Ccna3 Final All April 2013

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Tmatijevic
T
Tmatijevic
Community Contributor
Quizzes Created: 1 | Total Attempts: 167
| Attempts: 167 | Questions: 184
Please wait...
Question 1 / 184
0 %
0/100
Score 0/100
1. Which parameter is used to uniquely identify one wireless network from another?

Explanation

SSID stands for Service Set Identifier. It is a unique name assigned to a wireless network. It is used to identify and differentiate one wireless network from another. When devices search for available networks, they use the SSID to determine which network to connect to. The SSID is typically set by the network administrator and can be customized to make it easier for users to identify and connect to the correct network.

Submit
Please wait...
About This Quiz
Ccna3 Final All April 2013 - Quiz

This CCNA3 final exam for April 2013 assesses advanced knowledge in network configuration, management, and troubleshooting. It covers topics like VLANs, Spanning Tree Protocol, and inter-VLAN routing, crucial... see morefor network administrators and IT professionals. see less

2. Which value determines if a switch becomes the central point of reference in the spanning tree topology?

Explanation

The bridge ID is a unique identifier assigned to each switch in a spanning tree network. It consists of a priority value and the MAC address of the switch. The switch with the lowest bridge ID becomes the root bridge, which is the central point of reference in the spanning tree topology. The root bridge is responsible for determining the shortest path to each switch in the network. Therefore, the switch with the lowest bridge ID becomes the central point of reference in the spanning tree topology.

Submit
3. Why is MAC address filtering considered a poor choice in securing a WLAN?

Explanation

MAC address filtering is considered a poor choice in securing a WLAN because MAC addresses can be easily spoofed. This means that an attacker can impersonate a legitimate device by changing their MAC address to match that of an authorized device. This bypasses the filtering mechanism and allows unauthorized access to the network. As a result, relying solely on MAC address filtering for security can be ineffective and leave the WLAN vulnerable to unauthorized users.

Submit
4. Which value determines if a switch becomes the central point of reference in the spanning tree topology?

Explanation

The value that determines if a switch becomes the central point of reference in the spanning tree topology is the lowest bridge ID. In the spanning tree protocol, each switch is assigned a unique bridge ID, which consists of a priority value and a MAC address. The switch with the lowest bridge ID is elected as the root bridge and becomes the central point of reference for the spanning tree topology.

Submit
5. Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect?

Explanation

The IP phones should connect to AS1 and AS2. This is because AS stands for Access Switch, which is responsible for connecting end devices such as IP phones to the network. DS1 and DS2 are Distribution Switches, which are used to connect different access switches together. CS1 is not mentioned in the question, so it is not relevant to the connection of IP phones. Therefore, the IP phones should only connect to AS1 and AS2.

Submit
6. Which parameter is used to uniquely identify one wireless network from another?

Explanation

The parameter used to uniquely identify one wireless network from another is the SSID (Service Set Identifier). The SSID is a case-sensitive alphanumeric string that is assigned to a wireless network. When devices search for available networks, they can identify and connect to the correct network by matching the SSID. Each wireless network has its own unique SSID, allowing multiple networks to coexist in the same area without interference.

Submit
7. A network technician is attempting to configure 802.1q trunking on switch ports Fa0/5 through Fa0/10. Which set of commands will accomplish this task? Correct answer is image two.

Explanation

not-available-via-ai

Submit
8. Which type of VLAN would accommodate untagged traffic on a 802.1q trunk port?

Explanation

A native VLAN is a type of VLAN that is configured on a trunk port to carry untagged traffic. Untagged traffic refers to data packets that do not have VLAN tags attached to them. By designating a VLAN as the native VLAN, any untagged traffic received on the trunk port will be associated with that VLAN. This allows for seamless communication between devices that do not support VLAN tagging and devices on the native VLAN.

Submit
9. Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?

Explanation

When a collision occurs in a network, all hosts that are involved in the collision will receive a collision jamming signal. In this scenario, hosts A and B are the ones attempting to transmit a frame at the same time, resulting in a collision. Therefore, only hosts A, B, and C will receive the collision jamming signal.

Submit
10. Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect?

Explanation

The IP phones should connect to AS1 and AS2.

Submit
11. Refer to the exhibit. What is the maximum number of VLANs that can be deleted from the Switch as it is configured?

Explanation

Based on the given information, the maximum number of VLANs that can be deleted from the Switch is 4.

Submit
12. Why is MAC address filtering considered a poor choice in securing a WLAN?

Explanation

MAC address filtering is considered a poor choice in securing a WLAN because MAC addresses can be easily spoofed. MAC spoofing involves changing the MAC address of a device to impersonate another device that is allowed to connect to the network. This undermines the effectiveness of MAC address filtering as a security measure because unauthorized devices can bypass the filter by spoofing a valid MAC address. Therefore, relying solely on MAC address filtering leaves the WLAN vulnerable to unauthorized access and compromises its security.

Submit
13. Refer to the exhibit. What is the maximum number of VLANs that can be deleted from the Switch as it is configured?

Explanation

Based on the given information, the question is asking for the maximum number of VLANs that can be deleted from the configured switch. The correct answer is "four". This implies that there are currently at least four VLANs configured on the switch, and it is possible to delete up to that number of VLANs.

Submit
14. Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?

Explanation

In this scenario, since Hosts A and B are connected to the same hub, they are considered part of the same collision domain. When a collision occurs, the hub will send a collision jamming signal to all the hosts connected to it. Therefore, Hosts A, B, and C will receive the collision jamming signal. Hosts D and E are not connected to the same hub, so they will not receive the collision jamming signal.

Submit
15. Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?

Explanation

To establish an administrative connection for configuring the Linksys WRT300N wireless access point, the correct method is to enter the default IP address of the access point in a web browser from a computer in the same IP subnet as the access point. This allows the user to access the access point's configuration interface and make the necessary changes.

Submit
16. Refer to the exhibit. What would happen if the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1?

Explanation

If the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1, Host A would no longer be a member of VLAN 10. This is because port Fa0/3 has been manually assigned to VLAN 30. VLAN membership is determined by the port configuration on the switch, and since port Fa0/3 is now assigned to VLAN 30, Host A would be part of that VLAN instead of VLAN 10.

Submit
17. Which value determines if a switch becomes the central point of reference in the spanning tree topology?

Explanation

The value that determines if a switch becomes the central point of reference in the spanning tree topology is the lowest bridge ID. The bridge ID is a combination of the switch's priority and MAC address. During the spanning tree algorithm, switches compare their bridge IDs, and the switch with the lowest bridge ID becomes the root bridge, which is the central point of reference for the spanning tree topology.

Submit
18. An administrator is troubleshooting a PC on the network which is suffering from slow and intermittent connectivity. The PC has a ping success rate to the default gateway of less than half the ping attempts. Other PCs on the switch can consistently ping the default gateway. The switch port is configured for auto duplex and the PC is configured for full duplex. What will commonly cause this problem?

Explanation

The most likely cause of the slow and intermittent connectivity issue is a duplex mismatch between the PC and the switch port. The PC is configured for full duplex, but the switch port fails to autonegotiate and defaults to half duplex. This mismatch in duplex settings can result in packet loss and reduced performance, leading to the connectivity problems experienced by the PC.

Submit
19. An administrator is troubleshooting a PC on the network which is suffering from slow and intermittent connectivity. The PC has a ping success rate to the default gateway of less than half the ping attempts. Other PCs on the switch can consistently ping the default gateway. The switch port is configured for auto duplex and the PC is configured for full duplex. What will commonly cause this problem?

Explanation

In this scenario, the PC is set to full duplex, but the switch port fails to autonegotiate the duplex setting and defaults to half duplex. This creates a duplex mismatch, where one device is operating in full duplex mode while the other is operating in half duplex mode. This can result in slow and intermittent connectivity, as the two devices are not able to effectively communicate with each other.

Submit
20. Refer to the exhibit. Each switch is configured to participate in STP for VLANs 1, 10, 20, and 30. Which switch will become the root for VLAN 20?

Explanation

Based on the given information, the switch that will become the root for VLAN 20 is switch D. This is because the root bridge in STP is determined by the lowest bridge ID, which consists of the priority value and the MAC address. Since switch D has the lowest priority value or the lowest MAC address compared to the other switches, it will become the root for VLAN 20.

Submit
21. Which type of traffic can still be received on a switch interface that is in STP blocking mode?

Explanation

When a switch interface is in STP blocking mode, it still allows BPDU (Bridge Protocol Data Unit) frames to be received. BPDU frames are used by switches to exchange information about the network topology and to prevent loops. By allowing BPDU frames, the switch can continue to participate in the STP protocol and maintain the loop-free network. However, other types of traffic such as multicast frames, broadcast frames, and Layer 3 packets are not allowed in STP blocking mode.

Submit
22. Refer to the exhibit. A new switch, SW3, has been added to the network. The network administrator determines that VLAN information is not propagating to SW3. Which command will remedy the problem?

Explanation

The command "SW3(config)# vtp domain Cisco1" will remedy the problem. This command sets the VTP domain name on SW3 to "Cisco1", which should allow the VLAN information to propagate to SW3.

Submit
23. Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect?

Explanation

The IP phones should connect to AS1 and AS2. This is because AS1 and AS2 are the access switches in the network. Access switches are responsible for connecting end devices, such as IP phones, to the network. Therefore, the IP phones should be connected to AS1 and AS2.

Submit
24. An administrator is troubleshooting a PC on the network which is suffering from slow and intermittent connectivity. The PC has a ping success rate to the default gateway of less than half the ping attempts. Other PCs on the switch can consistently ping the default gateway. The switch port is configured for auto duplex and the PC is configured for full duplex. What will commonly cause this problem?

Explanation

The PC is set to full duplex while the switch port fails to autonegotiate the duplex setting and defaults to half duplex. This creates a duplex mismatch, resulting in slow and intermittent connectivity.

Submit
25. Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?

Explanation

To establish an administrative connection for configuring the Linksys WRT300N wireless access point, the method suggested is to enter the default IP address of the access point in a web browser from a computer in the same IP subnet as the access point. This allows the user to access the configuration interface of the access point and make the necessary changes or settings. By being on the same IP subnet, the computer and access point can communicate with each other effectively, enabling the configuration process.

Submit
26. Which type of traffic can still be received on a switch interface that is in STP blocking mode?

Explanation

When a switch interface is in STP blocking mode, it means that it is not forwarding any user data frames. However, it still receives and processes BPDU (Bridge Protocol Data Unit) frames. BPDU frames are used by switches to exchange information and determine the best path for forwarding frames in a network. Therefore, even though user data frames such as multicast frames, broadcast frames, and Layer 3 packets are not received on a switch interface in STP blocking mode, BPDU frames can still be received and processed.

Submit
27. What information in an Ethernet frame is used by a Layer 2 switch to build its address table?

Explanation

Layer 2 switches use the source MAC address in an Ethernet frame to build their address table. The source MAC address is a unique identifier assigned to the network interface card (NIC) of the device sending the frame. By examining the source MAC address of incoming frames, the switch can determine which devices are connected to each of its ports. This information is then used to forward frames to the correct destination device based on its MAC address, improving network efficiency and reducing unnecessary traffic.

Submit
28. Refer to the exhibit. A network administrator has segmented the network into two VLANs. The connected hosts can only access resources in their own VLAN. What is the most scalable and cost effective solution to allow inter-VLAN communication in this network?

