CCNA 3 Exam Questions

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By TRiXeR
T
TRiXeR
Community Contributor
Quizzes Created: 1 | Total Attempts: 205
Questions: 146 | Attempts: 205

SettingsSettingsSettings
CCNA 3 Exam Questions - Quiz

Chapter 3 of the CCNA is a very wide chapter and most students find it hard to understand. The quiz below has different questions specifically from chapter 3 and will give you a clear indication of how the questions are set and how to correctly tackle them. Give it a try!


Questions and Answers
  • 1. 

    1. Refer to the exhibit. After entering the commands in the exhibit, the administrator receives a “password required, but none set” message when attempting to connect to S1. What is the problem?

    • A.

      The enable secret password was not set.

    • B.

      S1 does not have login configured on the vty lines.

    • C.

      S1 does not have a password configured for the vty lines.

    • D.

      The crypto key is not properly configured to generate passwords.

    • E.

      The VLAN1 interface has not be enabled with the no shutdown command.

    Correct Answer
    C. S1 does not have a password configured for the vty lines.
    Explanation
    The administrator receives a "password required, but none set" message when attempting to connect to S1 because S1 does not have a password configured for the vty lines.

    Rate this question:

  • 2. 

    2. Which CLI mode allows users to access all device commands, such as those used for configuration, management, and troubleshooting

    • A.

      User EXEC mode

    • B.

      Privileged EXEC mode

    • C.

      Global configuration mode

    • D.

      Interface configuration mode

    Correct Answer
    B. Privileged EXEC mode
    Explanation
    The correct answer is privileged EXEC mode. In this mode, users have access to all device commands, including those used for configuration, management, and troubleshooting. This mode provides a higher level of access and control compared to the user EXEC mode, which only allows basic monitoring and verification commands. Global configuration mode is used for configuring global parameters, while interface configuration mode is used for configuring specific interfaces on the device.

    Rate this question:

  • 3. 

    3. Refer to the exhibit. Which Spanning Tree Protocol version is in effect?

    • A.

      Per VLAN Spanning Tree (PVST)

    • B.

      Per VLAN Spanning Tree + (PVST+)

    • C.

      Common Spanning Tree (CST)

    • D.

      Rapid Spanning Tree Protocol (RSTP)

    • E.

      Multiple Spanning Tree Protocol (MSTP)

    Correct Answer
    D. Rapid Spanning Tree Protocol (RSTP)
    Explanation
    The correct answer is Rapid Spanning Tree Protocol (RSTP). This can be determined based on the information provided in the exhibit.

    Rate this question:

  • 4. 

    4. Refer to the exhibit. A network administrator has segmented the network into two VLANs and configured Router1 for inter-VLAN routing. A test of the network, however, shows that hosts on each VLAN can only access local resources and not resources on the other VLAN. What is the most likely cause of this problem?

    • A.

      Switch port Fa0/1 is not trunking.

    • B.

      Router interface Fa0/0 is possibly down.

    • C.

      No routing protocol is configured on Router1.

    • D.

      One of the router subinterfaces is possibly down.

    Correct Answer
    A. Switch port Fa0/1 is not trunking.
    Explanation
    The most likely cause of the problem is that switch port Fa0/1 is not trunking. Trunking is necessary for communication between VLANs, as it allows multiple VLAN traffic to pass through a single link. Without trunking, the VLANs are isolated and cannot access resources on the other VLAN. Therefore, if switch port Fa0/1 is not configured as a trunk port, it would explain why hosts on each VLAN can only access local resources and not resources on the other VLAN.

    Rate this question:

  • 5. 

    5. Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?

    • A.

      Only hosts A and B

    • B.

      Only hosts A, B, and C

    • C.

      Only hosts A, B, C, and D

    • D.

      Only hosts A, B, C, and E

    Correct Answer
    B. Only hosts A, B, and C
    Explanation
    When a collision occurs in a network, all hosts involved in the collision will receive a collision jamming signal. In this scenario, hosts A and B are connected to the same hub, HB1, and they both attempt to transmit a frame at the same time resulting in a collision. Therefore, only hosts A, B, and C will receive the collision jamming signal.

    Rate this question:

  • 6. 

    6. Refer to the exhibit. Which three options correctly identify information that could be associated with this output?(Choose three.)

    • A.

      Interface FastEthernet3/0/0 is subinterfaced.

    • B.

      A non-proprietary trunking protocol is in use.

    • C.

      The configuration is appropriate for a router-on-a-stick network design.

    • D.

      A shutdown command has been applied to interface FastEthernet3/0/0.

    • E.

      Interface FastEthernet3/0/0.3 is mapped to the default management VLAN.

    • F.

      An IP address should be applied to FastEthernet3/0/0 for correct data routing.

