CCNA Exploration 3 - Final Exam

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Kapper59
K
Kapper59
Community Contributor
Quizzes Created: 7 | Total Attempts: 2,230
Questions: 52 | Attempts: 452

SettingsSettingsSettings
CCNA Exploration 3 - Final Exam - Quiz

Your studies on the Exploration curriculum under the overarching Cisco Certified Network Associate have led you to this moment – it’s your final exam! Are you fully prepared to walk out with a certification that you’ll carry with you throughout your career? Take the quiz and we’ll see!


Questions and Answers
  • 1. 

    Refer to the exhibit. The network administrator needs to setup Switch1 for remote access from HostA. Theshow ip interface brief is issued on Router1 and the show interfaces trunk command is issued on theSwitch1 to verify the current status. The administrator applies the additional configuration shown in theexhibit to Switch1. However, the telnet from HostA fails. What additional commands need to be appliedto the switch?

    • A.

      A) Switch(config)# interface vlan 1 Switch(config-if)# ip address 10.1.1.250 255.255.255.0 Switch(config-if)# no shutdown Switch(config-if)# ip default-gateway 10.1.10.254

    • B.

      B)Switch(config)# interface vlan 1 Switch(config-if)# ip address 10.1.50.250 255.255.255.0 Switch(config-if)# no shutdown Switch(config-if)# ip default-gateway 10.1.50.254

    • C.

      C)Switch(config)# interface vlan 10 Switch(config-if)# ip address 10.1.10.250 255.255.255.0 Switch(config-if)# no shutdown Switch(config-if)# ip default-gateway 10.1.10.254

    • D.

      E)Switch(config)# interface vlan 50 Switch(config-if)# ip address 10.1.10.250 255.255.255.0 Switch(config-if)# no shutdown Switch(config-if)# ip default-gateway 10.1.10.254

    • E.

      E)Switch(config)# interface vlan 50 Switch(config-if)# ip address 10.1.10.250 255.255.255.0 Switch(config-if)# no shutdown Switch(config-if)# ip default-gateway 10.1.10.254

    Correct Answer
    D. E)Switch(config)# interface vlan 50 Switch(config-if)# ip address 10.1.10.250 255.255.255.0 Switch(config-if)# no shutdown Switch(config-if)# ip default-gateway 10.1.10.254
    Explanation
    The correct answer is e)Switch(config)# interface vlan 50
    Switch(config-if)# ip address 10.1.10.250 255.255.255.0
    Switch(config-if)# no shutdown
    Switch(config-if)# ip default-gateway 10.1.10.254.

    In this scenario, the network administrator needs to set up remote access from HostA to Switch1. The additional commands provided in option e configure the VLAN 50 interface on Switch1 with the IP address 10.1.10.250 and subnet mask 255.255.255.0. The "no shutdown" command ensures that the interface is enabled. The "ip default-gateway" command sets the default gateway for the switch to 10.1.10.254. These commands are necessary for HostA to establish a connection with Switch1 via telnet.

    Rate this question:

  • 2. 

    Refer to the exhibit. On the basis of the configuration shown, how will an Ethernet frame on port GigabitEthernet0/1 be modified?

    • A.

      • 802.1Q encapsulation prepends a 4-byte tag field in front of the original Ethernet frame and recomputes the frame check sequence (FCS) on the modified frame.

    • B.

      • 802.1Q encapsulation inserts a 4-byte tag field into the original Ethernet frame between the source address and type/length fields and recomputes the frame check sequence (FCS) on the modified frame.

    • C.

      • 802.1Q encapsulation prepends an 802.1p field in front of the original Ethernet frame and recomputes the frame check sequence (FCS) on the modified frame.

    • D.

      • 802.1Q encapsulation inserts an 802.1p field into the original Ethernet frame between the source address and type/length fields and recomputes the frame check sequence (FCS) on the modified frame.

    Correct Answer
    B. • 802.1Q encapsulation inserts a 4-byte tag field into the original Ethernet frame between the source address and type/length fields and recomputes the frame check sequence (FCS) on the modified frame.
    Explanation
    The correct answer is that 802.1Q encapsulation inserts a 4-byte tag field into the original Ethernet frame between the source address and type/length fields and recomputes the frame check sequence (FCS) on the modified frame. This means that when an Ethernet frame is received on port GigabitEthernet0/1, it will have a 4-byte tag field added to it, which will be placed between the source address and type/length fields. Additionally, the frame check sequence (FCS) will be recomputed on the modified frame.

    Rate this question:

  • 3. 

    What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?

    • A.

      • All VLANs will be allowed across the trunk.

    • B.

      • Only VLAN 1 will be allowed across the trunk

    • C.

      • Only the native VLAN will be allowed across the trunk.

    • D.

      • The switches will negotiate via VTP which VLANs to allow across the trunk

    Correct Answer
    A. • All VLANs will be allowed across the trunk.
    Explanation
    When the range of allowed VLANs is set to the default value, all VLANs will be allowed across the trunk. This means that traffic from all VLANs will be able to pass through the trunk link between the switches.

    Rate this question:

  • 4. 

    Which parameter is used to uniquely identify one wireless network from another?

    • A.

      • SSID

    • B.

      • OFDM

    • C.

      • WEP

    • D.

      DSSS

    Correct Answer
    A. • SSID
    Explanation
    The parameter used to uniquely identify one wireless network from another is the SSID (Service Set Identifier). The SSID is a case-sensitive alphanumeric string that is assigned to a wireless network and is broadcasted by the access point. Devices connecting to the network must have the same SSID configured in order to establish a connection. The SSID helps distinguish between different networks in the vicinity and allows devices to connect to the desired network.

    Rate this question:

  • 5. 

    Refer to the exhibit. What is the consequence if SW1 port F0/1 is configured as an edge port?

    • A.

      • SW1 port F0/1 transitions to the learning state

    • B.

      • SW1 port F0/1 can generate a temporary loop

    • C.