Explanation

The most scalable and cost-effective solution to allow inter-VLAN communication in this network is to configure a router with two subinterfaces on one of its FastEthernet ports and connect it to S1 using a trunk link. This solution allows for the creation of virtual interfaces (subinterfaces) on the router, which can be assigned to each VLAN. By using a trunk link, multiple VLANs can be carried over a single physical connection, enabling communication between the VLANs. This solution eliminates the need for additional switches or routers, making it cost-effective, and it can easily scale to accommodate future VLANs if needed.

Submit
29. A network administrator is asked to connect four switches that are each configured with eight VLANs. Routers that have two FastEthernet ports each that support trunking are available. What is the minimum number of routers needed to interconnect traffic from all of the VLANs if trunking is allowed?

Explanation

In this scenario, the routers need to support trunking to interconnect traffic from all of the VLANs. Since each router has two FastEthernet ports, it can support trunking for multiple VLANs. Therefore, only one router is needed to connect the four switches with eight VLANs each.

Submit
30. A network administrator enters the enable command at the Switch> prompt of a new switch. What mode will the switch enter?

Explanation

When a network administrator enters the enable command at the Switch> prompt of a new switch, the switch will enter privileged EXEC mode. In this mode, the administrator has access to all the configuration commands and can make changes to the switch's settings. This mode provides a higher level of access and control compared to user EXEC mode, which only allows basic monitoring and troubleshooting commands.

Submit
31. Refer to the exhibit. Router R1 is properly configured for router on a stick inter-VLAN routing, but PC1 is unable to ping PC2. What needs to be done to resolve the problem?

Explanation

To resolve the problem of PC1 being unable to ping PC2, the Fa0/1 port of switch S1 needs to be configured as a trunk port. This is because router on a stick inter-VLAN routing requires a trunk port to carry traffic between the router and the switch, allowing multiple VLANs to be transmitted over a single physical link. By configuring the Fa0/1 port of S1 as a trunk port, it will be able to carry the traffic from PC1 and PC2 across different VLANs, enabling communication between them.

Submit
32. In which mode is a VTP switch operating if it has been configured to only forward VTP advertisements?

Explanation

A VTP switch is operating in transparent mode if it has been configured to only forward VTP advertisements. In this mode, the switch does not synchronize its VLAN database with other switches and does not participate in VTP updates. It simply forwards VTP advertisements to other switches in the network without making any changes to its own VLAN configuration. This mode is commonly used when there is a need to isolate VLAN configurations or when VTP updates are not required.

Submit
33. Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?

Explanation

To establish an administrative connection for configuring the Linksys WRT300N wireless access point, the correct method is to enter the default IP address of the access point in a web browser from a computer in the same IP subnet as the access point. By doing so, the computer can communicate with the access point and access its configuration interface through the web browser. This method allows the user to make changes to the access point's settings and configure it according to their requirements.

Submit
34. Refer to the exhibit. What happens when a frame from a source MAC address different from 00a8.d2e4.ba27 reaches switch port 0/5?

Explanation

When a frame from a source MAC address different from 00a8.d2e4.ba27 reaches switch port 0/5, the frame is dropped. This means that the switch does not forward the frame to its destination and it is discarded. There is no specific error message or port shutdown mentioned in the exhibit, so we can conclude that the frame is simply dropped.

Submit
35. Refer to the exhibit. A new switch, SW3, has been added to the network. The network administrator determines that VLAN information is not propagating to SW3. Which command will remedy the problem?

Explanation

The correct answer is "SW3(config)# vtp domain Cisco1". This command will set the VTP domain name on SW3 to "Cisco1", allowing it to receive VLAN information from other switches in the network. By setting the VTP domain name to match the other switches, SW3 will be able to participate in VTP updates and receive the VLAN information it needs.

Submit
36. Refer to the exhibit. Switch SWB is not responding to VTP updates from switch SWA. What is a possible cause of the problem?

Explanation

One possible cause of the problem is that there is a password set on one of the switches. This can prevent the VTP updates from being received by switch SWB, causing it to not respond.

Submit
37. Refer to the exhibit. What will allow a host on VLAN 40 on switch X to communicate with a host in VLAN 40 on switch Y?

Explanation

Trunking is the correct answer because it allows multiple VLANs to be carried over a single physical link between switches. By configuring trunking on both switches X and Y, the host on VLAN 40 on switch X can communicate with the host in VLAN 40 on switch Y by sending and receiving traffic through the trunk link. This allows the VLAN 40 traffic to be properly tagged and transmitted between the switches, enabling communication between the hosts on the same VLAN across different switches.

Submit
38. Why is it important that the network administrator consider the spanning-tree network diameter when choosing the root bridge?

Explanation

The network administrator needs to consider the spanning-tree network diameter when choosing the root bridge because BPDUs (Bridge Protocol Data Units) may be discarded due to expiring timers. BPDUs are used by switches to exchange information and maintain the spanning tree topology. If the network diameter is too large, it may take a longer time for BPDUs to reach all switches, and if the timers expire before BPDUs reach a switch, the switch may discard them. This can lead to incorrect spanning tree calculations and network instability. Therefore, considering the network diameter helps ensure that BPDUs can be successfully transmitted and received by all switches.

Submit
39. Which IEEE trunking protocol is used to encapsulate data traffic over a trunk link on a Cisco switch?

Explanation

802.1Q is the correct answer because it is the IEEE trunking protocol used to encapsulate data traffic over a trunk link on a Cisco switch. This protocol allows for the transmission of multiple VLANs over a single physical link, enabling efficient use of network resources and simplifying network management. STP (Spanning Tree Protocol) is used for loop prevention, DTP (Dynamic Trunking Protocol) is used for negotiating trunk links, and VTP (VLAN Trunking Protocol) is used for managing VLANs, but they are not specifically used for encapsulating data traffic over a trunk link.

Submit
40. Refer to the exhibit. The Layer 2 switching design that is shown has been implemented in a campus environment that is using Spanning Tree Protocol. All inter-switch links that are shown are trunks. Whenever an inter-switch link fails, the network takes nearly a minute to completely converge. How can the convergence time be reduced?

Explanation

Implementing Rapid Spanning Tree Protocol (RSTP) can reduce the convergence time in the network. RSTP is an improvement over the traditional Spanning Tree Protocol (STP) and provides faster convergence by reducing the time it takes for the network to recover from link failures. RSTP achieves this by introducing new port states and mechanisms that allow for quicker detection and reconfiguration of the network topology. By implementing RSTP, the network can achieve faster convergence, reducing the time it takes for the network to recover from link failures.

Submit
41. Refer to the exhibit. Each switch is configured to participate in STP for VLANs 1, 10, 20, and 30. Which switch will become the root for VLAN 20?

Explanation

Based on the information provided, the switch that will become the root for VLAN 20 is switch D. This can be determined by looking at the Bridge ID of each switch. The Bridge ID is composed of a priority value and the MAC address. The switch with the lowest Bridge ID becomes the root. Since switch D has the lowest priority value for VLAN 20, it will become the root for that VLAN.

Submit
42. Why is it advisable that a network administrator use SSH instead of Telnet when managing switches?

Explanation

SSH is advisable to use instead of Telnet when managing switches because it encrypts all remote management communications, providing a secure and protected connection. Telnet, on the other hand, does not encrypt any data, making it vulnerable to eavesdropping and unauthorized access. By using SSH, network administrators can ensure the confidentiality and integrity of their communications, safeguarding sensitive information and preventing potential security breaches.

Submit
43. What information in an Ethernet frame is used by a Layer 2 switch to build its address table?

Explanation

Layer 2 switches use the source MAC address in an Ethernet frame to build their address table. This is because the MAC address uniquely identifies each device connected to the network. By examining the source MAC address, the switch can determine which port the device is connected to and update its address table accordingly. This allows the switch to efficiently forward future frames to the appropriate destination device without flooding the network with unnecessary traffic.

Submit
44. Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP address should be assigned to this new host?

Explanation

The new host should be assigned the IP address 192.168.1.22 /28 because it falls within the range of the subnet 192.168.1.16/28. The subnet mask /28 indicates that the network can accommodate 16 hosts, with valid IP addresses ranging from 192.168.1.17 to 192.168.1.30. Therefore, 192.168.1.22 is a valid IP address within this range and can be assigned to the new host.

Submit
45. Refer to the exhibit. What is the result of issuing these commands?

Explanation

The given commands will set a password for the first Telnet connection. The "enable password" command is used to set the password for accessing privileged EXEC mode, not for Telnet connections. The "line vty 0 4" command is used to configure Telnet or SSH access, and the "password" command is used to set the password for Telnet connections. Therefore, the correct answer is that the password will be set for the first Telnet connection.

Submit
46. Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installation surveys showed strong signal strength from the AP locations to the client locations. Outside electrical interference has been eliminated. What will fix the problem?

Explanation

Changing the channel on AP-B to 6 or 11 will fix the problem. Intermittent connectivity issues can occur when neighboring access points are using the same wireless channel, causing interference and signal degradation. By changing the channel on AP-B to 6 or 11, it will ensure that AP-A and AP-B are not operating on the same channel, reducing interference and improving connectivity for users A and B.

Submit
47. Refer to the exhibit. If switch SW1 is configured with the four VLANs as shown in the exhibit, how many physical interfaces are needed on router R1 to configure inter-VLAN routing using subinterfaces?

Explanation

To configure inter-VLAN routing using subinterfaces, the router needs one physical interface. Each VLAN will be assigned a subinterface on the router, allowing communication between the VLANs. Therefore, only one physical interface on router R1 is required for this configuration.

Submit
48. Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161. What will the router do with this packet?

Explanation

Based on the given information, the router receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161. Since the source and destination addresses are within the same network (192.168.1.0/24), the router determines that the packet needs to be forwarded within the same network. However, there is no interface specified for this network in the exhibit. Therefore, the router does not have a valid interface to forward the packet to, resulting in the router dropping the packet.

Submit
49. Refer to the exhibit. What would happen if the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1?

Explanation

If the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1, Host A would no longer be a member of VLAN 10. This is because port Fa0/3 has been manually assigned to VLAN 30.

Submit
50. Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. What should be done to fix the problem?

Explanation

To fix the problem of hosts connected to switch SW1 not being able to communicate with the hosts in the same VLANs connected to switch SW2, the trunk port on switch SW2 should be reconfigured with static trunk configuration. This will ensure that the VLAN information is properly transmitted between the switches, allowing for communication between the hosts in the same VLANs.

Submit
51. What is the benefit of the auto-MDIX feature on a Cisco Catalyst switch?

Explanation

The auto-MDIX feature on a Cisco Catalyst switch allows the use of straight-through patch cables regardless of connected device types. This means that whether the connected device requires a straight-through or a crossover cable, the auto-MDIX feature will automatically detect and adjust the connection accordingly. This simplifies the cabling process and eliminates the need for manual cable adjustments, making network setup and maintenance easier.

Submit
52. Refer to the exhibit. A network administrator has segmented the network into two VLANs. The connected hosts can only access resources in their own VLAN. What is the most scalable and cost effective solution to allow inter-VLAN communication in this network?

Explanation

The most scalable and cost-effective solution to allow inter-VLAN communication in this network is to configure a router with two subinterfaces on one of its FastEthernet ports and connect it to S1 using a trunk link. This allows the router to handle the traffic between the VLANs by creating virtual interfaces for each VLAN. The trunk link enables the transmission of multiple VLAN traffic over a single physical link, reducing the need for additional physical connections and switches.

