Ccna3 Final All April 2013

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Tmatijevic
T
Tmatijevic
Community Contributor
Quizzes Created: 1 | Total Attempts: 167
| Attempts: 167
SettingsSettings
Please wait...
  • 1/184 Questions

    Why is MAC address filtering considered a poor choice in securing a WLAN?

    • Available bandwidth is reduced
    • MAC addresses are easily spoofed.
    • APs are more susceptible to DoS attacks.
    • The payload encryption is easily broken.
Please wait...
Ccna3 Final All April 2013 - Quiz
About This Quiz

This CCNA3 final exam for April 2013 assesses advanced knowledge in network configuration, management, and troubleshooting. It covers topics like VLANs, Spanning Tree Protocol, and inter-VLAN routing, crucial for network administrators and IT professionals.


Quiz Preview

  • 2. 

    Which parameter is used to uniquely identify one wireless network from another?

    • SSID

    • OFDM

    • WEP

    • DSSS

    Correct Answer
    A. SSID
    Explanation
    SSID stands for Service Set Identifier. It is a unique name assigned to a wireless network. It is used to identify and differentiate one wireless network from another. When devices search for available networks, they use the SSID to determine which network to connect to. The SSID is typically set by the network administrator and can be customized to make it easier for users to identify and connect to the correct network.

    Rate this question:

  • 3. 

    Which value determines if a switch becomes the central point of reference in the spanning tree topology?

    • Lowest bridge ID

    • highest revision number

    • lowest numeric IP address

    • highest numeric MAC address

    Correct Answer
    A. Lowest bridge ID
    Explanation
    The bridge ID is a unique identifier assigned to each switch in a spanning tree network. It consists of a priority value and the MAC address of the switch. The switch with the lowest bridge ID becomes the root bridge, which is the central point of reference in the spanning tree topology. The root bridge is responsible for determining the shortest path to each switch in the network. Therefore, the switch with the lowest bridge ID becomes the central point of reference in the spanning tree topology.

    Rate this question:

  • 4. 

    Which parameter is used to uniquely identify one wireless network from another?

    • SSID

    • OFDM

    • WEP

    • DSSS

    Correct Answer
    A. SSID
    Explanation
    The parameter used to uniquely identify one wireless network from another is the SSID (Service Set Identifier). The SSID is a case-sensitive alphanumeric string that is assigned to a wireless network. When devices search for available networks, they can identify and connect to the correct network by matching the SSID. Each wireless network has its own unique SSID, allowing multiple networks to coexist in the same area without interference.

    Rate this question:

  • 5. 

    A network technician is attempting to configure 802.1q trunking on switch ports Fa0/5 through Fa0/10. Which set of commands will accomplish this task? Correct answer is image two.

    • 1

    • 2

    • 3

    • 4

    Correct Answer
    A. 2
  • 6. 

    Which value determines if a switch becomes the central point of reference in the spanning tree topology?

    • Lowest bridge ID

    • highest revision number

    • lowest numeric IP address

    • highest numeric MAC address

    Correct Answer
    A. Lowest bridge ID
    Explanation
    The value that determines if a switch becomes the central point of reference in the spanning tree topology is the lowest bridge ID. In the spanning tree protocol, each switch is assigned a unique bridge ID, which consists of a priority value and a MAC address. The switch with the lowest bridge ID is elected as the root bridge and becomes the central point of reference for the spanning tree topology.

    Rate this question:

  • 7. 

    Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect?

    • AS1 and AS2

    • DS1 and DS2

    • DS1, DS2, and CS1

    • AS1, AS2, DS1, and DS2

    Correct Answer
    A. AS1 and AS2
    Explanation
    The IP phones should connect to AS1 and AS2. This is because AS stands for Access Switch, which is responsible for connecting end devices such as IP phones to the network. DS1 and DS2 are Distribution Switches, which are used to connect different access switches together. CS1 is not mentioned in the question, so it is not relevant to the connection of IP phones. Therefore, the IP phones should only connect to AS1 and AS2.

    Rate this question:

  • 8. 

    Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?

