CCNA 3 Exam Questions

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By TRiXeR
T
TRiXeR
Community Contributor
Quizzes Created: 1 | Total Attempts: 240
| Attempts: 240 | Questions: 146
Please wait...
Question 1 / 146
0 %
0/100
Score 0/100
1. 62. Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect?

Explanation

The IP phones should connect to AS1 and AS2. This is because AS1 and AS2 are the only devices listed in the exhibit, and there is no mention of any other devices that could potentially be used for connecting IP phones. Therefore, it can be inferred that AS1 and AS2 are the correct devices for connecting the IP phones.

Submit
Please wait...
About This Quiz
CCNA 3 Exam Questions - Quiz

Chapter 3 of the CCNA is a very wide chapter and most students find it hard to understand. The quiz below has different questions specifically from chapter 3 and will give you a clear indication of how the questions are set and how to correctly tackle them. Give it a... see moretry! see less

Personalize your quiz and earn a certificate with your name on it!
2. 4. Refer to the exhibit. A network administrator has segmented the network into two VLANs and configured Router1 for inter-VLAN routing. A test of the network, however, shows that hosts on each VLAN can only access local resources and not resources on the other VLAN. What is the most likely cause of this problem?

Explanation

The most likely cause of the problem is that switch port Fa0/1 is not trunking. Trunking is necessary for communication between VLANs, as it allows multiple VLAN traffic to pass through a single link. Without trunking, the VLANs are isolated and cannot access resources on the other VLAN. Therefore, if switch port Fa0/1 is not configured as a trunk port, it would explain why hosts on each VLAN can only access local resources and not resources on the other VLAN.

Submit
3. 94. An administrator is troubleshooting a PC on the network which is suffering from slow and intermittent connectivity. The PC has a ping success rate to the default gateway of less than half the ping attempts. Other PCs on the switch can consistently ping the default gateway. The switch port is configured for auto duplex and the PC is configured for full duplex. What will commonly cause this problem?

Explanation

The PC being set to full duplex while the switch port fails to autonegotiate the duplex setting and defaults to half duplex can cause a duplex mismatch. This mismatch leads to slow and intermittent connectivity, as the PC and switch are not communicating effectively.

Submit
4. 8. Which parameter is used to uniquely identify one wireless network from another?

Explanation

SSID stands for Service Set Identifier and is used to uniquely identify one wireless network from another. It is a case-sensitive alphanumeric string that is assigned to a wireless network. When devices search for available networks, they use the SSID to determine which network to connect to. Each wireless network has its own unique SSID, allowing devices to differentiate between networks and connect to the desired one.

Submit
5. 9. Which value determines if a switch becomes the central point of reference in the spanning tree topology?

Explanation

The lowest bridge ID determines if a switch becomes the central point of reference in the spanning tree topology. In the spanning tree protocol, each switch is assigned a unique bridge ID, which consists of a priority value and a MAC address. The switch with the lowest bridge ID is elected as the root bridge, and all other switches in the network determine their paths to the root bridge based on this information. Therefore, the switch with the lowest bridge ID becomes the central point of reference in the spanning tree topology.

Submit
6. 116. Which value determines if a switch becomes the central point of reference in the spanning tree topology?

Explanation

The lowest bridge ID determines if a switch becomes the central point of reference in the spanning tree topology. The bridge ID is a combination of a switch's priority value and its MAC address. When multiple switches are connected in a network, the switch with the lowest bridge ID is elected as the root bridge, which becomes the central point of reference for the spanning tree algorithm.

Submit
7. 117. An administrator is troubleshooting a PC on the network which is suffering from slow and intermittent connectivity. The PC has a ping success rate to the default gateway of less than half the ping attempts. Other PCs on the switch can consistently ping the default gateway. The switch port is configured for auto duplex and the PC is configured for full duplex. What will commonly cause this problem?

Explanation

The correct answer is that the PC is set to full duplex, but the switch port fails to autonegotiate the duplex setting and defaults to half duplex, causing a duplex mismatch. This means that the PC and the switch are not communicating effectively, leading to slow and intermittent connectivity.

Submit
8. 127. Refer to the exhibit. A new switch, SW3, has been added to the network. The network administrator determines that VLAN information is not propagating to SW3. Which command will remedy the problem?

Explanation

The command "SW3(config)# vtp domain Cisco1" will remedy the problem. This command sets the VTP domain name on SW3 to "Cisco1", allowing it to receive and propagate VLAN information from other switches in the network.

Submit
9. 24. Why is MAC address filtering considered a poor choice in securing a WLAN?

Explanation

MAC address filtering is considered a poor choice in securing a WLAN because MAC addresses can be easily spoofed. This means that an attacker can change their device's MAC address to match one that is allowed on the network, bypassing the filtering mechanism. This makes it ineffective in preventing unauthorized access to the network. Other security measures, such as encryption and authentication, are more reliable in protecting the WLAN from unauthorized users.

Submit
10. 131. Which type of traffic can still be received on a switch interface that is in STP blocking mode?

Explanation

When a switch interface is in STP (Spanning Tree Protocol) blocking mode, it means that the interface is not actively forwarding traffic. However, it still receives and processes BPDU (Bridge Protocol Data Unit) frames. BPDU frames are used by switches to exchange information and maintain the spanning tree topology. These frames are crucial for the proper functioning of the STP algorithm. Therefore, even in blocking mode, the switch interface will continue to receive and handle BPDU frames.

Submit
11. 141. A network technician is attempting to configure 802.1q trunking on switch ports Fa0/5 through Fa0/10. Which set of commands will accomplish this task?

Explanation

not-available-via-ai

Submit
12. 66. Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161. What will the router do with this packet?

Explanation

Based on the given information, the source and destination IP addresses are both within the same subnet 192.168.1.0/24. Since the router is receiving a packet with a destination IP address that is within its own subnet, it will assume that the destination IP address is directly connected and will attempt to find the destination host within its own network. However, if the router does not have a matching entry in its routing table for the destination IP address, it will drop the packet. Therefore, the router will drop the packet in this scenario.

Submit
13. 113. Which parameter is used to uniquely identify one wireless network from another?

Explanation

The SSID (Service Set Identifier) is used to uniquely identify one wireless network from another. It is a case-sensitive alphanumeric string that is set by the network administrator or the router manufacturer. When a device wants to connect to a specific wireless network, it must provide the correct SSID to establish a connection. This parameter ensures that devices connect to the intended network and not to other nearby networks with similar names.

Submit
14. 121. Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect?

Explanation

The IP phones should connect to AS1 and AS2. This is because AS1 and AS2 are the Access Switches in the network, which are responsible for connecting end devices such as IP phones. DS1 and DS2 are Distribution Switches, which are used to connect different access switches together. CS1 is the Core Switch, which is responsible for connecting multiple distribution switches. Therefore, the IP phones should connect to the Access Switches (AS1 and AS2) to establish a direct connection to the network.

Submit
15. 126. Refer to the exhibit. What is the maximum number of VLANs that can be deleted from the Switch as it is configured?

Explanation

Based on the exhibit, the switch is configured with a total of nine VLANs. The question asks for the maximum number of VLANs that can be deleted. Since there are nine VLANs in total, it is not possible to delete more than nine VLANs. Therefore, the correct answer is "four" because it is the maximum number of VLANs that can be deleted without exceeding the total number of VLANs configured on the switch.

Submit
16. 138. Refer to the exhibit. Switch SWB is not responding to VTP updates from switch SWA. What is a possible cause of the problem?

Explanation

A possible cause of the problem could be that there is a password set on one of the switches. This could prevent the VTP updates from being received by switch SWB. Without the correct password, switch SWB would not be able to authenticate and receive the updates from switch SWA.

Submit
17. 82. What information in an Ethernet frame is used by a Layer 2 switch to build its address table?

Explanation

A Layer 2 switch uses the source MAC address in an Ethernet frame to build its address table. This is because the MAC address uniquely identifies each device on a local network and allows the switch to associate the MAC address with the corresponding port. By learning and storing the source MAC addresses of devices connected to its ports, the switch can efficiently forward incoming frames to the correct destination device based on the MAC address. This helps in improving network performance and reducing unnecessary network traffic.

Submit
18. 103. Refer to the exhibit. What would happen if the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1?

Explanation

If the network administrator moves the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1, Host A will no longer be a member of VLAN 10. This is because port Fa0/3 has been manually assigned to VLAN 30. VLAN membership is determined by the port configuration on the switch, and in this case, the administrator has specifically assigned Fa0/3 to VLAN 30, causing Host A to no longer be associated with VLAN 10.

Submit
19. 59. Which value determines if a switch becomes the central point of reference in the spanning tree topology?

Explanation

The bridge ID is a combination of a priority value and a MAC address. In the spanning tree protocol, each switch in the network has a unique bridge ID. The switch with the lowest bridge ID becomes the root bridge and serves as the central point of reference in the spanning tree topology. Therefore, the value that determines if a switch becomes the central point of reference is the lowest bridge ID.

Submit
20. 129. Why is MAC address filtering considered a poor choice in securing a WLAN?

Explanation

MAC address filtering is considered a poor choice in securing a WLAN because MAC addresses can be easily spoofed. This means that an attacker can impersonate a legitimate device by changing their MAC address to match an authorized device. As a result, MAC address filtering alone is not sufficient to prevent unauthorized access to a WLAN. Other security measures, such as encryption and authentication protocols, should be implemented to ensure a more robust and effective security solution.