      • SW1 port F0/1 becomes a non-designated port

    • D.

      • SW1 port F0/2 no longer passes BPDUs to SW4

    Correct Answer
    B. • SW1 port F0/1 can generate a temporary loop
    Explanation
    If SW1 port F0/1 is configured as an edge port, it can generate a temporary loop. This means that if a switch or bridge is connected to this port, it may cause a loop in the network. This can lead to network instability and traffic congestion. It is important to configure edge ports properly to avoid such issues.

    Rate this question:

  • 6. 

    Refer to the exhibit. What will allow a host on VLAN 40 on switch X to communicate with a host in VLAN 40 on switch Y?

    • A.

      • QoS

    • B.

      • routing

    • C.

      • trunking

    • D.

      • VPN

    Correct Answer
    C. • trunking
    Explanation
    Trunking is the correct answer because it allows multiple VLANs to be carried over a single physical link between switches. By configuring trunking between switch X and switch Y, the hosts in VLAN 40 on both switches can communicate with each other. Trunking tags the traffic with VLAN information, allowing the switches to distinguish between different VLANs and forward the traffic accordingly.

    Rate this question:

  • 7. 

    Refer to the exhibit. Spanning-tree port priorities are 128 for all interfaces. The network administrator enters the spanning-tree vlan 1 root primary command on S4. Which two port results are correct? (Choose two.)

    • A.

      • S1 Gi0/1 becomes a root port.

    • B.

      • S2 Gi0/2 becomes a non-designated port

    • C.

      • S3 Gi0/1 becomes a non-designated port

    • D.

      • S4 Gi0/1 becomes a root port

    • E.

      • S4 Gi0/2 becomes a designated port.

    Correct Answer(s)
    A. • S1 Gi0/1 becomes a root port.
    E. • S4 Gi0/2 becomes a designated port.
    Explanation
    The correct answer is S1 Gi0/1 becomes a root port because when the "spanning-tree vlan 1 root primary" command is entered on S4, it sets the priority of S4 to the lowest value (0) and becomes the root bridge for VLAN 1. As a result, S1 Gi0/1, which has the lowest cost to reach the root bridge, becomes the root port.

    S4 Gi0/2 becomes a designated port because it has the lowest cost to reach the root bridge after S1 Gi0/1 becomes the root port. Therefore, it becomes the designated port for that particular segment.

    Rate this question:

  • 8. 

    Refer to the exhibit. Which two facts can be confirmed by this output? (Choose two.) 

    • A.

      Refer to the exhibit. Which two facts can be confirmed by this output? (Choose two.) • This switch shows no configuration revision errors. • This switch has established two-way communication with the neighboring devices. • This switch is configured to advertise its VLAN configuration to other VTP-enabled switches in the same VTP domain. • This switch will drop all VTP advertisements that come from the switches that are configured in the same VTP domain. • This switch will cause no disruption in the VTP domain operations if the rest of the switches in the same VTP domain have a higher configuration revision number

    • B.

      • This switch has established two-way communication with the neighboring devices

    • C.

      • This switch is configured to advertise its VLAN configuration to other VTP-enabled switches in the same VTP domain.

    • D.

      • This switch will drop all VTP advertisements that come from the switches that are configured in the same VTP domain.

    • E.

      • This switch will cause no disruption in the VTP domain operations if the rest of the switches in the same VTP domain have a higher configuration revision number

    Correct Answer(s)
    C. • This switch is configured to advertise its VLAN configuration to other VTP-enabled switches in the same VTP domain.
    E. • This switch will cause no disruption in the VTP domain operations if the rest of the switches in the same VTP domain have a higher configuration revision number
    Explanation
    The output from the switch confirms that it is configured to advertise its VLAN configuration to other VTP-enabled switches in the same VTP domain. This means that the switch will share its VLAN information with other switches in the network. Additionally, the output also indicates that if the other switches in the same VTP domain have a higher configuration revision number, this switch will not cause any disruption in the VTP domain operations. This suggests that the switch will not overwrite the VLAN configuration of other switches with lower revision numbers.

    Rate this question:

  • 9. 

    Refer to the exhibit. R1 is configured for traditional inter-VLAN routing. R1 can ping computer 3 but cannot ping computer 1. What is a possible cause for this failure? 

    • A.

      • S1 port Fa0/11 is in the wrong VLAN.

    • B.

      • R1 does not have an active routing protocol.

    • C.

      • The IP address of computer 1 is in the wrong logical network

    • D.

      • Router interface Fa0/0 has the wrong trunk encapsulation type configured.

    Correct Answer
    A. • S1 port Fa0/11 is in the wrong VLAN.
    Explanation
    The possible cause for R1 being able to ping computer 3 but not computer 1 is that S1 port Fa0/11 is in the wrong VLAN. This means that computer 1 is not in the same VLAN as R1, causing the communication failure.

    Rate this question:

  • 10. 

    Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and host B are on the default VLAN but are not able to exchange traffic. What should be done to fix the problem? 

    • A.

      • Allow all VLANs on the trunk link.

    • B.

      • Remove the native VLAN from the trunk.

    • C.

      • Include a router or switch with Layer 3 capabilities.

    • D.

      • Configure the same native VLAN on both ends of the trunk.

    Correct Answer
    D. • Configure the same native VLAN on both ends of the trunk.
    Explanation
    To fix the problem of Host A and Host B not being able to exchange traffic, the same native VLAN should be configured on both ends of the trunk. The native VLAN is the VLAN that is not tagged on the trunk link. By configuring the same native VLAN on both switches, the traffic from Host A and Host B will be able to pass through the trunk link without any issues. This ensures that the frames are not dropped or discarded due to mismatched VLAN configurations.

    Rate this question:

  • 11. 

    Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. What should be done to fix the problem?

    • A.

      • Configure VLANs with different VLAN IDs on switch SW2

    • B.

      • Reconfigure the trunk port on switch SW2 with static trunk configuration

    • C.