    • Only hosts A and B

    • Only hosts A, B, and C

    • Only hosts A, B, C, and D

    • Only hosts A, B, C, and E

    Correct Answer
    A. Only hosts A, B, and C
    Explanation
    When a collision occurs in a network, all hosts that are involved in the collision will receive a collision jamming signal. In this scenario, hosts A and B are the ones attempting to transmit a frame at the same time, resulting in a collision. Therefore, only hosts A, B, and C will receive the collision jamming signal.

    Rate this question:

  • 9. 

    Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect?

    • AS1 and AS2

    • DS1 and DS2

    • DS1, DS2, and CS1

    • AS1, AS2, DS1, and DS2

    Correct Answer
    A. AS1 and AS2
    Explanation
    The IP phones should connect to AS1 and AS2.

    Rate this question:

  • 10. 

    Refer to the exhibit. What is the maximum number of VLANs that can be deleted from the Switch as it is configured?

    • Zero

    • Four

    • Five

    • Eight

    • Nine

    Correct Answer
    A. Four
    Explanation
    Based on the given information, the question is asking for the maximum number of VLANs that can be deleted from the configured switch. The correct answer is "four". This implies that there are currently at least four VLANs configured on the switch, and it is possible to delete up to that number of VLANs.

    Rate this question:

  • 11. 

    Which type of VLAN would accommodate untagged traffic on a 802.1q trunk port?

    • Data VLAN

    • Native VLAN

    • Untagged VLAN

    • Management VLAN

    Correct Answer
    A. Native VLAN
    Explanation
    A native VLAN is a type of VLAN that is configured on a trunk port to carry untagged traffic. Untagged traffic refers to data packets that do not have VLAN tags attached to them. By designating a VLAN as the native VLAN, any untagged traffic received on the trunk port will be associated with that VLAN. This allows for seamless communication between devices that do not support VLAN tagging and devices on the native VLAN.

    Rate this question:

  • 12. 

    Refer to the exhibit. What is the maximum number of VLANs that can be deleted from the Switch as it is configured?

    • 0

    • 4

    • 5

    • 8

    • 9

    Correct Answer
    A. 4
    Explanation
    Based on the given information, the maximum number of VLANs that can be deleted from the Switch is 4.

    Rate this question:

  • 13. 

    Why is MAC address filtering considered a poor choice in securing a WLAN?

    • Available bandwidth is reduced.

    • MAC addresses are easily spoofed.

    • APs are more susceptible to DoS attacks.

    • The payload encryption is easily broken.

    Correct Answer
    A. MAC addresses are easily spoofed.
    Explanation
    MAC address filtering is considered a poor choice in securing a WLAN because MAC addresses can be easily spoofed. MAC spoofing involves changing the MAC address of a device to impersonate another device that is allowed to connect to the network. This undermines the effectiveness of MAC address filtering as a security measure because unauthorized devices can bypass the filter by spoofing a valid MAC address. Therefore, relying solely on MAC address filtering leaves the WLAN vulnerable to unauthorized access and compromises its security.

    Rate this question:

  • 14. 

    Which value determines if a switch becomes the central point of reference in the spanning tree topology?

    • Lowest bridge ID

    • Highest revision number

    • Lowest numeric IP address

    • Highest numeric MAC address

    Correct Answer
    A. Lowest bridge ID
    Explanation
    The value that determines if a switch becomes the central point of reference in the spanning tree topology is the lowest bridge ID. The bridge ID is a combination of the switch's priority and MAC address. During the spanning tree algorithm, switches compare their bridge IDs, and the switch with the lowest bridge ID becomes the root bridge, which is the central point of reference for the spanning tree topology.

    Rate this question:

  • 15. 

    An administrator is troubleshooting a PC on the network which is suffering from slow and intermittent connectivity. The PC has a ping success rate to the default gateway of less than half the ping attempts. Other PCs on the switch can consistently ping the default gateway. The switch port is configured for auto duplex and the PC is configured for full duplex. What will commonly cause this problem?

    • The PC is set to full duplex. The switch port fails to autonegotiate the duplex setting and defaults to half duplex, which causes a duplex mismatch.

    • The switch traffic is exceeding available frame buffers. The result is that frames are being dropped.

    • The PC and the default gateway have different bandwidth Ethernet ports.

    • The default gateway is not on the same switch that the PC is.

