CCNA Exploration 3 - Final Exam

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Kapper59
K
Kapper59
Community Contributor
Quizzes Created: 7 | Total Attempts: 2,294
| Attempts: 457 | Questions: 52
Please wait...
Question 1 / 52
0 %
0/100
Score 0/100
1. Which parameter is used to uniquely identify one wireless network from another?

Explanation

The parameter used to uniquely identify one wireless network from another is the SSID (Service Set Identifier). The SSID is a case-sensitive alphanumeric string that is assigned to a wireless network and is broadcasted by the access point. Devices connecting to the network must have the same SSID configured in order to establish a connection. The SSID helps distinguish between different networks in the vicinity and allows devices to connect to the desired network.

Submit
Please wait...
About This Quiz
CCNA Exploration 3 - Final Exam - Quiz

Your studies on the Exploration curriculum under the overarching Cisco Certified Network Associate have led you to this moment – it’s your final exam! Are you fully prepared... see moreto walk out with a certification that you’ll carry with you throughout your career? Take the quiz and we’ll see! see less

2.
Refer to the exhibit. What will allow a host on VLAN 40 on switch X to communicate with a host in VLAN 40 on switch Y?

Explanation

Trunking is the correct answer because it allows multiple VLANs to be carried over a single physical link between switches. By configuring trunking between switch X and switch Y, the hosts in VLAN 40 on both switches can communicate with each other. Trunking tags the traffic with VLAN information, allowing the switches to distinguish between different VLANs and forward the traffic accordingly.

Submit
3.
Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology? 
 

Explanation

In spanning tree protocol, the root bridge is elected based on the lowest bridge ID. The bridge ID is a combination of the bridge priority and the bridge MAC address. In this case, Cat-C has the lowest bridge priority (priority=0) among all the switches, so it will be elected as the root bridge of the spanning tree topology.

Submit
4.
Refer to the exhibit. Each switch is shown with its MAC address. Which switch will be elected as the spanning-tree root bridge if the switches are configured with their default priority values?

Explanation

Switch F will be elected as the spanning-tree root bridge because it has the lowest MAC address among all the switches. In the spanning-tree algorithm, the switch with the lowest bridge ID (which is determined by the MAC address) becomes the root bridge.

Submit
5.
Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal? 

 

Explanation

Hosts A, B, and C will receive the collision jamming signal. This is because all three hosts are connected to the same hub (HB1), and when a collision occurs, the hub sends a jamming signal to all connected hosts to indicate the collision. Hosts D and E are not connected to the same hub, so they will not receive the collision jamming signal.

Submit
6.
Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. What should be done to fix the problem?

Explanation

To fix the problem of hosts not being able to communicate between switches SW1 and SW2, the trunk port on switch SW2 needs to be reconfigured with a static trunk configuration. This will ensure that the VLANs on SW1 and SW2 can pass traffic between each other. By configuring the trunk port, the switches will be able to exchange VLAN information and allow communication between the hosts in the same VLANs.

Submit
7.
Refer to the exhibit. A network administrator has segmented the network into two VLANs and configured Router1 for inter-VLAN routing. A test of the network, however, shows that hosts on each VLAN can only access local resources and not resources on the other VLAN. What is the most likely cause of this problem?

Explanation

The most likely cause of the problem is that switch port Fa0/1 is not trunking. Trunking is necessary for allowing multiple VLANs to communicate with each other. If the switch port is not configured as a trunk port, it will only allow traffic from one VLAN, preventing hosts on each VLAN from accessing resources on the other VLAN. Therefore, this is the most likely cause of the issue.

Submit
8. What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?

Explanation

When the range of allowed VLANs is set to the default value, all VLANs will be allowed across the trunk. This means that traffic from all VLANs will be able to pass through the trunk link between the switches.

Submit
9.
Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP addresses should be assigned to this new host? 
 