Submit
21. 11. Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect?

Explanation

The IP phones should connect to AS1 and AS2. This is because AS1 and AS2 are the access switches in the network, which are responsible for connecting end devices such as IP phones. DS1 and DS2 are distribution switches, which are used to connect different access switches together. CS1 is a core switch, which is used for routing traffic between different networks. Therefore, the IP phones should connect to the access switches AS1 and AS2.

Submit
22. 133. Why is it advisable that a network administrator use SSH instead of Telnet when managing switches?

Explanation

SSH is recommended for network administrators because it encrypts all remote management communications, providing a secure and confidential way to manage switches. In contrast, Telnet does not offer encryption, making it susceptible to eavesdropping and unauthorized access. By using SSH, sensitive information and commands are protected from potential attackers, ensuring the integrity and confidentiality of the network management process.

Submit
23. 68. What is the purpose of the Spanning Tree algorithm?

Explanation

The purpose of the Spanning Tree algorithm is to prevent loops in a switched network with redundant paths. This algorithm ensures that there is only one active path between any two network devices at a time, while blocking redundant paths. This prevents broadcast storms and ensures efficient and reliable network communication.

Submit
24. 5. Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?

Explanation

When a collision occurs in a network, all hosts involved in the collision will receive a collision jamming signal. In this scenario, hosts A and B are connected to the same hub, HB1, and they both attempt to transmit a frame at the same time resulting in a collision. Therefore, only hosts A, B, and C will receive the collision jamming signal.

Submit
25. 34. A network technician is attempting to configure 802.1q trunking on switch ports Fa0/5 through Fa0/10. Which set of commands will accomplish this task?

Explanation

not-available-via-ai

Submit
26. 10. An administrator is troubleshooting a PC on the network which is suffering from slow and intermittent connectivity. The PC has a ping success rate to the default gateway of less than half the ping attempts. Other PCs on the switch can consistently ping the default gateway. The switch port is configured for auto duplex and the PC is configured for full duplex. What will commonly cause this problem?

Explanation

When a PC is set to full duplex and the switch port fails to autonegotiate the duplex setting, it defaults to half duplex. This creates a duplex mismatch between the PC and the switch port. In a duplex mismatch, the PC and the switch are operating at different duplex settings, which can lead to slow and intermittent connectivity. This is because the PC and the switch are not able to effectively communicate with each other, causing dropped frames and a lower ping success rate to the default gateway.

Submit
27. 53. Refer to the exhibit. What will allow a host on VLAN 40 on switch X to communicate with a host in VLAN 40 on switch Y?

Explanation

Trunking is the correct answer because it allows multiple VLANs to be carried over a single physical link between switches. By configuring trunk ports on both switch X and switch Y, the hosts on VLAN 40 can communicate with each other. Trunking encapsulates the VLAN information and allows it to be transmitted between switches, ensuring that the VLAN traffic is properly segregated and delivered to the correct destination.

Submit
28. 125. Refer to the exhibit. A network administrator has segmented the network into two VLANs. The connected hosts can only access resources in their own VLAN. What is the most scalable and cost effective solution to allow inter-VLAN communication in this network?

Explanation

The most scalable and cost-effective solution to allow inter-VLAN communication in this network is to configure a router with two subinterfaces on one of its FastEthernet ports and connect it to S1 using a trunk link. This allows for the creation of virtual interfaces (subinterfaces) on the router, each corresponding to a different VLAN. The trunk link enables the transmission of traffic between the router and the switch, ensuring that inter-VLAN communication can occur. This solution eliminates the need for additional switches or routers, making it a more efficient and cost-effective option.

Submit
29.   25. Refer to the exhibit. If switch SW1 is configured with the four VLANs as shown in the exhibit, how many physical interfaces are needed on router R1 to configure inter-VLAN routing using subinterfaces?

Explanation

To configure inter-VLAN routing using subinterfaces, only one physical interface is needed on router R1. This is because subinterfaces allow a single physical interface to be divided into multiple logical interfaces, each representing a different VLAN. By configuring subinterfaces on the router, each VLAN can be assigned a separate IP address and the router can route traffic between them. Therefore, only one physical interface is required to connect the router to the switch.

Submit
30. 143. Refer to the exhibit. A technician is troubleshooting a trunk problem between switches SW1 and SW2. What should be done to remedy the problem?

Explanation

To remedy the trunk problem between switches SW1 and SW2, the "Trunking Native Mode VLAN" on switch SW2 should be configured as VLAN 100. This means that any untagged traffic received on the trunk link will be treated as belonging to VLAN 100. By configuring the native VLAN on SW2 to be VLAN 100, it ensures that both switches are using the same native VLAN for trunking, which helps in establishing proper communication between them.

Submit
31. 84. Refer to the exhibit. Switch SWB is not responding to VTP updates from switch SWA. What is a possible cause of the problem?

Explanation

A possible cause of the problem is that there is a password set on one of the switches. This can prevent VTP updates from being received by SWB, causing it to not respond to the updates from SWA.

Submit
32. 98. Which configuration changes will increment the configuration revision number on the VTP server?

Explanation

Configuring or deleting a VLAN or creating a VLAN name will increment the configuration revision number on the VTP server. This is because any changes made to the VLAN configuration, such as adding or removing VLANs, will result in a new configuration being sent to the VTP clients. The configuration revision number is used by VTP to determine whether a received update is more recent than the current configuration on the device. Therefore, any changes to the VLAN configuration will trigger an update with an incremented revision number.

Submit
33. 107. Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?

Explanation

When a collision occurs on a network, all hosts involved in the collision will receive a collision jamming signal. In this scenario, hosts A and B are connected to the same hub and attempt to transmit a frame simultaneously, resulting in a collision. Therefore, only hosts A, B, and C will receive the collision jamming signal.

Submit
34. 28. What is the purpose of configuring a switch port as a trunk port?

Explanation

Configuring a switch port as a trunk port allows for the transmission of data from multiple VLANs through a single port. This is useful in scenarios where there are multiple VLANs in a network and the switch needs to be able to send traffic between them. By using a trunk port, the switch can tag the frames with VLAN information, allowing the receiving device to correctly identify and process the traffic for each VLAN. This helps to efficiently utilize network resources and simplifies network management.

Submit
35. 29. Refer to the exhibit. Which statement is true about the status of interface Fa0/1?

Explanation

not-available-via-ai

Submit
36. 139. Which IEEE trunking protocol is used to encapsulate data traffic over a trunk link on a Cisco switch?

Explanation

802.1Q is the correct answer because it is the IEEE trunking protocol used to encapsulate data traffic over a trunk link on a Cisco switch. This protocol allows for the transmission of multiple VLANs over a single physical link, enabling efficient utilization of network resources and simplifying network management. STP (Spanning Tree Protocol) is a different protocol used for loop prevention, DTP (Dynamic Trunking Protocol) is used for negotiating trunk links, and VTP (VLAN Trunking Protocol) is used for managing VLANs.

Submit
37. 142. Refer to the exhibit. Although they are directly connected, switch SWA is not exchanging VLAN information with switch SWC. What can be done to correct this problem?

Explanation

To correct the problem of switch SWA not exchanging VLAN information with switch SWC, the VTP version of SWA should be changed to version 1. VTP (VLAN Trunking Protocol) is used to synchronize VLAN information across switches in a network. By changing the VTP version of SWA to version 1, it will match the VTP version of SWC and allow the exchange of VLAN information between the switches.

Submit
38. 77. Using the command copy tftp:backup.cfg startup-config, an administrator downloaded a saved configuration from a TFTP server to a switch. Why does the administrator not detect any changes in the switch configuration after the download completes?

Explanation

When the administrator uses the command "copy tftp:backup.cfg startup-config" to download a saved configuration from a TFTP server to the switch, the configuration is actually downloaded to the startup-config file. However, changes made to the startup-config file do not take effect until the switch is reloaded. Therefore, even though the download completes successfully, the administrator will not detect any changes in the switch configuration until the switch is reloaded.

Submit
39. 95. Refer to the exhibit. What does "LEARNING" mean as it relates to the Spanning Tree Protocol?

Explanation

not-available-via-ai

Submit
40. 38. Which type of VLAN would accommodate untagged traffic on a 802.1q trunk port?

Explanation

A native VLAN is a type of VLAN that allows untagged traffic on an 802.1q trunk port. This means that any traffic that arrives on the trunk port without a VLAN tag will be treated as belonging to the native VLAN. The native VLAN is typically used for carrying management traffic or for allowing devices that do not support VLAN tagging to communicate on the network.

Submit
41. 108. In which mode is a VTP switch operating if it has been configured to only forward VTP advertisements?

Explanation

If a VTP switch has been configured to only forward VTP advertisements, it is operating in the "transparent" mode. In this mode, the switch does not participate in VTP updates or maintain a VTP database. It simply forwards VTP advertisements to other switches without making any changes to the VLAN configuration. This mode is typically used when there is a need to isolate VTP domains or when the switch needs to be connected to switches in different VTP domains.

Submit
42. 50. What information in an Ethernet frame is used by a Layer 2 switch to build its address table?