    Correct Answer
    A. The PC is set to full duplex. The switch port fails to autonegotiate the duplex setting and defaults to half duplex, which causes a duplex mismatch.
    Explanation
    The most likely cause of the slow and intermittent connectivity issue is a duplex mismatch between the PC and the switch port. The PC is configured for full duplex, but the switch port fails to autonegotiate and defaults to half duplex. This mismatch in duplex settings can result in packet loss and reduced performance, leading to the connectivity problems experienced by the PC.

    Rate this question:

  • 16. 

    Refer to the exhibit. Each switch is configured to participate in STP for VLANs 1, 10, 20, and 30. Which switch will become the root for VLAN 20?

    • A

    • B

    • C

    • D

    Correct Answer
    A. D
    Explanation
    Based on the given information, the switch that will become the root for VLAN 20 is switch D. This is because the root bridge in STP is determined by the lowest bridge ID, which consists of the priority value and the MAC address. Since switch D has the lowest priority value or the lowest MAC address compared to the other switches, it will become the root for VLAN 20.

    Rate this question:

  • 17. 

    Which type of traffic can still be received on a switch interface that is in STP blocking mode?

    • BPDU frames

    • Multicast frames

    • Broadcast frames

    • Layer 3 packets

    Correct Answer
    A. BPDU frames
    Explanation
    When a switch interface is in STP blocking mode, it still allows BPDU (Bridge Protocol Data Unit) frames to be received. BPDU frames are used by switches to exchange information about the network topology and to prevent loops. By allowing BPDU frames, the switch can continue to participate in the STP protocol and maintain the loop-free network. However, other types of traffic such as multicast frames, broadcast frames, and Layer 3 packets are not allowed in STP blocking mode.

    Rate this question:

  • 18. 

    Refer to the exhibit. What would happen if the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1?

    • Host A remains a member of VLAN 10, because the router is routing traffic between VLANs.

    • Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30.

    • Host A remains a member of VLAN 10, because the switch provides dynamic VLAN assignment for the port.

    • Host A maintains connectivity to all members of VLAN 10, because it is connected to the same physical network.

    • Host A is no longer a member of VLAN 10, but because port Fa0/3 was unused, it is now a member of VLAN 1.

    Correct Answer
    A. Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30.
    Explanation
    If the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1, Host A would no longer be a member of VLAN 10. This is because port Fa0/3 has been manually assigned to VLAN 30. VLAN membership is determined by the port configuration on the switch, and since port Fa0/3 is now assigned to VLAN 30, Host A would be part of that VLAN instead of VLAN 10.

    Rate this question:

  • 19. 

    An administrator is troubleshooting a PC on the network which is suffering from slow and intermittent connectivity. The PC has a ping success rate to the default gateway of less than half the ping attempts. Other PCs on the switch can consistently ping the default gateway. The switch port is configured for auto duplex and the PC is configured for full duplex. What will commonly cause this problem?

    • The PC is set to full duplex. The switch port fails to autonegotiate the duplex setting and defaults to half duplex, which causes a duplex mismatch.

    • The switch traffic is exceeding available frame buffers. The result is that frames are being dropped.

    • The PC and the default gateway have different bandwidth Ethernet ports.

    • The default gateway is not on the same switch that the PC is.

    Correct Answer
    A. The PC is set to full duplex. The switch port fails to autonegotiate the duplex setting and defaults to half duplex, which causes a duplex mismatch.
    Explanation
    In this scenario, the PC is set to full duplex, but the switch port fails to autonegotiate the duplex setting and defaults to half duplex. This creates a duplex mismatch, where one device is operating in full duplex mode while the other is operating in half duplex mode. This can result in slow and intermittent connectivity, as the two devices are not able to effectively communicate with each other.

    Rate this question:

  • 20. 

    Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?

    • only hosts A and B

    • only hosts A, B, and C

    • only hosts A, B, C, and D

    • only hosts A, B, C, and E

    Correct Answer
    A. only hosts A, B, and C
    Explanation
    In this scenario, since Hosts A and B are connected to the same hub, they are considered part of the same collision domain. When a collision occurs, the hub will send a collision jamming signal to all the hosts connected to it. Therefore, Hosts A, B, and C will receive the collision jamming signal. Hosts D and E are not connected to the same hub, so they will not receive the collision jamming signal.