    Correct Answer(s)
    A. Interface FastEthernet3/0/0 is subinterfaced.
    B. A non-proprietary trunking protocol is in use.
    C. The configuration is appropriate for a router-on-a-stick network design.
    Explanation
    The exhibit shows the output of a command that provides information about the configuration of interface FastEthernet3/0/0. The statement "Interface FastEthernet3/0/0 is subinterfaced" indicates that this interface has been divided into multiple logical interfaces. The statement "A non-proprietary trunking protocol is in use" suggests that a standard trunking protocol, such as IEEE 802.1Q, is being used for VLAN tagging. The statement "The configuration is appropriate for a router-on-a-stick network design" implies that the configuration is suitable for a network design where a single physical interface is used to connect to multiple VLANs.

    Rate this question:

  • 7. 

    7. Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?

    • A.

      Associate with the access point and then open a HyperTerminal session with the access point.

    • B.

      Physically connect to the access point and then reboot the computer to launch the configuration software.

    • C.

      From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.

    • D.

      Modify the TCP/IP properties of the computer connected to the access point so that it exists on the same network, and then reboot your computer to establish a connection.

    Correct Answer
    C. From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.
    Explanation
    To establish an administrative connection for configuring the Linksys WRT300N wireless access point, the correct method is to enter the default IP address of the access point in a web browser from a computer in the same IP subnet as the access point. This allows the user to access the configuration interface of the access point and make the necessary changes. This method does not require physical connection or rebooting the computer, and it is a common way to configure network devices through a web-based interface.

    Rate this question:

  • 8. 

    8. Which parameter is used to uniquely identify one wireless network from another?

    • A.

      SSID

    • B.

      OFDM

    • C.

      WEP

    • D.

      DSSS

    Correct Answer
    A. SSID
    Explanation
    SSID stands for Service Set Identifier and is used to uniquely identify one wireless network from another. It is a case-sensitive alphanumeric string that is assigned to a wireless network. When devices search for available networks, they use the SSID to determine which network to connect to. Each wireless network has its own unique SSID, allowing devices to differentiate between networks and connect to the desired one.

    Rate this question:

  • 9. 

    9. Which value determines if a switch becomes the central point of reference in the spanning tree topology?

    • A.

      Lowest bridge ID

    • B.

      Highest revision number

    • C.

      Lowest numeric IP address

    • D.

      Highest numeric MAC address

    Correct Answer
    A. Lowest bridge ID
    Explanation
    The lowest bridge ID determines if a switch becomes the central point of reference in the spanning tree topology. In the spanning tree protocol, each switch is assigned a unique bridge ID, which consists of a priority value and a MAC address. The switch with the lowest bridge ID is elected as the root bridge, and all other switches in the network determine their paths to the root bridge based on this information. Therefore, the switch with the lowest bridge ID becomes the central point of reference in the spanning tree topology.

    Rate this question:

  • 10. 

    10. An administrator is troubleshooting a PC on the network which is suffering from slow and intermittent connectivity. The PC has a ping success rate to the default gateway of less than half the ping attempts. Other PCs on the switch can consistently ping the default gateway. The switch port is configured for auto duplex and the PC is configured for full duplex. What will commonly cause this problem?

    • A.

      The PC is set to full duplex. The switch port fails to autonegotiate the duplex setting and defaults to half duplex, which causes a duplex mismatch.

    • B.

      The switch traffic is exceeding available frame buffers. The result is that frames are being dropped.

    • C.

      The PC and the default gateway have different bandwidth Ethernet ports.

    • D.

      The default gateway is not on the same switch that the PC is.

    Correct Answer
    A. The PC is set to full duplex. The switch port fails to autonegotiate the duplex setting and defaults to half duplex, which causes a duplex mismatch.
    Explanation
    When a PC is set to full duplex and the switch port fails to autonegotiate the duplex setting, it defaults to half duplex. This creates a duplex mismatch between the PC and the switch port. In a duplex mismatch, the PC and the switch are operating at different duplex settings, which can lead to slow and intermittent connectivity. This is because the PC and the switch are not able to effectively communicate with each other, causing dropped frames and a lower ping success rate to the default gateway.

    Rate this question:

  • 11. 

    11. Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect?

    • A.

      AS1 and AS2

    • B.

      DS1 and DS2

    • C.

      DS1, DS2, and CS1

    • D.

      AS1, AS2, DS1, and DS2

    Correct Answer
    A. AS1 and AS2
    Explanation
    The IP phones should connect to AS1 and AS2. This is because AS1 and AS2 are the access switches in the network, which are responsible for connecting end devices such as IP phones. DS1 and DS2 are distribution switches, which are used to connect different access switches together. CS1 is a core switch, which is used for routing traffic between different networks. Therefore, the IP phones should connect to the access switches AS1 and AS2.

    Rate this question:

  • 12. 

    12. What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?

    • A.

      Only the management VLAN

    • B.

      All VLANs except the extended range VLANs

    • C.

      All VLANs except 1 and 1002-1005

    • D.

      All VLANs

    Correct Answer
    D. All VLANs
    Explanation
    When the range of allowed VLANs is set to the default value, all VLANs are allowed across a trunk. This means that all VLAN traffic can pass through the trunk link, allowing communication between devices in different VLANs. The default range typically includes all VLANs except for VLAN 1 (the default VLAN) and VLANs 1002-1005 (reserved VLANs). Therefore, the correct answer is that all VLANs are allowed across the trunk.