Explanation

The new host should be assigned the IP address 192.168.1.22 with a subnet mask of /28. This is because the given IP address falls within the range of the subnet 192.168.1.16/28, which includes addresses from 192.168.1.17 to 192.168.1.30. Therefore, 192.168.1.22 is a valid IP address within this subnet.

Submit
10. In which mode is a VTP switch operating if it has been configured to only forward VTP advertisements?

Explanation

A VTP switch that has been configured to only forward VTP advertisements is operating in transparent mode. In this mode, the switch will forward VTP advertisements to other switches but will not synchronize or update its own VLAN database based on those advertisements. This allows the switch to act as a relay for VTP information without participating in the VTP domain itself.

Submit
11.
Refer to the exhibit. R1 is configured for traditional inter-VLAN routing. R1 can ping computer 3 but cannot ping computer 1. What is a possible cause for this failure? 

Explanation

The possible cause for R1 being able to ping computer 3 but not computer 1 is that S1 port Fa0/11 is in the wrong VLAN. This means that computer 1 is not in the same VLAN as R1, causing the communication failure.

Submit
12.
Refer to the exhibit. Computer A sends a broadcast message. Which devices will see the broadcast? 
 
 
 

Explanation

Computer A sends a broadcast message, which means it is sending the message to all devices on the network. However, since computer A is the one sending the message, it will not receive the broadcast. Therefore, the devices that will see the broadcast are computer C and Router1.

Submit
13. Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point

Explanation

To establish an administrative connection for configuring the Linksys WRT300N wireless access point, the correct method is to enter the default IP address of the access point in a web browser from a computer in the same IP subnet as the access point. This allows the user to access the configuration interface of the access point and make the necessary changes. This method does not require any physical connection or rebooting of the computer, making it a convenient and efficient way to configure the access point.

Submit
14.
Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and host B are on the default VLAN but are not able to exchange traffic. What should be done to fix the problem? 

Explanation

To fix the problem of Host A and Host B not being able to exchange traffic, the same native VLAN should be configured on both ends of the trunk. The native VLAN is the VLAN that is not tagged on the trunk link. By configuring the same native VLAN on both switches, the traffic from Host A and Host B will be able to pass through the trunk link without any issues. This ensures that the frames are not dropped or discarded due to mismatched VLAN configurations.

Submit
15.
Refer to the exhibit. An Ethernet switch has developed the CAM table shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit? 

 

Explanation

When the switch receives the frame shown at the bottom of the exhibit, it will forward the frame out all interfaces except Interface3. This is because the CAM table shows that the MAC address 00-00-3D-1F-11-05 is associated with Interface2, so the switch will forward the frame to all other interfaces except Interface3.

Submit
16.
Refer to the exhibit. The switches in the exhibit have VTP pruning enabled. Which VLANs will be pruned from switch SW3? 

Explanation

Switch SW3 will prune VLAN 10 and VLAN 20. This is because VTP pruning is enabled on the switches, which allows the switches to dynamically prune VLANs that are not active on the trunk links. Since VLAN 10 and VLAN 20 are not active on any of the trunk links connected to SW3, they will be pruned to optimize bandwidth usage.

Submit
17.
Refer to the exhibit. Switch SW2 was tested in a lab environment and then inserted into a production network without reloading its configuration. After the trunk link between SW1 and SW2 was brought up, all users lost connectivity to the network. What could be the source of the problem?

Explanation

The source of the problem is that the VTP configuration revision number of SW2 was higher than the configuration revision number of SW1. VTP (VLAN Trunking Protocol) is used to manage VLAN configurations across a network. When a switch with a higher configuration revision number is added to a network, it will overwrite the VLAN database of switches with lower revision numbers. In this case, SW2 had a higher revision number than SW1, causing it to overwrite SW1's VLAN database and resulting in the loss of connectivity for all users.

Submit
18.

Refer to the exhibit. On the basis of the configuration shown, how will an Ethernet frame on port GigabitEthernet0/1 be modified?