      Introduce a Layer 3 device or a switch with Layer 3 capability in the topology

    • D.

      • Apply IP addresses that are in the same subnet to the interfaces used to connect SW1 and SW2.

    Correct Answer
    B. • Reconfigure the trunk port on switch SW2 with static trunk configuration
    Explanation
    To fix the problem of hosts not being able to communicate between switches SW1 and SW2, the trunk port on switch SW2 needs to be reconfigured with a static trunk configuration. This will ensure that the VLANs on SW1 and SW2 can pass traffic between each other. By configuring the trunk port, the switches will be able to exchange VLAN information and allow communication between the hosts in the same VLANs.

    Rate this question:

  • 12. 

    What happens when the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines?

    • A.

      • A new RSA key pair is created.

    • B.

      • The switch defaults to allowing Telnet connections only

    • C.

      • The switch is no longer able to make SSH connections as an SSH client

    • D.

      • The switch allows remote connections only after a new RSA key pair is generated

    Correct Answer
    D. • The switch allows remote connections only after a new RSA key pair is generated
    Explanation
    When the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines, the switch allows remote connections only after a new RSA key pair is generated. This means that the previous RSA key pair is deleted and a new one is created, which is necessary for establishing secure SSH connections. The switch will no longer be able to make SSH connections as an SSH client until a new RSA key pair is generated.

    Rate this question:

  • 13. 

    Refer to the exhibit. An Ethernet switch has developed the CAM table shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit?  

    • A.

      • forward the frame out all interfaces except Interface3

    • B.

      • add station 00-00-3D-1F-11-05 to Interface2 in the forwarding table

    • C.

      • forward the frame out Interface3

    • D.

      • discard the frame

    • E.

      • forward the frame out all interfaces

    • F.

      • forward the frame out Interface2

    Correct Answer
    A. • forward the frame out all interfaces except Interface3
    Explanation
    When the switch receives the frame shown at the bottom of the exhibit, it will forward the frame out all interfaces except Interface3. This is because the CAM table shows that the MAC address 00-00-3D-1F-11-05 is associated with Interface2, so the switch will forward the frame to all other interfaces except Interface3.

    Rate this question:

  • 14. 

    Which two statements describe Spanning Tree Protocol? (Choose two.)

    • A.

      • It eliminates Layer 2 loops in network topologies.

    • B.

      • It eliminates the need for redundant physical paths in network topologies

    • C.

      • It can only be used in networks in which Layer 2 switching is in use.

    • D.

      • It can only be used in networks where both routers and switches are used together

    • E.

      • It can only be used in networks where routers are installed.

    Correct Answer(s)
    A. • It eliminates Layer 2 loops in network topologies.
    C. • It can only be used in networks in which Layer 2 switching is in use.
    Explanation
    Spanning Tree Protocol (STP) is a network protocol that prevents loops in Layer 2 network topologies. By using STP, redundant physical paths can be created without causing loops, ensuring network reliability and fault tolerance. However, STP is specifically designed for networks that utilize Layer 2 switching. It is not limited to networks that use both routers and switches together, nor is it limited to networks with routers only.

    Rate this question:

  • 15. 

    Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP addresses should be assigned to this new host?  

    • A.

      • 192.168.1.11 /28

    • B.

      • 192.168.1.22 /28

    • C.

      • 192.168.1.33 /28

    • D.

      • 192.168.1.44 /28

    • E.

      • 192.168.1.55 /28

    Correct Answer
    B. • 192.168.1.22 /28
    Explanation
    The new host should be assigned the IP address 192.168.1.22 with a subnet mask of /28. This is because the given IP address falls within the range of the subnet 192.168.1.16/28, which includes addresses from 192.168.1.17 to 192.168.1.30. Therefore, 192.168.1.22 is a valid IP address within this subnet.

    Rate this question:

  • 16. 

    Refer to the exhibit. How does SW1 manage traffic coming from Host A?

    • A.

      • SW1 drops the traffic because it is untagged.

    • B.

      • SW1 leaves the traffic untagged and forwards it over the trunk.

    • C.

      • SW1 tags the traffic with the lowest VLAN ID value and forwards it over the trunk link.

    • D.

      • SW1 encapsulates the traffic with 802.1Q encapsulation and forwards it over the trunk link.

    Correct Answer
    B. • SW1 leaves the traffic untagged and forwards it over the trunk.
    Explanation
    SW1 manages traffic coming from Host A by leaving it untagged and forwarding it over the trunk. This means that the traffic from Host A will not have any VLAN tags attached to it and will be transmitted as is over the trunk link.

    Rate this question:

  • 17. 

    Refer to the exhibit. The switches are configured for VTP as shown. Which two statements correctly describe the operation of these switches? (Choose two.) .  

    • A.

      • A new VLAN can be added to Switch1 and that information will be added only to Switch2

    • B.

      • A new VLAN can be added to Switch1 and that information will be added to Switch2 and Switch4.

    • C.

      • An existing VLAN can be deleted from Switch4 and that VLAN will be deleted from Switch1 and Switch2.

    • D.

      • An existing VLAN can be deleted from Switch2 and that VLAN will be deleted from Switch1 and Switch4.

    • E.

      • A new VLAN can be added to Switch4 and that information will be added to Switch1, Switch2, and Switch3.

    • F.

      • A new VLAN can be added to Switch3 and that information will be added to Switch1, Switch2, and Switch4.

    Correct Answer(s)
    B. • A new VLAN can be added to Switch1 and that information will be added to Switch2 and Switch4.
    C. • An existing VLAN can be deleted from Switch4 and that VLAN will be deleted from Switch1 and Switch2.
    Explanation
    Switch1 is configured as a VTP server, while Switch2 and Switch4 are configured as VTP clients. This means that any new VLAN added to Switch1 will be propagated to Switch2 and Switch4. Additionally, any existing VLAN deleted from Switch4 will also be deleted from Switch1 and Switch2. This is because VTP clients synchronize their VLAN database with the VTP server, ensuring consistency across the switches.

