CCNA 3 Mod 2

21 Questions | Total Attempts: 122

SettingsSettingsSettings
Chapters Of CCNA Quizzes & Trivia

CCNA 3 Mod 2CCNA 3 Mod 2


Questions and Answers
  • 1. 
    When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respond after the backoff period has expired?
    • A. 

      The hosts return to a listen-before-transmit mode.

    • B. 

      The hosts creating the collision have priority to send data.

    • C. 

      The hosts creating the collision retransmit the last 16 frames.

    • D. 

      The hosts extend their delay period to allow for rapid transmission.

  • 2. 
    Refer to the exhibit. The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link?
    • A. 

      No collisions will occur on this link.

    • B. 

      Only one of the devices can transmit at a time.

    • C. 

      The switch will have priority for transmitting data.

    • D. 

      The devices will default back to half duplex if excessive collisions occur.

  • 3. 
    Refer to the exhibit. What action does SW1 take on a frame sent from PC_A to PC_C if the MAC address table of SW1 is empty?
    • A. 

      SW1 drops the frame.

    • B. 

      SW1 floods the frame on all ports on SW1, except port Fa0/1.

    • C. 

      SW1 floods the frame on all ports on the switch, except Fa0/23 and Fa0/1.

    • D. 

      SW1 uses the CDP protocol to synchronize the MAC tables on both switches and then forwards the frame to all ports on SW2.

  • 4. 
    When a switch receives a frame and the source MAC address is not found in the switching table, what action will be taken by the switch to process the incoming frame?
    • A. 

      The switch will request that the sending node resend the frame.

    • B. 

      The switch will issue an ARP request to confirm that the source exists.

    • C. 

      The switch will map the source MAC address to the port on which it was received.

    • D. 

      The switch ends an acknowledgement frame to the source MAC of this incoming frame.

  • 5. 
    Refer to the exhibit. The switch and the hub have default configurations, and the switch has built its CAM table. Which of the hosts will capture a copy of the frame when workstation A sends a unicast packet to workstation C?
    • A. 

      Workstation C

    • B. 

      Workstations B and C

    • C. 

      Workstations A, B, C, and the interfaces of the router

    • D. 

      Workstations B, C, D, E, F, and interfaces of the router

  • 6. 
    Refer to the exhibit. How many collision domains are depicted in the network?
    • A. 

      1

    • B. 

      2

    • C. 

      4

    • D. 

      6

    • E. 

      7

  • 7. 
    Which two statements about Layer 2 Ethernet switches are true? (Choose two.)
    • A. 

      Layer 2 switches prevent broadcasts.

    • B. 

      Layer 2 switches have multiple collision domains.

    • C. 

      Layer 2 switches route traffic between different networks.

    • D. 

      Layer 2 switches decrease the number of broadcast domains.

    • E. 

      Layer 2 switches can send traffic based on the destination MAC address.

  • 8. 
    Which command line interface (CLI) mode allows users to configure switch parameters, such as the hostname and password?
    • A. 

      User EXEC mode

    • B. 

      Privileged EXEC mode

    • C. 

      Global configuration mode

    • D. 

      Interface configuration mode

  • 9. 
    A network administrator uses the CLI to enter a command that requires several parameters. The switch responds with “% Incomplete command”. The administrator cannot remember the missing parameters. What can the administrator do to get the parameter information? append ?
    • A. 

      To the last parameter

    • B. 

      Append a space and then ? to the last parameter

    • C. 

      Use Ctrl-P to show a parameter list.

    • D. 

      Use the Tab key to show which options are available

  • 10. 
    Where is the startup configuration stored?
    • A. 

      DRAM

    • B. 

      NVRAM

    • C. 

      ROM

    • D. 

      Startup-config.text

  • 11. 
    If a network administrator enters these commands in global configuration mode on a switch, what will be the result?
    • A. 

      Switch1(config-line)# line console 0

    • B. 

      Switch1(config-line)# password cisco

    • C. 

      Switch1(config-line)# login

  • 12. 
    To secure the console port with the password “cisco” to deny access to the console port by specifying 0 lines are available to gain access to line configuration mode by supplying the required password to configure the privilege exec password that will be used for remote access problem?
    • A. 