Explanation

The correct answer is that 802.1Q encapsulation inserts a 4-byte tag field into the original Ethernet frame between the source address and type/length fields and recomputes the frame check sequence (FCS) on the modified frame. This means that when an Ethernet frame is received on port GigabitEthernet0/1, it will have a 4-byte tag field added to it, which will be placed between the source address and type/length fields. Additionally, the frame check sequence (FCS) will be recomputed on the modified frame.

Submit
19. What happens when the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines?

Explanation

When the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines, the switch allows remote connections only after a new RSA key pair is generated. This means that the previous RSA key pair is deleted and a new one is created, which is necessary for establishing secure SSH connections. The switch will no longer be able to make SSH connections as an SSH client until a new RSA key pair is generated.

Submit
20.
Refer to the exhibit. What does "FORWARDING" mean in the command output shown?

Explanation

The term "FORWARDING" in the command output means that the switch is actively sending and receiving data frames. This indicates that the switch is functioning properly and is actively forwarding network traffic.

Submit
21. Why is it important that the network administrator consider the spanning-tree network diameter when choosing the root bridge?

Explanation

The network administrator should consider the spanning-tree network diameter when choosing the root bridge because if the network diameter is too large, the BPDUs (Bridge Protocol Data Units) may take a longer time to reach their destination switches. This delay can cause the timers on the switches to expire, leading to the BPDUs being discarded. Therefore, by selecting a root bridge that minimizes the network diameter, the administrator can ensure that the BPDUs reach their destination switches in a timely manner, preventing any potential discarding of BPDUs due to expiring timers.

Submit
22.

Refer to the exhibit. What will happen when frames that contain an unknown source address reach interface fa0/24? 


Explanation

When frames that contain an unknown source address reach interface fa0/24, the incoming frames will be dropped. This is because the switch does not have the source address in its MAC address table, indicating that it is an unknown device. To prevent potential security risks, the switch will discard these frames to maintain network security and prevent unauthorized access.

Submit
23.
Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit data at the same time. How do the hosts respond on the network? (Choose two.) 
 
 
 

Explanation

After the end of the jam signal, a backoff algorithm is invoked, which means that both Host 1 and Host 4 will wait for a random amount of time before attempting to transmit again. This helps to avoid another collision. Additionally, if a host has data to transmit after the backoff period, it will check to determine if the line is idle before transmitting. This ensures that the host does not interfere with any ongoing transmissions and reduces the chances of collision.

Submit
24. Which statement regarding the service password-encryption command is ?

 

Explanation

The service password-encryption command encrypts all previously unencrypted passwords in the running configuration. This means that any passwords that were previously stored in clear text format will be encrypted after enabling this command. It does not only encrypt passwords for the console and VTY ports, but rather it encrypts all passwords in the running configuration. To view the passwords encrypted by this command, one would need to enter the "no service password-encryption" command.

Submit
25.
Refer to the exhibit. Which two statements are about the operation of the interfaces? (Choose two.) 

Explanation

The first statement is about the operation of the interfaces because it states that incoming traffic with VLAN ID 0 is processed by interface fa0/0. The second statement is also about the operation of the interfaces because it states that incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.

Submit
26. What are two benefits of the IEEE 802.11n standard over the IEEE 802.11G? (Choose two.) 

 

Explanation

The IEEE 802.11n standard provides improved range compared to IEEE 802.11G, allowing for better coverage and connectivity over longer distances. It also permits increased data rates, meaning faster and more efficient transmission of data.

Submit
27. Which two statements describe Spanning Tree Protocol? (Choose two.)

Explanation

Spanning Tree Protocol (STP) is a network protocol that prevents loops in Layer 2 network topologies. By using STP, redundant physical paths can be created without causing loops, ensuring network reliability and fault tolerance. However, STP is specifically designed for networks that utilize Layer 2 switching. It is not limited to networks that use both routers and switches together, nor is it limited to networks with routers only.