Submit
53. Why is it advisable that a network administrator use SSH instead of Telnet when managing switches?

Explanation

SSH encrypts all remote management communications whereas Telnet does not. This means that when using SSH, all the data transmitted between the network administrator's device and the switches is encrypted, ensuring that it cannot be intercepted or read by unauthorized individuals. On the other hand, Telnet sends data in clear text, making it vulnerable to eavesdropping and unauthorized access. Therefore, using SSH provides a higher level of security and protects sensitive information during remote management tasks.

Submit
54. What is the purpose of the Spanning Tree algorithm?

Explanation

The purpose of the Spanning Tree algorithm is to prevent loops in a switched network with redundant paths. By identifying and disabling redundant paths, the algorithm ensures that there is only one active path between any two switches, preventing the possibility of broadcast storms and network instability caused by loops.

Submit
55. Refer to the exhibit. Each switch is shown with its MAC address. Which switch will be elected as the spanning-tree rootbridge if the switches are configured with their default priority values?

Explanation

not-available-via-ai

Submit
56. Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?

Explanation

The term "DYNAMIC" in the output indicates that the MAC address entry was dynamically learned by the switch. This means that the switch learned the MAC address from the source address in a frame received on Fa0/18. The switch automatically updates its MAC address table by learning and associating MAC addresses with the corresponding ports. In this case, the MAC address 0060.5c5b.cd23 was learned from a frame received on port Fa0/18.

Submit
57. What is the purpose of the Spanning Tree algorithm?

Explanation

The purpose of the Spanning Tree algorithm is to prevent loops in a switched network with redundant paths. This algorithm ensures that there is only one active path between any two network devices, thus preventing the formation of loops that could lead to broadcast storms and network congestion. By selecting a single path and blocking redundant paths, the Spanning Tree algorithm improves network stability and ensures efficient data transmission.

Submit
58. Refer to the exhibit. A network administrator has segmented the network into two VLANs and configured R1 and S1 as displayed. However, PC1 is unable to access PC2. What is the likely problem?

Explanation

The likely problem is that the Fa0/1 port of S1 is not configured as a trunk port. In order for VLAN traffic to pass between the switch and the router, the port connecting them needs to be configured as a trunk port. A trunk port allows multiple VLANs to pass through it, while an access port can only carry traffic for a single VLAN. Since PC1 is unable to access PC2, it suggests that the VLAN traffic is not being properly passed between the switch and the router, indicating that the port is not configured correctly.

Submit
59. What is the purpose of configuring a switch port as a trunk port?

Explanation

Configuring a switch port as a trunk port allows for the transmission of data from multiple VLANs through a single port. This is useful in situations where there are multiple VLANs in a network and data needs to be exchanged between them. Trunk ports tag the frames with VLAN information, allowing the receiving switch to correctly identify and forward the frames to the appropriate VLAN. By using trunk ports, it is possible to effectively manage and control traffic between VLANs without the need for separate physical connections for each VLAN.

Submit
60. Refer to the exhibit. A new host needs to be connected to VLAN 3. Which IP address should be assigned to this new host?

Explanation

The IP address that should be assigned to the new host is 192.168.1.52 /28. This is because the subnet mask /28 indicates that the first 28 bits of the IP address are used for the network portion, leaving 4 bits for the host portion. The IP address 192.168.1.52 falls within the range of usable host addresses in VLAN 3.

Submit
61. Refer to the exhibit. Which statement is true about the status of interface Fa0/1?

Explanation

not-available-via-ai

Submit
62. Refer to the exhibit. A network administrator has segmented the network into two VLANs and configured Router1 for inter-VLAN routing. A test of the network, however, shows that hosts on each VLAN can only access local resources and not resources on the other VLAN. What is the most likely cause of this problem?

Explanation

The most likely cause of the problem is that the switch port Fa0/1 is not trunking. Trunking is used to carry traffic for multiple VLANs over a single link, allowing hosts on different VLANs to communicate with each other. If the switch port is not configured as a trunk port, it will only allow traffic for a single VLAN, which would explain why hosts on each VLAN can only access local resources and not resources on the other VLAN.

Submit
63. Refer to the exhibit. Hosts that are connected to switch SW1 are not able to communicate with hosts in the same VLAN thatare connected to switch SW2. What should be done to fix the problem?

Explanation

To fix the problem of hosts not being able to communicate with hosts in the same VLAN connected to switch SW2, the fa0/1 interface on switch SW1 should be reconfigured with a static trunk configuration. This will allow the interface to carry traffic from multiple VLANs, enabling communication between the switches and the hosts in the same VLAN.

Submit
64. Using the command copy tftp:backup.cfg startup-config, an administrator downloaded a saved configuration from a TFTP server to a switch. Why does the administrator not detect any changes in the switch configuration after the download completes?

Explanation

not-available-via-ai

Submit
65. Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. What should be done to fix the problem?

Explanation

The correct answer is to reconfigure the trunk port on switch SW2 with static trunk configuration. This is because the question states that the hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. This indicates a problem with the trunk port, which is responsible for carrying traffic between switches. By reconfiguring the trunk port with static trunk configuration, it ensures that the VLAN information is properly transmitted between the switches, allowing communication between the hosts in the same VLANs.

Submit
66. Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?

Explanation

The term "DYNAMIC" in the output indicates that the switch has learned the MAC address 0060.5c5b.cd23 from the source address in a frame received on port Fa0/18. This means that the switch dynamically added this MAC address to its MAC address table based on the source address of a frame it received on that specific port.

Submit
67. Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161. What will the router do with this packet?

Explanation

The router will drop the packet because the source and destination addresses are in the same subnet (192.168.1.0/24). Since the packet is destined for a host within the same subnet, the router does not need to forward it to another interface. Instead, the router will drop the packet as it does not need to be routed.

Submit
68. Company policy requires disabling the command history buffer on network devices. An administrator enters terminal no history size at the command prompt on a Cisco Catalyst switch and receives no error messages back, but the command history buffer is still available. What is the problem?

Explanation

The problem is that the size parameter in the command only reset the default buffer size, but it did not actually disable access to the buffer. This means that the command history buffer is still available despite the administrator's attempt to disable it.

Submit
69. Which CLI mode allows users to access all device commands, such as those used for configuration, management, and troubleshooting?

Explanation

The privileged EXEC mode is the CLI mode that allows users to access all device commands, including those used for configuration, management, and troubleshooting. In this mode, users have elevated privileges and can perform advanced tasks such as configuring interfaces, managing routing protocols, and troubleshooting network issues. This mode provides full control and access to all device commands and is typically accessed after entering the user EXEC mode with the necessary credentials.

Submit
70. Refer to the exhibit. Which Spanning Tree Protocol version is in effect?

Explanation

The correct answer is Rapid Spanning Tree Protocol (RSTP). This is because RSTP is an IEEE standard protocol that provides rapid convergence of the spanning tree in a network. It improves upon the original Spanning Tree Protocol (STP) by reducing the convergence time and allowing for faster network recovery in the event of link failures. RSTP also supports VLANs, making it suitable for modern networks with multiple VLANs.

Submit
71. Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?

Explanation

Setting the security mode to WEP on the Linksys integrated router will encrypt the data transmitted between the wireless client and the access point. This means that any data sent over the wireless network will be protected and cannot be easily intercepted or accessed by unauthorized users. WEP stands for Wired Equivalent Privacy and is an older wireless security protocol that provides basic encryption for wireless networks.

Submit
72. What is an efficient and cost effective way to minimize the frequency and effects of broadcast storms on an Ethernet LAN?

Explanation

Dividing the computers into separate VLANs on the existing switches is an efficient and cost-effective way to minimize the frequency and effects of broadcast storms on an Ethernet LAN. By separating the computers into different VLANs, broadcast traffic is contained within each VLAN and does not propagate to other VLANs. This helps to reduce the overall broadcast traffic on the network, preventing broadcast storms from occurring and minimizing their effects on network performance. Additionally, using existing switches to create VLANs eliminates the need for additional hardware or equipment, making it a cost-effective solution.

Submit
73. What is a function or characteristic of the native VLAN?

Explanation

The correct answer is that the native VLAN supports untagged traffic on an 802.1Q trunk. This means that any traffic that is not specifically tagged with a VLAN identifier will be treated as belonging to the native VLAN. This is useful for devices that do not support VLAN tagging, as they can still communicate on the network using the native VLAN.

Submit
74. Refer to the exhibit. Hosts PC_A and PC_B send traffic simultaneously, and the frames from the transmitting stations collide. What is the last device to receive the collision?

Explanation

Switch SW1 is the last device to receive the collision. Switches are responsible for creating separate collision domains, meaning that when a collision occurs on one port, it does not propagate to the other ports. In this scenario, the collision would have occurred between PC_A and PC_B, and it would have been detected by switch SW1. The switch would then handle the collision by using its collision detection mechanism and would not forward the collided frames to the other devices connected to it. Therefore, switch SW1 is the last device to receive the collision.

Submit
75. Which STP port type can only appear once on a segment, and must be present in order for traffic to flow on that segment?

Explanation

A designated port is a port that is elected by the spanning tree protocol (STP) to forward traffic on a segment. It is the only port type that must be present in order for traffic to flow on that segment. The designated port is responsible for forwarding frames and ensuring that there are no loops in the network. It is selected based on criteria such as the lowest path cost to the root bridge. Therefore, the correct answer is designated port.

Submit
76. Which configuration changes will increment the configuration revision number on the VTP server?

Explanation

Configuring or deleting a VLAN or creating a VLAN name will increment the configuration revision number on the VTP server. This is because any changes made to the VLAN configuration, such as adding or removing VLANs or modifying their names, will require the VTP server to update its configuration. The configuration revision number is used to track and synchronize changes between VTP servers and clients in a VTP domain. Therefore, any modifications to the VLAN configuration will trigger an increment in the revision number to ensure consistency across the network.

Submit
77. Refer to the exhibit. Switch SWB is not responding to VTP updates from switch SWA. What is a possible cause of the problem?

Explanation

One possible cause of the problem is that there is a password set on one of the switches. This can prevent VTP updates from being received by SWB, causing it to not respond to the updates from SWA.

Submit
78. Company policy requires disabling the command history buffer on network devices. An administrator enters terminal no history sizeat the command prompt on a Cisco Catalyst switch and receives no error messages back, but the command history buffer is still available. What is the problem?

Explanation

The problem is that the size parameter in the command "terminal no history size" only reset the default buffer size, but it did not actually disable access to the buffer. This means that even though the buffer size may have been changed, the administrator can still access and view the command history.

Submit
79. A network technician is attempting to configure 802.1q trunking on switch ports Fa0/5 through Fa0/10. Which set of commands will accomplish this task? Correct answer is image two.

Explanation

not-available-via-ai

Submit
80. What is the purpose of the switch command switchport access vlan 99?

Explanation

The purpose of the switch command "switchport access vlan 99" is to assign the port to a particular VLAN. This command configures the switch port to belong to VLAN 99, allowing traffic to be sent and received only within that VLAN.

Submit
81. Refer to the exhibit. A technician is troubleshooting a trunk problem between switches SW1 and SW2. What should be done to remedy the problem?