Explanation

Layer 2 switches use the source MAC address in an Ethernet frame to build their address table. This is because Layer 2 switches operate at the data link layer of the OSI model and use MAC addresses to identify devices on a local network. By learning and storing the source MAC addresses of incoming frames, the switch can associate each MAC address with the corresponding port on which the frame was received. This allows the switch to make forwarding decisions based on the destination MAC address, ensuring that frames are delivered to the correct device on the network.

Submit
43. 78. Refer to the exhibit. Each switch is configured to participate in STP for VLANs 1, 10, 20, and 30. Which switch will become the root for VLAN 20?

Explanation

In the exhibit, the switch with the lowest Bridge ID (BID) becomes the root switch. The BID is determined by the switch priority and the MAC address. In this case, switch D has the lowest BID for VLAN 20, as its priority is 4096 and its MAC address is the lowest among all the switches. Therefore, switch D will become the root for VLAN 20.

Submit
44. 2. Which CLI mode allows users to access all device commands, such as those used for configuration, management, and troubleshooting

Explanation

The correct answer is privileged EXEC mode. In this mode, users have access to all device commands, including those used for configuration, management, and troubleshooting. This mode provides a higher level of access and control compared to the user EXEC mode, which only allows basic monitoring and verification commands. Global configuration mode is used for configuring global parameters, while interface configuration mode is used for configuring specific interfaces on the device.

Submit
45. 81. Why is it advisable that a network administrator use SSH instead of Telnet when managing switches?

Explanation

SSH is advisable for network administrators to use instead of Telnet when managing switches because SSH encrypts all remote management communications, providing a secure and private connection. In contrast, Telnet does not encrypt any data, making it vulnerable to eavesdropping and unauthorized access. By using SSH, sensitive information such as login credentials and configuration details are protected, ensuring the integrity and confidentiality of the network management process.

Submit
46. 102. Company policy requires disabling the command history buffer on network devices. An administrator enters terminal no history size at the command prompt on a Cisco Catalyst switch and receives no error messages back, but the command history buffer is still available. What is the problem?

Explanation

The problem is that the "size" parameter in the command only reset the default buffer size but did not actually disable access to the buffer. So even though the command was entered without any syntax errors and there were no error messages, the command history buffer is still available on the Cisco Catalyst switch.

Submit
47. 51. Refer to the exhibit. What would happen if the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1?

Explanation

If the network administrator moves the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1, Host A will no longer be a member of VLAN 10. This is because port Fa0/3 has been manually assigned to VLAN 30. VLAN membership is determined by the port configuration on the switch, and since port Fa0/3 has been specifically assigned to VLAN 30, Host A will no longer be part of VLAN 10.

Submit
48. 119. What is an efficient and cost effective way to minimize the frequency and effects of broadcast storms on an Ethernet LAN?

Explanation

Dividing the computers into separate VLANs on the existing switches is an efficient and cost-effective way to minimize the frequency and effects of broadcast storms on an Ethernet LAN. By separating the computers into different VLANs, broadcast traffic is contained within each VLAN and does not propagate to other VLANs, reducing the overall broadcast traffic on the network. This helps to prevent network congestion and performance issues caused by broadcast storms. Additionally, it allows for better network management and control as each VLAN can have its own set of rules and policies.

Submit
49. 20. Refer to the exhibit. What is the maximum number of VLANs that can be deleted from the Switch as it is configured?

Explanation

Based on the information provided in the exhibit, the maximum number of VLANs that can be deleted from the switch is four.

Submit
50. 124. Refer to the exhibit. Router R1 is properly configured for router on a stick inter-VLAN routing, but PC1 is unable to ping PC2. What needs to be done to resolve the problem?

Explanation

To resolve the issue of PC1 being unable to ping PC2, the Fa0/1 port of S1 needs to be configured as a trunk port. This is because router on a stick inter-VLAN routing requires a trunk link between the router and the switch in order to carry traffic for multiple VLANs. By configuring the Fa0/1 port of S1 as a trunk port, it will be able to carry traffic for multiple VLANs and allow PC1 to communicate with PC2.

Submit
51. 26. Refer to the exhibit. What can be determined from the configuration of this wireless device?

Explanation

The configuration of this wireless device indicates that all wireless devices connected to this access point must have the SSID of Academy. This means that in order to connect to this access point, the wireless devices must be configured with the same SSID.

Submit
52. 35. Refer to the exhibit. Switch SWA is not processing VTP advertisments from switch SWB. What can done to correct the error?

Explanation

The correct answer is to change the domain name on switch SWA to cisco. This is because VTP (VLAN Trunking Protocol) uses the domain name to determine if switches should synchronize their VLAN information. In this case, since switch SWA is not processing VTP advertisements from switch SWB, it suggests that they are not in the same VTP domain. By changing the domain name on switch SWA to "cisco", it will match the domain name of switch SWB and allow the VTP advertisements to be processed.

Submit
53. 14. What is the purpose of the Spanning Tree algorithm?

Explanation

The purpose of the Spanning Tree algorithm is to prevent loops in a switched network with redundant paths. By identifying and disabling redundant paths, the algorithm ensures that there is only one active path between any two network devices. This prevents the formation of loops, which can cause network congestion and broadcast storms. Ultimately, the Spanning Tree algorithm helps to maintain network stability and prevent disruptions in communication.

Submit
54. 56. Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?

Explanation

To configure the Linksys WRT300N wireless access point, the correct method is to enter the default IP address of the access point in a web browser from a computer in the same IP subnet as the access point. This allows the computer to establish a connection with the access point and access its configuration settings through a web-based interface. By entering the default IP address, the computer can communicate with the access point and make the necessary configuration changes.

Submit
55. 60. Refer to the exhibit. The Layer 2 switching design that is shown has been implemented in a campus environment that is using Spanning Tree Protocol. All inter-switch links that are shown are trunks. Whenever an inter-switch link fails, the network takes nearly a minute to completely converge. How can the convergence time be reduced?

Explanation

Implementing Rapid Spanning Tree Protocol (RSTP) can reduce the convergence time in the network. RSTP is an improvement over the traditional Spanning Tree Protocol (STP) and provides faster convergence by reducing the time it takes for the network to recover from link failures. RSTP achieves this by introducing new port states and timers, allowing for quicker detection and recovery of failed links. By implementing RSTP, the network can significantly reduce the convergence time and improve overall network performance.

Submit
56. 75. Refer to the exhibit. A new switch, SW3, has been added to the network. The network administrator determines that VLAN information is not propagating to SW3. Which command will remedy the problem?

Explanation

The VLAN information is not propagating to SW3 because it is not configured with the correct VTP domain. The command "SW3(config)# vtp domain Cisco1" will set the VTP domain of SW3 to "Cisco1" which will allow it to receive and propagate VLAN information.

Submit
57. 109. Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?

Explanation

To establish an administrative connection for configuring the Linksys WRT300N wireless access point, the correct method is to enter the default IP address of the access point in a web browser from a computer in the same IP subnet as the access point. By doing this, the computer will be able to communicate with the access point and access its configuration settings through the web interface. This method does not require any physical connection or rebooting of the computer, making it a convenient and efficient way to configure the access point.

Submit
58. 55. In which mode is a VTP switch operating if it has been configured to only forward VTP advertisements?

Explanation

A VTP switch is operating in "transparent" mode if it has been configured to only forward VTP advertisements. In this mode, the switch does not participate in VTP domain updates and does not synchronize its VLAN database with other switches. It simply forwards VTP advertisements to other switches in the network. This mode is useful when you want to maintain VLAN information locally on the switch without affecting the rest of the network.

Submit
59. 123. Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?

Explanation

The term "DYNAMIC" in the output indicates that the MAC address entry was dynamically learned by the switch. This means that the switch learned the MAC address from the source address in a frame received on Fa0/18. The switch does not have to perform a lookup to determine the final destination port when forwarding a frame to the device with this MAC address. Additionally, only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18.

Submit
60. 32. Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?

Explanation

Setting the security mode to WEP on the Linksys integrated router will encrypt the data transmitted between the wireless client and the access point. This means that the data will be encoded in a way that only authorized devices can decode and understand, providing a level of security for the wireless network.

Submit
61. 64. Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?

Explanation

The term DYNAMIC in the output indicates that the MAC address entry was dynamically learned by the switch. This means that the switch learned the MAC address from the source address in a frame received on interface Fa0/18. The switch automatically adds dynamic entries to its MAC address table when it receives frames from new devices. These dynamic entries are temporary and can be removed by the switch itself if they are not used for a certain period of time.

Submit
62. 87. A network administrator enters the enable command at the Switch> prompt of a new switch. What mode will the switch enter?

Explanation

When a network administrator enters the enable command at the Switch> prompt of a new switch, the switch will enter privileged EXEC mode. In this mode, the administrator has access to all the commands and features of the switch, allowing them to perform advanced configurations and management tasks.

Submit
63. 44. Refer to the exhibit. VLAN 20 was recently added on the network. Users on VLAN 20 on SW1 start complaining that they do not have connectivity to the users on the same VLAN on switch SW2. What should be done to remedy the problem?

Explanation

To remedy the problem of users on VLAN 20 not having connectivity to users on the same VLAN on switch SW2, VLAN 20 needs to be included in the list of allowed VLANs on the trunk link on SW2. By including VLAN 20 in the allowed VLANs, SW2 will allow traffic for VLAN 20 to pass through the trunk link, enabling connectivity between the two switches for users on VLAN 20.