    Rate this question:

  • 21. 

    Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?

    • Associate with the access point and then open a HyperTerminal session with the access point.

    • Physically connect to the access point and then reboot the computer to launch the configuration software.

    • From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.

    • Modify the TCP/IP properties of the computer connected to the access point so that it exists on the same network, and then reboot your computer to establish a connection.

    Correct Answer
    A. From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.
    Explanation
    To establish an administrative connection for configuring the Linksys WRT300N wireless access point, the correct method is to enter the default IP address of the access point in a web browser from a computer in the same IP subnet as the access point. This allows the user to access the access point's configuration interface and make the necessary changes.

    Rate this question:

  • 22. 

    Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect?

    • AS1 and AS2

    • DS1 and DS2

    • DS1, DS2, and CS1

    • AS1, AS2, DS1, and DS2

    Correct Answer
    A. AS1 and AS2
    Explanation
    The IP phones should connect to AS1 and AS2. This is because AS1 and AS2 are the access switches in the network. Access switches are responsible for connecting end devices, such as IP phones, to the network. Therefore, the IP phones should be connected to AS1 and AS2.

    Rate this question:

  • 23. 

    Refer to the exhibit. A new switch, SW3, has been added to the network. The network administrator determines that VLAN information is not propagating to SW3. Which command will remedy the problem?

    • SW1(config)# vtp version 1

    • SW2(config)# vtp mode client

    • SW3(config)# vtp domain Cisco1

    • SW3(config)# vtp mode transparent

    Correct Answer
    A. SW3(config)# vtp domain Cisco1
    Explanation
    The command "SW3(config)# vtp domain Cisco1" will remedy the problem. This command sets the VTP domain name on SW3 to "Cisco1", which should allow the VLAN information to propagate to SW3.

    Rate this question:

  • 24. 

    Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?

    • Associate with the access point and then open a HyperTerminal session with the access point.

    • Physically connect to the access point and then reboot the computer to launch the configuration software.

    • From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.

    • Modify the TCP/IP properties of the computer connected to the access point so that it exists on the same network, and then reboot your computer to establish a connection.

    Correct Answer
    A. From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.
    Explanation
    To establish an administrative connection for configuring the Linksys WRT300N wireless access point, the method suggested is to enter the default IP address of the access point in a web browser from a computer in the same IP subnet as the access point. This allows the user to access the configuration interface of the access point and make the necessary changes or settings. By being on the same IP subnet, the computer and access point can communicate with each other effectively, enabling the configuration process.

    Rate this question:

  • 25. 

    What information in an Ethernet frame is used by a Layer 2 switch to build its address table?

    • Source IP address

    • source MAC address

    • destination IP address

    • destination MAC address

    Correct Answer
    A. source MAC address
    Explanation
    Layer 2 switches use the source MAC address in an Ethernet frame to build their address table. The source MAC address is a unique identifier assigned to the network interface card (NIC) of the device sending the frame. By examining the source MAC address of incoming frames, the switch can determine which devices are connected to each of its ports. This information is then used to forward frames to the correct destination device based on its MAC address, improving network efficiency and reducing unnecessary traffic.

    Rate this question:

  • 26. 

    An administrator is troubleshooting a PC on the network which is suffering from slow and intermittent connectivity. The PC has a ping success rate to the default gateway of less than half the ping attempts. Other PCs on the switch can consistently ping the default gateway. The switch port is configured for auto duplex and the PC is configured for full duplex. What will commonly cause this problem?

    • The PC is set to full duplex. The switch port fails to autonegotiate the duplex setting and defaults to half duplex, which causes a duplex mismatch.

    • The switch traffic is exceeding available frame buffers. The result is that frames are being dropped.

    • The PC and the default gateway have different bandwidth Ethernet ports.

    • The default gateway is not on the same switch that the PC is.

    Correct Answer
    A. The PC is set to full duplex. The switch port fails to autonegotiate the duplex setting and defaults to half duplex, which causes a duplex mismatch.
    Explanation
    The PC is set to full duplex while the switch port fails to autonegotiate the duplex setting and defaults to half duplex. This creates a duplex mismatch, resulting in slow and intermittent connectivity.

    Rate this question:

  • 27. 

