CCNA LAN Switching and Wireless Final
AS1 and AS2
DS1 and DS2
DS1, DS2, and CS1
AS1, AS2, DS1, and DS2
Probing
Beaconing
Association
Authentication
Spanning Tree Protocol will guarantee a loop free Layer 2 topology.
Spanning Tree Protocol guarantees the shortest path to destination networks.
The switch with the highest priority will be assigned the lowest BID in the root election.
The first step in the spanning-tree election process is to determine the root port.
To select designated ports, the spanning-tree algorithm must determine the longest contiguous path from the root bridge.
Relocate the APs closer to each other.
Increase the distance between the clients.
Change the channel on AP-B to 6 or 11.
Place AP-A and AP-B on the same wireless channel.
Increase the distance between the clients.
Root port
Edge port
Alternate port
Designated port
User EXEC mode
Privileged EXEC mode
global configuration mode
interface configuration mode
The VTP configuration revision is different on both switches.
The VTP domains are different on both switches.
VTP pruning is disabled.
VTP v2 is disabled.
SSID
OFDM
WEP
DSSS
Discard the frame
Forward the frame out port 3
Forward the frame out all ports
Forward the frame out all ports except port 3
Add station 00-00-3D-1F-11-05 to port 2 in the forwarding table
configuring trunk links on the VTP server
Configuring or changing the VTP password
configuring or changing the VTP domain name
Configuring or changing the VTP version number
Configuring or deleting a VLAN or creating a VLAN name
The enable password will be set.
The password will be set for the first Telnet connection.
The password will be set for the console connection.
The password will be set for the auxiliary connection.
Zero
One
Power cycle the switch to clear all dynamically learned addresses.
The clear switching-tables command will remove statically configured entries.
The clear mac-address-table command will remove statically and dynamically configured table entries.
The erase flash command will clear all statically configured table entries.
Statically configured MAC addresses will automatically be removed from the address table 300 minutes after the last activity on a switch port.
Only the management VLAN
all VLANs except the extended range VLANs
All VLANs except 1 and 1002-1005
All VLANs
Fa0/1 interface of switch A
Fa0/1 interface of switch B
Fa0/2 interface of switch B
Fa0/1 interface of switch C
Fa0/2 interface of switch C
The network diameter limitation is 9.
BPDUs may be discarded because of expiring timers.
The cabling distance between the switches is 100 meters.
The cabling distance between the switches is 100 meters. The network diameter must be set to the number of meters of the cable between the root bridge and its farthest connected switch.
Host A remains a member of VLAN 10, because the router is routing traffic between VLANs.
Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30.
Host A remains a member of VLAN 10, because the switch provides dynamic VLAN assignment for the port.
Host A maintains connectivity to all members of VLAN 10, because it is connected to the same physical network.
Host A is no longer a member of VLAN 10, but because port Fa0/3 was unused, it is now a member of VLAN 1.
A computer with a console connection to the WRT300N
A computer with a wireless connection to the WRT300N
A computer with an AUX port connection to the WRT300N
A computer configured in the same IP subnet as the WRT300N and a direct cable connection to it
Hub
Switch
Router
Gateway
Incoming traffic with VLAN ID 0 is processed by interface fa0/0.
Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.
Both subinterfaces remain up with line protocol up, even if fa0/0 line protocol is down.
Subinterfaces use unique MAC addresses by adding the 802.1Q VLAN ID to the hardware address.
Traffic inbound on this router is processed by different subinterfaces, depending on the VLAN from which the traffic originated.
Available bandwidth is reduced.
MAC addresses are easily spoofed.
APs are more susceptible to DoS attacks.
The payload encryption is easily broken.
Switch port Fa0/1 is not trunking.
Router interface Fa0/0 is possibly down.
No routing protocol is configured on Router1.
One of the router subinterfaces is possibly down.
The native VLAN can only be VLAN 1.
VLAN 2 must be specified as the default VLAN.
There is no router to allow the packets to cross from one switch to the other.
The interfaces connecting the switches have not been placed in trunking mode.
It propagates VLAN configurations to other switches.
It restricts broadcast packets to a single VLAN.
It segments a network into multiple broadcast domains.
It prevents loops in a switched network with redundant paths.
S1 port Fa0/11 is in the wrong VLAN.
R1 does not have an active routing protocol.
The IP address of computer 1 is in the wrong logical network.
Router interface Fa0/0 has the wrong trunk encapsulation type configured.