Submit
28.
Refer to the exhibit. The network administrator enters the configuration shown to allow both SSH and Telnet connections to the switch. The Telnet connections fail. What is the most likely cause of this problem?

Explanation

The most likely cause of the Telnet connections failing is that the transport input command is configured incorrectly. The transport input command is used to specify which protocols are allowed for incoming connections. If it is configured incorrectly, it may not be allowing Telnet connections to the switch.

Submit
29.
Refer to the exhibit. Switch SW2 has been newly purchased and added to the network. What configuration should be applied to SW2 so that it participates in the same VTP domain as switch SW1, receives VLAN information from SW1, and synchronizes VLAN information?

Explanation

To ensure that SW2 participates in the same VTP domain as SW1, receives VLAN information, and synchronizes VLAN information, it needs to be configured with the VTP domain password. This password will allow SW2 to authenticate and join the VTP domain established by SW1, ensuring that they both have access to the same VLAN information and can synchronize any changes made to the VLAN database.

Submit
30.
Refer to the exhibit. A network administrator needs to implement inter-VLAN routing on a hierarchical network. On which devices should the inter-VLAN routing be configured?
• AS1 and AS2
• DS1 and DS2
• Gateway and CS1
• Gateway, CS1, DS1, and DS2

Explanation

Inter-VLAN routing allows communication between different VLANs in a network. In this scenario, the inter-VLAN routing should be configured on the Gateway and CS1 devices. The Gateway device serves as the central point for routing traffic between VLANs, while CS1 acts as a Layer 3 switch that can perform inter-VLAN routing. Configuring inter-VLAN routing on these devices will enable communication between VLANs in the hierarchical network.

Submit
31.
Refer to the exhibit. Which statement is  regarding the information shown?

Explanation

The exhibit shows that interfaces Gi0/1 and Fa0/1 are allowed to carry data from multiple VLANs. This means that these interfaces are configured to allow traffic from multiple VLANs to pass through them, rather than being restricted to a single VLAN.

Submit
32.

Refer to the exhibit. What is the consequence if SW1 port F0/1 is configured as an edge port?

Explanation

If SW1 port F0/1 is configured as an edge port, it can generate a temporary loop. This means that if a switch or bridge is connected to this port, it may cause a loop in the network. This can lead to network instability and traffic congestion. It is important to configure edge ports properly to avoid such issues.

Submit
33.
Refer to the exhibit. Hosts PC_A and PC_B send traffic simultaneously, and the frames from the transmitting stations collide. What is the last device to receive the collision? 

Explanation

Switch SW1 is the last device to receive the collision. Switches are responsible for creating separate collision domains, which means that collisions are contained within a single port or interface on the switch. In this scenario, both PC_A and PC_B are connected to switch SW1, so if a collision occurs between them, it will be detected by SW1. The other devices listed (hub HB1, router R1, switch SW2, router R2, and switch SW4) do not have a direct connection to both PC_A and PC_B, so they will not receive the collision.

Submit
34. What is the purpose of issuing the command switchport mode access on a switch interface?

Explanation

The command "switchport mode access" is used to force the switch port to be a part of a single VLAN. By default, switch ports are in dynamic auto mode, which means they can negotiate with connected devices to determine the appropriate VLAN. However, by issuing the "switchport mode access" command, the port is forced to operate in access mode, meaning it will only belong to a specific VLAN and will not negotiate with connected devices. This is useful when you want to restrict the port to a specific VLAN and prevent unauthorized devices from connecting to other VLANs.

Submit
35.
Refer to the exhibit. The network administrator needs to remove the east-hosts VLAN and use the switch port from that VLAN in one of the existing VLANs. What two commands should be used when completely removing VLAN 2 from S1-Central while leaving the switch and all its interfaces operational? (Choose two)

Explanation

To completely remove VLAN 2 from S1-Central while leaving the switch and all its interfaces operational, the network administrator should use the following two commands:
1. S1-Central(config)# no vlan 2: This command removes VLAN 2 from the switch's configuration.
2. S1-Central(config-if)# switchport access vlan 3: This command changes the access VLAN for the switchport to VLAN 3. This effectively replaces the previous VLAN 2 with VLAN 3 on that switchport.