Submit
64. 47. Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161. What will the router do with this packet?

Explanation

Based on the information provided in the exhibit, the router will drop the packet because the source and destination IP addresses are in the same subnet (192.168.1.0/24). Therefore, the router does not need to forward the packet to another interface.

Submit
65. 99. Refer to the exhibit. A network administrator has segmented the network into two VLANs and configured R1 and S1 as displayed. However, PC1 is unable to access PC2. What is the likely problem?

Explanation

The likely problem is that the Fa0/1 port of S1 is not configured as a trunk port. In order for VLANs to communicate with each other, a trunk port is required to carry traffic between the VLANs. Without a trunk port, the VLANs will remain isolated and PC1 will not be able to access PC2.

Submit
66. 27. Which type of traffic can still be received on a switch interface that is in STP blocking mode?

Explanation

When a switch interface is in STP (Spanning Tree Protocol) blocking mode, it means that it is not forwarding any data frames, including multicast frames, broadcast frames, and Layer 3 packets. However, BPDU (Bridge Protocol Data Unit) frames are still received on a switch interface in STP blocking mode. BPDU frames are used by switches to exchange information about network topology and to prevent loops in the network. Therefore, even though the switch interface is not forwarding regular traffic, it still needs to receive and process BPDU frames to maintain the integrity of the network.

Submit
67. 70. Refer to the exhibit. A network administrator has segmented the network into two VLANs. The connected hosts can only access resources in their own VLAN. What is the most scalable and cost effective solution to allow inter-VLAN communication in this network?

Explanation

The most scalable and cost-effective solution to allow inter-VLAN communication in this network is to configure a router with two subinterfaces on one of its FastEthernet ports and connect it to S1 using a trunk link. This allows the router to handle the traffic between the VLANs by separating them into different subinterfaces. By using a trunk link, multiple VLANs can be carried over a single physical connection, reducing the need for additional physical interfaces and switches. This solution provides flexibility and scalability for future expansion of the network.

Submit
68. 91. Refer to the exhibit. A network administrator is configuring RT1 for inter-VLAN routing. The switch is configured correctly and is functional. Host1, Host2, and Host3 cannot communicate with each other. Based on the router configuration, what is causing the problem?

Explanation

The problem is caused by the IP addresses on the subinterfaces being incorrectly matched to the VLANs. This means that the subinterfaces are not properly configured to communicate with the correct VLANs, resulting in the inability of the hosts to communicate with each other.

Submit
69. 7. Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?

Explanation

To establish an administrative connection for configuring the Linksys WRT300N wireless access point, the correct method is to enter the default IP address of the access point in a web browser from a computer in the same IP subnet as the access point. This allows the user to access the configuration interface of the access point and make the necessary changes. This method does not require physical connection or rebooting the computer, and it is a common way to configure network devices through a web-based interface.

Submit
70. 65. What is the purpose of the switch command switchport access vlan 99?

Explanation

The purpose of the switch command "switchport access vlan 99" is to assign the port to a particular VLAN. This command is used to configure a switch port to belong to a specific VLAN, allowing traffic to be sent and received only within that VLAN. By assigning the port to VLAN 99, any device connected to that port will be part of VLAN 99 and will be able to communicate with other devices within the same VLAN.

Submit
71. 3. Refer to the exhibit. Which Spanning Tree Protocol version is in effect?

Explanation

The correct answer is Rapid Spanning Tree Protocol (RSTP). This can be determined based on the information provided in the exhibit.

Submit
72. 23. Refer to the exhibit. Each switch is configured to participate in STP for VLANs 1, 10, 20, and 30. Which switch will become the root for VLAN 20?

Explanation

Switch D will become the root for VLAN 20 because it has the lowest Bridge ID. The Bridge ID is determined by the Bridge Priority and the MAC address. In this case, Switch D has the lowest Bridge Priority and the lowest MAC address compared to the other switches. Therefore, it will become the root for VLAN 20.

Submit
73. 61. A network administrator is asked to connect four switches that are each configured with eight VLANs. Routers that have two FastEthernet ports each that support trunking are available. What is the minimum number of routers needed to interconnect traffic from all of the VLANs if trunking is allowed?

Explanation

The minimum number of routers needed to interconnect traffic from all of the VLANs is 1. This is because the routers have two FastEthernet ports each that support trunking, which means each router can connect to two switches. Since there are four switches, one router is enough to connect all of them and interconnect traffic from all of the VLANs.

Submit
74. 115. Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. What should be done to fix the problem?

Explanation

The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. This indicates a problem with the trunk port configuration on switch SW2. By reconfiguring the trunk port on switch SW2 with static trunk configuration, the issue can be resolved. This will ensure that the VLAN information is properly transmitted between the switches, allowing the hosts to communicate with each other.

Submit
75. 13. Refer to the exhibit. VTP pruning is enabled in the VTP domain that is shown. How will switch ST-1 handle Layer 2 broadcast traffic originating from host A on switch ST-C?

Explanation

VTP pruning is a feature that prevents unnecessary broadcast traffic from being sent across all VLANs in a VTP domain. In this scenario, since VTP pruning is enabled, switch ST-1 will only forward Layer 2 broadcast traffic originating from host A to the ports that have active receivers for that VLAN. The exhibit does not show any other switches connected to switch ST-1 except for switch ST-C, which is connected to port Fa0/5. Therefore, the broadcast traffic will only be forwarded out port Fa0/5.

Submit
76.   17. Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP address should be assigned to this new host?

Explanation

The new host should be assigned the IP address 192.168.1.22 /28 because it falls within the range of the subnet defined by the network address 192.168.1.0 and the subnet mask 255.255.255.240 (/28). This subnet allows for a total of 14 usable IP addresses, with the first and last addresses reserved for the network and broadcast addresses respectively. Therefore, the valid IP addresses for hosts in this subnet range from 192.168.1.1 to 192.168.1.14, and 192.168.1.22 falls within this range.

Submit
77. 52. Refer to the exhibit. R1 is configured for traditional inter-VLAN routing. R1 can ping computer 3 but cannot ping computer 1. What is a possible cause for this failure?

Explanation

The possible cause for the failure is that S1 port Fa0/11 is in the wrong VLAN. This means that the switch port connecting to computer 1 is not in the correct VLAN, which prevents R1 from being able to ping computer 1.

Submit
78. 58. Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. What should be done to fix the problem?

Explanation

To fix the problem of hosts connected to switch SW1 not being able to communicate with the hosts in the same VLANs connected to switch SW2, the trunk port on switch SW2 should be reconfigured with static trunk configuration. This will ensure that the VLAN information is properly transmitted between the switches, allowing for communication between the hosts in the same VLANs.

Submit
79. 21. Which configuration changes will increment the configuration revision number on the VTP server?

Explanation

Configuring or deleting a VLAN or creating a VLAN name will increment the configuration revision number on the VTP server. This is because any changes made to the VLAN configuration, such as creating a new VLAN or deleting an existing VLAN, will result in a change in the configuration revision number. This allows the VTP server to keep track of the most recent changes made to the VLAN configuration and ensure that all VTP clients are updated accordingly.

Submit
80. 128. What advantage does cut-through switching provide?

Explanation

Cut-through switching is a method of forwarding frames in a network. Unlike store-and-forward switching, which waits for the entire frame to be received before forwarding, cut-through switching starts forwarding the frame as soon as the destination address is received. This results in lower latency and faster transmission of frames. Therefore, the advantage of cut-through switching is that it forwards frames quickly.

Submit
81. 67. Refer to the exhibit. A new host needs to be connected to VLAN 3. Which IP address should be assigned to this new host?

Explanation

The IP address 192.168.1.52 /28 should be assigned to the new host because it falls within the range of the subnet defined by the given network address and subnet mask. The /28 subnet mask indicates that the network can accommodate 16 IP addresses, ranging from 192.168.1.48 to 192.168.1.63. Therefore, 192.168.1.52 is a valid IP address within this range.

Submit
82. 18. Refer to the exhibit. An administrator documented the output of a CAM table from an Ethernet switch as shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit?

Explanation

Based on the information provided in the exhibit, the switch will forward the frame out all ports except port 3. This is because the MAC address 00-00-3D-1F-11-05 is associated with port 2 in the forwarding table, so the switch will forward the frame to all ports except for the one associated with that MAC address, which is port 3.

Submit
83. 22. Using the command copy tftp:backup.cfg startup-config, an administrator downloaded a saved configuration from a TFTP server to a switch. Why does the administrator not detect any changes in the switch configuration after the download completes?

Explanation

not-available-via-ai

Submit
84. 63. Refer to the exhibit. What happens when a frame from a source MAC address different from 00a8.d2e4.ba27 reaches switch port 0/5?

Explanation

When a frame with a source MAC address different from 00a8.d2e4.ba27 reaches switch port 0/5, the frame is dropped. This is because the switch uses the MAC address table to determine which port to forward the frame to based on the source MAC address. If the source MAC address is not found in the MAC address table, it means that the frame is coming from an unauthorized or unknown device, and the switch will drop the frame to prevent potential security risks.

Submit
85. 71. Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installation surveys showed strong signal strength from the AP locations to the client locations. Outside electrical interference has been eliminated. What will fix the problem?