Explanation

To remedy the trunk problem between switches SW1 and SW2, the "Trunking Native Mode VLAN" on switch SW2 should be configured as VLAN 100. This means that the native VLAN on switch SW2 should be set to VLAN 100, which will ensure that the trunk link between the switches can properly pass VLAN traffic.

Submit
82. Which feature is uniquely found in an access layer switch within a hierarchical network model?

Explanation

Power over Ethernet (PoE) is a feature that is uniquely found in an access layer switch within a hierarchical network model. PoE allows the switch to provide power to devices such as IP phones, wireless access points, and surveillance cameras through the Ethernet cables, eliminating the need for separate power cables. This feature simplifies the deployment and management of network devices, reduces clutter, and provides flexibility in device placement. Access control lists, layer 3 routing capabilities, and link aggregation are features that can be found in switches at different layers of the network hierarchy, but PoE is specific to access layer switches.

Submit
83. .    Refer to the exhibit. Switches S2 and S3 are properly connected using an ethernet cable. A network administrator hasconfigured both switches with VTP, but S3 is unable to propagate VLANs to S2. What could be the reason for this?

Explanation

The reason why S3 is unable to propagate VLANs to S2 is because the VTP domains are different on both switches. VTP (VLAN Trunking Protocol) is used to synchronize VLAN information across switches within the same VTP domain. If the VTP domains are different, the switches will not be able to exchange VLAN information and propagate the VLANs.

Submit
84. Refer to the exhibit. The network consists of four hubs and a switch. The hosts connected to each hub are assigned addresses in the respective VLAN as shown. PC1 on VLAN 1 becomes infected with a virus and initiates a continuous IP broadcast. Which hubs will receive the broadcasts?

Explanation

not-available-via-ai

Submit
85. Refer to the exhibit. VLAN 20 was recently added on the network. Users on VLAN 20 on SW1 start complaining that they do not have connectivity to the users on the same VLAN on switch SW2. What should be done to remedy the problem?

Explanation

To resolve the issue of VLAN 20 users on SW1 not having connectivity to VLAN 20 users on SW2, VLAN 20 needs to be added to the list of allowed VLANs on the trunk link of SW2. By including VLAN 20 in the allowed VLANs, the trunk link will be able to carry traffic for VLAN 20 between the two switches, allowing the users to communicate with each other.

Submit
86. Refer to the exhibit. A network administrator is configuring RT1 for inter-VLAN routing. The switch is configured correctly and is functional. Host1, Host2, and Host3 cannot communicate with each other. Based on the router configuration, what is causing the problem?

Explanation

The problem is caused by the IP addresses on the subinterfaces being incorrectly matched to the VLANs. This means that the subinterfaces are not correctly configured to communicate with the corresponding VLANs, resulting in the inability of Host1, Host2, and Host3 to communicate with each other.

Submit
87. Refer to the exhibit. VTP pruning is enabled in the VTP domain that is shown. How will switch ST-1 handle Layer 2 broadcast traffic originating from host A on switch ST-C?

Explanation

Switch ST-1 will handle Layer 2 broadcast traffic originating from host A on switch ST-C by forwarding it out port Fa0/5 only. This is because VTP pruning is enabled in the VTP domain, which means that broadcast traffic will only be forwarded to the switches that have active receivers for that traffic. Since switch ST-1 does not have any active receivers for the broadcast traffic originating from host A, it will only forward it out port Fa0/5 and not to any other ports.

Submit
88. What operational change will occur if an 802.11b client associates with an access point that is currently supporting clients utilizing 802.11g?

Explanation

If an 802.11b client associates with an access point that is currently supporting clients utilizing 802.11g, the operational change that will occur is that the 802.11g clients will operate at reduced speeds. This is because the access point will have to support both 802.11b and 802.11g clients, and since 802.11b has a slower maximum data rate than 802.11g, it will bring down the overall speed for all clients connected to the access point.

Submit
89. Using the command copy tftp:backup.cfg startup-config, an administrator downloaded a saved configuration from a TFTP server to a switch. Why does the administrator not detect any changes in the switch configuration after the download completes?

Explanation

not-available-via-ai

Submit
90. Refer to the exhibit. What can be determined from the configuration of this wireless device?

Explanation

The configuration of this wireless device indicates that all wireless devices connected to this access point must have the SSID of Academy. This means that any device attempting to connect to this access point must be configured with the correct SSID in order to establish a connection.

Submit
91. Refer to the exhibit. The broadcast traffic from PC1 is consuming bandwidth on the interswitch trunks. What should be done to prevent this from happening?

Explanation

not-available-via-ai

Submit
92. Refer to the exhibit. Switch SWA is not processing VTP advertisments from switch SWB. What can done to correct the error?

Explanation

not-available-via-ai

Submit
93. A wireless LAN access point will convert traffic between which two frame encapsulation types?

Explanation

A wireless LAN access point will convert traffic between 802.3 and 802.11 frame encapsulation types. This is because 802.3 is the standard for Ethernet frame encapsulation used in wired networks, while 802.11 is the standard for wireless LAN frame encapsulation. The access point acts as a bridge between the wired and wireless networks, converting the frames from one encapsulation type to the other to enable communication between wired and wireless devices.

Submit
94. Refer to the exhibit. Although they are directly connected, switch SWA is not exchanging VLAN information with switch SWC. What can be done to correct this problem?

Explanation

The reason why changing the VTP version of SWA to version 1 can correct the problem is that VTP (VLAN Trunking Protocol) is used to synchronize VLAN information across switches in a network. By default, VTP version 2 is used, which supports extended VLANs. However, if SWC is using VTP version 1, it will not be able to understand the extended VLAN information sent by SWA. By changing the VTP version of SWA to version 1, both switches will be using the same version and will be able to exchange VLAN information correctly.

Submit
95. Refer to the exhibit. All trunk links are operational and all VLANs are allowed on all trunk links. An ARP request is sent by computer 5. Which device or devices will receive this message?

Explanation

The ARP request sent by computer 5 will be received by computer 3 and RTR-A. This is because computer 3 and RTR-A are connected to the same VLAN as computer 5 and are part of the same broadcast domain. Trunk links allow all VLANs, so the ARP request will be forwarded to all devices in the VLAN, including computer 3 and RTR-A.

Submit
96. Which two operations can be performed from the boot loader command line of a Cisco Catalyst switch? (Choose two.)

Explanation

From the boot loader command line of a Cisco Catalyst switch, two operations that can be performed are reinstalling the IOS image and formatting the flash file system. The boot loader is a software program that is responsible for loading the operating system and allows for basic configuration and troubleshooting tasks. Reinstalling the IOS image can be done to upgrade or restore the operating system, while formatting the flash file system erases all files and configurations stored in the flash memory.

Submit
97. Which switch forwarding method should be used on a network that employs frame classification based on an assigned Quality of Service (QoS) value?

Explanation

Store-and-forward is the appropriate switch forwarding method for a network that uses frame classification based on a QoS value. This method ensures that the entire frame is received and checked for errors before it is forwarded, allowing for better accuracy and reliability. It also allows for the examination of the QoS value assigned to the frame, enabling the switch to prioritize and handle the traffic accordingly. This method is particularly useful in environments where QoS is important, as it ensures that frames are properly processed before being forwarded.

Submit
98. Which combination is required to establish a connection to initially configure the Linksys WRT300N wireless access device?

Explanation

To initially configure the Linksys WRT300N wireless access device, a computer needs to be configured in the same IP subnet as the WRT300N and have a direct cable connection to it. This means that the computer and the WRT300N need to be on the same network and have compatible IP addresses. The direct cable connection allows for a direct communication between the computer and the device, enabling the configuration process.

Submit
99. Refer to the exhibit. Switch SWB is not responding to VTP updates from switch SWA. What is a possible cause of the problem?

Explanation

One possible cause of the problem is that there is a password set on one of the switches. This can prevent the VTP updates from being received by switch SWB, as it would require the correct password to authenticate and receive the updates.

Submit
100. In which mode is a VTP switch operating if it has been configured to only forward VTP advertisements?

Explanation

A VTP switch is operating in "transparent" mode if it has been configured to only forward VTP advertisements. In this mode, the switch does not participate in VTP domain-wide VLAN management. It simply forwards VTP advertisements received from other switches to other switches in the network. The transparent mode is typically used when you want to isolate VLAN configurations on a specific switch and prevent the propagation of VLAN changes to other switches in the network.

Submit
101. What will be the effect of the command S1# copy system:running-config tftp://172.16.2.155/tokyo-config?

Explanation

The command "copy system:running-config tftp://172.16.2.155/tokyo-config" will save the running configuration file on S1 to a file named "tokyo-config" via TFTP.

Submit
102. RSTP is enabled in a switched network that is active and converged. Which switch port type assumes a discarding state on non-root switches?

Explanation

In a switched network that is active and converged, the switch port type that assumes a discarding state on non-root switches is the alternate port. Alternate ports are used in Rapid Spanning Tree Protocol (RSTP) to provide an alternative path to the root bridge in case the designated port fails. When there is a designated port on a non-root switch, the alternate port will be in a discarding state to prevent loops and ensure network stability.

Submit
103. What are two characteristics of normal range VLANs? (Choose two.)

Explanation

Normal range VLANs are stored in the vlan.dat file, which is a file that contains information about all the VLANs on a switch. This file is used by the switch to maintain VLAN information even after a reboot. Additionally, normal range VLANs are identified by a VLAN ID between 1 and 1005. This range is reserved for normal VLANs, while VLANs outside this range are considered extended VLANs.

Submit
104. Refer to the exhibit. What does "LEARNING" mean as it relates to the Spanning Tree Protocol?

Explanation

not-available-via-ai

Submit
105. What advantage does cut-through switching provide?

Explanation

Cut-through switching is a networking technique that allows frames to be forwarded as soon as the destination address is received, without waiting for the entire frame to be received. This provides the advantage of forwarding frames quickly, reducing latency in the network. By not waiting for the entire frame to be received and analyzed, cut-through switching can provide faster data transmission and improved network performance.

Submit
106. Which switching method provides error-free data transmission?

Explanation

Store-and-forward is a switching method that provides error-free data transmission. In this method, the entire data frame is received and stored in a buffer before it is forwarded to the next destination. The switch checks the integrity of the data frame, ensuring that it is error-free, before forwarding it. This method is effective in preventing errors from being propagated through the network, as any corrupted or incomplete data frames are discarded. Therefore, store-and-forward is the correct answer for ensuring error-free data transmission.

Submit
107. A wireless access point is configured for WPA2. Which encryption algorithm will all devices that connect to the access point be required to use?

Explanation

All devices that connect to a wireless access point configured for WPA2 will be required to use the AES encryption algorithm. AES (Advanced Encryption Standard) is a widely used encryption algorithm that provides strong security for wireless networks. It is the recommended encryption algorithm for WPA2, offering better security than other options such as TKIP or WEP. PPK and PSK are not encryption algorithms, so they are not the correct answer.

Submit
108. Refer to the exhibit. The commands are entered into switch SW1 as shown, and an 802.1q trunk is successfully established. How does switch SW1 handle the untagged traffic that is destined for the trunk?

Explanation

Switch SW1 will send all untagged traffic to VLAN 25. This means that any traffic that arrives on the trunk without a VLAN tag will be forwarded to VLAN 25. This is the default behavior for untagged traffic on a trunk port.

Submit
109. In which mode is a VTP switch operating if it does not allow for the creation of local VLANs but it does accept VLAN updates from other switches in the same domain?