    Which type of traffic can still be received on a switch interface that is in STP blocking mode?

    • BPDU frames

    • multicast frames

    • broadcast frames

    • Layer 3 packets

    Correct Answer
    A. BPDU frames
    Explanation
    When a switch interface is in STP blocking mode, it means that it is not forwarding any user data frames. However, it still receives and processes BPDU (Bridge Protocol Data Unit) frames. BPDU frames are used by switches to exchange information and determine the best path for forwarding frames in a network. Therefore, even though user data frames such as multicast frames, broadcast frames, and Layer 3 packets are not received on a switch interface in STP blocking mode, BPDU frames can still be received and processed.

    Rate this question:

  • 28. 

    In which mode is a VTP switch operating if it has been configured to only forward VTP advertisements?

    • Client

    • Root

    • server

    • transparent

    Correct Answer
    A. transparent
    Explanation
    A VTP switch is operating in transparent mode if it has been configured to only forward VTP advertisements. In this mode, the switch does not synchronize its VLAN database with other switches and does not participate in VTP updates. It simply forwards VTP advertisements to other switches in the network without making any changes to its own VLAN configuration. This mode is commonly used when there is a need to isolate VLAN configurations or when VTP updates are not required.

    Rate this question:

  • 29. 

    Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?

    • Associate with the access point and then open a HyperTerminal session with the access point.

    • Physically connect to the access point and then reboot the computer to launch the configuration software.

    • From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.

    • Modify the TCP/IP properties of the computer connected to the access point so that it exists on the same network, and then reboot your computer to establish a connection

    Correct Answer
    A. From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.
    Explanation
    To establish an administrative connection for configuring the Linksys WRT300N wireless access point, the correct method is to enter the default IP address of the access point in a web browser from a computer in the same IP subnet as the access point. By doing so, the computer can communicate with the access point and access its configuration interface through the web browser. This method allows the user to make changes to the access point's settings and configure it according to their requirements.

    Rate this question:

  • 30. 

    A network administrator is asked to connect four switches that are each configured with eight VLANs. Routers that have two FastEthernet ports each that support trunking are available. What is the minimum number of routers needed to interconnect traffic from all of the VLANs if trunking is allowed?

    • 1

    • 2

    • 4

    • 8

    • 16

    Correct Answer
    A. 1
    Explanation
    In this scenario, the routers need to support trunking to interconnect traffic from all of the VLANs. Since each router has two FastEthernet ports, it can support trunking for multiple VLANs. Therefore, only one router is needed to connect the four switches with eight VLANs each.

    Rate this question:

  • 31. 

    Refer to the exhibit. What happens when a frame from a source MAC address different from 00a8.d2e4.ba27 reaches switch port 0/5?

    • The frame is dropped.

    • The port is shut down.

    • An error message is displayed.

    • FastEthernet port 0/5 will show an err-disabled message

    Correct Answer
    A. The frame is dropped.
    Explanation
    When a frame from a source MAC address different from 00a8.d2e4.ba27 reaches switch port 0/5, the frame is dropped. This means that the switch does not forward the frame to its destination and it is discarded. There is no specific error message or port shutdown mentioned in the exhibit, so we can conclude that the frame is simply dropped.

    Rate this question:

  • 32. 

    Refer to the exhibit. A network administrator has segmented the network into two VLANs. The connected hosts can only access resources in their own VLAN. What is the most scalable and cost effective solution to allow inter-VLAN communication in this network?

    • Replace S1 with a router that has one FastEthernet interface for each PC.

    • Add a second switch and divide the PCs so that each VLAN is connected to its own switch.

    • Configure a router with two subinterfaces on one of its FastEthernet ports and connect it to S1 using a trunk link.

    • Connect a router to a port on S1 and assign the IP address of VLAN1 to the connecting router interface.

    Correct Answer
    A. Configure a router with two subinterfaces on one of its FastEthernet ports and connect it to S1 using a trunk link.
    Explanation
    The most scalable and cost-effective solution to allow inter-VLAN communication in this network is to configure a router with two subinterfaces on one of its FastEthernet ports and connect it to S1 using a trunk link. This solution allows for the creation of virtual interfaces (subinterfaces) on the router, which can be assigned to each VLAN. By using a trunk link, multiple VLANs can be carried over a single physical connection, enabling communication between the VLANs. This solution eliminates the need for additional switches or routers, making it cost-effective, and it can easily scale to accommodate future VLANs if needed.