Submit
36.

Refer to the exhibit. Spanning-tree port priorities are 128 for all interfaces. The network administrator enters the spanning-tree vlan 1 root primary command on S4. Which two port results are correct? (Choose two.)

Explanation

The correct answer is S1 Gi0/1 becomes a root port because when the "spanning-tree vlan 1 root primary" command is entered on S4, it sets the priority of S4 to the lowest value (0) and becomes the root bridge for VLAN 1. As a result, S1 Gi0/1, which has the lowest cost to reach the root bridge, becomes the root port.

S4 Gi0/2 becomes a designated port because it has the lowest cost to reach the root bridge after S1 Gi0/1 becomes the root port. Therefore, it becomes the designated port for that particular segment.

Submit
37.

Refer to the exhibit. Which two facts can be confirmed by this output? (Choose two.) 

Explanation

The output from the switch confirms that it is configured to advertise its VLAN configuration to other VTP-enabled switches in the same VTP domain. This means that the switch will share its VLAN information with other switches in the network. Additionally, the output also indicates that if the other switches in the same VTP domain have a higher configuration revision number, this switch will not cause any disruption in the VTP domain operations. This suggests that the switch will not overwrite the VLAN configuration of other switches with lower revision numbers.

Submit
38. What are three benefits of a hierarchical network model? (Choose three.) 

Explanation

The hierarchical network model provides three main benefits. Firstly, it reduces contention for bandwidth by dividing the network into different layers, allowing for more efficient data flow. Secondly, it increases fault tolerance of the network by providing redundancy at different layers, ensuring that if one layer fails, the network can still function. Lastly, it simplifies management and troubleshooting by organizing the network into distinct layers, making it easier to identify and resolve issues.

Submit
39. What three tasks should be performed before moving a Catalyst switch to another VTP management domain? (Choose three.)
.

 
 
 

Explanation

Before moving a Catalyst switch to another VTP management domain, three tasks should be performed. Firstly, the correct VTP mode and version should be selected to ensure compatibility with the new domain. Secondly, the switch should be configured with the name of the new management domain to establish the correct identity. Lastly, it is important to verify that the switch has a lower configuration revision number than the other switches in the new domain to prevent any conflicts or issues during synchronization.

Submit
40.
Refer to the exhibit. The network administrator needs to setup Switch1 for remote access from HostA. Theshow ip interface brief is issued on Router1 and the show interfaces trunk command is issued on theSwitch1 to verify the current status. The administrator applies the additional configuration shown in theexhibit to Switch1. However, the telnet from HostA fails. What additional commands need to be appliedto the switch?

Explanation

The correct answer is e)Switch(config)# interface vlan 50
Switch(config-if)# ip address 10.1.10.250 255.255.255.0
Switch(config-if)# no shutdown
Switch(config-if)# ip default-gateway 10.1.10.254.

In this scenario, the network administrator needs to set up remote access from HostA to Switch1. The additional commands provided in option e configure the VLAN 50 interface on Switch1 with the IP address 10.1.10.250 and subnet mask 255.255.255.0. The "no shutdown" command ensures that the interface is enabled. The "ip default-gateway" command sets the default gateway for the switch to 10.1.10.254. These commands are necessary for HostA to establish a connection with Switch1 via telnet.

Submit
41.
Refer to the exhibit. How does SW1 manage traffic coming from Host A?

Explanation

SW1 manages traffic coming from Host A by leaving it untagged and forwarding it over the trunk. This means that the traffic from Host A will not have any VLAN tags attached to it and will be transmitted as is over the trunk link.

Submit
42.
Refer to the exhibit. What does STATIC indicate in the output that is shown? 
 