Explanation

Changing the channel on AP-B to 6 or 11 will fix the problem of intermittent connectivity. This is because if AP-A and AP-B are on the same channel, they can cause interference with each other, leading to connectivity issues. By changing the channel on AP-B to 6 or 11, it will ensure that AP-A and AP-B are operating on different non-overlapping channels, reducing interference and improving connectivity.

Submit
86. 72. How does a switch that is configured for 802.1Q trunking handle untagged frames that are received on a trunk port?

Explanation

When a switch is configured for 802.1Q trunking, it can carry multiple VLANs over a single trunk link. If untagged frames are received on a trunk port, the switch will assign them to the native VLAN. The native VLAN is a default VLAN that is not tagged with a VLAN ID. So, any untagged frames received on the trunk port are assumed to belong to the native VLAN and are assigned to it.

Submit
87. 74. A wireless LAN access point will convert traffic between which two frame encapsulation types?

Explanation

A wireless LAN access point will convert traffic between 802.3 and 802.11 frame encapsulation types. 802.3 is the standard for Ethernet networks, while 802.11 is the standard for wireless LANs. The access point acts as a bridge between the wired Ethernet network and the wireless network, converting the frames from one encapsulation type to the other to allow communication between wired and wireless devices.

Submit
88. 86. What type of message do wireless clients transmit when they are searching for a specific wireless network?

Explanation

Wireless clients transmit probe messages when they are searching for a specific wireless network. Probe messages are used to discover nearby access points and request information about available networks. This allows the client to find and connect to the desired network. Beacon messages, on the other hand, are transmitted by access points to advertise their presence and provide information about the network. Associate messages are used by clients to request association with a specific access point, while authenticate messages are used to verify the identity of the client and establish a secure connection.

Submit
89. 39. Company policy requires disabling the command history buffer on network devices. An administrator enters terminal no history sizeat the command prompt on a Cisco Catalyst switch and receives no error messages back, but the command history buffer is still available. What is the problem?

Explanation

The command "terminal no history size" was entered by the administrator, but it only reset the default buffer size instead of disabling access to the buffer. This means that although the buffer size may have been changed, the command history buffer is still available for use.

Submit
90. 40. Refer to the exhibit. What does "LEARNING" mean as it relates to the Spanning Tree Protocol?

Explanation

The term "LEARNING" in the context of the Spanning Tree Protocol means that the switch is receiving Bridge Protocol Data Units (BPDUs) and using them to populate its MAC address table. However, it is not actively sending any data frames.

Submit
91. 43. Refer to the exhibit. Users complain that they do not have connectivity to the web server that is connected to SW1. What should be done to remedy the problem?

Explanation

To remedy the connectivity issue between the users and the web server connected to SW1, the VLAN 100 should be configured as the native VLAN for SW1. This is because the native VLAN is used for untagged traffic on a trunk link, and configuring VLAN 100 as the native VLAN will ensure that the traffic from the web server is correctly transmitted and received by the users.

Submit
92. 15. In which mode is a VTP switch operating if it does not allow for the creation of local VLANs but it does accept VLAN updates from other switches in the same domain?

Explanation

A VTP switch operating in client mode does not allow for the creation of local VLANs but it does accept VLAN updates from other switches in the same domain. In client mode, the switch receives VTP advertisements from the server and transparent switches in the domain, allowing it to synchronize its VLAN database with the rest of the network. However, it cannot create or modify VLANs locally.

Submit
93. 118. What will be the effect of the command S1# copy system:running-config tftp://172.16.2.155/tokyo-config?

Explanation

The command "copy system:running-config tftp://172.16.2.155/tokyo-config" is used to save the running configuration file on S1 to a TFTP server with the file name "tokyo-config". This means that the running configuration file will be transferred to the TFTP server and saved as "tokyo-config". It does not mention anything about overwriting the startup configuration file or the contents of NVRAM becoming the startup configuration file on the tokyo switch.

Submit
94. 41. Refer to the exhibit. All trunk links are operational and all VLANs are allowed on all trunk links. An ARP request is sent by computer 5. Which device or devices will receive this message?

Explanation

The ARP request sent by computer 5 will be received by computer 3 and RTR-A. This is because computer 3 and RTR-A are connected to the same VLAN as computer 5, and all devices within a VLAN can receive and process ARP requests.

Submit
95. 46. Which two operations can be performed from the boot loader command line of a Cisco Catalyst switch? (Choose two.)

Explanation

From the boot loader command line of a Cisco Catalyst switch, two operations that can be performed are reinstalling the IOS image and formatting the flash file system. Reinstalling the IOS image involves replacing the current operating system with a new one, which can be necessary in case of corruption or upgrading. Formatting the flash file system erases all files and directories stored in the flash memory, allowing for a clean slate or removing any unwanted files.

Submit
96. 106. Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and host B are on the default VLAN but are not able to exchange traffic. What should be done to fix the problem?

Explanation

To fix the problem of Host A and Host B not being able to exchange traffic, the same native VLAN should be configured on both ends of the trunk. The native VLAN is used for untagged traffic, and if the native VLAN is different on each end, the traffic will not be able to pass between the switches. By configuring the same native VLAN on both ends, the switches will be able to properly handle the untagged traffic and allow communication between the hosts.

Submit
97. 48. Refer to the exhibit. A network administrator enters the displayed commands to configure VLAN 30. What is the result of running these commands?

Explanation

The given commands "vlan 30" and "exit" are entered in the global configuration mode of the switch. These commands will add VLAN 30 to the VLAN database of S3, as it is entered in the VLAN database configuration mode. However, since the commands are not entered in the VLAN database configuration mode of S1, S2, and S4, VLAN 30 will not be added to their VLAN databases. Therefore, VLAN 30 will be added to the VLAN database of S3 but will not be propagated to S4, S2, or S1.

Submit
98. 30. Refer to the exhibit. Switch SWB is not responding to VTP updates from switch SWA. What is a possible cause of the problem?

Explanation

A possible cause of the problem could be that there is a password set on one of the switches. This can prevent VTP updates from being received by SWB, causing it to not respond to the updates from SWA.

Submit
99. 135. Which switch forwarding method should be used on a network that employs frame classification based on an assigned Quality of Service (QoS) value?

Explanation

Store-and-forward is the appropriate switch forwarding method for a network that uses frame classification based on a Quality of Service (QoS) value. This method involves the switch receiving the entire frame before forwarding it, allowing it to analyze and classify the frame based on its QoS value. This ensures that the switch can properly prioritize and handle the frame according to its assigned QoS value, ensuring efficient and effective network performance.

Submit
100. 12. What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?

Explanation

When the range of allowed VLANs is set to the default value, all VLANs are allowed across a trunk. This means that all VLAN traffic can pass through the trunk link, allowing communication between devices in different VLANs. The default range typically includes all VLANs except for VLAN 1 (the default VLAN) and VLANs 1002-1005 (reserved VLANs). Therefore, the correct answer is that all VLANs are allowed across the trunk.

Submit
101. 19. When port security is used on a switch, which violation mode will cause an SNMP trap to be sent and traffic to be dropped when the number of secure MAC addresses for a port is reached?

Explanation

When port security is used on a switch, the restrict violation mode will cause an SNMP trap to be sent and traffic to be dropped when the number of secure MAC addresses for a port is reached. This means that if an unauthorized device tries to connect to the port and the maximum number of secure MAC addresses has already been reached, an SNMP trap will be sent to notify the network administrator and the traffic from the unauthorized device will be dropped, preventing it from accessing the network.

Submit
102. 31. Which wireless topology supports roaming from one access point to another?

Explanation

ESS stands for Extended Service Set, which is a wireless topology that supports roaming from one access point to another. In an ESS, multiple access points are connected to create a large coverage area, allowing devices to seamlessly move between access points without losing connectivity. This is commonly used in large-scale wireless networks, such as in office buildings or campuses, where users need to move around while maintaining a stable connection.

Submit
103. 130. Refer to the exhibit. The commands are entered into switch SW1 as shown, and an 802.1q trunk is successfully established. How does switch SW1 handle the untagged traffic that is destined for the trunk?

Explanation

Switch SW1 will send all untagged traffic to VLAN 25. This is because when an 802.1q trunk is established, all untagged traffic is assigned to the native VLAN. In this case, the native VLAN is VLAN 25, so any untagged traffic that arrives on the trunk will be forwarded to VLAN 25.

Submit
104. 105. Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit. However, hosts B and D cannot ping each other. What is the most likely cause of this problem?

Explanation

Hosts B and D cannot ping each other because they are configured with IP addresses from different subnets. In order for hosts to communicate with each other, they must be on the same subnet. Since B and D are on different subnets, they are unable to establish a connection and exchange data.

Submit
105. 83. What are two characteristics of normal range VLANs? (Choose two.)

Explanation

Normal range VLANs are stored in the vlan.dat file, which is a file that stores the VLAN configuration information on a Cisco switch. Additionally, normal range VLANs are identified by a VLAN ID between 1 and 1005. These characteristics distinguish normal range VLANs from other types of VLANs.

Submit
106. 100. A network administrator issued the erase nvram: command on a switch. What will be the outcome of the command?

Explanation

The erase nvram: command on a switch will clear the contents of the startup configuration file. The startup configuration file is stored in the non-volatile RAM (NVRAM) and contains the configuration settings that are used when the switch is powered on or restarted. By issuing the erase nvram: command, the administrator is essentially deleting the startup configuration file, which will result in the switch using the default factory settings upon reboot. This command does not affect the MAC table or the VLAN database, which are stored in different locations.