    Rate this question:

  • 13. 

    13. Refer to the exhibit. VTP pruning is enabled in the VTP domain that is shown. How will switch ST-1 handle Layer 2 broadcast traffic originating from host A on switch ST-C?

    • A.

      It will be dropped.

    • B.

      It will be forwarded out port Fa0/5 only.

    • C.

      It will be forwarded out ports Fa0/5 and Fa0/10.

    • D.

      It will be forwarded out ports Fa0/5, Fa0/10, and Fa0/15.

    Correct Answer
    B. It will be forwarded out port Fa0/5 only.
    Explanation
    VTP pruning is a feature that prevents unnecessary broadcast traffic from being sent across all VLANs in a VTP domain. In this scenario, since VTP pruning is enabled, switch ST-1 will only forward Layer 2 broadcast traffic originating from host A to the ports that have active receivers for that VLAN. The exhibit does not show any other switches connected to switch ST-1 except for switch ST-C, which is connected to port Fa0/5. Therefore, the broadcast traffic will only be forwarded out port Fa0/5.

    Rate this question:

  • 14. 

    14. What is the purpose of the Spanning Tree algorithm?

    • A.

      It propagates VLAN configurations to other switches.

    • B.

      It restricts broadcast packets to a single VLAN.

    • C.

      It segments a network into multiple broadcast domains.

    • D.

      It prevents loops in a switched network with redundant paths.

    Correct Answer
    D. It prevents loops in a switched network with redundant paths.
    Explanation
    The purpose of the Spanning Tree algorithm is to prevent loops in a switched network with redundant paths. By identifying and disabling redundant paths, the algorithm ensures that there is only one active path between any two network devices. This prevents the formation of loops, which can cause network congestion and broadcast storms. Ultimately, the Spanning Tree algorithm helps to maintain network stability and prevent disruptions in communication.

    Rate this question:

  • 15. 

    15. In which mode is a VTP switch operating if it does not allow for the creation of local VLANs but it does accept VLAN updates from other switches in the same domain?

    • A.

      Client

    • B.

      Root

    • C.

      Server

    • D.

      Transparent

    Correct Answer
    A. Client
    Explanation
    A VTP switch operating in client mode does not allow for the creation of local VLANs but it does accept VLAN updates from other switches in the same domain. In client mode, the switch receives VTP advertisements from the server and transparent switches in the domain, allowing it to synchronize its VLAN database with the rest of the network. However, it cannot create or modify VLANs locally.

    Rate this question:

  • 16. 

    16. Which three statements are correct concerning the default configuration of a new switch? (Choose three.) It is configured in VTP server mode.

    • A.

      It is configured in VTP server mode.

    • B.

      STP is automatically enabled.

    • C.

      The first VTY line is automatically configured to allow remote connections.

    • D.

      VLAN1 is configured with a management IP address.

    • E.

      All switch ports are assigned to VLAN1.

    • F.

      The enable password is configured as cisco.

    Correct Answer(s)
    A. It is configured in VTP server mode.
    B. STP is automatically enabled.
    E. All switch ports are assigned to VLAN1.
    Explanation
    The default configuration of a new switch includes the following three statements:
    1. It is configured in VTP server mode.
    2. STP (Spanning Tree Protocol) is automatically enabled.
    3. All switch ports are assigned to VLAN1.

    Rate this question:

  • 17. 

      17. Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP address should be assigned to this new host?

    • A.

      192.168.1.11 /28

    • B.

      192.168.1.22 /28

    • C.

      192.168.1.33 /28

    • D.

      192.168.1.44 /28

    • E.

      192.168.1.55 /28

    Correct Answer
    B. 192.168.1.22 /28
    Explanation
    The new host should be assigned the IP address 192.168.1.22 /28 because it falls within the range of the subnet defined by the network address 192.168.1.0 and the subnet mask 255.255.255.240 (/28). This subnet allows for a total of 14 usable IP addresses, with the first and last addresses reserved for the network and broadcast addresses respectively. Therefore, the valid IP addresses for hosts in this subnet range from 192.168.1.1 to 192.168.1.14, and 192.168.1.22 falls within this range.

    Rate this question:

  • 18. 

    18. Refer to the exhibit. An administrator documented the output of a CAM table from an Ethernet switch as shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit?

    • A.

      Discard the frame

    • B.

      Forward the frame out port 2

    • C.

      Forward the frame out port 3

    • D.

      Forward the frame out all ports

    • E.

      Forward the frame out all ports except port 3

    • F.

      Add station 00-00-3D-1F-11-05 to port 2 in the forwarding table

    Correct Answer
    E. Forward the frame out all ports except port 3
    Explanation
    Based on the information provided in the exhibit, the switch will forward the frame out all ports except port 3. This is because the MAC address 00-00-3D-1F-11-05 is associated with port 2 in the forwarding table, so the switch will forward the frame to all ports except for the one associated with that MAC address, which is port 3.

