CCNA Lan Final V2

52 Questions | Total Attempts: 177

SettingsSettingsSettings
CCNA Lan Final V2 - Quiz

CCNA LAN Switching and Wireless Final


Questions and Answers
  • 1. 
    Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect?
    • A. 

      AS1 and AS2

    • B. 

      DS1 and DS2

    • C. 

      DS1, DS2, and CS1

    • D. 

      AS1, AS2, DS1, and DS2

  • 2. 
    A wireless client is attempting to establish a connection with a wireless access point. What process does the client use to discover the access points which are available to it?
    • A. 

      Probing

    • B. 

      Beaconing

    • C. 

      Association

    • D. 

      Authentication

  • 3. 
    Which statement is correct about STP architecture?
    • A. 

      Spanning Tree Protocol will guarantee a loop free Layer 2 topology.

    • B. 

      Spanning Tree Protocol guarantees the shortest path to destination networks.

    • C. 

      The switch with the highest priority will be assigned the lowest BID in the root election.

    • D. 

      The first step in the spanning-tree election process is to determine the root port.

    • E. 

      To select designated ports, the spanning-tree algorithm must determine the longest contiguous path from the root bridge.

  • 4. 
    Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installation surveys showed strong signal strength from the AP locations to the client locations. Outside electrical interference has been eliminated. What will fix the problem?
    • A. 

      Relocate the APs closer to each other.

    • B. 

      Increase the distance between the clients.

    • C. 

      Change the channel on AP-B to 6 or 11.

    • D. 

      Place AP-A and AP-B on the same wireless channel.

    • E. 

      Increase the distance between the clients.

  • 5. 
    RSTP is enabled in a switched network that is active and converged. Which switch port type assumes a discarding state on non-root switches?
    • A. 

      Root port

    • B. 

      Edge port

    • C. 

      Alternate port

    • D. 

      Designated port

  • 6. 
    Which CLI mode allows users to access all device commands, such as those used for configuration, management, and troubleshooting?
    • A. 

      User EXEC mode

    • B. 

      Privileged EXEC mode

    • C. 

      global configuration mode

    • D. 

      interface configuration mode

  • 7. 
    • A. 

      The VTP configuration revision is different on both switches.

    • B. 

      The VTP domains are different on both switches.

    • C. 

      VTP pruning is disabled.

    • D. 

      VTP v2 is disabled.

  • 8. 
    Which parameter is used to uniquely identify one wireless network from another?
    • A. 

      SSID

    • B. 

      OFDM

    • C. 

      WEP

    • D. 

      DSSS

  • 9. 
    Refer to the exhibit. An administrator documented the output of a CAM table from an Ethernet switch as shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit?
    • A. 

      Discard the frame

    • B. 

      Forward the frame out port 3

    • C. 

      Forward the frame out all ports

    • D. 

      Forward the frame out all ports except port 3

    • E. 

      Add station 00-00-3D-1F-11-05 to port 2 in the forwarding table

  • 10. 
    Which configuration changes will increment the configuration revision number on the VTP server?
    • A. 

      configuring trunk links on the VTP server

    • B. 

      Configuring or changing the VTP password

    • C. 

      configuring or changing the VTP domain name

    • D. 

      Configuring or changing the VTP version number

    • E. 

      Configuring or deleting a VLAN or creating a VLAN name

  • 11. 
    • A. 

      The enable password will be set.

    • B. 

      The password will be set for the first Telnet connection.

    • C. 

      The password will be set for the console connection.

    • D. 

      The password will be set for the auxiliary connection.

  • 12. 
    Refer to the exhibit. If switch SW1 is configured with the four VLANs as shown in the exhibit, how many physical interfaces are needed on router R1 to configure inter-VLAN routing using subinterfaces?
    • A. 

      Zero

    • B. 

      One

  • 13. 
    What two methods can be used to remove MAC address table entries from a switch? (Choose two.)
    • A. 

      Power cycle the switch to clear all dynamically learned addresses.

    • B. 

      The clear switching-tables command will remove statically configured entries.

    • C. 

      The clear mac-address-table command will remove statically and dynamically configured table entries.

    • D. 

      The erase flash command will clear all statically configured table entries.

    • E. 

      Statically configured MAC addresses will automatically be removed from the address table 300 minutes after the last activity on a switch port.

  • 14. 
    What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?
    • A. 