Explanation

A VTP switch operating in client mode does not allow for the creation of local VLANs but it does accept VLAN updates from other switches in the same domain. In client mode, the switch receives VTP advertisements from the VTP server and updates its VLAN database accordingly. However, it cannot create or modify VLANs locally. This mode is typically used in larger networks where the VLAN configuration is centrally managed by a VTP server, and the client switches simply receive and apply the updates.

Submit
110. Refer to the exhibit. A network administrator enters the displayed commands to configure VLAN 30. What is the result of running these commands?

Explanation

The given commands configure VLAN 30 on the switches S1, S2, and S3. However, the "switchport trunk allowed vlan" command is missing the "add" keyword, which means that only VLAN 30 will be allowed on the trunk links of S3. Therefore, VLAN 30 will be added to the VLAN database of S3 but will not be propagated to S4, S2, or S1.

Submit
111. A network administrator issued the erase nvram: command on a switch. What will be the outcome of the command?

Explanation

The "erase nvram:" command is used to clear the contents of the startup configuration file on a switch. NVRAM (non-volatile random-access memory) is a type of memory that stores the startup configuration file, which contains the configuration settings for the switch. By issuing this command, the network administrator will delete the startup configuration file, effectively clearing its contents.

Submit
112. Which two devices can cause interference with the operation of a WLAN because they operate on similar frequencies? (Choose two.)

Explanation

Cordless phones and microwave ovens can cause interference with the operation of a WLAN because they both operate on similar frequencies. Cordless phones often operate on the 2.4 GHz frequency, which is also used by many Wi-Fi networks. Microwave ovens can also emit signals in the 2.4 GHz range, which can disrupt Wi-Fi signals. Therefore, the use of these devices near a WLAN can result in decreased performance or even complete disruption of the wireless network.

Submit
113. A network administrator must purchase new access layer switches to deploy across an existing hierarchical network that supports voice and data traffic. At a minimum, which two features should the new access layer switches support? (Choose two.)

Explanation

The new access layer switches should support PoE (Power over Ethernet) because it is required to power IP phones and other network devices without the need for separate power cables. QoS (Quality of Service) is also necessary to prioritize voice traffic over data traffic, ensuring high-quality voice calls. Modular design, Layer 3 support, and line speed forwarding rates are not explicitly mentioned as requirements for the existing network, so they are not necessary for the new access layer switches.

Submit
114. Where is the information of newly created VLANs stored on a switch?

Explanation

The information of newly created VLANs is stored in the flash memory of a switch. Flash memory is a type of non-volatile storage that retains data even when power is turned off. It is commonly used in networking devices to store the switch's operating system, configuration files, and other important data. Storing the VLAN information in flash memory allows the switch to retain the VLAN configuration even after a reboot or power outage.

Submit
115. Refer to the exhibit. An administrator documented the output of a CAM table from an Ethernet switch as shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit?

Explanation

The CAM table shows that the MAC address 00-00-3D-1F-11-05 is associated with port 2. Therefore, when the switch receives the frame with this MAC address, it will forward the frame out all ports except port 3, as indicated in the answer.

Submit
116. Refer to the exhibit. What does "LEARNING" mean as it relates to the Spanning Tree Protocol?

Explanation

not-available-via-ai

Submit
117. Which combination of DTP modes set on adjacent switches will cause the link to become an access link instead of a trunk link?

Explanation

When both switches are set to "dynamic auto" mode, it means that they will both negotiate the DTP mode. In this case, since both switches are in the same mode, they will not negotiate to form a trunk link. Instead, they will both default to become access links. Therefore, the combination of "dynamic auto – dynamic auto" will cause the link to become an access link instead of a trunk link.

Submit
118. What type of message do wireless clients transmit when they are searching for a specific wireless network?

Explanation

Wireless clients transmit probe messages when they are searching for a specific wireless network. These probe messages are used to discover and locate available wireless networks in the vicinity. By sending out probe messages, the wireless clients can gather information about the network's SSID (Service Set Identifier) and other parameters, allowing them to establish a connection with the desired network.

Submit
119. Refer to the exhibit. All edge ports are configured with the spanning-tree portfast command. Host1 is recently connected to port Fa0/1 on switch SW1. Which statement is true about the status of port Fa0/1?

Explanation

The given correct answer states that the port will transition immediately into the forwarding state. This is because all edge ports are configured with the spanning-tree portfast command, which allows the port to bypass the listening and learning states and transition directly into the forwarding state. Therefore, when Host1 is connected to port Fa0/1 on switch SW1, the port will immediately start forwarding traffic.

Submit
120. Which configuration changes will increment the configuration revision number on the VTP server?

Explanation

When a VLAN is configured or deleted, or a VLAN name is created, the configuration revision number on the VTP server will be incremented. This is because these actions involve making changes to the VLAN database, which is managed by the VTP server. By incrementing the configuration revision number, the VTP server ensures that other VTP devices in the network are aware of the changes and can synchronize their VLAN databases accordingly.

Submit
121. A network administrator is planning the upgrade of an enterprise LAN to feature Layer 3 support for the application of data security policies, aggregated links, and redundant devices and links. Which switches in the hierarchical three-layer design model support these network requirements?

Explanation

Distribution switches in the hierarchical three-layer design model support these network requirements. Distribution switches are responsible for connecting access switches to the core switches. They provide aggregation of multiple access switches, allowing for the implementation of data security policies, aggregated links, and redundant devices and links. Core switches, on the other hand, are responsible for high-speed backbone connectivity and do not typically handle these requirements. Access switches are responsible for connecting end-user devices and do not provide the necessary features for the given network requirements.

Submit
122. Refer to the exhibit. The network administrator is planning five additional VLANs to be shared throughout the VTP domain onS3. What action should the administrator take before creating the additional VLANs?

Explanation

Before creating the additional VLANs, the network administrator should create the VLANs on a switch in VTP server mode. This will allow the VLANs to propagate to the other switches in the VTP domain. By creating the VLANs on a switch in VTP server mode, the administrator ensures that the new VLAN information will be distributed to all switches in the domain, allowing all switches to have the same VLAN configuration.

Submit
123. Which wireless topology supports roaming from one access point to another?

Explanation

ESS stands for Extended Service Set, which is a wireless networking term that refers to a group of interconnected access points. In an ESS, multiple access points are connected to a distribution system, allowing users to roam seamlessly from one access point to another without losing connectivity. This makes ESS the correct answer as it supports roaming from one access point to another. BSS (Basic Service Set) refers to a single access point, IBSS (Independent Basic Service Set) is a network without an access point, and ad hoc refers to a temporary network formed between devices without the need for an access point.

Submit
124. While configuring a new switch, a network administrator configures the switch as an HTTP server. What benefits does this configuration provide?

Explanation

Configuring the switch as an HTTP server allows web-based configuration tools to be used with the switch. This means that the network administrator can access and configure the switch's settings through a web browser, which is often more user-friendly and convenient than using a command-line interface. It eliminates the need for specialized software or console cables, making it easier to manage and troubleshoot the switch remotely.

Submit
125. Refer to the exhibit. Which three options correctly identify information that could be associated with this output?(Choose three.)

Explanation

The output indicates that Interface FastEthernet3/0/0 is subinterfaced, which means it has been divided into multiple logical interfaces. This is supported by the presence of Interface FastEthernet3/0/0.3, which suggests that VLAN tagging is being used. The output also mentions that a non-proprietary trunking protocol is in use, indicating that a standard protocol like IEEE 802.1Q is being used for VLAN trunking. Lastly, the configuration is appropriate for a router-on-a-stick network design, which is evident from the presence of subinterfaces and VLAN mapping.

Submit
126. Refer to the exhibit. Users complain that they do not have connectivity to the web server that is connected to SW1. What should be done to remedy the problem?

Explanation

To remedy the connectivity issue to the web server connected to SW1, VLAN 100 should be configured as the native VLAN for SW1. This means that untagged traffic will be sent through VLAN 100, allowing for proper communication between the web server and other devices connected to SW1. By configuring VLAN 100 as the native VLAN, any untagged traffic will be associated with this VLAN and be able to communicate with the web server.

Submit
127. What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?

Explanation

When the range of allowed VLANs is set to the default value, all VLANs are allowed across a trunk. This means that all VLAN traffic can pass through the trunk link, allowing for communication between devices in different VLANs. The default value for the allowed VLAN range includes all VLANs, so there are no restrictions on which VLANs can pass through the trunk.

Submit
128. Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and host B are on the default VLAN but are not able to exchange traffic. What should be done to fix the problem?

Explanation

To fix the problem of Host A and Host B not being able to exchange traffic, the same native VLAN should be configured on both ends of the trunk. The native VLAN is used to carry untagged traffic across the trunk link. By configuring the same native VLAN on both switches, the untagged traffic from Host A and Host B will be able to pass through the trunk and communicate with each other.

Submit
129. Refer to the exhibit. Which two switch interfaces would be RSTP edge ports? (Choose two.)

Explanation

The two switch interfaces that would be RSTP edge ports are switch S3, Fa0/5 and switch S4, Fa0/2. RSTP edge ports are ports that connect to end devices and do not participate in the STP/RSTP protocol. These ports are assumed to be connected to devices that do not support STP, such as hosts or IP phones. Therefore, switch interfaces S3, Fa0/5 and S4, Fa0/2 are the correct answers as they are connected to end devices.

Submit
130. RSTP is enabled in a switched network that is active and converged. Which switch port type assumes a discarding state onnon-root switches?

Explanation

In a switched network with RSTP enabled and active, the alternate port assumes a discarding state on non-root switches. The alternate port is a backup port that is ready to take over the designated port role if the current designated port fails. It remains in a discarding state to prevent loops and ensure network stability.

Submit
131. Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit data at the same time. How do the hosts respond on the network? (Choose two.)

Explanation

When Host 1 and Host 4 both transmit data at the same time, a collision occurs on the network. After the end of the jam signal, a backoff algorithm is invoked, which means that both hosts will wait for a random amount of time before attempting to retransmit their data. This helps to avoid another collision. Additionally, if a host has data to transmit after the backoff period, it will check to determine if the line is idle before transmitting. This ensures that the host does not cause another collision by attempting to transmit while the line is still busy.

Submit
132. Which three statements are correct concerning the default configuration of a new switch? (Choose three.)

Explanation

The default configuration of a new switch includes being configured in VTP server mode, having STP automatically enabled, and having all switch ports assigned to VLAN1.

Submit
133. Refer to the exhibit. What does "FORWARDING" mean in the command output shown?

Explanation

The term "FORWARDING" in the command output means that the switch is actively sending and receiving data frames. This indicates that the switch is functioning properly and is actively forwarding network traffic.

Submit
134. Refer to the exhibit. Which two settings show the default value of VTP configuration on a Cisco 2960 switch? (Choose two.)

Explanation

The default value of the VTP configuration on a Cisco 2960 switch is shown by the "revision number" and "pruning mode" settings. The revision number represents the version of the VTP configuration and is typically set to 0 by default. The pruning mode determines whether VTP pruning is enabled or disabled, and it is usually disabled by default.

Submit
135. What is a result of improperly implementing a network with redundancy at Layer 2?

Explanation

Improperly implementing a network with redundancy at Layer 2 can result in end device malfunction because of broadcast storms. Broadcast storms occur when there is a high volume of broadcast traffic continuously circulating in the network, overwhelming the devices and causing them to malfunction. This can happen if redundant connections are not properly configured, leading to loops in the network where broadcast traffic keeps circulating indefinitely.