    Rate this question:

  • 33. 

    A network administrator enters the enable command at the Switch> prompt of a new switch. What mode will the switch enter?

    • Setup mode

    • configuration mode

    • privileged EXEC mode

    • user EXEC mode

    • ROMMON mode

    • interface mode

    Correct Answer
    A. privileged EXEC mode
    Explanation
    When a network administrator enters the enable command at the Switch> prompt of a new switch, the switch will enter privileged EXEC mode. In this mode, the administrator has access to all the configuration commands and can make changes to the switch's settings. This mode provides a higher level of access and control compared to user EXEC mode, which only allows basic monitoring and troubleshooting commands.

    Rate this question:

  • 34. 

    Refer to the exhibit. Router R1 is properly configured for router on a stick inter-VLAN routing, but PC1 is unable to ping PC2. What needs to be done to resolve the problem?

    • Rename VLAN1.

    • Connect one more port of S1 to R1.

    • Configure the Fa0/1 port of S1 as a trunk port.

    • Move the Fa0/0 interface of R1 to another VLAN.

    Correct Answer
    A. Configure the Fa0/1 port of S1 as a trunk port.
    Explanation
    To resolve the problem of PC1 being unable to ping PC2, the Fa0/1 port of switch S1 needs to be configured as a trunk port. This is because router on a stick inter-VLAN routing requires a trunk port to carry traffic between the router and the switch, allowing multiple VLANs to be transmitted over a single physical link. By configuring the Fa0/1 port of S1 as a trunk port, it will be able to carry the traffic from PC1 and PC2 across different VLANs, enabling communication between them.

    Rate this question:

  • 35. 

    Refer to the exhibit. What will allow a host on VLAN 40 on switch X to communicate with a host in VLAN 40 on switch Y?

    • QoS

    • routing

    • Trunking

    • VPN

    Correct Answer
    A. Trunking
    Explanation
    Trunking is the correct answer because it allows multiple VLANs to be carried over a single physical link between switches. By configuring trunking on both switches X and Y, the host on VLAN 40 on switch X can communicate with the host in VLAN 40 on switch Y by sending and receiving traffic through the trunk link. This allows the VLAN 40 traffic to be properly tagged and transmitted between the switches, enabling communication between the hosts on the same VLAN across different switches.

    Rate this question:

  • 36. 

    Why is it important that the network administrator consider the spanning-tree network diameter when choosing the root bridge?

    • The network diameter limitation is 9.

    • BPDUs may be discarded because of expiring timers.

    • The cabling distance between the switches is 100 meters.

    • The network diameter must be set to the number of meters of the cable between the root bridge and its farthest connected switch.

    Correct Answer
    A. BPDUs may be discarded because of expiring timers.
    Explanation
    The network administrator needs to consider the spanning-tree network diameter when choosing the root bridge because BPDUs (Bridge Protocol Data Units) may be discarded due to expiring timers. BPDUs are used by switches to exchange information and maintain the spanning tree topology. If the network diameter is too large, it may take a longer time for BPDUs to reach all switches, and if the timers expire before BPDUs reach a switch, the switch may discard them. This can lead to incorrect spanning tree calculations and network instability. Therefore, considering the network diameter helps ensure that BPDUs can be successfully transmitted and received by all switches.

    Rate this question:

  • 37. 

    Refer to the exhibit. A new switch, SW3, has been added to the network. The network administrator determines that VLAN information is not propagating to SW3. Which command will remedy the problem?

    • SW1(config)# vtp version 1

    • SW2(config)# vtp mode client

    • SW3(config)# vtp domain Cisco1

    • SW3(config)# vtp mode transparent

    Correct Answer
    A. SW3(config)# vtp domain Cisco1
    Explanation
    The correct answer is "SW3(config)# vtp domain Cisco1". This command will set the VTP domain name on SW3 to "Cisco1", allowing it to receive VLAN information from other switches in the network. By setting the VTP domain name to match the other switches, SW3 will be able to participate in VTP updates and receive the VLAN information it needs.

    Rate this question:

  • 38. 