    Rate this question:

  • 19. 

    19. When port security is used on a switch, which violation mode will cause an SNMP trap to be sent and traffic to be dropped when the number of secure MAC addresses for a port is reached?

    • A.

      Sticky

    • B.

      Protect

    • C.

      Restrict

    • D.

      Shutdown

    Correct Answer
    C. Restrict
    Explanation
    When port security is used on a switch, the restrict violation mode will cause an SNMP trap to be sent and traffic to be dropped when the number of secure MAC addresses for a port is reached. This means that if an unauthorized device tries to connect to the port and the maximum number of secure MAC addresses has already been reached, an SNMP trap will be sent to notify the network administrator and the traffic from the unauthorized device will be dropped, preventing it from accessing the network.

    Rate this question:

  • 20. 

    20. Refer to the exhibit. What is the maximum number of VLANs that can be deleted from the Switch as it is configured?

    • A.

      Zero

    • B.

      Four

    • C.

      Five

    • D.

      Eight

    • E.

      Nine

    Correct Answer
    B. Four
    Explanation
    Based on the information provided in the exhibit, the maximum number of VLANs that can be deleted from the switch is four.

    Rate this question:

  • 21. 

    21. Which configuration changes will increment the configuration revision number on the VTP server?

    • A.

      Configuring trunk links on the VTP server

    • B.

      Configuring or changing the VTP password

    • C.

      Configuring or changing the VTP domain name

    • D.

      Configuring or changing the VTP version number

    • E.

      Configuring or deleting a VLAN or creating a VLAN name

    Correct Answer
    E. Configuring or deleting a VLAN or creating a VLAN name
    Explanation
    Configuring or deleting a VLAN or creating a VLAN name will increment the configuration revision number on the VTP server. This is because any changes made to the VLAN configuration, such as creating a new VLAN or deleting an existing VLAN, will result in a change in the configuration revision number. This allows the VTP server to keep track of the most recent changes made to the VLAN configuration and ensure that all VTP clients are updated accordingly.

    Rate this question:

  • 22. 

    22. Using the command copy tftp:backup.cfg startup-config, an administrator downloaded a saved configuration from a TFTP server to a switch. Why does the administrator not detect any changes in the switch configuration after the download completes?

    • A.

      The command should have been copy startup-config tftp:backup.cfg.

    • B.

      A backup configuration from a TFTP server cannot be copied directly into the startup-config.

    • C.

      The command copy running-config startup-config should be used to save the changes on the switch.

    • D.

      Downloading to the startup-config requires the switch to be reloaded in order for the configuration to take effect.

    Correct Answer
    D. Downloading to the startup-config requires the switch to be reloaded in order for the configuration to take effect.
  • 23. 

    23. Refer to the exhibit. Each switch is configured to participate in STP for VLANs 1, 10, 20, and 30. Which switch will become the root for VLAN 20?

    • A.

      A

    • B.

      B

    • C.

      C

    • D.

      D

    Correct Answer
    D. D
    Explanation
    Switch D will become the root for VLAN 20 because it has the lowest Bridge ID. The Bridge ID is determined by the Bridge Priority and the MAC address. In this case, Switch D has the lowest Bridge Priority and the lowest MAC address compared to the other switches. Therefore, it will become the root for VLAN 20.

    Rate this question:

  • 24. 

    24. Why is MAC address filtering considered a poor choice in securing a WLAN?

    • A.

      Available bandwidth is reduced

    • B.

      MAC addresses are easily spoofed.

    • C.

      APs are more susceptible to DoS attacks.

    • D.

      The payload encryption is easily broken.

    Correct Answer
    B. MAC addresses are easily spoofed.
    Explanation
    MAC address filtering is considered a poor choice in securing a WLAN because MAC addresses can be easily spoofed. This means that an attacker can change their device's MAC address to match one that is allowed on the network, bypassing the filtering mechanism. This makes it ineffective in preventing unauthorized access to the network. Other security measures, such as encryption and authentication, are more reliable in protecting the WLAN from unauthorized users.

    Rate this question:

  • 25. 

      25. Refer to the exhibit. If switch SW1 is configured with the four VLANs as shown in the exhibit, how many physical interfaces are needed on router R1 to configure inter-VLAN routing using subinterfaces?

    • A.

      Zero

    • B.

      One

    • C.

      Two

    • D.

      Four

    Correct Answer
    B. One
    Explanation
    To configure inter-VLAN routing using subinterfaces, only one physical interface is needed on router R1. This is because subinterfaces allow a single physical interface to be divided into multiple logical interfaces, each representing a different VLAN. By configuring subinterfaces on the router, each VLAN can be assigned a separate IP address and the router can route traffic between them. Therefore, only one physical interface is required to connect the router to the switch.

    Rate this question:

  • 26. 

    26. Refer to the exhibit. What can be determined from the configuration of this wireless device?

    • A.

      This configuration is commonly found in an ad hoc network.

