Your studies on the Exploration curriculum under the overarching Cisco Certified Network Associate have led you to this moment – it’s your final exam! Are you fully prepared to walk out with a certification that you’ll carry with you throughout your career? Take the quiz and we’ll see!
• QoS
• routing
• trunking
• VPN
Rate this question:
• Cat-A
• Cat-B
• Cat-C
• Cat-D
Rate this question:
• switch A
• switch B
• switch C
• switch D
• switch E
• switch F
Rate this question:
• only hosts A and B
• only hosts A, B, and C
• only hosts A, B, C, and D
• only hosts A, B, C, and E
Rate this question:
• Configure VLANs with different VLAN IDs on switch SW2
• Reconfigure the trunk port on switch SW2 with static trunk configuration
Introduce a Layer 3 device or a switch with Layer 3 capability in the topology
• Apply IP addresses that are in the same subnet to the interfaces used to connect SW1 and SW2.
Rate this question:
• Switch port Fa0/1 is not trunking.
• Router interface Fa0/0 is possibly down.
• No routing protocol is configured on Router1.
• One of the router subinterfaces is possibly down.
Rate this question:
• All VLANs will be allowed across the trunk.
• Only VLAN 1 will be allowed across the trunk
• Only the native VLAN will be allowed across the trunk.
• The switches will negotiate via VTP which VLANs to allow across the trunk
Rate this question:
• 192.168.1.11 /28
• 192.168.1.22 /28
• 192.168.1.33 /28
• 192.168.1.44 /28
• 192.168.1.55 /28
Rate this question:
• client
• root
• server
• transparent
Rate this question:
• S1 port Fa0/11 is in the wrong VLAN.
• R1 does not have an active routing protocol.
• The IP address of computer 1 is in the wrong logical network
• Router interface Fa0/0 has the wrong trunk encapsulation type configured.
Rate this question:
• computer B
• computer B and Router1
• computer C and Router1
• computer B, computer D, computer E and Router1
• computer B, computer C, computer D, computer E and Router1
• computer A, computer B, computer C, computer D, computer E and Router1
Rate this question:
• Associate with the access point and then open a HyperTerminal session with the access point.
• Physically connect to the access point and then reboot the computer to launch the configuration software
• From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.
• Modify the TCP/IP properties of the computer connected to the access point so that it exists on the same network, and then reboot your computer to establish a connection
Rate this question:
• Allow all VLANs on the trunk link.
• Remove the native VLAN from the trunk.
• Include a router or switch with Layer 3 capabilities.
• Configure the same native VLAN on both ends of the trunk.
Rate this question:
• forward the frame out all interfaces except Interface3
• add station 00-00-3D-1F-11-05 to Interface2 in the forwarding table
• forward the frame out Interface3
• discard the frame
• forward the frame out all interfaces
• forward the frame out Interface2
Rate this question:
• VLAN 10 and VLAN 20
• VLAN 1, VLAN 10, and VLAN 20
• VLAN 1, VLAN 1002 through 1005
• VLAN 1, VLAN 10, VLAN 20, VLAN 1002 through 1005
Rate this question:
• All the VLANs were pruned from the trunk port between SW1 and SW2
• SW1 and SW2 cannot be both set as VTP servers in the same VTP domain.
• VTP configuration revision number of SW2 was higher than the configuration revision number of SW1.
• The additional VLANs from SW2 created more VLANs than the VLAN database of SW1 could contain.
Rate this question:
• 802.1Q encapsulation prepends a 4-byte tag field in front of the original Ethernet frame and recomputes the frame check sequence (FCS) on the modified frame.
• 802.1Q encapsulation inserts a 4-byte tag field into the original Ethernet frame between the source address and type/length fields and recomputes the frame check sequence (FCS) on the modified frame.
• 802.1Q encapsulation prepends an 802.1p field in front of the original Ethernet frame and recomputes the frame check sequence (FCS) on the modified frame.
• 802.1Q encapsulation inserts an 802.1p field into the original Ethernet frame between the source address and type/length fields and recomputes the frame check sequence (FCS) on the modified frame.
Rate this question:
• A new RSA key pair is created.
• The switch defaults to allowing Telnet connections only
• The switch is no longer able to make SSH connections as an SSH client
• The switch allows remote connections only after a new RSA key pair is generated
Rate this question:
• The switch is sending and receiving data frames.
• The switch is receiving BPDUs, but not sending data frames
• The switch is participating in an election process by forwarding the BPDUs it receives
• The switch is receiving BPDUs and populating the MAC address table, but not sending data.