      Only the management VLAN

    • B. 

      all VLANs except the extended range VLANs

    • C. 

      All VLANs except 1 and 1002-1005

    • D. 

      All VLANs

  • 15. 
    Refer to the exhibit. All switches are configured with the default bridge priority. Which port will act as a non-designated port if all links are operating at the same bandwidth?
    • A. 

      Fa0/1 interface of switch A

    • B. 

      Fa0/1 interface of switch B

    • C. 

      Fa0/2 interface of switch B

    • D. 

      Fa0/1 interface of switch C

    • E. 

      Fa0/2 interface of switch C

  • 16. 
    Why is it important that the network administrator consider the spanning-tree network diameter when choosing the root bridge?
    • A. 

      The network diameter limitation is 9.

    • B. 

      BPDUs may be discarded because of expiring timers.

    • C. 

      The cabling distance between the switches is 100 meters.

    • D. 

      The cabling distance between the switches is 100 meters. The network diameter must be set to the number of meters of the cable between the root bridge and its farthest connected switch.

  • 17. 
    Refer to the exhibit. What would happen if the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1?
    • A. 

      Host A remains a member of VLAN 10, because the router is routing traffic between VLANs.

    • B. 

      Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30.

    • C. 

      Host A remains a member of VLAN 10, because the switch provides dynamic VLAN assignment for the port.

    • D. 

      Host A maintains connectivity to all members of VLAN 10, because it is connected to the same physical network.

    • E. 

      Host A is no longer a member of VLAN 10, but because port Fa0/3 was unused, it is now a member of VLAN 1.

  • 18. 
    Which combination is required to establish a connection to initially configure the Linksys WRT300N wireless access device?
    • A. 

      A computer with a console connection to the WRT300N

    • B. 

      A computer with a wireless connection to the WRT300N

    • C. 

      A computer with an AUX port connection to the WRT300N

    • D. 

      A computer configured in the same IP subnet as the WRT300N and a direct cable connection to it

  • 19. 
    A wireless access point can function as which type of shared medium, wired LAN device?
    • A. 

      Hub

    • B. 

      Switch

    • C. 

      Router

    • D. 

      Gateway

  • 20. 
    • A. 

      Incoming traffic with VLAN ID 0 is processed by interface fa0/0.

    • B. 

      Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.

    • C. 

      Both subinterfaces remain up with line protocol up, even if fa0/0 line protocol is down.

    • D. 

      Subinterfaces use unique MAC addresses by adding the 802.1Q VLAN ID to the hardware address.

    • E. 

      Traffic inbound on this router is processed by different subinterfaces, depending on the VLAN from which the traffic originated.

  • 21. 
    Why is MAC address filtering considered a poor choice in securing a WLAN?
    • A. 

      Available bandwidth is reduced.

    • B. 

      MAC addresses are easily spoofed.

    • C. 

      APs are more susceptible to DoS attacks.

    • D. 

      The payload encryption is easily broken.

  • 22. 
    Refer to the exhibit. A network administrator has segmented the network into two VLANs and configured Router1 for inter-VLAN routing. A test of the network, however, shows that hosts on each VLAN can only access local resources and not resources on the other VLAN. What is the most likely cause of this problem?
    • A. 

      Switch port Fa0/1 is not trunking.

    • B. 

      Router interface Fa0/0 is possibly down.

    • C. 

      No routing protocol is configured on Router1.

    • D. 

      One of the router subinterfaces is possibly down.

  • 23. 
    • A. 

      The native VLAN can only be VLAN 1.

    • B. 

      VLAN 2 must be specified as the default VLAN.

    • C. 

      There is no router to allow the packets to cross from one switch to the other.

    • D. 

      The interfaces connecting the switches have not been placed in trunking mode.

  • 24. 
     What is the purpose of the Spanning Tree algorithm?
    • A. 

      It propagates VLAN configurations to other switches.

    • B. 

      It restricts broadcast packets to a single VLAN.

    • C. 

      It segments a network into multiple broadcast domains.

    • D. 

      It prevents loops in a switched network with redundant paths.

  • 25. 
    • A. 

      S1 port Fa0/11 is in the wrong VLAN.

    • B. 

      R1 does not have an active routing protocol.

    • C. 

      The IP address of computer 1 is in the wrong logical network.

    • D. 

      Router interface Fa0/0 has the wrong trunk encapsulation type configured.

Related Topics
Back to Top Back to top