    • B.

      All wireless devices that are connected to this access point must have the SSID of Academy.

    • C.

      Any wireless clients that are attached to this access point would have the same IP address and SSID.

    • D.

      Any wireless clients that are attached to this access point must be connected using the 802.11n WAN protocol.

    Correct Answer
    B. All wireless devices that are connected to this access point must have the SSID of Academy.
    Explanation
    The configuration of this wireless device indicates that all wireless devices connected to this access point must have the SSID of Academy. This means that in order to connect to this access point, the wireless devices must be configured with the same SSID.

    Rate this question:

  • 27. 

    27. Which type of traffic can still be received on a switch interface that is in STP blocking mode?

    • A.

      BPDU frames

    • B.

      Multicast frames

    • C.

      Broadcast frames

    • D.

      Layer 3 packets

    Correct Answer
    A. BPDU frames
    Explanation
    When a switch interface is in STP (Spanning Tree Protocol) blocking mode, it means that it is not forwarding any data frames, including multicast frames, broadcast frames, and Layer 3 packets. However, BPDU (Bridge Protocol Data Unit) frames are still received on a switch interface in STP blocking mode. BPDU frames are used by switches to exchange information about network topology and to prevent loops in the network. Therefore, even though the switch interface is not forwarding regular traffic, it still needs to receive and process BPDU frames to maintain the integrity of the network.

    Rate this question:

  • 28. 

    28. What is the purpose of configuring a switch port as a trunk port?

    • A.

      To control the broadcast domain size

    • B.

      To eliminate the collisions that result from multiple VLANs

    • C.

      To transmit data from multiple VLANs through a single port

    • D.

      To increase the bandwidth between the switch and its upstream device

    Correct Answer
    C. To transmit data from multiple VLANs through a single port
    Explanation
    Configuring a switch port as a trunk port allows for the transmission of data from multiple VLANs through a single port. This is useful in scenarios where there are multiple VLANs in a network and the switch needs to be able to send traffic between them. By using a trunk port, the switch can tag the frames with VLAN information, allowing the receiving device to correctly identify and process the traffic for each VLAN. This helps to efficiently utilize network resources and simplifies network management.

    Rate this question:

  • 29. 

    29. Refer to the exhibit. Which statement is true about the status of interface Fa0/1?

    • A.

      The interface is not configured to transmit data.

    • B.

      The interface is configured to transmit data at 10 Mb/s speed.

    • C.

      The interface is configured to transmit data in half-duplex mode.

    • D.

      The interface is configured to use HDLC encapsulation to transmit data.

    Correct Answer
    C. The interface is configured to transmit data in half-duplex mode.
  • 30. 

    30. Refer to the exhibit. Switch SWB is not responding to VTP updates from switch SWA. What is a possible cause of the problem?

    • A.

      The VTP revision numbers are different.

    • B.

      The number of existing VLANs is different.

    • C.

      There is a password set on one of the switches.

    • D.

      The enable passwords are not set on the switches.

    Correct Answer
    C. There is a password set on one of the switches.
    Explanation
    A possible cause of the problem could be that there is a password set on one of the switches. This can prevent VTP updates from being received by SWB, causing it to not respond to the updates from SWA.

    Rate this question:

  • 31. 

    31. Which wireless topology supports roaming from one access point to another?

    • A.

      ESS

    • B.

      BSS

    • C.

      IBSS

    • D.

      Ad hoc

    Correct Answer
    A. ESS
    Explanation
    ESS stands for Extended Service Set, which is a wireless topology that supports roaming from one access point to another. In an ESS, multiple access points are connected to create a large coverage area, allowing devices to seamlessly move between access points without losing connectivity. This is commonly used in large-scale wireless networks, such as in office buildings or campuses, where users need to move around while maintaining a stable connection.

    Rate this question:

  • 32. 

    32. Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?

    • A.

      WEP identifies the wireless LAN.

    • B.

      WEP allows the access point to inform clients of its presence.

    • C.

      WEP translates IP addresses into easy-to-remember domain names.

    • D.

      WEP encrypts data between the wireless client and the access point.

    • E.

      WEP translates an internal address or group of addresses into an outside, public address.

    Correct Answer
    D. WEP encrypts data between the wireless client and the access point.
    Explanation
    Setting the security mode to WEP on the Linksys integrated router will encrypt the data transmitted between the wireless client and the access point. This means that the data will be encoded in a way that only authorized devices can decode and understand, providing a level of security for the wireless network.

    Rate this question:

  • 33. 

    33. Refer to the exhibit. Which two switch interfaces would be RSTP edge ports? (Choose two.)

    • A.

      Switch S1, Fa0/1

    • B.

      Switch S3, Fa0/5

    • C.

      Switch S4, Fa0/1

    • D.

      Switch S2, Fa0/3

    • E.

      Switch S4, Fa0/2

    • F.