    Rate this question:

  • 18. 

    Refer to the exhibit. Computer A sends a broadcast message. Which devices will see the broadcast?    

    • A.

      • computer B

    • B.

      • computer B and Router1

    • C.

      • computer C and Router1

    • D.

      • computer B, computer D, computer E and Router1

    • E.

      • computer B, computer C, computer D, computer E and Router1

    • F.

      • computer A, computer B, computer C, computer D, computer E and Router1

    Correct Answer
    C. • computer C and Router1
    Explanation
    Computer A sends a broadcast message, which means it is sending the message to all devices on the network. However, since computer A is the one sending the message, it will not receive the broadcast. Therefore, the devices that will see the broadcast are computer C and Router1.

    Rate this question:

  • 19. 

    Refer to the exhibit. The network administrator enters the configuration shown to allow both SSH and Telnet connections to the switch. The Telnet connections fail. What is the most likely cause of this problem? . 

    • A.

      • The SSH version number is wrong.

    • B.

      • SSH has been configured on the wrong line

    • C.

      • Telnet and SSH cannot be configured simultaneously.

    • D.

      • The transport input command is configured incorrectly.

    Correct Answer
    D. • The transport input command is configured incorrectly.
    Explanation
    The most likely cause of the Telnet connections failing is that the transport input command is configured incorrectly. The transport input command is used to specify which protocols are allowed for incoming connections. If it is configured incorrectly, it may not be allowing Telnet connections to the switch.

    Rate this question:

  • 20. 

    Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?  

    • A.

      • Cat-A

    • B.

      • Cat-B

    • C.

      • Cat-C

    • D.

      • Cat-D

    Correct Answer
    C. • Cat-C
    Explanation
    In spanning tree protocol, the root bridge is elected based on the lowest bridge ID. The bridge ID is a combination of the bridge priority and the bridge MAC address. In this case, Cat-C has the lowest bridge priority (priority=0) among all the switches, so it will be elected as the root bridge of the spanning tree topology.

    Rate this question:

  • 21. 

    Refer to the exhibit. The switches in the exhibit have VTP pruning enabled. Which VLANs will be pruned from switch SW3? 

    • A.

      • VLAN 10 and VLAN 20

    • B.

      • VLAN 1, VLAN 10, and VLAN 20

    • C.

      • VLAN 1, VLAN 1002 through 1005

    • D.

      • VLAN 1, VLAN 10, VLAN 20, VLAN 1002 through 1005

    Correct Answer
    A. • VLAN 10 and VLAN 20
    Explanation
    Switch SW3 will prune VLAN 10 and VLAN 20. This is because VTP pruning is enabled on the switches, which allows the switches to dynamically prune VLANs that are not active on the trunk links. Since VLAN 10 and VLAN 20 are not active on any of the trunk links connected to SW3, they will be pruned to optimize bandwidth usage.

    Rate this question:

  • 22. 

    Refer to the exhibit. What does STATIC indicate in the output that is shown?   

    • A.

      • The switch will not allow any other device to connect to port Fa0/15.

    • B.

      • Traffic destined for MAC address 0000.c123.5432 will be forwarded to Fa0/15.

    • C.

      • This entry will be removed and refreshed every 300 seconds to keep it in the table.

    • D.

      • The switch learned this MAC address from the source address in a frame received on Fa0/15.

    • E.

      • When processing a frame, the switch does not have to perform a lookup to determine the final destination port.

    Correct Answer
    B. • Traffic destined for MAC address 0000.c123.5432 will be forwarded to Fa0/15.
    Explanation
    The term "STATIC" in the output indicates that the switch has manually configured a specific forwarding entry for the MAC address 0000.c123.5432. This means that any traffic destined for that MAC address will be forwarded to port Fa0/15, regardless of any other factors such as source address or destination port lookup. The entry will remain in the table until it is manually removed or refreshed every 300 seconds.

    Rate this question:

  • 23. 

     Which three statements are  regarding router-on-a-stick inter-VLAN routing? (Choose three.) 

    • A.

      • requires the use of subinterfaces on the router

    • B.

      • requires an access link between the router and Layer 2 switch

    • C.

      • more cost-efficient and scalable than using multiple physical interfaces

    • D.

      • requires each subinterface to be configured with the no shutdown command

    • E.

      • can impact performance if many VLANs compete for bandwidth on a single router interface

    • F.

      • makes troubleshooting the inter-VLAN routing configuration much less complex than when using multiple physical interfaces

    Correct Answer(s)
    A. • requires the use of subinterfaces on the router
    C. • more cost-efficient and scalable than using multiple physical interfaces
    E. • can impact performance if many VLANs compete for bandwidth on a single router interface
    Explanation
    Router-on-a-stick inter-VLAN routing requires the use of subinterfaces on the router, as it allows a single physical interface to be divided into multiple logical interfaces for each VLAN. It is more cost-efficient and scalable than using multiple physical interfaces because it eliminates the need for additional hardware. However, it can impact performance if many VLANs compete for bandwidth on a single router interface, as the available bandwidth is shared among all the VLANs.

    Rate this question:

  • 24. 

    Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.35 and a destination address of 192.168.1.85. What will the router do with this packet?

    • A.

      • The router will forward the packet out interface FastEthernet 0/1.1.

    • B.

      • The router will forward the packet out interface FastEthernet 0/1.2.

    • C.

      • The router will forward the packet out interface FastEthernet 0/1.3.

    • D.

      • The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.

    • E.

      • The router will ignore the packet because the source and destination are on the same broadcast domain.

    • F.

      • The router will drop the packet since no network that includes the source address is attached to the router.

    Correct Answer
    E. • The router will ignore the packet because the source and destination are on the same broadcast domain.
    Explanation
    The router will ignore the packet because the source and destination are on the same broadcast domain. This means that the packet does not need to be forwarded to another network, as both the source and destination addresses are within the same network. Therefore, the router does not need to take any action and can ignore the packet.