Submit
136. What does TKIP have in common with AES?

Explanation

TKIP (Temporal Key Integrity Protocol) and AES (Advanced Encryption Standard) are both encryption protocols used in wireless networks. They both encrypt Layer 2 payloads, which means they provide security for the data being transmitted between devices at the data link layer of the OSI model. This ensures that the data is protected from unauthorized access and tampering.

Submit
137. Which service should be disabled on a Cisco switch or router to prevent packet sniffers from capturing information about the device?

Explanation

CDP (Cisco Discovery Protocol) should be disabled on a Cisco switch or router to prevent packet sniffers from capturing information about the device. CDP is a Cisco proprietary protocol that allows devices to share information about themselves with neighboring devices. By disabling CDP, the device will not broadcast information such as device type, software version, and IP address, making it more difficult for packet sniffers to gather information about the device.

Submit
138. When port security is used on a switch, which violation mode will cause an SNMP trap to be sent and traffic to be dropped when the number of secure MAC addresses for a port is reached?

Explanation

When port security is used on a switch, the restrict violation mode will cause an SNMP trap to be sent and traffic to be dropped when the number of secure MAC addresses for a port is reached. This means that if a device with a MAC address not in the secure list tries to connect to the port, an SNMP trap will be sent to alert the network administrator, and the traffic from that device will be dropped, preventing unauthorized access to the network.

Submit
139. What are two benefits of the IEEE 802.11n standard over the IEEE 802.11G? (Choose two.)

Explanation

The IEEE 802.11n standard provides improved range compared to IEEE 802.11G, meaning that it can transmit signals over a greater distance. It also permits increased data rates, allowing for faster transmission of data.

Submit
140. Refer to the exhibit. Router R1 is connected to a switch through a trunk. What two ways are indicative of how the router handles incoming VLAN traffic? (Choose two.)

Explanation

The first way indicative of how the router handles incoming VLAN traffic is that incoming traffic with VLAN ID 10 is processed by subinterface Fa0/0.1. This suggests that the router is configured with subinterfaces to handle traffic from different VLANs separately. The second way is that traffic inbound on this router is processed by different subinterfaces depending on the VLAN from which the traffic originated. This indicates that the router is using subinterfaces to route traffic based on the VLAN tags, allowing for separate handling of traffic from different VLANs.

Submit
141. What can an administrator do to ensure that a specific switch will win a root election if all switches are set to their default configurations?

Explanation

By setting the bridge priority to 16384, the administrator can ensure that a specific switch wins the root election. The bridge priority is a value that determines the priority of a switch in the spanning tree protocol (STP) election process. The switch with the lowest bridge priority becomes the root bridge. By setting the bridge priority to 16384, which is higher than the default priority of 32768, the specific switch will have a higher priority and will win the root election. This ensures that the specific switch becomes the root bridge and has control over the STP topology.

Submit
142. Refer to the exhibit. The network administrator needs to remove the east-hosts VLAN and use the switch port from that VLAN in one of the existing VLANs. Which two sets of commands should be used when completely removing VLAN 2 from S1-Central while leaving the switch and all its interfaces operational? (Choose two.)

Explanation

To completely remove VLAN 2 from S1-Central while leaving the switch and all its interfaces operational, the network administrator should use the following two sets of commands:
1. S1-Central# configure terminal
S1-Central(config)# no vlan 2
This command removes VLAN 2 from the switch's VLAN database.

2. S1-Central# configure terminal
S1-Central(config)# interface fastethernet 0/1
S1-Central(config-if)# switchport access vlan 3
This command configures interface FastEthernet 0/1 to be a member of VLAN 3, effectively replacing the previous VLAN 2 configuration.

Submit
143. Refer to the exhibit. R1 is configured for traditional inter-VLAN routing. R1 can ping computer 3 but cannot ping computer 1. What is a possible cause for this failure?

Explanation

The possible cause for R1 being able to ping computer 3 but not computer 1 is that S1 port Fa0/11 is in the wrong VLAN. This means that computer 1 is not in the same VLAN as R1, causing a failure in communication between them.

Submit
144. Which statement correctly describes an IBSS?

Explanation

An IBSS (Independent Basic Service Set) is a type of wireless network in which wireless stations communicate directly with each other, without the need for an access point. In this type of network, each wireless station acts as both a client and an access point, allowing for direct peer-to-peer communication between devices. This is different from other types of wireless networks where stations communicate with a single access point or multiple access points with the same or different SSIDs.

Submit
145. How does a switch that is configured for 802.1Q trunking handle untagged frames that are received on a trunk port?

Explanation

When a switch is configured for 802.1Q trunking and receives untagged frames on a trunk port, it will assign those frames to the native VLAN. The native VLAN is a VLAN that is not tagged and is used for communication between switches or devices that do not support VLAN tagging. By assigning the untagged frames to the native VLAN, the switch ensures that they are properly processed and forwarded within the network.

Submit
146. What is the purpose of issuing the command switchport mode access on a switch interface?

Explanation

The purpose of issuing the command "switchport mode access" on a switch interface is to force the port to be a part of a single VLAN. This command configures the switch port to operate in access mode, which means that the port will only be able to communicate with devices that are connected to the same VLAN. By default, switch ports operate in dynamic auto mode, which allows them to negotiate with the connected device to determine whether to operate in access or trunk mode. However, by explicitly setting the mode to access, the port is forced to be a part of a single VLAN.

Submit
147. What happens when the crypto key zeroize rsa command is entered on a switch configured with thetransport input ssh command on the vty lines?

Explanation

When the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines, the switch allows remote connections only after a new RSA key pair is generated. This means that the existing RSA key pair is deleted and a new one is created. This is necessary because the RSA key pair is used for authentication in SSH connections. By zeroizing the RSA key, the switch removes the ability to make SSH connections until a new RSA key pair is generated.

Submit
148. Refer to the exhibit. SW-T has been configured with a single trunking interface. Which VLANs will be allowed across the trunk?

Explanation

The correct answer is that all configured VLANs will be allowed across the trunk. This is because the exhibit states that SW-T has been configured with a single trunking interface, and trunking interfaces are used to carry traffic for multiple VLANs. Therefore, all VLANs that have been configured on SW-T will be allowed to pass through the trunk.

Submit
149. In a three-layer hierarchical network design, which distribution layer function delineates broadcast domains?

Explanation

The distribution layer in a three-layer hierarchical network design is responsible for routing between VLANs. This means that it separates broadcast domains by allowing communication between different virtual LANs. By doing so, it helps to control and manage network traffic, ensuring that broadcasts are contained within their respective VLANs and not propagated throughout the entire network. This helps to improve network performance and security by reducing the scope of broadcast storms and limiting the impact of network issues to specific VLANs.

Submit
150. Which statement correctly describes a function of a Layer 2 switch?

Explanation

A Layer 2 switch uses the destination MAC address to selectively forward a frame. Layer 2 switches operate at the data link layer of the OSI model and use MAC addresses to determine the destination of a frame. They maintain a MAC address table to map MAC addresses to specific ports, allowing them to forward frames only to the appropriate destination. This enables efficient and targeted communication within a local area network (LAN).

Submit
151. What identifier in the BPDU creates a unique BID for a switch?

Explanation

The MAC address is used as the identifier in the BPDU (Bridge Protocol Data Unit) to create a unique BID (Bridge ID) for a switch. The BID is crucial for the spanning tree protocol to determine the root bridge and the path cost to reach it. Each switch in the network has a unique MAC address, which is used as part of its BID. This allows the switches to have a hierarchical structure and ensures that there are no duplicate BIDs in the network, preventing loops and ensuring proper network connectivity.

Submit
152. Which statement is correct about STP architecture?

Explanation

The correct answer is "Spanning Tree Protocol will guarantee a loop free Layer 2 topology." This statement is correct because the main purpose of the Spanning Tree Protocol (STP) is to prevent loops in a Layer 2 network. STP achieves this by selectively blocking redundant links to create a loop-free topology. By doing so, it ensures that there is only one active path to each destination, avoiding any potential looping issues that could cause network instability or broadcast storms.

Submit
153. Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit. However, hosts B and D cannot ping each other. What is the most likely cause of this problem?

Explanation

The most likely cause of the problem is that hosts B and D are configured with IP addresses from different subnets. Since they are in different subnets, they cannot communicate with each other directly. In order for hosts in different subnets to communicate, a router or a layer 3 switch is needed to route the traffic between the subnets.

Submit
154. Refer to the exhibit. Which three options correctly describe the router configuration that is shown? (Choose three.)

Explanation

The correct answer options are:
1. An IEEE standard trunking protocol is in use.
2. Interface Fa0/1 has been configured with subinterfaces.
3. The configuration is appropriate for a router-on-a-stick network design.

The exhibit shows that interface Fa0/1 has been configured with subinterfaces, which is a common practice in a router-on-a-stick network design. Additionally, the exhibit mentions that an IEEE standard trunking protocol is in use, indicating that the router is using a protocol like IEEE 802.1Q for VLAN trunking. These three options correctly describe the router configuration shown in the exhibit.

Submit
155. Why is priority configured in 4096 increments when using PVST+?

Explanation

The extended bridge ID in PVST+ only allows for four bits to be used for the bridge priority. This means that the bridge priority can only be configured in increments of 4096. The remaining bits are used for other purposes, such as identifying the VLAN. Therefore, when configuring priority in PVST+, it is important to use values that can be evenly divided into 32768 without leaving a remainder.

Submit
156. Which Cisco switch feature is used to limit the number of valid MAC addresses that a switch associates with a switchport?

Explanation

Port security is a Cisco switch feature that is used to limit the number of valid MAC addresses that a switch associates with a switchport. It allows network administrators to control the number of devices that can connect to a switchport by specifying the maximum number of MAC addresses allowed. This feature helps in preventing unauthorized devices from connecting to the network and enhances network security.

Submit
157. Refer to the exhibit. All switches are configured with the default bridge priority. Which port will act as a non-designated port ifall links are operating at the same bandwidth?

Explanation

The correct answer is Fa0/1 interface of switch A. In the exhibit, all switches are configured with the default bridge priority, which means the bridge with the lowest MAC address will become the root bridge. In this case, switch A has the lowest MAC address. The non-designated port is the port that is not part of the shortest path to the root bridge. Since switch A is the root bridge, its Fa0/1 interface will not be part of the shortest path to the root bridge and will therefore act as a non-designated port.

Submit
158. Refer to the exhibit. All switch interfaces are members of the same VLAN. What information is used by Switch1 to determine if incoming frames from the hosts should be forwarded to Router1?

Explanation

Switch1 uses the destination address field in the Ethernet header to determine if incoming frames from the hosts should be forwarded to Router1. The Ethernet header contains the destination MAC address, which Switch1 uses to make forwarding decisions. If the destination MAC address matches the MAC address of Router1, Switch1 will forward the frame to Router1.

Submit
159. Refer to the exhibit. Switch SW2 was tested in a lab environment and then inserted into a production network withoutreloading its configuration. After the trunk link between SW1 and SW2 was brought up, all users lost connectivity to thenetwork. What could be the source of the problem?