      Switch S3, Fa0/2

    Correct Answer(s)
    B. Switch S3, Fa0/5
    E. Switch S4, Fa0/2
    Explanation
    The correct answer is switch S3, Fa0/5 and switch S4, Fa0/2. These interfaces would be RSTP edge ports because they are connected to end devices, such as computers or printers, which do not participate in the spanning tree protocol. Edge ports are configured to immediately transition to the forwarding state without going through the listening and learning states, which helps to minimize network convergence time.

    Rate this question:

  • 34. 

    34. A network technician is attempting to configure 802.1q trunking on switch ports Fa0/5 through Fa0/10. Which set of commands will accomplish this task?

    • A.

      Image One

    • B.

      Image Two

    • C.

      Image Three

    • D.

      Image Four

    Correct Answer
    B. Image Two
  • 35. 

    35. Refer to the exhibit. Switch SWA is not processing VTP advertisments from switch SWB. What can done to correct the error?

    • A.

      Change the hostname of SWC to SWA.

    • B.

      Change the hostname of switch SWA to SWC.

    • C.

      Change the domain name on switch SWA to cisco.

    • D.

      Change the enable password on both switches to Cisco.

    Correct Answer
    C. Change the domain name on switch SWA to cisco.
    Explanation
    The correct answer is to change the domain name on switch SWA to cisco. This is because VTP (VLAN Trunking Protocol) uses the domain name to determine if switches should synchronize their VLAN information. In this case, since switch SWA is not processing VTP advertisements from switch SWB, it suggests that they are not in the same VTP domain. By changing the domain name on switch SWA to "cisco", it will match the domain name of switch SWB and allow the VTP advertisements to be processed.

    Rate this question:

  • 36. 

    36. A network administrator is planning the upgrade of an enterprise LAN to feature Layer 3 support for the application of data security policies, aggregated links, and redundant devices and links. Which switches in the hierarchical three-layer design model support these network requirements?

    • A.

      Core switches

    • B.

      Access switches

    • C.

      Backbone switches

    • D.

      Distribution switches

    Correct Answer
    D. Distribution switches
    Explanation
    In a hierarchical three-layer design model, distribution switches are responsible for connecting core switches to access switches. They provide features such as data security policies, aggregated links, and redundancy for devices and links. Core switches, on the other hand, are responsible for high-speed switching and routing between distribution switches. Access switches, as the name suggests, provide network access to end devices. Backbone switches, although not mentioned in the question, are typically used to connect different distribution switches together in a larger network. Therefore, the correct answer for this question is distribution switches.

    Rate this question:

  • 37. 

    37. The global configuration command ip default-gateway 172.16.100.1  is applied to a switch. What is the effect of this command?

    • A.

      The switch will have a management interface with the address 172.16.100.1.

    • B.

      The switch can be remotely managed from a host on another network.

    • C.

      The switch can communicate with other hosts on the 172.16.100.0 network.

    • D.

      The switch is limited to sending and receiving frames to and from the gateway 172.16.100.1.

    Correct Answer
    B. The switch can be remotely managed from a host on another network.
    Explanation
    The global configuration command "ip default-gateway 172.16.100.1" allows the switch to be remotely managed from a host on another network. This command sets the default gateway for the switch, which is the IP address of the device that will be used as the next hop for any traffic that is not destined for the local network. By setting the default gateway to 172.16.100.1, the switch can forward management traffic to that IP address, allowing remote management from a host on another network.

    Rate this question:

  • 38. 

    38. Which type of VLAN would accommodate untagged traffic on a 802.1q trunk port?

    • A.

      Data VLAN

    • B.

      Native VLAN

    • C.

      Untagged VLAN

    • D.

      Management VLAN

    Correct Answer
    B. Native VLAN
    Explanation
    A native VLAN is a type of VLAN that allows untagged traffic on an 802.1q trunk port. This means that any traffic that arrives on the trunk port without a VLAN tag will be treated as belonging to the native VLAN. The native VLAN is typically used for carrying management traffic or for allowing devices that do not support VLAN tagging to communicate on the network.

    Rate this question:

  • 39. 

    39. Company policy requires disabling the command history buffer on network devices. An administrator enters terminal no history sizeat the command prompt on a Cisco Catalyst switch and receives no error messages back, but the command history buffer is still available. What is the problem?

    • A.

      The command contained a syntax error.

    • B.

      The Cisco IOS version does not support disabling the command history buffer.

    • C.

      The command history can only be disabled on a router, not a switch.

    • D.

      The size parameter reset the default buffer size but did not disable access to the buffer.

    Correct Answer
    D. The size parameter reset the default buffer size but did not disable access to the buffer.
    Explanation
    The command "terminal no history size" was entered by the administrator, but it only reset the default buffer size instead of disabling access to the buffer. This means that although the buffer size may have been changed, the command history buffer is still available for use.

    Rate this question:

  • 40. 

    40. Refer to the exhibit. What does “LEARNING” mean as it relates to the Spanning Tree Protocol?

    • A.

      The switch is sending and receiving data frames.

    • B.

      The switch is not receiving BPDUs, but is sending and receiving data.

    • C.