      Incorrect vty lines configured

    • B. 

      Incompatible Secure Shell version

    • C. 

      Incorrect default gateway address

    • D. 

      Vty lines that are configured to allow only Telnet

  • 13. 
    Which two statements are true about EXEC mode passwords? (Choose two.)
    • A. 

      The enable secret password command stores the configured password in plain text.

    • B. 

      The enable secret password command provides better security than the enable password.

    • C. 

      The enable password and enable secret password protect access to privileged EXEC mode.

    • D. 

      The service password-encryption command is required to encrypt the enable secret password. Best practices require both the enable password and enable secret password to be configured and used simultaneously.

  • 14. 
    Refer to the exhibit. The exhibit shows partial output of the show running-config command. The enable password on this switch is “cisco.” What can be determined from the output shown?
    • A. 

      The enable password is encrypted by default.

    • B. 

      An MD5 hashing algorithm was used on all encrypted passwords.

    • C. 

      Any configured line mode passwords will be encrypted in this configuration.

    • D. 

      This line represents most secure privileged EXEC mode password possible.

  • 15. 
    Which statement is true about the command banner login “Authorized personnel Only” issued on a switch?
    • A. 

      The command is entered in privileged EXEC mode.

    • B. 

      The command will cause the message Authorized personnel Only to display before a user logs in.

    • C. 

      The command will generate the error message % Ambiguous command: “banner motd” ” to be displayed.

    • D. 

      The command will cause the message End with the character “%” to be displayed after the command is entered into the switch.

  • 16. 
    What are two ways to make a switch less vulnerable to attacks like MAC address flooding, CDP attacks, and Telnet attacks? (Choose two.)
    • A. 

      Enable CDP on the switch.

    • B. 

      Change passwords regularly.

    • C. 

      Turn off unnecessary services.

    • D. 

      Enable the HTTP server on the switch.

    • E. 

      Use the enable password rather than the enable secret password.

  • 17. 
    Which two statements are true regarding switch port security? (Choose two.)
    • A. 

      The three configurable violation modes all log violations via SNMP.

    • B. 

      Dynamically learned secure MAC addresses are lost when the switch reboots.

    • C. 

      The three configurable violation modes all require user intervention to re-enable ports.

    • D. 

      After entering the sticky parameter, only MAC addresses subsequently learned are converted to secure MAC addresses.

    • E. 

      If fewer than the maximum number of MAC addresses for a port are configured statically, dynamically learned addresses are added to CAM until the maximum number is reached.

  • 18. 
    Refer to the exhibit. What happens when Host 1 attempts to send data?
    • A. 

      Frames from Host 1 cause the interface to shut down.

    • B. 

      Frames from Host 1 are dropped and no log message is sent.

    • C. 

      Frames from Host 1 create a MAC address entry in the running-config.

    • D. 

      Frames from Host 1 will remove all MAC address entries in the address table.

  • 19. 
    What happens when the transport input ssh command is entered on the switch vty lines?
    • A. 

      The SSH client on the switch is enabled.

    • B. 

      Communication between the switch and remote users is encrypted.

    • C. 

      A username/password combination is no longer needed to establish a secure remote connection to the switch.

    • D. 

      The switch requires remote connections via proprietary client software.

  • 20. 
    Refer to the exhibit. A user on PC1 experiences a delay when accessing applications on the server. What two statements about latency are true? (Choose two.)
    • A. 

      Each hop in the path adds delay to the overall latency.

    • B. 

      Placing the bits on the wire at PC1 is propagation delay.

    • C. 

      Total latency depends solely on the number of devices in the path.

    • D. 

      The NIC delay at points A and F contributes to the overall latency.

    • E. 

      The time it takes for an electrical signal to transit the segment from point C to point D is the cause for the propagation delay.

  • 21. 
    Refer to the exhibit. Which hosts will receive a broadcast frame sent from Host A?
    • A. 

      Hosts A and B

    • B. 

      Hosts D and E

    • C. 

      Hosts A, B, and C

    • D. 

      Hosts A, B, C, D, and E

    • E. 

      Hosts A, B, C, D, E, and F

Related Topics