Rate this question:
• The network diameter limitation is 9.
• BPDUs may be discarded because of expiring timers.
• The cabling distance between the switches is 100 meters
• The network diameter must be set to the number of meters of the cable between the root bridge and its farthest connected switch.
Rate this question:
• A syslog message will be logged.
• Fa0/24 will become error-disabled
• The incoming frames will be dropped.
• The security violation count will be incremented
Rate this question:
• After the end of the jam signal, a backoff algorithm is invoked.
• Hosts 1 and 4 are operating full duplex so no collision will exist.
• The hub will block the port connected to Host 4 to prevent a collision.
• Hosts 1 and 4 are assigned shorter backoff values to provide them priority to access the media.
• If a host has data to transmit after the backoff period of that host, the host checks to determine if the line is idle before transmitting.
Rate this question:
• The service password-encryption command is entered at the privileged EXEC mode prompt
• The service password-encryption command encrypts only passwords for the console and VTY ports.
• The service password-encryption command encrypts all previously unencrypted passwords in the running configuration.
• To see the passwords encrypted by the service password-encryption command, enter the no service password-encryption command
Rate this question:
• Incoming traffic with VLAN ID 0 is processed by interface fa0/0.
• Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.
• Both subinterfaces remain up with line protocol up, even if fa0/0 line protocol is down
• Subinterfaces use unique MAC addresses by adding the 802.1Q VLAN ID to the hardware address
• Traffic inbound on this router is processed by different subinterfaces, depending on the VLAN from which the traffic originated.
Rate this question:
• requires less equipment
• provides improved range
• permits increased data rates
• has a single-input and a single-output
• needs no hardware upgrade for compatibility
Rate this question:
• It eliminates Layer 2 loops in network topologies.
• It eliminates the need for redundant physical paths in network topologies
• It can only be used in networks in which Layer 2 switching is in use.
• It can only be used in networks where both routers and switches are used together
• It can only be used in networks where routers are installed.
Rate this question:
• The SSH version number is wrong.
• SSH has been configured on the wrong line
• Telnet and SSH cannot be configured simultaneously.
• The transport input command is configured incorrectly.
Rate this question:
• Disable VTP pruning on SW2.
• Configure SW2 in VTP transparent mode.
• Configure SW2 with the VTP domain password.
• Configure SW2 as a VTP server with a higher revision number.
Rate this question:
• AS1 and AS2
• DS1 and DS2
• Gateway and CS1
• Gateway, CS1, DS1, and DS2
Rate this question:
• Only one VLAN is currently configured to use the trunk links
• The switch negotiated trunk links for interfaces Fa0/1 and Gi0/1
• A Cisco proprietary protocol is in use for interfaces Fa0/1 and Gi0/1.
• Interfaces Gi0/1 and Fa0/1 are allowed to carry data from multiple VLANs
Rate this question:
• SW1 port F0/1 transitions to the learning state
• SW1 port F0/1 can generate a temporary loop
• SW1 port F0/1 becomes a non-designated port
• SW1 port F0/2 no longer passes BPDUs to SW4
Rate this question:
• hub HB1
• switch SW1
• router R1
• switch SW2
• router R2
• switch SW4
Rate this question:
• disable port security
• make the port operational
• override the default port behavior
• force the port to be a part of a single vlan
Rate this question:
• S1-Central# reload
• S1-Central# erase flash:
• S1-Central(config)# no vlan 2
• S1-Central# delete flash:vlan.dat
• S1-Central(config-if)# switchport access vlan 3
Rate this question:
• S1 Gi0/1 becomes a root port.
• S2 Gi0/2 becomes a non-designated port
• S3 Gi0/1 becomes a non-designated port
• S4 Gi0/1 becomes a root port
• S4 Gi0/2 becomes a designated port.
Rate this question:
Refer to the exhibit. Which two facts can be confirmed by this output? (Choose two.) • This switch shows no configuration revision errors. • This switch has established two-way communication with the neighboring devices. • This switch is configured to advertise its VLAN configuration to other VTP-enabled switches in the same VTP domain. • This switch will drop all VTP advertisements that come from the switches that are configured in the same VTP domain. • This switch will cause no disruption in the VTP domain operations if the rest of the switches in the same VTP domain have a higher configuration revision number
• This switch has established two-way communication with the neighboring devices
• This switch is configured to advertise its VLAN configuration to other VTP-enabled switches in the same VTP domain.
• This switch will drop all VTP advertisements that come from the switches that are configured in the same VTP domain.