      The switch is participating in the election process by forwarding the BPDUs it receives.

    • D.

      The switch is receiving BPDUs and populating the MAC address table, but not sending data.

    Correct Answer
    D. The switch is receiving BPDUs and populating the MAC address table, but not sending data.
    Explanation
    The term "LEARNING" in the context of the Spanning Tree Protocol means that the switch is receiving Bridge Protocol Data Units (BPDUs) and using them to populate its MAC address table. However, it is not actively sending any data frames.

    Rate this question:

  • 41. 

    41. Refer to the exhibit. All trunk links are operational and all VLANs are allowed on all trunk links. An ARP request is sent by computer 5. Which device or devices will receive this message?

    • A.

      Only computer 4

    • B.

      Computer 3 and RTR-A

    • C.

      Computer 4 and RTR-A

    • D.

      Computer 1, computer 2, computer 4, and RTR-A

    • E.

      Computer 1, computer 2, computer 3, computer 4, and RTR-A

    • F.

      All of the computers and the router

    Correct Answer
    B. Computer 3 and RTR-A
    Explanation
    The ARP request sent by computer 5 will be received by computer 3 and RTR-A. This is because computer 3 and RTR-A are connected to the same VLAN as computer 5, and all devices within a VLAN can receive and process ARP requests.

    Rate this question:

  • 42. 

    42. Refer to the exhibit. Router R1 is connected to a switch through a trunk. What two ways are indicative of how the router handles incoming VLAN traffic? (Choose two.)

    • A.

      Data from VLAN 20 is not being routed.

    • B.

      Incoming traffic with VLAN ID 1 is processed by interface Fa0/0.

    • C.

      Incoming traffic that has a VLAN ID of 10 is processed by subinterface Fa0/0.1.

    • D.

      VLAN traffic is processed on the subinterfaces even if Fa0/0 line protocol goes down.

    • E.

      The router uses a unique MAC address on VLAN 10 and 20 by adding the 802.1Q VLAN ID to the hardware address.

    • F.

      Traffic inbound on this router is processed by different subinterfaces depending on the VLAN from which the traffic originated.

    Correct Answer(s)
    C. Incoming traffic that has a VLAN ID of 10 is processed by subinterface Fa0/0.1.
    F. Traffic inbound on this router is processed by different subinterfaces depending on the VLAN from which the traffic originated.
    Explanation
    The first statement, "Incoming traffic that has a VLAN ID of 10 is processed by subinterface Fa0/0.1," indicates that the router is using subinterfaces to handle traffic from different VLANs. This means that the router is configured to separate traffic from different VLANs and process them separately.

    The last statement, "Traffic inbound on this router is processed by different subinterfaces depending on the VLAN from which the traffic originated," further reinforces the idea that the router is using subinterfaces to handle VLAN traffic. It suggests that the router has multiple subinterfaces configured, each corresponding to a specific VLAN, and it processes traffic based on the VLAN from which it originated.

    Rate this question:

  • 43. 

    43. Refer to the exhibit. Users complain that they do not have connectivity to the web server that is connected to SW1. What should be done to remedy the problem?

    • A.

      Allow all VLANs on the trunk link.

    • B.

      Configure VLAN 100 as the native VLAN for SW1.

    • C.

      Configure the trunk port in trunk mode on SW1.

    • D.

      Attach the web server to a router and configure inter-VLAN routing.

    Correct Answer
    B. Configure VLAN 100 as the native VLAN for SW1.
    Explanation
    To remedy the connectivity issue between the users and the web server connected to SW1, the VLAN 100 should be configured as the native VLAN for SW1. This is because the native VLAN is used for untagged traffic on a trunk link, and configuring VLAN 100 as the native VLAN will ensure that the traffic from the web server is correctly transmitted and received by the users.

    Rate this question:

  • 44. 

    44. Refer to the exhibit. VLAN 20 was recently added on the network. Users on VLAN 20 on SW1 start complaining that they do not have connectivity to the users on the same VLAN on switch SW2. What should be done to remedy the problem?

    • A.

      Configure the trunk port in a desirable mode on SW2.

    • B.

      Include VLAN 20 in the list of allowed VLANs on the trunk link on SW2.

    • C.

      Configure VLAN 1 to be the native VLAN for both networks on SW1 and SW2.

    • D.

      Remove VLAN 20 from the allowed VLANs on the trunk link on SW2, an action that will enable all VLANs on the trunk link.

    Correct Answer
    B. Include VLAN 20 in the list of allowed VLANs on the trunk link on SW2.
    Explanation
    To remedy the problem of users on VLAN 20 not having connectivity to users on the same VLAN on switch SW2, VLAN 20 needs to be included in the list of allowed VLANs on the trunk link on SW2. By including VLAN 20 in the allowed VLANs, SW2 will allow traffic for VLAN 20 to pass through the trunk link, enabling connectivity between the two switches for users on VLAN 20.

    Rate this question:

  • 45. 

    45. Which statement correctly describes an IBSS?

    • A.