Explanation

The VTP configuration revision number of SW2 being higher than the configuration revision number of SW1 could be the source of the problem. In a VTP domain, switches exchange VLAN information using VTP advertisements. The switch with the highest configuration revision number becomes the VTP server and propagates its VLAN database to other switches in the domain. If SW2 has a higher revision number than SW1, it means that SW2 has a more recent VLAN database. When the trunk link is brought up, SW2's VLAN database will overwrite SW1's VLAN database, causing all users to lose connectivity to the network.

Submit
160. Refer to the exhibit. The configuration steps that are listed in the exhibit have been entered in switch S1 via the console. Subsequent attempts to telnet to the switch are not successful. What is causing the problem?

Explanation

The problem is caused by the incorrect configuration of the "transport input" command. The given exhibit does not show the "transport input" command being configured, so it is likely that the default transport input is being used, which does not include Telnet access. Therefore, the switch is not allowing Telnet connections. To fix the problem, the "transport input telnet" command should be added to the vty lines configuration.

Submit
161. When an access point is placed near the outside wall of a building, which implementation design procedure should be used?

Explanation

When an access point is placed near the outside wall of a building, decreasing the power setting is the recommended implementation design procedure. By decreasing the power setting, the access point's signal strength is reduced, which helps prevent the signal from leaking outside the building and potentially being accessed by unauthorized users. This helps to improve the security and privacy of the wireless network.

Submit
162. What are two requirements for configuring inter-VLAN routing using the router-on-a-stick model? (Choose two.)

Explanation

To configure inter-VLAN routing using the router-on-a-stick model, two requirements must be met. Firstly, each subinterface should have its own IP address, subnet mask, and unique VLAN assignment. This allows the router to communicate with different VLANs. Secondly, the physical interface of the router must be connected to a trunk link on the adjacent switch. This is necessary to carry traffic from multiple VLANs over a single physical connection. The other options are not requirements for configuring inter-VLAN routing using the router-on-a-stick model.

Submit
163. Refer to the exhibit. After entering the commands in the exhibit, the administrator receives a "password required, but none set" message when attempting to connect to S1. What is the problem?

Explanation

The problem is that S1 does not have a password configured for the vty lines. This means that there is no password set for remote connections to the device, which is why the administrator receives a "password required, but none set" message when attempting to connect to S1.

Submit
164. What benefit does 802.1x provide to a wireless network?

Explanation

802.1x provides the benefit of centralized user authentication to a wireless network. This means that users connecting to the network are required to authenticate themselves before gaining access. This helps to ensure that only authorized users can connect to the network, increasing security. It also allows for easier management of user credentials, as authentication can be handled in a central location rather than on individual devices.

Submit
165. What technique is a security attack that depletes the pool of IP addresses available for legitimate hosts?

Explanation

DHCP starvation is a security attack that depletes the pool of IP addresses available for legitimate hosts. This attack floods the DHCP server with fake DHCP requests, causing it to exhaust its available IP addresses. As a result, legitimate hosts are unable to obtain an IP address and connect to the network. This technique can disrupt network operations and lead to denial of service for legitimate users.

Submit
166. A wireless access point can function as which type of shared medium, wired LAN device?

Explanation

A wireless access point can function as a hub. A hub is a basic networking device that connects multiple devices in a network, allowing them to communicate with each other. It operates at the physical layer of the network and simply broadcasts incoming data packets to all connected devices. Unlike a switch or a router, a hub does not perform any intelligent routing or filtering of data. Therefore, a wireless access point can serve as a hub by providing a central connection point for wireless devices to connect to a wired LAN network.

Submit
167. The global configuration command ip default-gateway 172.16.100.1  is applied to a switch. What is the effect of this command?

Explanation

The global configuration command "ip default-gateway 172.16.100.1" allows the switch to have a default gateway, which is the IP address of a router or gateway device that connects the switch to other networks. This enables the switch to communicate with hosts on other networks, including being remotely managed from a host on another network.

Submit
168. Refer to the exhibit. The network administrator wants to allow both SSH and Telnet connections to Switch1. However, the SSH connections fail. What is the most likely cause of this problem?

Explanation

The most likely cause of the SSH connections failing is that the RSA key has been removed. The RSA key is used for secure communication between the SSH client and server. Without the RSA key, the SSH connections cannot be established and will fail.

Submit
169. Refer to the exhibit. Router R-West and switch S-West1 are connected via a single ethernet cable between the routerinterface fa0/0 and the switch interface fa0/1. The router and switch have been configured with the commands that aredisplayed in the exhibit. The network administrator enters the show interfaces trunk command and receives the output asshown. What is the cause of the "not-trunking" status for switch port Fa0/1

Explanation

The "not-trunking" status for switch port Fa0/1 is caused by the fact that the router does not support Dynamic Trunking Protocol (DTP), therefore the trunk has not been established. DTP is a Cisco proprietary protocol used to negotiate and establish trunk links between switches and routers. Since the router does not support DTP, it cannot form a trunk with the switch, resulting in the "not-trunking" status.

Submit
170. What is one disadvantage that 802.11a wireless has compared to 802.11g?

Explanation

The use of higher frequencies in 802.11a wireless makes the signals more likely to be obstructed. This is a disadvantage compared to 802.11g because lower frequencies used in 802.11g can penetrate obstacles better and have a longer range. Higher frequency signals have a harder time passing through walls, furniture, and other objects, resulting in weaker and more obstructed signals. This can lead to decreased signal strength and slower data transfer rates, making 802.11a wireless less reliable in certain environments.

Submit
171. What two methods can be used to remove MAC address table entries from a switch? (Choose two.)

Explanation

The power cycle of a switch will clear all dynamically learned MAC address table entries. This means that any MAC addresses that were dynamically learned by the switch will be removed when the switch is power cycled.

The clear mac-address-table command can be used to remove both statically and dynamically configured MAC address table entries. This command clears all entries in the MAC address table, regardless of how they were configured.

Therefore, the correct answer is: Power cycle the switch to clear all dynamically learned addresses and The clear mac-address-table command will remove statically and dynamically configured table entries.

Submit
172. What allows WLAN clients to learn which networks and access points are available in an area?

Explanation

Probes allow WLAN clients to learn which networks and access points are available in an area. Probes are small packets of data that are sent by the client devices to search for available networks. When a client device sends out a probe, nearby access points respond with beacons, which contain information about the network, including the SSID (Service Set Identifier). The client device then uses this information to determine which networks are available and can establish a connection with the desired access point through the process of association.

Submit
173. Refer to the exhibit. A network administrator issues the show interfaces fastEthernet 0/8 switchport command to check the status of the port. What can be concluded from the output?

Explanation

The output of the "show interfaces fastEthernet 0/8 switchport" command indicates that Port Fa0/8 is configured in access mode and associated with VLAN 1.

Submit
174. Refer to the exhibit. The switch VTY lines have been properly configured, but PC1 is unable to remotely manage the switch. How can this problem be resolved?

Explanation

To remotely manage a switch, the switch needs to know the IP address of the device it will use as its default gateway. This IP address is necessary for the switch to send traffic to destinations outside of its own network. Without a default gateway, the switch does not know where to send the traffic, resulting in the inability to remotely manage the switch. Therefore, configuring a default gateway on the switch will resolve this problem.

Submit
175. What three tasks should be performed before moving a Catalyst switch to another VTP management domain? (Choose three.)

Explanation

The three tasks that should be performed before moving a Catalyst switch to another VTP management domain are:
1. Select the correct VTP mode and version: This ensures that the switch is compatible with the VTP settings in the new domain.
2. Configure the switch with the name of the new management domain: This allows the switch to identify and join the correct VTP domain.
3. Verify that the switch has a lower configuration revision number than the other switches in the new domain: This ensures that the switch does not overwrite the VTP database with an outdated configuration.

Submit
176. What are two benefits of a hierarchical network model over a flat network design? (Choose two.)

Explanation

A hierarchical network model provides increased network availability by dividing the network into multiple layers, allowing for redundancy and fault tolerance. This ensures that if one layer fails, the other layers can still function, minimizing downtime. Additionally, a hierarchical network model simplifies management and troubleshooting by organizing the network into distinct layers with specific functions. This makes it easier to identify and resolve issues, as well as manage network resources efficiently.

Submit
177. Which two types of traffic are always transmitted as untagged frames? (Choose two.)

Explanation

The two types of traffic that are always transmitted as untagged frames are traffic that is assigned to the native VLAN and traffic that is leaving an access mode port that is connected to another switch. Untagged frames do not have any VLAN tags added to them, and these specific types of traffic are always transmitted without any VLAN tagging.

Submit
178. The network administrator wants to configure a switch to pass VLAN update information to other switches in the domain but not update its own local VLAN database. Which two steps should the administrator perform to achieve this? (Choose two.)

Explanation

To achieve the desired configuration, the network administrator should perform two steps: configure the VTP mode of the switch to transparent and configure the switch with the same VTP domain name as other switches in the network. By setting the switch to transparent mode, it will pass VLAN update information to other switches without updating its own local VLAN database. Additionally, configuring the switch with the same VTP domain name ensures that it can communicate and exchange information with other switches in the network.

Submit
179. Refer to the exhibit. Switches S1 and S2 have had their startup configurations erased and the commands shown in theexhibit entered. They are connected via a crossover cable in their respective GigabitEthernet 1/1 interfaces. All host ports arethen configured as access ports on VLAN 2. Devices on the 192.168.1.0 network connected to each switch are unable toping any devices on the same network connected to the other switch. What is the problem?

Explanation

The problem is that there is no router to allow the packets to cross from one switch to the other. Switches operate at layer 2 of the OSI model and cannot route packets between different networks. In this scenario, both switches are connected via a crossover cable, but without a router, the devices on the 192.168.1.0 network connected to each switch cannot communicate with each other. To enable communication between the switches, a router or a layer 3 switch is required to route the packets between the networks.

Submit
180. Refer to the exhibit. What will be the result of the commands that are shown in the exhibit?

Explanation

The given exhibit shows an access list that is applied to interface Fa0/2. The access list permits DHCP server responses, which means that only the DHCP server's responses will be allowed to pass through interface Fa0/2. This implies that clients will only be able to receive DHCP addresses if they are connected to VLAN 2 and their requests are received on interface Fa0/2. Therefore, the correct answer is "DHCP server responses will only be permitted on interface Fa0/2."

Submit
181. Refer to the exhibit. This switch is to be added to the production network. Which two facts about VLANs and VTP operation can be confirmed by this output? (Choose two.)

Explanation

The output from the exhibit confirms two facts about VLANs and VTP operation. Firstly, VLANs can only be added to the VLAN database on this switch by a VTP advertisement. This means that the switch will not allow manual configuration of VLANs and will rely on VTP advertisements to add VLAN information. Secondly, adding this switch to the network will cause no disruption in the VTP domain operations if the rest of the switches in the same VTP domain have a higher configuration revision number. This suggests that the switch will seamlessly integrate into the existing VTP domain as long as it has a lower configuration revision number than the other switches.

Submit
182. Which two statements describe VTP transparent mode operation? (Choose two.)

Explanation

Transparent mode switches can add VLANs of local significance only. This means that they can create and manage VLANs that are specific to their own network, but they cannot propagate these VLANs to other switches. Transparent mode switches also pass any VLAN management information that they receive to other switches. This allows them to forward VLAN updates and changes to other switches in the network.

Submit
183. Which three statements are true regarding router-on-a-stick inter-VLAN routing? (Choose three.)