    Rate this question:

  • 25. 

    Refer to the exhibit. The network administrator needs to remove the east-hosts VLAN and use the switch port from that VLAN in one of the existing VLANs. What two commands should be used when completely removing VLAN 2 from S1-Central while leaving the switch and all its interfaces operational? (Choose two)

    • A.

      • S1-Central# reload

    • B.

      • S1-Central# erase flash:

    • C.

      • S1-Central(config)# no vlan 2

    • D.

      • S1-Central# delete flash:vlan.dat

    • E.

      • S1-Central(config-if)# switchport access vlan 3

    Correct Answer(s)
    C. • S1-Central(config)# no vlan 2
    E. • S1-Central(config-if)# switchport access vlan 3
    Explanation
    To completely remove VLAN 2 from S1-Central while leaving the switch and all its interfaces operational, the network administrator should use the following two commands:
    1. S1-Central(config)# no vlan 2: This command removes VLAN 2 from the switch's configuration.
    2. S1-Central(config-if)# switchport access vlan 3: This command changes the access VLAN for the switchport to VLAN 3. This effectively replaces the previous VLAN 2 with VLAN 3 on that switchport.

    Rate this question:

  • 26. 

    Refer to the exhibit. What does "FORWARDING" mean in the command output shown?

    • A.

      • The switch is sending and receiving data frames.

    • B.

      • The switch is receiving BPDUs, but not sending data frames

    • C.

      • The switch is participating in an election process by forwarding the BPDUs it receives

    • D.

      • The switch is receiving BPDUs and populating the MAC address table, but not sending data.

    Correct Answer
    A. • The switch is sending and receiving data frames.
    Explanation
    The term "FORWARDING" in the command output means that the switch is actively sending and receiving data frames. This indicates that the switch is functioning properly and is actively forwarding network traffic.

    Rate this question:

  • 27. 

    Refer to the exhibit. Switch SW2 has been newly purchased and added to the network. What configuration should be applied to SW2 so that it participates in the same VTP domain as switch SW1, receives VLAN information from SW1, and synchronizes VLAN information?

    • A.

      • Disable VTP pruning on SW2.

    • B.

      • Configure SW2 in VTP transparent mode.

    • C.

      • Configure SW2 with the VTP domain password.

    • D.

      • Configure SW2 as a VTP server with a higher revision number.

    Correct Answer
    C. • Configure SW2 with the VTP domain password.
    Explanation
    To ensure that SW2 participates in the same VTP domain as SW1, receives VLAN information, and synchronizes VLAN information, it needs to be configured with the VTP domain password. This password will allow SW2 to authenticate and join the VTP domain established by SW1, ensuring that they both have access to the same VLAN information and can synchronize any changes made to the VLAN database.

    Rate this question:

  • 28. 

    What are three benefits of a hierarchical network model? (Choose three.) 

    • A.

      • reduced contention for bandwidth

    • B.

      • reduced size of the physical layout

    • C.

      • increased fault tolerance of the network

    • D.

      • elimination of the need for wiring closets

    • E.

      • elimination of the need for layer three functionality

    • F.

      • simplification of management and troubleshooting

    Correct Answer(s)
    A. • reduced contention for bandwidth
    C. • increased fault tolerance of the network
    F. • simplification of management and troubleshooting
    Explanation
    The hierarchical network model provides three main benefits. Firstly, it reduces contention for bandwidth by dividing the network into different layers, allowing for more efficient data flow. Secondly, it increases fault tolerance of the network by providing redundancy at different layers, ensuring that if one layer fails, the network can still function. Lastly, it simplifies management and troubleshooting by organizing the network into distinct layers, making it easier to identify and resolve issues.

    Rate this question:

  • 29. 

    Refer to the exhibit. Which three options correctly identify information that could be associated with this output?(Choose three.)    

    • A.

      • Interface FastEthernet3/0/0 is subinterfaced.

    • B.

      • A non-proprietary trunking protocol is in use.

    • C.

      • The configuration is appropriate for a router-on-a-stick network design.

    • D.

      • A shutdown command has been applied to interface FastEthernet3/0/0.

    • E.

      • Interface FastEthernet3/0/0.3 is mapped to the default management VLAN.

    • F.

      • An IP address should be applied to FastEthernet3/0/0 for correct data routing

    Correct Answer(s)
    A. • Interface FastEthernet3/0/0 is subinterfaced.
    B. • A non-proprietary trunking protocol is in use.
    C. • The configuration is appropriate for a router-on-a-stick network design.
    Explanation
    The exhibit shows the output of a command on a network device. From the output, we can determine that interface FastEthernet3/0/0 is subinterfaced because it is associated with a VLAN (Virtual Local Area Network) identifier. Additionally, we can identify that a non-proprietary trunking protocol is in use because the output mentions Dot1Q, which is an open standard trunking protocol. Finally, we can conclude that the configuration is appropriate for a router-on-a-stick network design because the output displays VLAN mappings for subinterfaces.

    Rate this question:

  • 30. 

    Refer to the exhibit. Switch SW2 was tested in a lab environment and then inserted into a production network without reloading its configuration. After the trunk link between SW1 and SW2 was brought up, all users lost connectivity to the network. What could be the source of the problem?

    • A.

      • All the VLANs were pruned from the trunk port between SW1 and SW2

    • B.

      • SW1 and SW2 cannot be both set as VTP servers in the same VTP domain.

    • C.

      • VTP configuration revision number of SW2 was higher than the configuration revision number of SW1.

    • D.

      • The additional VLANs from SW2 created more VLANs than the VLAN database of SW1 could contain.