    Refer to the exhibit. Switch SWB is not responding to VTP updates from switch SWA. What is a possible cause of the problem?

    • The VTP revision numbers are different.

    • The number of existing VLANs is different.

    • There is a password set on one of the switches.

    • The enable passwords are not set on the switches

    Correct Answer
    A. There is a password set on one of the switches.
    Explanation
    One possible cause of the problem is that there is a password set on one of the switches. This can prevent the VTP updates from being received by switch SWB, causing it to not respond.

    Rate this question:

  • 39. 

    Which IEEE trunking protocol is used to encapsulate data traffic over a trunk link on a Cisco switch?

    • STP

    • DTP

    • VTP

    • 802.1Q

    Correct Answer
    A. 802.1Q
    Explanation
    802.1Q is the correct answer because it is the IEEE trunking protocol used to encapsulate data traffic over a trunk link on a Cisco switch. This protocol allows for the transmission of multiple VLANs over a single physical link, enabling efficient use of network resources and simplifying network management. STP (Spanning Tree Protocol) is used for loop prevention, DTP (Dynamic Trunking Protocol) is used for negotiating trunk links, and VTP (VLAN Trunking Protocol) is used for managing VLANs, but they are not specifically used for encapsulating data traffic over a trunk link.

    Rate this question:

  • 40. 

    Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP address should be assigned to this new host?

    • 192.168.1.11 /28

    • 192.168.1.22 /28

    • 192.168.1.33 /28

    • 192.168.1.44 /28

    • 192.168.1.55 /28

    Correct Answer
    A. 192.168.1.22 /28
    Explanation
    The new host should be assigned the IP address 192.168.1.22 /28 because it falls within the range of the subnet 192.168.1.16/28. The subnet mask /28 indicates that the network can accommodate 16 hosts, with valid IP addresses ranging from 192.168.1.17 to 192.168.1.30. Therefore, 192.168.1.22 is a valid IP address within this range and can be assigned to the new host.

    Rate this question:

  • 41. 

    Refer to the exhibit. The Layer 2 switching design that is shown has been implemented in a campus environment that is using Spanning Tree Protocol. All inter-switch links that are shown are trunks. Whenever an inter-switch link fails, the network takes nearly a minute to completely converge. How can the convergence time be reduced?

    • Increase the capacity of the distribution and core trunk links to 10 Gb/s.

    • Add a trunk link that directly connects D1 and D2.

    • Use Layer 3 switching on the core switch.

    • Implement Rapid Spanning Tree Protocol

    Correct Answer
    A. Implement Rapid Spanning Tree Protocol
    Explanation
    Implementing Rapid Spanning Tree Protocol (RSTP) can reduce the convergence time in the network. RSTP is an improvement over the traditional Spanning Tree Protocol (STP) and provides faster convergence by reducing the time it takes for the network to recover from link failures. RSTP achieves this by introducing new port states and mechanisms that allow for quicker detection and reconfiguration of the network topology. By implementing RSTP, the network can achieve faster convergence, reducing the time it takes for the network to recover from link failures.

    Rate this question:

  • 42. 

    Refer to the exhibit. Each switch is configured to participate in STP for VLANs 1, 10, 20, and 30. Which switch will become the root for VLAN 20?

    • A

    • B

    • C

    • D

    Correct Answer
    A. D
    Explanation
    Based on the information provided, the switch that will become the root for VLAN 20 is switch D. This can be determined by looking at the Bridge ID of each switch. The Bridge ID is composed of a priority value and the MAC address. The switch with the lowest Bridge ID becomes the root. Since switch D has the lowest priority value for VLAN 20, it will become the root for that VLAN.

    Rate this question:

  • 43. 

    Why is it advisable that a network administrator use SSH instead of Telnet when managing switches?

    • SSH uses TCP whereas Telnet does not.

    • SSH encrypts only the username and password when logging in.

    • SSH encrypts all remote management communications whereas Telnet does not.

    • SSH sends a clear text message steam which reduces the bandwidth use for management.

    Correct Answer
    A. SSH encrypts all remote management communications whereas Telnet does not.
    Explanation
    SSH is advisable to use instead of Telnet when managing switches because it encrypts all remote management communications, providing a secure and protected connection. Telnet, on the other hand, does not encrypt any data, making it vulnerable to eavesdropping and unauthorized access. By using SSH, network administrators can ensure the confidentiality and integrity of their communications, safeguarding sensitive information and preventing potential security breaches.