Submit
107. 112. What are two benefits of the IEEE 802.11n standard over the IEEE 802.11G? (Choose two.)

Explanation

The IEEE 802.11n standard offers two benefits over the IEEE 802.11G. Firstly, it provides improved range, meaning that it can transmit data over a larger distance without losing signal strength. Secondly, it permits increased data rates, allowing for faster transmission speeds and more efficient data transfer.

Submit
108. 97. What operational change will occur if an 802.11b client associates with an access point that is currently supporting clients utilizing 802.11g?

Explanation

If an 802.11b client associates with an access point that is currently supporting clients utilizing 802.11g, the 802.11g clients will operate at reduced speeds. This is because the access point will need to support the slower 802.11b standard in order to accommodate the 802.11b client. As a result, the overall network performance will be impacted as the faster 802.11g clients will have to operate at the slower speeds of the 802.11b standard.

Submit
109. 33. Refer to the exhibit. Which two switch interfaces would be RSTP edge ports? (Choose two.)

Explanation

The correct answer is switch S3, Fa0/5 and switch S4, Fa0/2. These interfaces would be RSTP edge ports because they are connected to end devices, such as computers or printers, which do not participate in the spanning tree protocol. Edge ports are configured to immediately transition to the forwarding state without going through the listening and learning states, which helps to minimize network convergence time.

Submit
110. 136. Refer to the exhibit. The broadcast traffic from PC1 is consuming bandwidth on the interswitch trunks. What should be done to prevent this from happening?

Explanation

Enabling pruning for VLAN10 on the VTP server will prevent the broadcast traffic from PC1 from consuming bandwidth on the interswitch trunks. VLAN pruning allows switches to dynamically remove unnecessary broadcast traffic from trunks by only forwarding the traffic to the switches that have active ports in the VLAN. By enabling pruning for VLAN10, the switch will only forward the broadcast traffic to switches that have ports in VLAN10, reducing the overall bandwidth consumption on the interswitch trunks. Moving PC1 to a different port on SW2 or SW3, moving PC2 to a port on SW3, or associating PC1 as a member of a new VLAN would not directly address the issue of broadcast traffic consuming bandwidth on the interswitch trunks.

Submit
111. 76. Refer to the exhibit. The network consists of four hubs and a switch. The hosts connected to each hub are assigned addresses in the respective VLAN as shown. PC1 on VLAN 1 becomes infected with a virus and initiates a continuous IP broadcast. Which hubs will receive the broadcasts?

Explanation

not-available-via-ai

Submit
112. 1. Refer to the exhibit. After entering the commands in the exhibit, the administrator receives a "password required, but none set" message when attempting to connect to S1. What is the problem?

Explanation

The administrator receives a "password required, but none set" message when attempting to connect to S1 because S1 does not have a password configured for the vty lines.

Submit
113. 90. Why is priority configured in 4096 increments when using PVST+?

Explanation

The extended bridge ID, which includes the bridge priority and the MAC address, is used in PVST+. The bridge priority is a 4-bit value, meaning it can only have 16 possible values (0-15). Therefore, the priority needs to be configured in increments of 4096 to ensure that it can be divided equally into 32768, which is the maximum value for the bridge priority. This allows for efficient load balancing and redundancy in the network.

Submit
114. 36. A network administrator is planning the upgrade of an enterprise LAN to feature Layer 3 support for the application of data security policies, aggregated links, and redundant devices and links. Which switches in the hierarchical three-layer design model support these network requirements?

Explanation

In a hierarchical three-layer design model, distribution switches are responsible for connecting core switches to access switches. They provide features such as data security policies, aggregated links, and redundancy for devices and links. Core switches, on the other hand, are responsible for high-speed switching and routing between distribution switches. Access switches, as the name suggests, provide network access to end devices. Backbone switches, although not mentioned in the question, are typically used to connect different distribution switches together in a larger network. Therefore, the correct answer for this question is distribution switches.

Submit
115. 57. Refer to the exhibit. Hosts PC_A and PC_B send traffic simultaneously, and the frames from the transmitting stations collide. What is the last device to receive the collision?

Explanation

Switch SW1 is the last device to receive the collision. Switches are capable of detecting collisions and can help in reducing them by segmenting the network into separate collision domains. In this scenario, since the frames from PC_A and PC_B collide, SW1 will receive the collision and take appropriate action, such as sending a collision signal back to the transmitting stations and possibly initiating a retransmission.

Submit
116. 85. What benefit does 802.1x provide to a wireless network?

Explanation

802.1x provides the benefit of centralized user authentication to a wireless network. This means that instead of each individual device on the network having its own authentication process, the network can authenticate users in a centralized manner. This simplifies the authentication process, improves security, and allows for better control and management of user access to the network.

Submit
117. 16. Which three statements are correct concerning the default configuration of a new switch? (Choose three.) It is configured in VTP server mode.

Explanation

The default configuration of a new switch includes the following three statements:
1. It is configured in VTP server mode.
2. STP (Spanning Tree Protocol) is automatically enabled.
3. All switch ports are assigned to VLAN1.

Submit
118. 132. In a three-layer hierarchical network design, which distribution layer function delineates broadcast domains?

Explanation

In a three-layer hierarchical network design, the distribution layer function that delineates broadcast domains is routing between VLANs. This means that the distribution layer is responsible for routing traffic between different VLANs, which helps to separate and control broadcast traffic within each VLAN. By routing between VLANs, the distribution layer ensures that broadcast traffic is contained within its respective VLAN and does not affect other VLANs in the network. This helps to improve network performance and security by reducing unnecessary broadcast traffic.

Submit
119. 42. Refer to the exhibit. Router R1 is connected to a switch through a trunk. What two ways are indicative of how the router handles incoming VLAN traffic? (Choose two.)

Explanation

The first statement, "Incoming traffic that has a VLAN ID of 10 is processed by subinterface Fa0/0.1," indicates that the router is using subinterfaces to handle traffic from different VLANs. This means that the router is configured to separate traffic from different VLANs and process them separately.

The last statement, "Traffic inbound on this router is processed by different subinterfaces depending on the VLAN from which the traffic originated," further reinforces the idea that the router is using subinterfaces to handle VLAN traffic. It suggests that the router has multiple subinterfaces configured, each corresponding to a specific VLAN, and it processes traffic based on the VLAN from which it originated.

Submit
120. 120. Which combination of DTP modes set on adjacent switches will cause the link to become an access link instead of a trunk link?

Explanation

When both switches are set to dynamic auto mode, they will negotiate the link mode. In this case, since both switches are set to dynamic auto, they will both default to access mode. Therefore, the link will become an access link instead of a trunk link.

Submit
121. 69. What are two requirements for configuring inter-VLAN routing using the router-on-a-stick model? (Choose two.)

Explanation

To configure inter-VLAN routing using the router-on-a-stick model, two requirements must be met. Firstly, each subinterface should be configured with its own IP address, subnet mask, and unique VLAN assignment. This allows the router to communicate with different VLANs. Secondly, the physical interface of the router must be connected to a trunk link on the adjacent switch. A trunk link is necessary to carry traffic from multiple VLANs between the router and the switch. These two requirements enable the router to route traffic between different VLANs.

Submit
122. 37. The global configuration command ip default-gateway 172.16.100.1  is applied to a switch. What is the effect of this command?

Explanation

The global configuration command "ip default-gateway 172.16.100.1" allows the switch to be remotely managed from a host on another network. This command sets the default gateway for the switch, which is the IP address of the device that will be used as the next hop for any traffic that is not destined for the local network. By setting the default gateway to 172.16.100.1, the switch can forward management traffic to that IP address, allowing remote management from a host on another network.

Submit
123. 114. Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit data at the same time. How do the hosts respond on the network? (Choose two.)

Explanation

When Host 1 and Host 4 both transmit data at the same time, a collision occurs. After the collision, a jam signal is sent to indicate the collision. Once the jam signal ends, a backoff algorithm is invoked, which means that both hosts will wait for a random amount of time before attempting to retransmit their data. This random backoff period helps to prevent another collision from occurring. If a host has data to transmit after its backoff period, it will check if the line is idle before transmitting to avoid causing another collision. This helps to ensure that only one host transmits at a time, reducing the likelihood of collisions.

Submit
124. 79. What is the benefit of the auto-MDIX feature on a Cisco Catalyst switch?

Explanation

The auto-MDIX feature on a Cisco Catalyst switch allows the use of straight-through patch cables regardless of the connected device types. This means that the switch can automatically detect the type of cable being used (straight-through or crossover) and adjust the connection accordingly. This eliminates the need for manual cable swapping and simplifies the network setup process.

Submit
125. 49. Refer to the exhibit. A network administrator issues the show interfaces fastEthernet 0/8 switchport command to check the status of the port. What can be concluded from the output?

Explanation

The output of the "show interfaces fastEthernet 0/8 switchport" command indicates that Port Fa0/8 is configured in access mode and associated with VLAN 1. This means that the port is not configured as a trunk and is only allowing traffic from a single VLAN, which is VLAN 1.

Submit
126. 54. Why is it important that the network administrator consider the spanning-tree network diameter when choosing the root bridge?