    Correct Answer
    C. • VTP configuration revision number of SW2 was higher than the configuration revision number of SW1.
    Explanation
    The source of the problem is that the VTP configuration revision number of SW2 was higher than the configuration revision number of SW1. VTP (VLAN Trunking Protocol) is used to manage VLAN configurations across a network. When a switch with a higher configuration revision number is added to a network, it will overwrite the VLAN database of switches with lower revision numbers. In this case, SW2 had a higher revision number than SW1, causing it to overwrite SW1's VLAN database and resulting in the loss of connectivity for all users.

    Rate this question:

  • 31. 

    Refer to the exhibit. A network administrator needs to implement inter-VLAN routing on a hierarchical network. On which devices should the inter-VLAN routing be configured? • AS1 and AS2 • DS1 and DS2 • Gateway and CS1 • Gateway, CS1, DS1, and DS2

    • A.

      • AS1 and AS2

    • B.

      • DS1 and DS2

    • C.

      • Gateway and CS1

    • D.

      • Gateway, CS1, DS1, and DS2

    Correct Answer
    C. • Gateway and CS1
    Explanation
    Inter-VLAN routing allows communication between different VLANs in a network. In this scenario, the inter-VLAN routing should be configured on the Gateway and CS1 devices. The Gateway device serves as the central point for routing traffic between VLANs, while CS1 acts as a Layer 3 switch that can perform inter-VLAN routing. Configuring inter-VLAN routing on these devices will enable communication between VLANs in the hierarchical network.

    Rate this question:

  • 32. 

    Which three statements are correct concerning the default configuration of a new switch? (Choose three.) .    

    • A.

      • Spanning Tree Protocol is disabled

    • B.

      • Enable password is configured as cisco.

    • C.

      • All switch ports are assigned to VLAN1.

    • D.

      • The flash directory contains the IOS image.

    • E.

      • VLAN1 is configured with a management IP address.

    • F.

      • All interfaces are set to auto-negotiation of speed and duplex.

    Correct Answer(s)
    C. • All switch ports are assigned to VLAN1.
    D. • The flash directory contains the IOS image.
    F. • All interfaces are set to auto-negotiation of speed and duplex.
    Explanation
    The default configuration of a new switch includes the following correct statements: All switch ports are assigned to VLAN1, meaning that all ports belong to the default VLAN. The flash directory contains the IOS image, which is the operating system of the switch. All interfaces are set to auto-negotiation of speed and duplex, allowing them to automatically determine the optimal settings for communication.

    Rate this question:

  • 33. 

    Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit data at the same time. How do the hosts respond on the network? (Choose two.)    

    • A.

      • After the end of the jam signal, a backoff algorithm is invoked.

    • B.

      • Hosts 1 and 4 are operating full duplex so no collision will exist.

    • C.

      • The hub will block the port connected to Host 4 to prevent a collision.

    • D.

      • Hosts 1 and 4 are assigned shorter backoff values to provide them priority to access the media.

    • E.

      • If a host has data to transmit after the backoff period of that host, the host checks to determine if the line is idle before transmitting.

    Correct Answer(s)
    A. • After the end of the jam signal, a backoff algorithm is invoked.
    E. • If a host has data to transmit after the backoff period of that host, the host checks to determine if the line is idle before transmitting.
    Explanation
    After the end of the jam signal, a backoff algorithm is invoked, which means that both Host 1 and Host 4 will wait for a random amount of time before attempting to transmit again. This helps to avoid another collision. Additionally, if a host has data to transmit after the backoff period, it will check to determine if the line is idle before transmitting. This ensures that the host does not interfere with any ongoing transmissions and reduces the chances of collision.

    Rate this question:

  • 34. 

    Refer to the exhibit. After the listed commands are entered into router R1 and switch S1, the administrator enters the show interface fa0/1 trunk and gets the results shown. What is the likely problem? 

    • A.

      • The trunk is established, but no VLANs have been configured to use it.

    • B.

      • The trunk has not been established because the router does not support dynamic trunking protocol.

    • C.

      • The router, the switch, or both must be configured with the dynamic desirable option for dynamic trunking protocol to establish a trunk.

    • D.

      • The router is missing the dynamic trunking protocol statements necessary to form a trunk

    Correct Answer
    B. • The trunk has not been established because the router does not support dynamic trunking protocol.
    Explanation
    The likely problem is that the trunk has not been established because the router does not support dynamic trunking protocol. This can be inferred from the fact that the show interface fa0/1 trunk command did not display any trunking information, indicating that the trunk has not been established.

    Rate this question:

  • 35. 

    Refer to the exhibit. Which two statements are about the operation of the interfaces? (Choose two.) 

    • A.

      • Incoming traffic with VLAN ID 0 is processed by interface fa0/0.

    • B.

      • Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.

    • C.

      • Both subinterfaces remain up with line protocol up, even if fa0/0 line protocol is down

    • D.

      • Subinterfaces use unique MAC addresses by adding the 802.1Q VLAN ID to the hardware address

    • E.

      • Traffic inbound on this router is processed by different subinterfaces, depending on the VLAN from which the traffic originated.

    Correct Answer(s)
    B. • Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.
    E. • Traffic inbound on this router is processed by different subinterfaces, depending on the VLAN from which the traffic originated.
    Explanation
    The first statement is about the operation of the interfaces because it states that incoming traffic with VLAN ID 0 is processed by interface fa0/0. The second statement is also about the operation of the interfaces because it states that incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.

    Rate this question:

  • 36. 

    What three tasks should be performed before moving a Catalyst switch to another VTP management domain? (Choose three.) . .    

    • A.

      • Select the correct VTP mode and version

    • B.

      • Configure the switch with the name of the new management domain

    • C.

      • Download the VTP database from the VTP server in the new domain.

    • D.

      • Configure the VTP server in the new domain to recognize the BID of the switch.

    • E.

      • Reset the VTP counters to allow the switch to synchronize with the other switches in the new domain.

    • F.

      • Verify that the switch has a lower configuration revision number than the other switches in the new domain.