• This switch will cause no disruption in the VTP domain operations if the rest of the switches in the same VTP domain have a higher configuration revision number
Rate this question:
• reduced contention for bandwidth
• reduced size of the physical layout
• increased fault tolerance of the network
• elimination of the need for wiring closets
• elimination of the need for layer three functionality
• simplification of management and troubleshooting
Rate this question:
• Select the correct VTP mode and version
• Configure the switch with the name of the new management domain
• Download the VTP database from the VTP server in the new domain.
• Configure the VTP server in the new domain to recognize the BID of the switch.
• Reset the VTP counters to allow the switch to synchronize with the other switches in the new domain.
• Verify that the switch has a lower configuration revision number than the other switches in the new domain.
Rate this question:
A) Switch(config)# interface vlan 1 Switch(config-if)# ip address 10.1.1.250 255.255.255.0 Switch(config-if)# no shutdown Switch(config-if)# ip default-gateway 10.1.10.254
B)Switch(config)# interface vlan 1 Switch(config-if)# ip address 10.1.50.250 255.255.255.0 Switch(config-if)# no shutdown Switch(config-if)# ip default-gateway 10.1.50.254
C)Switch(config)# interface vlan 10 Switch(config-if)# ip address 10.1.10.250 255.255.255.0 Switch(config-if)# no shutdown Switch(config-if)# ip default-gateway 10.1.10.254
E)Switch(config)# interface vlan 50 Switch(config-if)# ip address 10.1.10.250 255.255.255.0 Switch(config-if)# no shutdown Switch(config-if)# ip default-gateway 10.1.10.254
E)Switch(config)# interface vlan 50 Switch(config-if)# ip address 10.1.10.250 255.255.255.0 Switch(config-if)# no shutdown Switch(config-if)# ip default-gateway 10.1.10.254
Rate this question:
• SW1 drops the traffic because it is untagged.
• SW1 leaves the traffic untagged and forwards it over the trunk.
• SW1 tags the traffic with the lowest VLAN ID value and forwards it over the trunk link.
• SW1 encapsulates the traffic with 802.1Q encapsulation and forwards it over the trunk link.
Rate this question:
• The switch will not allow any other device to connect to port Fa0/15.
• Traffic destined for MAC address 0000.c123.5432 will be forwarded to Fa0/15.
• This entry will be removed and refreshed every 300 seconds to keep it in the table.
• The switch learned this MAC address from the source address in a frame received on Fa0/15.
• When processing a frame, the switch does not have to perform a lookup to determine the final destination port.
Rate this question:
• The trunk is established, but no VLANs have been configured to use it.
• The trunk has not been established because the router does not support dynamic trunking protocol.
• The router, the switch, or both must be configured with the dynamic desirable option for dynamic trunking protocol to establish a trunk.
• The router is missing the dynamic trunking protocol statements necessary to form a trunk
Rate this question:
• Interface FastEthernet3/0/0 is subinterfaced.
• A non-proprietary trunking protocol is in use.
• The configuration is appropriate for a router-on-a-stick network design.
• A shutdown command has been applied to interface FastEthernet3/0/0.
• Interface FastEthernet3/0/0.3 is mapped to the default management VLAN.
• An IP address should be applied to FastEthernet3/0/0 for correct data routing
Rate this question:
• Spanning Tree Protocol is disabled
• Enable password is configured as cisco.
• All switch ports are assigned to VLAN1.
• The flash directory contains the IOS image.
• VLAN1 is configured with a management IP address.
• All interfaces are set to auto-negotiation of speed and duplex.
Rate this question:
AID
SSID
BSSID
ESSID
Rate this question:
• requires the use of subinterfaces on the router
• requires an access link between the router and Layer 2 switch
• more cost-efficient and scalable than using multiple physical interfaces
• requires each subinterface to be configured with the no shutdown command
• can impact performance if many VLANs compete for bandwidth on a single router interface
• makes troubleshooting the inter-VLAN routing configuration much less complex than when using multiple physical interfaces
Rate this question:
• Power cycle the switch to clear all dynamically learned addresses
• The clear switching-tables command will remove statically configured entries
• The clear mac-address-table command will remove statically and dynamically configured table entries.
• The erase flash command will clear all statically configured table entries
• Statically configured MAC addresses will automatically be removed from the address table 300 minutes after the last activity on a switch port
Rate this question:
• The switch ports are on different VLANs
• The switch IP address is on the wrong subnet
• The hosts are configured on different logical networks
• A router is required to forward traffic between Host1 and Host2.
• The VLAN port assignments must be contiguous for each VLAN.
• The host default gateway addresses must be on the same logical network
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.