    Rate this question:

  • 44. 

    What information in an Ethernet frame is used by a Layer 2 switch to build its address table?

    • Source IP address

    • source MAC address

    • destination IP address

    • destination MAC address

    Correct Answer
    A. source MAC address
    Explanation
    Layer 2 switches use the source MAC address in an Ethernet frame to build their address table. This is because the MAC address uniquely identifies each device connected to the network. By examining the source MAC address, the switch can determine which port the device is connected to and update its address table accordingly. This allows the switch to efficiently forward future frames to the appropriate destination device without flooding the network with unnecessary traffic.

    Rate this question:

  • 45. 

    Refer to the exhibit. What is the result of issuing these commands?

    • The enable password will be set.

    • The password will be set for the first Telnet connection.

    • The password will be set for the console connection

    Correct Answer
    A. The password will be set for the first Telnet connection.
    Explanation
    The given commands will set a password for the first Telnet connection. The "enable password" command is used to set the password for accessing privileged EXEC mode, not for Telnet connections. The "line vty 0 4" command is used to configure Telnet or SSH access, and the "password" command is used to set the password for Telnet connections. Therefore, the correct answer is that the password will be set for the first Telnet connection.

    Rate this question:

  • 46. 

    Refer to the exhibit. If switch SW1 is configured with the four VLANs as shown in the exhibit, how many physical interfaces are needed on router R1 to configure inter-VLAN routing using subinterfaces?

    • 0

    • 1

    • 2

    • 4

    Correct Answer
    A. 1
    Explanation
    To configure inter-VLAN routing using subinterfaces, the router needs one physical interface. Each VLAN will be assigned a subinterface on the router, allowing communication between the VLANs. Therefore, only one physical interface on router R1 is required for this configuration.

    Rate this question:

  • 47. 

    Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161. What will the router do with this packet?

    • The router will drop the packet.

    • The router will forward the packet out interface FastEthernet 0/1.1.

    • The router will forward the packet out interface FastEthernet 0/1.2.

    • The router will forward the packet out interface FastEthernet 0/1.3.

    • The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3

    Correct Answer
    A. The router will drop the packet.
    Explanation
    Based on the given information, the router receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161. Since the source and destination addresses are within the same network (192.168.1.0/24), the router determines that the packet needs to be forwarded within the same network. However, there is no interface specified for this network in the exhibit. Therefore, the router does not have a valid interface to forward the packet to, resulting in the router dropping the packet.

    Rate this question:

  • 48. 

    Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installation surveys showed strong signal strength from the AP locations to the client locations. Outside electrical interference has been eliminated. What will fix the problem?

    • Relocate the APs closer to each other.

    • Increase the distance between the clients.

    • Change the channel on AP-B to 6 or 11.

    • Place AP-A and AP-B on the same wireless channel

    Correct Answer
    A. Change the channel on AP-B to 6 or 11.
    Explanation
    Changing the channel on AP-B to 6 or 11 will fix the problem. Intermittent connectivity issues can occur when neighboring access points are using the same wireless channel, causing interference and signal degradation. By changing the channel on AP-B to 6 or 11, it will ensure that AP-A and AP-B are not operating on the same channel, reducing interference and improving connectivity for users A and B.

    Rate this question:

  • 49. 

    Refer to the exhibit. What would happen if the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1?

    • Host A remains a member of VLAN 10, because the router is routing traffic between VLANs.

    • Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30.

    • Host A remains a member of VLAN 10, because the switch provides dynamic VLAN assignment for the port.

    • Host A maintains connectivity to all members of VLAN 10, because it is connected to the same physical network.

    • Host A is no longer a member of VLAN 10, but because port Fa0/3 was unused, it is now a member of VLAN 1.

    Correct Answer
    A. Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30.
    Explanation
    If the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1, Host A would no longer be a member of VLAN 10. This is because port Fa0/3 has been manually assigned to VLAN 30.

    Rate this question:

Quiz Review Timeline (Updated): Mar 19, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 23, 2013
    Quiz Created by
    Tmatijevic
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.