    Correct Answer(s)
    A. • Select the correct VTP mode and version
    B. • Configure the switch with the name of the new management domain
    F. • Verify that the switch has a lower configuration revision number than the other switches in the new domain.
    Explanation
    Before moving a Catalyst switch to another VTP management domain, three tasks should be performed. Firstly, the correct VTP mode and version should be selected to ensure compatibility with the new domain. Secondly, the switch should be configured with the name of the new management domain to establish the correct identity. Lastly, it is important to verify that the switch has a lower configuration revision number than the other switches in the new domain to prevent any conflicts or issues during synchronization.

    Rate this question:

  • 37. 

    Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?  

    • A.

      • only hosts A and B

    • B.

      • only hosts A, B, and C

    • C.

      • only hosts A, B, C, and D

    • D.

      • only hosts A, B, C, and E

    Correct Answer
    B. • only hosts A, B, and C
    Explanation
    Hosts A, B, and C will receive the collision jamming signal. This is because all three hosts are connected to the same hub (HB1), and when a collision occurs, the hub sends a jamming signal to all connected hosts to indicate the collision. Hosts D and E are not connected to the same hub, so they will not receive the collision jamming signal.

    Rate this question:

  • 38. 

    Which statement regarding the service password-encryption command is ? .  

    • A.

      • The service password-encryption command is entered at the privileged EXEC mode prompt

    • B.

      • The service password-encryption command encrypts only passwords for the console and VTY ports.

    • C.

      • The service password-encryption command encrypts all previously unencrypted passwords in the running configuration.

    • D.

      • To see the passwords encrypted by the service password-encryption command, enter the no service password-encryption command

    Correct Answer
    C. • The service password-encryption command encrypts all previously unencrypted passwords in the running configuration.
    Explanation
    The service password-encryption command encrypts all previously unencrypted passwords in the running configuration. This means that any passwords that were previously stored in clear text format will be encrypted after enabling this command. It does not only encrypt passwords for the console and VTY ports, but rather it encrypts all passwords in the running configuration. To view the passwords encrypted by this command, one would need to enter the "no service password-encryption" command.

    Rate this question:

  • 39. 

    Refer to the exhibit. Which two statements are regarding what the cost value of 23 represents for Switch4? (Choose two.)   .

    • A.

      • This cost represents the lowest cost path for Switch4 to the root switch.

    • B.

      • A cost of 23 is the value being advertised out port 16 on the switch upstream (closer) to the root switch.

    • C.

      • Switch4 adds the cost of a Fast Ethernet link to 23 to determine its total cost to reach the root switch.

    • D.

      • Switch4 is connected via a Fast Ethernet link to an upstream switch that in turn is directly connected to the root switch via a Gigabit Ethernet link

    • E.

      • The root switch is advertising a cost of 23, which is lower than any other switch in the VLAN0001 spanning-tree domain.

    Correct Answer(s)
    A. • This cost represents the lowest cost path for Switch4 to the root switch.
    C. • Switch4 adds the cost of a Fast Ethernet link to 23 to determine its total cost to reach the root switch.
    Explanation
    The first statement is correct because a cost of 23 represents the lowest cost path for Switch4 to the root switch. The second statement is also correct because Switch4 adds the cost of a Fast Ethernet link to 23 to determine its total cost to reach the root switch.

    Rate this question:

  • 40. 

    Refer to the exhibit. What three statements describe why Host1 and Host2 are unable to communicate? (Choose three.) . . .  

    • A.

      • The switch ports are on different VLANs

    • B.

      • The switch IP address is on the wrong subnet

    • C.

      • The hosts are configured on different logical networks

    • D.

      • A router is required to forward traffic between Host1 and Host2.

    • E.

      • The VLAN port assignments must be contiguous for each VLAN.

    • F.

      • The host default gateway addresses must be on the same logical network

    Correct Answer(s)
    A. • The switch ports are on different VLANs
    C. • The hosts are configured on different logical networks
    D. • A router is required to forward traffic between Host1 and Host2.
    Explanation
    The three statements that describe why Host1 and Host2 are unable to communicate are:
    1. The switch ports are on different VLANs, which means they are in separate broadcast domains and cannot directly communicate with each other.
    2. The hosts are configured on different logical networks, indicating that they have different IP address ranges and cannot reach each other without the help of a router.
    3. A router is required to forward traffic between Host1 and Host2 because they are on different networks and need a device to route the traffic between them.

    Rate this question:

  • 41. 

    Refer to the exhibit. Each switch is shown with its MAC address. Which switch will be elected as the spanning-tree root bridge if the switches are configured with their default priority values?

    • A.

      • switch A

    • B.

      • switch B

    • C.

      • switch C

    • D.

      • switch D

    • E.

      • switch E

    • F.

      • switch F

    Correct Answer
    F. • switch F
    Explanation
    Switch F will be elected as the spanning-tree root bridge because it has the lowest MAC address among all the switches. In the spanning-tree algorithm, the switch with the lowest bridge ID (which is determined by the MAC address) becomes the root bridge.

    Rate this question:

  • 42. 

    Refer to the exhibit. Hosts PC_A and PC_B send traffic simultaneously, and the frames from the transmitting stations collide. What is the last device to receive the collision? 

    • A.

      • hub HB1

    • B.

      • switch SW1

    • C.

      • router R1

    • D.

      • switch SW2

    • E.

      • router R2

    • F.

      • switch SW4

    Correct Answer
    B. • switch SW1
    Explanation
    Switch SW1 is the last device to receive the collision. Switches are responsible for creating separate collision domains, which means that collisions are contained within a single port or interface on the switch. In this scenario, both PC_A and PC_B are connected to switch SW1, so if a collision occurs between them, it will be detected by SW1. The other devices listed (hub HB1, router R1, switch SW2, router R2, and switch SW4) do not have a direct connection to both PC_A and PC_B, so they will not receive the collision.

    Rate this question:

  • 43. 

    Why is it important that the network administrator consider the spanning-tree network diameter when choosing the root bridge?

    • A.

      • The network diameter limitation is 9.

    • B.