Explanation

The first statement is true because router-on-a-stick inter-VLAN routing requires the use of subinterfaces on the router to separate and route traffic between different VLANs. The second statement is true because an access link is needed between the router and Layer 2 switch to carry the VLAN traffic. The third statement is true because using a single physical interface with subinterfaces is more cost-efficient and scalable compared to using multiple physical interfaces for each VLAN.

Submit
184. Refer to the exhibit. Switch SW-A is to be used as a temporary replacement for another switch in the VTP Student domain.What two pieces of information are indicated from the exhibited output? (Choose two.)

Explanation

From the exhibited output, it can be inferred that the other switches in the domain can be running either VTP version 1 or 2. This is indicated by the fact that the VTP version on SW-A is shown as "1 or 2". Additionally, it is indicated that this switch will update its VLAN configuration when VLAN changes are made on a VTP server in the same domain. This is shown by the "VTP Operating Mode" being displayed as "Client" and the "VTP Version" being displayed as "2".

Submit
View My Results

Quiz Review Timeline (Updated): Mar 19, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 23, 2013
    Quiz Created by
    Tmatijevic
Cancel
  • All
    All (184)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which parameter is used to uniquely identify one wireless network from...
Which value determines if a switch becomes the central point of...
Why is MAC address filtering considered a poor choice in securing a...
Which value determines if a switch becomes the central point of...
Refer to the exhibit. A network administrator needs to add IP phones...
Which parameter is used to uniquely identify one wireless network from...
A network technician is attempting to configure 802.1q trunking on...
Which type of VLAN would accommodate untagged traffic on a 802.1q...
Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to...
Refer to the exhibit. A network administrator needs to add IP phones...
Refer to the exhibit. What is the maximum number of VLANs that can be...
Why is MAC address filtering considered a poor choice in securing a...
Refer to the exhibit. What is the maximum number of VLANs that can be...
Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to...
Which method establishes an administrative connection for configuring...
Refer to the exhibit. What would happen if the network administrator...
Which value determines if a switch becomes the central point of...
An administrator is troubleshooting a PC on the network which is...
An administrator is troubleshooting a PC on the network which is...
Refer to the exhibit. Each switch is configured to participate in STP...
Which type of traffic can still be received on a switch interface that...
Refer to the exhibit. A new switch, SW3, has been added to the...
Refer to the exhibit. A network administrator needs to add IP phones...
An administrator is troubleshooting a PC on the network which is...
Which method establishes an administrative connection for configuring...
Which type of traffic can still be received on a switch interface that...
What information in an Ethernet frame is used by a Layer 2 switch to...
Refer to the exhibit. A network administrator has segmented the...
A network administrator is asked to connect four switches that are...
A network administrator enters the enable command at the Switch>...
Refer to the exhibit. Router R1 is properly configured for router on a...
In which mode is a VTP switch operating if it has been configured to...
Which method establishes an administrative connection for configuring...
Refer to the exhibit. What happens when a frame from a source MAC...
Refer to the exhibit. A new switch, SW3, has been added to the...
Refer to the exhibit. Switch SWB is not responding to VTP updates from...
Refer to the exhibit. What will allow a host on VLAN 40 on switch X to...
Why is it important that the network administrator consider the...
Which IEEE trunking protocol is used to encapsulate data traffic over...
Refer to the exhibit. The Layer 2 switching design that is shown has...
Refer to the exhibit. Each switch is configured to participate in STP...
Why is it advisable that a network administrator use SSH instead of...
What information in an Ethernet frame is used by a Layer 2 switch to...
Refer to the exhibit. A new host needs to be connected to VLAN 1....
Refer to the exhibit. What is the result of issuing these commands?
Refer to the exhibit. Users A and B are reporting intermittent...
Refer to the exhibit. If switch SW1 is configured with the four VLANs...
Refer to the exhibit. Router RA receives a packet with a source...
Refer to the exhibit. What would happen if the network administrator...
Refer to the exhibit. The hosts connected to switch SW1 are not able...
What is the benefit of the auto-MDIX feature on a Cisco Catalyst...
Refer to the exhibit. A network administrator has segmented the...
Why is it advisable that a network administrator use SSH instead of...
What is the purpose of the Spanning Tree algorithm?
Refer to the exhibit. Each switch is shown with its MAC address. Which...
Refer to the exhibit. What does the term DYNAMIC indicate in the...
What is the purpose of the Spanning Tree algorithm?
Refer to the exhibit. A network administrator has segmented the...
What is the purpose of configuring a switch port as a trunk port?
Refer to the exhibit. A new host needs to be connected to VLAN 3....
Refer to the exhibit. Which statement is true about the status of...
Refer to the exhibit. A network administrator has segmented the...
Refer to the exhibit. Hosts that are connected to switch SW1 are not...
Using the command copy tftp:backup.cfg startup-config, an...
Refer to the exhibit. The hosts connected to switch SW1 are not able...
Refer to the exhibit. What does the term DYNAMIC indicate in the...
Refer to the exhibit. Router RA receives a packet with a source...
Company policy requires disabling the command history buffer on...
Which CLI mode allows users to access all device commands, such as...
Refer to the exhibit. Which Spanning Tree Protocol version is in...
Refer to the exhibit. What is the effect of setting the security mode...
What is an efficient and cost effective way to minimize the frequency...
What is a function or characteristic of the native VLAN?
Refer to the exhibit. Hosts PC_A and PC_B send traffic simultaneously,...
Which STP port type can only appear once on a segment, and must be...
Which configuration changes will increment the configuration revision...
Refer to the exhibit. Switch SWB is not responding to VTP updates from...
Company policy requires disabling the command history buffer on...
A network technician is attempting to configure 802.1q trunking on...
What is the purpose of the switch command switchport access vlan 99?
Refer to the exhibit. A technician is troubleshooting a trunk problem...
Which feature is uniquely found in an access layer switch within a...
....
Refer to the exhibit. The network consists of four hubs and a switch....
Refer to the exhibit. VLAN 20 was recently added on the network. Users...
Refer to the exhibit. A network administrator is configuring RT1 for...
Refer to the exhibit. VTP pruning is enabled in the VTP domain that is...
What operational change will occur if an 802.11b client associates...
Using the command copy tftp:backup.cfg startup-config, an...
Refer to the exhibit. What can be determined from the configuration of...
Refer to the exhibit. The broadcast traffic from PC1 is consuming...
Refer to the exhibit. Switch SWA is not processing VTP advertisments...
A wireless LAN access point will convert traffic between which two...
Refer to the exhibit. Although they are directly connected, switch SWA...
Refer to the exhibit. All trunk links are operational and all VLANs...
Which two operations can be performed from the boot loader command...
Which switch forwarding method should be used on a network that...
Which combination is required to establish a connection to initially...
Refer to the exhibit. Switch SWB is not responding to VTP updates from...
In which mode is a VTP switch operating if it has been configured to...
What will be the effect of the command S1# copy system:running-config...
RSTP is enabled in a switched network that is active and converged....
What are two characteristics of normal range VLANs? (Choose two.)
Refer to the exhibit. What does "LEARNING" mean as it relates to the...
What advantage does cut-through switching provide?
Which switching method provides error-free data transmission?
A wireless access point is configured for WPA2. Which encryption...
Refer to the exhibit. The commands are entered into switch SW1 as...
In which mode is a VTP switch operating if it does not allow for the...
Refer to the exhibit. A network administrator enters the displayed...
A network administrator issued the erase nvram: command on a switch....
Which two devices can cause interference with the operation of a WLAN...
A network administrator must purchase new access layer switches to...
Where is the information of newly created VLANs stored on a switch?
Refer to the exhibit. An administrator documented the output of a CAM...
Refer to the exhibit. What does "LEARNING" mean as it relates to the...
Which combination of DTP modes set on adjacent switches will cause the...
What type of message do wireless clients transmit when they are...
Refer to the exhibit. All edge ports are configured with the...
Which configuration changes will increment the configuration revision...
A network administrator is planning the upgrade of an enterprise LAN...
Refer to the exhibit. The network administrator is planning five...
Which wireless topology supports roaming from one access point to...
While configuring a new switch, a network administrator configures the...
Refer to the exhibit. Which three options correctly identify...
Refer to the exhibit. Users complain that they do not have...
What VLANs are allowed across a trunk when the range of allowed VLANs...
Refer to the exhibit. Both switches are interconnected via a trunk...
Refer to the exhibit. Which two switch interfaces would be RSTP edge...
RSTP is enabled in a switched network that is active and converged....
Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4...
Which three statements are correct concerning the default...
Refer to the exhibit. What does "FORWARDING" mean in the command...
Refer to the exhibit. Which two settings show the default value of VTP...
What is a result of improperly implementing a network with redundancy...
What does TKIP have in common with AES?
Which service should be disabled on a Cisco switch or router to...
When port security is used on a switch, which violation mode will...
What are two benefits of the IEEE 802.11n standard over the IEEE...
Refer to the exhibit. Router R1 is connected to a switch through a...
What can an administrator do to ensure that a specific switch will win...
Refer to the exhibit. The network administrator needs to remove the...
Refer to the exhibit. R1 is configured for traditional inter-VLAN...
Which statement correctly describes an IBSS?
How does a switch that is configured for 802.1Q trunking handle...
What is the purpose of issuing the command ...
What happens when the crypto key zeroize rsa command is entered on a...
Refer to the exhibit. SW-T has been configured with a single trunking...
In a three-layer hierarchical network design, which distribution layer...
Which statement correctly describes a function of a Layer 2 switch?
What identifier in the BPDU creates a unique BID for a switch?
Which statement is correct about STP architecture?
Refer to the exhibit. The devices in the network are operational and...
Refer to the exhibit. Which three options correctly describe the...
Why is priority configured in 4096 increments when using PVST+?
Which Cisco switch feature is used to limit the number of valid MAC...
Refer to the exhibit. All switches are configured with the default...
Refer to the exhibit. All switch interfaces are members of the same...
Refer to the exhibit. Switch SW2 was tested in a lab environment and...
Refer to the exhibit. The configuration steps that are listed in the...
When an access point is placed near the outside wall of a building,...
What are two requirements for configuring inter-VLAN routing using the...
Refer to the exhibit. After entering the commands in the exhibit, the...
What benefit does 802.1x provide to a wireless network?
What technique is a security attack that depletes the pool of IP...
A wireless access point can function as which type of shared medium,...
The global configuration command ip default-gateway 172.16.100.1 ...
Refer to the exhibit. The network administrator wants to allow both...
Refer to the exhibit. Router R-West and switch S-West1 are connected...
What is one disadvantage that 802.11a wireless has compared to...
What two methods can be used to remove MAC address table entries from...
What allows WLAN clients to learn which networks and access points are...
Refer to the exhibit. A network administrator issues the show...
Refer to the exhibit. The switch VTY lines have been properly...
What three tasks should be performed before moving a Catalyst switch...
What are two benefits of a hierarchical network model over a flat...
Which two types of traffic are always transmitted as untagged frames?...
The network administrator wants to configure a switch to pass VLAN...
Refer to the exhibit. Switches S1 and S2 have had their startup...
Refer to the exhibit. What will be the result of the commands that are...
Refer to the exhibit. This switch is to be added to the production...
Which two statements describe VTP transparent mode operation? (Choose...
Which three statements are true regarding router-on-a-stick inter-VLAN...
Refer to the exhibit. Switch SW-A is to be used as a temporary...
Alert!

Advertisement