters and finals, CCNA Discovery, CCNA Exploration, CCNA Security : CCNA Exploration 3 final exam answers
Both authenticate using a shared key. They both use sequence numbers to ensure that all packets arrive. They both use data from the MAC header to verify the integrity of the data. 49. Refer to the exhibit. Hosts PC_A and PC_B send traffic sim ultaneously, and the fram es from the transm itting stations collide. What is the last device to receive the collision? hub HB1 sw itch SW1 router R1 sw itch SW2 router R2 sw itch SW4 50. What happens w hen the crypto key zeroize rsa com m and is entered on a sw itch configured w ith the transport input ssh com m and on the vty lines? A new RSA key pair is created. The sw itch defaults to allow ing Telnet connections only. The sw itch is no longer able to make SSH connections as an SSH client. The sw itch allow s remote connections only after a new RSA key pair is generated.

Nieuwer bericht

Startpagina

Ouder bericht

1x2 Picks contact Links

ciscotoetsantwoorden.blogspot.com. Sjabloon Simple. Mogelijk gemaakt door Blogger.

ciscotoetsantwoorden.blogspot.nl/2012/09/ccna-exploration-3-final-exam-answers.html

5/5

Anda mungkin juga menyukai