      • BPDUs may be discarded because of expiring timers.

    • C.

      • The cabling distance between the switches is 100 meters

    • D.

      • The network diameter must be set to the number of meters of the cable between the root bridge and its farthest connected switch.

    Correct Answer
    B. • BPDUs may be discarded because of expiring timers.
    Explanation
    The network administrator should consider the spanning-tree network diameter when choosing the root bridge because if the network diameter is too large, the BPDUs (Bridge Protocol Data Units) may take a longer time to reach their destination switches. This delay can cause the timers on the switches to expire, leading to the BPDUs being discarded. Therefore, by selecting a root bridge that minimizes the network diameter, the administrator can ensure that the BPDUs reach their destination switches in a timely manner, preventing any potential discarding of BPDUs due to expiring timers.

    Rate this question:

  • 44. 

    Refer to the exhibit. A network administrator has segmented the network into two VLANs and configured Router1 for inter-VLAN routing. A test of the network, however, shows that hosts on each VLAN can only access local resources and not resources on the other VLAN. What is the most likely cause of this problem?

    • A.

      • Switch port Fa0/1 is not trunking.

    • B.

      • Router interface Fa0/0 is possibly down.

    • C.

      • No routing protocol is configured on Router1.

    • D.

      • One of the router subinterfaces is possibly down.

    Correct Answer
    A. • Switch port Fa0/1 is not trunking.
    Explanation
    The most likely cause of the problem is that switch port Fa0/1 is not trunking. Trunking is necessary for allowing multiple VLANs to communicate with each other. If the switch port is not configured as a trunk port, it will only allow traffic from one VLAN, preventing hosts on each VLAN from accessing resources on the other VLAN. Therefore, this is the most likely cause of the issue.

    Rate this question:

  • 45. 

    What is the purpose of issuing the command switchport mode access on a switch interface?

    • A.

      • disable port security

    • B.

      • make the port operational

    • C.

      • override the default port behavior

    • D.

      • force the port to be a part of a single vlan

    Correct Answer
    D. • force the port to be a part of a single vlan
    Explanation
    The command "switchport mode access" is used to force the switch port to be a part of a single VLAN. By default, switch ports are in dynamic auto mode, which means they can negotiate with connected devices to determine the appropriate VLAN. However, by issuing the "switchport mode access" command, the port is forced to operate in access mode, meaning it will only belong to a specific VLAN and will not negotiate with connected devices. This is useful when you want to restrict the port to a specific VLAN and prevent unauthorized devices from connecting to other VLANs.

    Rate this question:

  • 46. 

    Refer to the exhibit. Which statement is  regarding the information shown?

    • A.

      • Only one VLAN is currently configured to use the trunk links

    • B.

      • The switch negotiated trunk links for interfaces Fa0/1 and Gi0/1

    • C.

      • A Cisco proprietary protocol is in use for interfaces Fa0/1 and Gi0/1.

    • D.

      • Interfaces Gi0/1 and Fa0/1 are allowed to carry data from multiple VLANs

    Correct Answer
    D. • Interfaces Gi0/1 and Fa0/1 are allowed to carry data from multiple VLANs
    Explanation
    The exhibit shows that interfaces Gi0/1 and Fa0/1 are allowed to carry data from multiple VLANs. This means that these interfaces are configured to allow traffic from multiple VLANs to pass through them, rather than being restricted to a single VLAN.

    Rate this question:

  • 47. 

    Which identifier is used to keep track of frames that are destined for a particular wireless client?

    • A.

      AID

    • B.

      SSID

    • C.

      BSSID

    • D.

      ESSID

    Correct Answer
    C. BSSID
    Explanation
    The BSSID (Basic Service Set Identifier) is used to keep track of frames that are destined for a particular wireless client. It is a unique identifier assigned to each wireless access point or router in a wireless network. The BSSID allows the wireless client to identify and connect to the specific access point or router it wants to communicate with.

    Rate this question:

  • 48. 

    Refer to the exhibit. What will happen when frames that contain an unknown source address reach interface fa0/24?  . 

    • A.

      • A syslog message will be logged.

    • B.

      • Fa0/24 will become error-disabled

    • C.

      • The incoming frames will be dropped.

    • D.

      • The security violation count will be incremented

    Correct Answer
    C. • The incoming frames will be dropped.
    Explanation
    When frames that contain an unknown source address reach interface fa0/24, the incoming frames will be dropped. This is because the switch does not have the source address in its MAC address table, indicating that it is an unknown device. To prevent potential security risks, the switch will discard these frames to maintain network security and prevent unauthorized access.

    Rate this question:

  • 49. 

    In which mode is a VTP switch operating if it has been configured to only forward VTP advertisements?

    • A.

      • client

    • B.

      • root

    • C.

      • server

    • D.

      • transparent

    Correct Answer
    D. • transparent
    Explanation
    A VTP switch that has been configured to only forward VTP advertisements is operating in transparent mode. In this mode, the switch will forward VTP advertisements to other switches but will not synchronize or update its own VLAN database based on those advertisements. This allows the switch to act as a relay for VTP information without participating in the VTP domain itself.

    Rate this question:

  • 50. 

    Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point

    • A.

      • Associate with the access point and then open a HyperTerminal session with the access point.

    • B.

      • Physically connect to the access point and then reboot the computer to launch the configuration software

    • C.

      • From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.

    • D.

      • Modify the TCP/IP properties of the computer connected to the access point so that it exists on the same network, and then reboot your computer to establish a connection

    Correct Answer
    C. • From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.
    Explanation
    To establish an administrative connection for configuring the Linksys WRT300N wireless access point, the correct method is to enter the default IP address of the access point in a web browser from a computer in the same IP subnet as the access point. This allows the user to access the configuration interface of the access point and make the necessary changes. This method does not require any physical connection or rebooting of the computer, making it a convenient and efficient way to configure the access point.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 28, 2010
    Quiz Created by
    Kapper59
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.