Explanation

The network administrator needs to consider the spanning-tree network diameter when choosing the root bridge because BPDUs (Bridge Protocol Data Units) may be discarded due to expiring timers. BPDUs are used by switches to exchange information and establish the best path for traffic in a network. If the network diameter is too large, it may take longer for BPDUs to reach all switches, resulting in timers expiring and BPDUs being discarded. This can lead to instability and suboptimal network performance. Therefore, choosing a root bridge that minimizes the network diameter helps ensure efficient communication and stability in the network.

Submit
127. 134. Which service should be disabled on a Cisco switch or router to prevent packet sniffers from capturing information about the device?

Explanation

CDP (Cisco Discovery Protocol) should be disabled on a Cisco switch or router to prevent packet sniffers from capturing information about the device. CDP is a Cisco proprietary protocol that allows network devices to share information about themselves, including their IP addresses, platform, and capabilities. By disabling CDP, the device will not broadcast this information, making it harder for potential attackers to gather information about the network infrastructure.

Submit
128. 104. What identifier in the BPDU creates a unique BID for a switch?

Explanation

The MAC address is used as the identifier in the BPDU to create a unique BID (Bridge ID) for a switch. The BID is a combination of the bridge priority and the MAC address. Each switch in a network has a unique MAC address, which is used to differentiate it from other switches. By using the MAC address as the identifier, the BPDU ensures that each switch has a unique BID, allowing for proper communication and prevention of loops in the network.

Submit
129. 80. Refer to the exhibit. Which two settings show the default value of VTP configuration on a Cisco 2960 switch? (Choose two.)

Explanation

The default value of the VTP configuration on a Cisco 2960 switch includes the revision number and pruning mode. The revision number represents the version of the VTP database, and the default value is usually 0. Pruning mode, on the other hand, determines whether VTP pruning is enabled or disabled. By default, the pruning mode is disabled.

Submit
130. 73. While configuring a new switch, a network administrator configures the switch as an HTTP server. What benefits does this configuration provide?

Explanation

Configuring the switch as an HTTP server allows web-based configuration tools to be used with the switch. This means that the network administrator can access and configure the switch using a web browser, making it easier and more convenient to manage the switch's settings. This eliminates the need for specialized software or command-line interfaces, simplifying the configuration process and potentially reducing the learning curve for administrators.

Submit
131. 89. Which feature is uniquely found in an access layer switch within a hierarchical network model?

Explanation

Power over Ethernet (PoE) is a feature that is uniquely found in an access layer switch within a hierarchical network model. PoE allows the switch to provide power to connected devices, such as IP phones, wireless access points, and security cameras, through the Ethernet cables, eliminating the need for separate power cables. This feature simplifies the deployment and management of network devices, reduces costs, and makes it easier to provide power to devices in remote or hard-to-reach locations.

Submit
132. 6. Refer to the exhibit. Which three options correctly identify information that could be associated with this output?(Choose three.)

Explanation

The exhibit shows the output of a command that provides information about the configuration of interface FastEthernet3/0/0. The statement "Interface FastEthernet3/0/0 is subinterfaced" indicates that this interface has been divided into multiple logical interfaces. The statement "A non-proprietary trunking protocol is in use" suggests that a standard trunking protocol, such as IEEE 802.1Q, is being used for VLAN tagging. The statement "The configuration is appropriate for a router-on-a-stick network design" implies that the configuration is suitable for a network design where a single physical interface is used to connect to multiple VLANs.

Submit
133. 111. Refer to the exhibit. What does "FORWARDING" mean in the command output shown?

Explanation

The term "FORWARDING" in the command output indicates that the switch is actively sending and receiving data frames. This means that the switch is functioning properly and is actively forwarding network traffic between connected devices.

Submit
134. 144. What allows WLAN clients to learn which networks and access points are available in an area?

Explanation

Probes allow WLAN clients to learn which networks and access points are available in an area. Probes are small packets of data that WLAN clients send out to scan for available networks. These probes are broadcasted to all nearby access points, and in response, the access points send back beacons, which contain information about the network, including the SSID (Service Set Identifier). By receiving these probes and beacons, WLAN clients can determine the available networks and access points in their vicinity.

Submit
135. 145. What technique is a security attack that depletes the pool of IP addresses available for legitimate hosts?

Explanation

DHCP starvation is a security attack technique that depletes the pool of available IP addresses for legitimate hosts. This attack floods the DHCP server with a large number of bogus DHCP requests, causing it to exhaust its supply of IP addresses. As a result, legitimate hosts are unable to obtain an IP address and connect to the network. This can lead to network disruption and denial of service for legitimate users.

Submit
136. 88. Refer to the exhibit. The network administrator needs to remove the east-hosts VLAN and use the switch port from that VLAN in one of the existing VLANs. Which two sets of commands should be used when completely removing VLAN 2 from S1-Central while leaving the switch and all its interfaces operational? (Choose two.)

Explanation

To completely remove VLAN 2 from S1-Central while leaving the switch and all its interfaces operational, the first set of commands should be used to erase the flash and delete the VLAN database file. This ensures that all configuration related to VLAN 2 is removed. Then, the second set of commands should be used to enter the configuration mode, remove VLAN 2 from the switch's VLAN database, and reconfigure interface FastEthernet 0/1 to be a member of VLAN 3 instead of VLAN 2.

Submit
137. 146. Refer to the exhibit. All edge ports are configured with the spanning-tree portfast command. Host1 is recently connected to port Fa0/1 on switch SW1. Which statement is true about the status of port Fa0/1?

Explanation

When the "spanning-tree portfast" command is enabled on all edge ports, it allows for the immediate transition of the port into the forwarding state. This means that the port will bypass the blocking, listening, and learning states, and go straight into forwarding data. Therefore, the statement "The port will transition immediately into forwarding state" is true.

Submit
138. 45. Which statement correctly describes an IBSS?

Explanation

An IBSS (Independent Basic Service Set) is a type of wireless network where wireless stations communicate directly with each other, without the need for an access point. In an IBSS, each wireless station acts as a peer and can communicate with other stations within the network. This type of network is often referred to as an ad hoc network, as it can be set up quickly without the need for a centralized infrastructure. This is different from other options listed, where wireless stations communicate with a single access point, multiple access points with the same SSID, or multiple access points with different SSIDs.

Submit
139. 137. Refer to the exhibit. All switch interfaces are members of the same VLAN. What information is used by Switch1 to determine if incoming frames from the hosts should be forwarded to Router1?

Explanation

Switch1 uses the destination address field in the Ethernet header to determine if incoming frames from the hosts should be forwarded to Router1. The destination address in the Ethernet header contains the MAC address of the intended recipient. Switch1 compares this destination MAC address with its MAC address table to determine the outgoing interface for the frame. If the destination MAC address matches the MAC address of Router1, Switch1 will forward the frame to Router1.

Submit
140. 96. What does TKIP have in common with AES?

Explanation

Both TKIP and AES are encryption algorithms that are commonly used in wireless networks. They both operate at Layer 2 of the OSI model, which means they encrypt the data at the data link layer. This ensures that the data is protected during transmission over the wireless network.

Submit
141. 140. When an access point is placed near the outside wall of a building, which implementation design procedure should be used?

Explanation

When an access point is placed near the outside wall of a building, decreasing the power setting should be used as an implementation design procedure. This is because reducing the power setting will help to limit the coverage area of the access point, preventing the signal from extending too far beyond the building and potentially reaching unauthorized users outside. By decreasing the power setting, the access point's signal strength is reduced, ensuring that it is only accessible within the intended area and reducing the risk of unauthorized access.

Submit
142. 92. What happens when the crypto key zeroize rsa command is entered on a switch configured with thetransport input ssh command on the vty lines?

Explanation

When the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines, the switch will delete the existing RSA key pair. As a result, the switch will no longer be able to make SSH connections as an SSH client. However, the switch will allow remote connections again only after a new RSA key pair is generated.

Submit
143. 93. What three tasks should be performed before moving a Catalyst switch to another VTP management domain? (Choose three.)

Explanation

Before moving a Catalyst switch to another VTP management domain, three tasks should be performed. Firstly, the correct VTP mode and version should be selected to ensure compatibility with the new domain. Secondly, the switch should be configured with the name of the new management domain to properly identify it within the network. Lastly, it is important to verify that the switch has a lower configuration revision number than the other switches in the new domain to prevent any conflicts or inconsistencies in the network.

Submit
144. 101. Refer to the exhibit. The network administrator wants to allow both SSH and Telnet connections to Switch1. However, the SSH connections fail. What is the most likely cause of this problem?

Explanation

The most likely cause of the SSH connections failing is that the RSA key has been removed. The RSA key is used for secure communication between the client and the server in SSH connections. If the key is missing or has been removed, the SSH connections will fail.

Submit
145. 110. Which three statements are true regarding router-on-a-stick inter-VLAN routing? (Choose three.)

Explanation

Router-on-a-stick inter-VLAN routing requires the use of subinterfaces on the router because each subinterface represents a different VLAN. It is more cost-efficient and scalable than using multiple physical interfaces because it allows multiple VLANs to be routed over a single physical interface. However, it can impact performance if many VLANs compete for bandwidth on a single router interface because the available bandwidth is shared among the VLANs.