 

Explanation

The term "STATIC" in the output indicates that the switch has manually configured a specific forwarding entry for the MAC address 0000.c123.5432. This means that any traffic destined for that MAC address will be forwarded to port Fa0/15, regardless of any other factors such as source address or destination port lookup. The entry will remain in the table until it is manually removed or refreshed every 300 seconds.

Submit
43.
Refer to the exhibit. After the listed commands are entered into router R1 and switch S1, the administrator enters the show interface fa0/1 trunk and gets the results shown. What is the likely problem? 

Explanation

The likely problem is that the trunk has not been established because the router does not support dynamic trunking protocol. This can be inferred from the fact that the show interface fa0/1 trunk command did not display any trunking information, indicating that the trunk has not been established.

Submit
44.
Refer to the exhibit. Which three options correctly identify information that could be associated with this output?(Choose three.) 
 

 
 

Explanation

The exhibit shows the output of a command on a network device. From the output, we can determine that interface FastEthernet3/0/0 is subinterfaced because it is associated with a VLAN (Virtual Local Area Network) identifier. Additionally, we can identify that a non-proprietary trunking protocol is in use because the output mentions Dot1Q, which is an open standard trunking protocol. Finally, we can conclude that the configuration is appropriate for a router-on-a-stick network design because the output displays VLAN mappings for subinterfaces.

Submit
45. Which three statements are correct concerning the default configuration of a new switch? (Choose three.)

 
 
 

Explanation

The default configuration of a new switch includes the following correct statements: All switch ports are assigned to VLAN1, meaning that all ports belong to the default VLAN. The flash directory contains the IOS image, which is the operating system of the switch. All interfaces are set to auto-negotiation of speed and duplex, allowing them to automatically determine the optimal settings for communication.

Submit
46. Which identifier is used to keep track of frames that are destined for a particular wireless client?

Explanation

The BSSID (Basic Service Set Identifier) is used to keep track of frames that are destined for a particular wireless client. It is a unique identifier assigned to each wireless access point or router in a wireless network. The BSSID allows the wireless client to identify and connect to the specific access point or router it wants to communicate with.

Submit
47.  Which three statements are  regarding router-on-a-stick inter-VLAN routing? (Choose three.) 

Explanation

Router-on-a-stick inter-VLAN routing requires the use of subinterfaces on the router, as it allows a single physical interface to be divided into multiple logical interfaces for each VLAN. It is more cost-efficient and scalable than using multiple physical interfaces because it eliminates the need for additional hardware. However, it can impact performance if many VLANs compete for bandwidth on a single router interface, as the available bandwidth is shared among all the VLANs.

Submit
48.  What two methods can be used to remove MAC address table entries from a switch? (Choose two)

Explanation

Power cycling the switch will clear all dynamically learned MAC addresses from the address table. The clear mac-address-table command can be used to remove both statically and dynamically configured MAC addresses from the table.

Submit
49.
Refer to the exhibit. What three statements describe why Host1 and Host2 are unable to communicate? (Choose three.)
.
.

 

Explanation

The three statements that describe why Host1 and Host2 are unable to communicate are:
1. The switch ports are on different VLANs, which means they are in separate broadcast domains and cannot directly communicate with each other.
2. The hosts are configured on different logical networks, indicating that they have different IP address ranges and cannot reach each other without the help of a router.
3. A router is required to forward traffic between Host1 and Host2 because they are on different networks and need a device to route the traffic between them.

Submit
50. Refer to the exhibit. The switches are configured for VTP as shown. Which two statements correctly describe the operation of these switches? (Choose two.)

 

Explanation

Switch1 is configured as a VTP server, while Switch2 and Switch4 are configured as VTP clients. This means that any new VLAN added to Switch1 will be propagated to Switch2 and Switch4. Additionally, any existing VLAN deleted from Switch4 will also be deleted from Switch1 and Switch2. This is because VTP clients synchronize their VLAN database with the VTP server, ensuring consistency across the switches.