      Wireless stations communicate with a single access point.

    • B.

      Wireless stations communicate directly with each other, without an access point.

    • C.

      Wireless stations communicate with multiple access points, each with the same SSID.

    • D.

      Wireless stations communicate with multiple access points, each with a different SSID.

    Correct Answer
    B. Wireless stations communicate directly with each other, without an access point.
    Explanation
    An IBSS (Independent Basic Service Set) is a type of wireless network where wireless stations communicate directly with each other, without the need for an access point. In an IBSS, each wireless station acts as a peer and can communicate with other stations within the network. This type of network is often referred to as an ad hoc network, as it can be set up quickly without the need for a centralized infrastructure. This is different from other options listed, where wireless stations communicate with a single access point, multiple access points with the same SSID, or multiple access points with different SSIDs.

    Rate this question:

  • 46. 

    46. Which two operations can be performed from the boot loader command line of a Cisco Catalyst switch? (Choose two.)

    • A.

      Change hostname

    • B.

      View active VLANs

    • C.

      Reinstall IOS image

    • D.

      Format flash file system

    • E.

      Show MAC address table

    Correct Answer(s)
    C. Reinstall IOS image
    D. Format flash file system
    Explanation
    From the boot loader command line of a Cisco Catalyst switch, two operations that can be performed are reinstalling the IOS image and formatting the flash file system. Reinstalling the IOS image involves replacing the current operating system with a new one, which can be necessary in case of corruption or upgrading. Formatting the flash file system erases all files and directories stored in the flash memory, allowing for a clean slate or removing any unwanted files.

    Rate this question:

  • 47. 

    47. Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161. What will the router do with this packet?

    • A.

      The router will drop the packet.

    • B.

      The router will forward the packet out interface FastEthernet 0/1.1.

    • C.

      The router will forward the packet out interface FastEthernet 0/1.2.

    • D.

      The router will forward the packet out interface FastEthernet 0/1.3.

    • E.

      The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.

    Correct Answer
    A. The router will drop the packet.
    Explanation
    Based on the information provided in the exhibit, the router will drop the packet because the source and destination IP addresses are in the same subnet (192.168.1.0/24). Therefore, the router does not need to forward the packet to another interface.

    Rate this question:

  • 48. 

    48. Refer to the exhibit. A network administrator enters the displayed commands to configure VLAN 30. What is the result of running these commands?

    • A.

      VLAN 30 will be added to S1, S2, and S3, but not to S4.

    • B.

      VLAN 30 will be pruned from the VLAN database of S3.

    • C.

      VLAN 30 will be added to the VLAN database of S3 but will not be propagated to S4, S2 or S1.

    • D.

      VLAN 30 will not be added to the VLAN database of S3 and an error message will be displayed.

    Correct Answer
    C. VLAN 30 will be added to the VLAN database of S3 but will not be propagated to S4, S2 or S1.
    Explanation
    The given commands "vlan 30" and "exit" are entered in the global configuration mode of the switch. These commands will add VLAN 30 to the VLAN database of S3, as it is entered in the VLAN database configuration mode. However, since the commands are not entered in the VLAN database configuration mode of S1, S2, and S4, VLAN 30 will not be added to their VLAN databases. Therefore, VLAN 30 will be added to the VLAN database of S3 but will not be propagated to S4, S2, or S1.

    Rate this question:

  • 49. 

    49. Refer to the exhibit. A network administrator issues the show interfaces fastEthernet 0/8 switchport command to check the status of the port. What can be concluded from the output?

    • A.

      Port Fa0/8 is configured as a trunk with 802.1q encapsulation.

    • B.

      Port Fa0/8 is configured as a trunk in VLAN 1.

    • C.

      Port Fa0/8 is configured in access mode and associated with VLAN 1.

    • D.

      Port Fa0/8 is configured as a trunk and VLAN 1 is a native VLAN for the trunk.

    Correct Answer
    C. Port Fa0/8 is configured in access mode and associated with VLAN 1.
    Explanation
    The output of the "show interfaces fastEthernet 0/8 switchport" command indicates that Port Fa0/8 is configured in access mode and associated with VLAN 1. This means that the port is not configured as a trunk and is only allowing traffic from a single VLAN, which is VLAN 1.

    Rate this question:

  • 50. 

    50. What information in an Ethernet frame is used by a Layer 2 switch to build its address table?

    • A.

      Source IP address

    • B.

      Source MAC address

    • C.

      Destination IP address

    • D.

      Destination MAC address

    Correct Answer
    B. Source MAC address
    Explanation
    Layer 2 switches use the source MAC address in an Ethernet frame to build their address table. This is because Layer 2 switches operate at the data link layer of the OSI model and use MAC addresses to identify devices on a local network. By learning and storing the source MAC addresses of incoming frames, the switch can associate each MAC address with the corresponding port on which the frame was received. This allows the switch to make forwarding decisions based on the destination MAC address, ensuring that frames are delivered to the correct device on the network.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 27, 2013
    Quiz Created by
    TRiXeR
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.