Submit
146. 122. Refer to the exhibit. This switch is to be added to the production network. Which two facts about VLANs and VTP operation can be confirmed by this output? (Choose two.)

Explanation

The first fact that can be confirmed is that VLANs can only be added to the VLAN database on this switch by a VTP advertisement. This means that the switch will not allow manual configuration of VLANs and will only accept VLAN information from VTP advertisements.

The second fact is that adding this switch to the network will cause no disruption in the VTP domain operations if the rest of the switches in the same VTP domain have a higher configuration revision number. This indicates that the switch will seamlessly integrate into the VTP domain as long as there are no conflicting configuration revisions.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 27, 2013
    Quiz Created by
    TRiXeR
Cancel
  • All
    All (146)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
62. Refer to the exhibit. A network administrator needs to add IP...
4. Refer to the exhibit. A network administrator has segmented the...
94. An administrator is troubleshooting a PC on the network which is...
8. Which parameter is used to uniquely identify one wireless network...
9. Which value determines if a switch becomes the central point of...
116. Which value determines if a switch becomes the central point of...
117. An administrator is troubleshooting a PC on the network which is...
127. Refer to the exhibit. A new switch, SW3, has been added to the...
24. Why is MAC address filtering considered a poor choice in securing...
131. Which type of traffic can still be received on a switch interface...
141. A network technician is attempting to configure 802.1q trunking...
66. Refer to the exhibit. Router RA receives a packet with a source...
113. Which parameter is used to uniquely identify one wireless network...
121. Refer to the exhibit. A network administrator needs to add IP...
126. Refer to the exhibit. What is the maximum number of VLANs that...
138. Refer to the exhibit. Switch SWB is not responding to VTP updates...
82. What information in an Ethernet frame is used by a Layer 2 switch...
103. Refer to the exhibit. What would happen if the network...
59. Which value determines if a switch becomes the central point of...
129. Why is MAC address filtering considered a poor choice in securing...
11. Refer to the exhibit. A network administrator needs to add IP...
133. Why is it advisable that a network administrator use SSH instead...
68. What is the purpose of the Spanning Tree algorithm?
5. Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt...
34. A network technician is attempting to configure 802.1q trunking on...
10. An administrator is troubleshooting a PC on the network which is...
53. Refer to the exhibit. What will allow a host on VLAN 40 on switch...
125. Refer to the exhibit. A network administrator has segmented the...
 ...
143. Refer to the exhibit. A technician is troubleshooting a trunk...
84. Refer to the exhibit. Switch SWB is not responding to VTP updates...
98. Which configuration changes will increment the configuration...
107. Refer to the exhibit. Hosts A and B, connected to hub HB1,...
28. What is the purpose of configuring a switch port as a trunk port?
29. Refer to the exhibit. Which statement is true about the status of...
139. Which IEEE trunking protocol is used to encapsulate data traffic...
142. Refer to the exhibit. Although they are directly connected,...
77. Using the command copy tftp:backup.cfg startup-config, an...
95. Refer to the exhibit. What does "LEARNING" mean as it relates to...
38. Which type of VLAN would accommodate untagged traffic on a 802.1q...
108. In which mode is a VTP switch operating if it has been configured...
50. What information in an Ethernet frame is used by a Layer 2 switch...
78. Refer to the exhibit. Each switch is configured to participate in...
2. Which CLI mode allows users to access all device commands, such as...
81. Why is it advisable that a network administrator use SSH instead...
102. Company policy requires disabling the command history buffer on...
51. Refer to the exhibit. What would happen if the network...
119. What is an efficient and cost effective way to minimize the...
20. Refer to the exhibit. What is the maximum number of VLANs that can...
124. Refer to the exhibit. Router R1 is properly configured for router...
26. Refer to the exhibit. What can be determined from the...
35. Refer to the exhibit. Switch SWA is not processing VTP...
14. What is the purpose of the Spanning Tree algorithm?
56. Which method establishes an administrative connection for...
60. Refer to the exhibit. The Layer 2 switching design that is shown...
75. Refer to the exhibit. A new switch, SW3, has been added to the...
109. Which method establishes an administrative connection for...
55. In which mode is a VTP switch operating if it has been configured...
123. Refer to the exhibit. What does the term DYNAMIC indicate in the...
32. Refer to the exhibit. What is the effect of setting the security...
64. Refer to the exhibit. What does the term DYNAMIC indicate in the...
87. A network administrator enters the enable command at the...
44. Refer to the exhibit. VLAN 20 was recently added on the network....
47. Refer to the exhibit. Router RA receives a packet with a source...
99. Refer to the exhibit. A network administrator has segmented the...
27. Which type of traffic can still be received on a switch interface...
70. Refer to the exhibit. A network administrator has segmented the...
91. Refer to the exhibit. A network administrator is configuring RT1...
7. Which method establishes an administrative connection for...
65. What is the purpose of the switch command switchport access vlan...
3. Refer to the exhibit. Which Spanning Tree Protocol version is in...
23. Refer to the exhibit. Each switch is configured to participate in...
61. A network administrator is asked to connect four switches that are...
115. Refer to the exhibit. The hosts connected to switch SW1 are not...
13. Refer to the exhibit. VTP pruning is enabled in the VTP domain...
 ...
52. Refer to the exhibit. R1 is configured for traditional inter-VLAN...
58. Refer to the exhibit. The hosts connected to switch SW1 are not...
21. Which configuration changes will increment the configuration...
128. What advantage does cut-through switching provide?
67. Refer to the exhibit. A new host needs to be connected to VLAN 3....
18. Refer to the exhibit. An administrator documented the output of a...
22. Using the command copy tftp:backup.cfg startup-config, an...
63. Refer to the exhibit. What happens when a frame from a source MAC...
71. Refer to the exhibit. Users A and B are reporting intermittent...
72. How does a switch that is configured for 802.1Q trunking handle...
74. A wireless LAN access point will convert traffic between which two...
86. What type of message do wireless clients transmit when they are...
39. Company policy requires disabling the command history buffer on...
40. Refer to the exhibit. What does "LEARNING" mean as it relates to...
43. Refer to the exhibit. Users complain that they do not have...
15. In which mode is a VTP switch operating if it does not allow for...
118. What will be the effect of the command S1# copy...
41. Refer to the exhibit. All trunk links are operational and all...
46. Which two operations can be performed from the boot loader command...
106. Refer to the exhibit. Both switches are interconnected via a...
48. Refer to the exhibit. A network administrator enters the displayed...
30. Refer to the exhibit. Switch SWB is not responding to VTP updates...
135. Which switch forwarding method should be used on a network that...
12. What VLANs are allowed across a trunk when the range of allowed...
19. When port security is used on a switch, which violation mode will...
31. Which wireless topology supports roaming from one access point to...
130. Refer to the exhibit. The commands are entered into switch SW1 as...
105. Refer to the exhibit. The devices in the network are operational...
83. What are two characteristics of normal range VLANs? (Choose two.)
100. A network administrator issued the erase nvram: command on a...
112. What are two benefits of the IEEE 802.11n standard over the IEEE...
97. What operational change will occur if an 802.11b client associates...
33. Refer to the exhibit. Which two switch interfaces would be RSTP...
136. Refer to the exhibit. The broadcast traffic from PC1 is consuming...
76. Refer to the exhibit. The network consists of four hubs and a...
1. Refer to the exhibit. After entering the commands in the exhibit,...
90. Why is priority configured in 4096 increments when using PVST+?
36. A network administrator is planning the upgrade of an enterprise...
57. Refer to the exhibit. Hosts PC_A and PC_B send traffic...
85. What benefit does 802.1x provide to a wireless network?
16. Which three statements are correct concerning the default...
132. In a three-layer hierarchical network design, which distribution...
42. Refer to the exhibit. Router R1 is connected to a switch through a...
120. Which combination of DTP modes set on adjacent switches will...
69. What are two requirements for configuring inter-VLAN routing using...
37. The global configuration command ip default-gateway...
114. Refer to the exhibit. All hosts are in listen mode. Host 1 and...
79. What is the benefit of the auto-MDIX feature on a Cisco Catalyst...
49. Refer to the exhibit. A network administrator issues the show...
54. Why is it important that the network administrator consider the...
134. Which service should be disabled on a Cisco switch or router to...
104. What identifier in the BPDU creates a unique BID for a switch?
80. Refer to the exhibit. Which two settings show the default value of...
73. While configuring a new switch, a network administrator configures...
89. Which feature is uniquely found in an access layer switch within a...
6. Refer to the exhibit. Which three options correctly identify...
111. Refer to the exhibit. What does "FORWARDING" mean in the command...
144. What allows WLAN clients to learn which networks and access...
145. What technique is a security attack that depletes the pool of IP...
88. Refer to the exhibit. The network administrator needs to remove...
146. Refer to the exhibit. All edge ports are configured with the...
45. Which statement correctly describes an IBSS?
137. Refer to the exhibit. All switch interfaces are members of the...
96. What does TKIP have in common with AES?
140. When an access point is placed near the outside wall of a...
92. What happens when the crypto key zeroize rsa command is entered on...
93. What three tasks should be performed before moving a Catalyst...
101. Refer to the exhibit. The network administrator wants to allow...
110. Which three statements are true regarding router-on-a-stick...
122. Refer to the exhibit. This switch is to be added to the...
Alert!

Advertisement