Submit
51.
Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.35 and a destination address of 192.168.1.85. What will the router do with this packet?

Explanation

The router will ignore the packet because the source and destination are on the same broadcast domain. This means that the packet does not need to be forwarded to another network, as both the source and destination addresses are within the same network. Therefore, the router does not need to take any action and can ignore the packet.

Submit
52.


Refer to the exhibit. Which two statements are regarding what the cost value of 23 represents for Switch4? (Choose two.) 
 


.

Explanation

The first statement is correct because a cost of 23 represents the lowest cost path for Switch4 to the root switch. The second statement is also correct because Switch4 adds the cost of a Fast Ethernet link to 23 to determine its total cost to reach the root switch.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 28, 2010
    Quiz Created by
    Kapper59
Cancel
  • All
    All (52)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which parameter is used to uniquely identify one wireless network from...
Refer to the exhibit. What will allow a host on VLAN 40 on switch X to...
Refer to the exhibit. Which switch will be elected as the root bridge...
Refer to the exhibit. Each switch is shown with its MAC address. Which...
Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to...
Refer to the exhibit. The hosts connected to switch SW1 are not able...
Refer to the exhibit. A network administrator has segmented the...
What VLANs are allowed across a trunk when the range of allowed VLANs...
Refer to the exhibit. A new host needs to be connected to VLAN 1....
In which mode is a VTP switch operating if it has been configured to...
Refer to the exhibit. R1 is configured for traditional inter-VLAN...
Refer to the exhibit. Computer A sends a broadcast message. Which...
Which method establishes an administrative connection for configuring...
Refer to the exhibit. Both switches are interconnected via a trunk...
Refer to the exhibit. An Ethernet switch has developed the CAM table...
Refer to the exhibit. The switches in the exhibit have VTP pruning...
Refer to the exhibit. Switch SW2 was tested in a lab environment and...
Refer to the exhibit. On the basis of the configuration shown, how...
What happens when the crypto key zeroize rsa command is entered on a...
Refer to the exhibit. What does "FORWARDING" mean in the command...
Why is it important that the network administrator consider the...
Refer to the exhibit. What will happen when frames that contain an...
Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4...
Which statement regarding the service password-encryption command is ?...
Refer to the exhibit. Which two statements are about the operation of...
What are two benefits of the IEEE 802.11n standard over the IEEE...
Which two statements describe Spanning Tree Protocol? (Choose two.)
Refer to the exhibit. The network administrator enters the...
Refer to the exhibit. Switch SW2 has been newly purchased and added to...
Refer to the exhibit. A network administrator needs to implement...
Refer to the exhibit. Which statement is  regarding the...
Refer to the exhibit. What is the consequence if SW1 port F0/1 is...
Refer to the exhibit. Hosts PC_A and PC_B send traffic simultaneously,...
What is the purpose of issuing the command switchport mode access on a...
Refer to the exhibit. The network administrator needs to remove the...
Refer to the exhibit. Spanning-tree port priorities are 128 for all...
Refer to the exhibit. Which two facts can be confirmed by this output?...
What are three benefits of a hierarchical network model? (Choose...
What three tasks should be performed before moving a Catalyst switch...
Refer to the exhibit. The network administrator needs to setup Switch1...
Refer to the exhibit. How does SW1 manage traffic coming from Host A?
Refer to the exhibit. What does STATIC indicate in the output that is...
Refer to the exhibit. After the listed commands are entered into...
Refer to the exhibit. Which three options correctly identify...
Which three statements are correct concerning the default...
Which identifier is used to keep track of frames that are destined for...
 Which three statements are  regarding router-on-a-stick...
 What two methods can be used to remove MAC address table entries...
Refer to the exhibit. What three statements describe why Host1 and...
Refer to the exhibit. The switches are configured for VTP as shown....
Refer to the exhibit. Router RA receives a packet with a source...
Refer to the exhibit. Which two statements are regarding what the cost...
Alert!

Advertisement