Related Topics
Take Another Quiz

CCNA 3 Chapter 2

18 Questions
CCNA Quizzes & Trivia

I love it this is 100/100 !!

Questions and Answers
  • 1. 
    When a switch receives a frame and the source MAC address is not found in theswitching table, what action will be taken by the switch to process the incoming frame?
    • A. 

      The switch will request that the sending node resend the frame.

    • B. 

      The switch will issue an ARP request to confirm that the source exists.

    • C. 

      The switch will map the source MAC address to the port on which it was received.

    • D. 

      The switch ends an acknowledgement frame to the source MAC of this incoming frame.

  • 2. 
     Refer to the exhibit. How many collision domains are depicted in the network?
    • A. 

      1

    • B. 

      2

    • C. 

      3

    • D. 

      4

    • E. 

      5

  • 3. 
    Refer to the exhibit. What action does SW1 take on a frame sent from PC_A to PC_C ifthe MAC address table of SW1 is empty?
    • A. 

      SW1 drops the frame.

    • B. 

      SW1 floods the frame on all ports on SW1, except port Fa0/1.

    • C. 

      SW1 floods the frame on all ports on the switch, except Fa0/23 and Fa0/1.

    • D. 

      SW1 uses the CDP protocol to synchronize the MAC tables on both switches and then forwards the frame to all ports on SW2.

  • 4. 
    • A. 

      To secure the console port with the password "cisco"

    • B. 

      To deny access to the console port by specifying 0 lines are available

    • C. 

      To gain access to line configuration mode by supplying the required password

    • D. 

      To configure the privilege exec password that will be used for remote access

  • 5. 
    A network administrator uses the CLI to enter a command that requires severalparameters. The switch responds with "% Incomplete command". The administratorcannot remember the missing parameters. What can the administrator do to get theparameter information?
    • A. 

      Append ? to the last parameter

    • B. 

      Append a space and then ? to the last parameter

    • C. 

      Use Ctrl-P to show a parameter list

    • D. 

      Use the Tab key to show which options are available

  • 6. 
    6. Refer to the exhibit. The switch and the hub have default configurations, and the switchhas built its CAM table. Which of the hosts will capture a copy of the frame whenworkstation A sends a unicast packet to workstation C?
    • A. 

      Workstation C

    • B. 

      Workstations B and C

    • C. 

      Workstations A, B, C, and the interfaces of the router

    • D. 

      Workstations B, C, D, E, F, and interfaces of the router

  • 7. 
    Refer to the exhibit. The exhibit shows partial output of the show running-configcommand. The enable password on this switch is "cisco." What can be determined fromthe output shown?
    • A. 

      The enable password is encrypted by default.

    • B. 

      An MD5 hashing algorithm was used on all encrypted passwords.

    • C. 

      Any configured line mode passwords will be encrypted in this configuration.

    • D. 

      This line represents most secure privileged EXEC mode password possible.

  • 8. 
    9. What are two ways to make a switch less vulnerable to attacks like MAC addressflooding, CDP attacks, and Telnet attacks? (Choose two.)
    • A. 

      Enable CDP on the switch.

    • B. 

      Change passwords regularly.

    • C. 

      Turn off unnecessary services.

    • D. 

      Enable the HTTP server on the switch.

    • E. 

      Use the enable password rather than the enable secret password.

  • 9. 
    . Refer to the exhibit. The switch and workstation are administratively configured forfull-duplex operation. Which statement accurately reflects the operation of this link?
    • A. 

      No collisions will occur on this link.

    • B. 

      Only one of the devices can transmit at a time.

    • C. 

      The switch will have priority for transmitting data

    • D. 

      The devices will default back to half duplex if excessive collisions occur.

  • 10. 
    11. Where is the startup configuration stored?
    • A. 

      DRAM

    • B. 

      NVRAM

    • C. 

      ROM

    • D. 

      Startup-config.text

  • 11. 
    12. Refer to the exhibit. What happens when Host 1 attempts to send data?
    • A. 

      Frames from Host 1 cause the interface to shut down.

    • B. 

      Frames from Host 1 are dropped and no log message is sent.

    • C. 

      Frames from Host 1 create a MAC address entry in the running-config.

    • D. 

      Frames from Host 1 will remove all MAC address entries in the address table.

  • 12. 
    Refer to the exhibit. The network administrator’s attempts to connect to Switch1 viaSecure Shell are failing. What is most likely the problem?
    • A. 

      Incorrect vty lines configured

    • B. 

      Ncompatible Secure Shell version

    • C. 

      Incorrect default gateway address

    • D. 

      Vty lines that are configured to allow only Telnet

  • 13. 
    Which command line interface (CLI) mode allows users to configure switchparameters, such as the hostname and password?
    • A. 

      User EXEC mode

    • B. 

      Privileged EXEC mode

    • C. 

      Global configuration mode

    • D. 

      Interface configuration mode

  • 14. 
    Which statement is true about the command banner login "Authorized personnel Only"issued on a switch?
    • A. 

      The command is entered in privileged EXEC mode

    • B. 

      The command will cause the message Authorized personnel Only to display before a user logs in.

    • C. 

      The command will generate the error message % Ambiguous command: "banner motd" ” to be displayed.

    • D. 

      The command will cause the message End with the character “%” to be displayed after the command is entered into the switch.

  • 15. 
    What happens when the transport input ssh command is entered on the switch vtylines?
    • A. 

      The SSH client on the switch is enabled

    • B. 

      Communication between the switch and remote users is encrypted.

    • C. 

      A username/password combination is no longer needed to establish a secure remote connection to the switch.

    • D. 

      The switch requires remote connections via proprietary client software.

  • 16. 
    Which two statements about Layer 2 Ethernet switches are true? (Choose two.)
    • A. 

      Layer 2 switches prevent broadcasts.

    • B. 

      Layer 2 switches have multiple collision domains.

    • C. 

      Layer 2 switches route traffic between different networks.

    • D. 

      Layer 2 switches decrease the number of broadcast domains.

    • E. 

      Layer 2 switches can send traffic based on the destination MAC address.

  • 17. 
    19. Which two statements are true about EXEC mode passwords? (Choose two.)
    • A. 

      The enable secret password command stores the configured password in plain text.

    • B. 

      The enable secret password command provides better security than the enable password.

    • C. 

      The enable password and enable secret password protect access to privileged EXEC mode.

    • D. 

      The service password-encryption command is required to encrypt the enable secret password.

    • E. 

      Best practices require both the enable password and enable secret password to be configured and used simultaneously.

  • 18. 
    When a collision occurs in a network using CSMA/CD, how do hosts with data totransmit respond after the backoff period has expired?
    • A. 

      The hosts return to a listen-before-transmit mode.

    • B. 

      The hosts creating the collision have priority to send data.

    • C. 

      The hosts creating the collision retransmit the last 16 frames.

    • D. 

      The hosts extend their delay period to allow for rapid transmission.