ccna 3 eswitching practice final exam v 4.0

22
CCNA ESwitching Final Practice Exam 1 CCNA3 FINAL Exam Score 100 pdf1. 2. What happens when the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines? A new RSA key pair is created. The switch defaults to allowing Telnet connections only. The switch is no longer able to make SSH connections as an SSH client. The switch allows remote connections only after a new RSA key pair is generated. 3. What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value? All VLANs will be allowed across the trunk. Only VLAN 1 will be allowed across the trunk. Only the native VLAN will be allowed across the trunk. The switches will negotiate via VTP which VLANs to allow across the trunk.

Upload: ahmed-farouk

Post on 14-Sep-2014

3.357 views

Category:

Documents


1 download

DESCRIPTION

CCNA 3 ESwitching Practice Final Exam v 4.0 Score 100%

TRANSCRIPT

Page 1: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

1

CCNA3 FINAL Exam Score 100 pdf1.

2. What happens when the crypto key zeroize rsa command is entered

on a switch configured with the transport input ssh command on the vty

lines?

A new RSA key pair is created.

The switch defaults to allowing Telnet connections only.

The switch is no longer able to make SSH connections as an SSH

client.

The switch allows remote connections only after a new RSA key pair

is generated.

3. What VLANs are allowed across a trunk when the range of allowed VLANs is set

to the default value?

All VLANs will be allowed across the trunk.

Only VLAN 1 will be allowed across the trunk.

Only the native VLAN will be allowed across the trunk.

The switches will negotiate via VTP which VLANs to allow across the trunk.

Page 2: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

2

4. Using the command copy tftp:backup.cfg startup-config, an administrator

downloaded a saved configuration from a TFTP server to a switch. Why does the

administrator not detect any changes in the switch configuration after the download

completes?

The command should have been copy startup-config tftp:backup.cfg.

A backup configuration from a TFTP server cannot be copied directly into the

startup-config.

The command copy running-config startup-config should be used to save the

changes on the switch.

Downloading to the startup-config requires the switch to be reloaded in order for

the configuration to take effect.

5.

Page 3: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

3

6.

7. Which statement regarding the service password-encryption command is

true?

The service password-encryption command is entered at the privileged

EXEC mode prompt.

The service password-encryption command encrypts only passwords for

the console and VTY ports.

The service password-encryption command encrypts all previously

unencrypted passwords in the running configuration.

To see the passwords encrypted by the service password-encryption

command, enter the no service password-encryption command.

Page 4: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

4

8. Which three statements are correct concerning the default configuration

of a new switch? (Choose three.)

Spanning Tree Protocol is disabled.

Enable password is configured as cisco.

All switch ports are assigned to VLAN1.

The flash directory contains the IOS image.

VLAN1 is configured with a management IP address.

All interfaces are set to auto-negotiation of speed and duplex.

9.

Page 5: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

5

10.

11. What three tasks should be performed before moving a Catalyst switch to another

VTP management domain? (Choose three.)

Select the correct VTP mode and version.

Configure the switch with the name of the new management domain.

Download the VTP database from the VTP server in the new domain.

Configure the VTP server in the new domain to recognize the BID of the switch.

Reset the VTP counters to allow the switch to synchronize with the other switches in

the new domain.

Verify that the switch has a lower configuration revision number than the other

switches in the new domain.

12. How does Spanning Tree Protocol aid network architecture?

allows for redundant links by eliminating loops

provides greater scalability by eliminating collisions

reduces switch processor load by reducing broadcast traffic on trunk links

reduces administrative overhead by sharing VLAN databases between switches

across the network

Page 6: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

6

13. Which type of frame contains information that is used in the election of the

spanning tree root bridge?

BID

LSA

LSU

BPDU

14.

15.

Page 7: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

7

16. After unpacking a new Linksys WRT300N wireless multifunction device, a user

needs to change the default administrator password and make other configuration

changes. What must the user do to access the device in order to make these changes?

Use a wireless client to associate with the WRT300N and then open a

HyperTerminal session with the device.

Establish a wired connection with the device and then reboot the attached

computer to launch the configuration software.

Establish a wired connection from a computer in the same IP subnet as the

WRT300N and enter the default IP address of the device into a web browser on

the computer.

Modify the TCP/IP properties of the computer that is connected to the WRT300N

so that the computer and the WRT300N exist on the same network. Then reboot

the computer to establish a connection.

17.

Page 8: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

8

18.

19.

Page 9: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

9

20.

21.

Page 10: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

11

22.

23. Which parameter is a specific frequency at which a wireless access point will

operate?

BSS

WEP

SSID

ad hoc

channel

24. Which parameter is associated with wireless authentication?

shared key

SSID

ad hoc

channel

Page 11: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

11

25.

26.

Page 12: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

12

27.

28. Which statement correctly describes the spanning-tree path cost?

It is calculated based on the total number of switches connected in a loop.

It is calculated based on the utilization of all the switches along a given path.

It is calculated based on the bridge priority of the switches along a given path.

It is calculated based on the sum of the port cost value, determined by link speed,

for each switch port along a given path

Page 13: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

13

29.

30.

Page 14: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

14

31.

32. Which three actions are performed during the boot sequence of a Cisco switch?

(Choose three.)

The boot loader uses the self-contained switch operating system to boot the

switch.

The boot loader retrieves diagnostics routines via TFTP

The boot loader performs POST.

The boot loader is loaded from RAM.

The boot loader initializes the flash file system that is used to boot the system.

The boot loader loads the default operating system if the flash-based operating

system is corrupt or missing.

33.

Page 15: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

15

34.

35.

36. Which statement is true about open authentication when it is enabled on an access

point?

requires no authentication

uses a 64-bit encryption algorithm

requires the use of an authentication server

requires a mutually agreed upon password

Page 16: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

16

37. How are data frames identified and sent to the correct VLAN when exiting an

Ethernet trunk?

Frames are forwarded to the correct VLAN based on the VLAN tag.

Frames are always forwarded to the native VLAN when exiting a trunk.

Frames are forwarded to the correct VLAN based on the source IP address.

Frames are forwarded to the correct VLAN based on information in the MAC

address table.

38.

Page 17: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

17

39. When port security is used on a switch, which violation mode will cause an

SNMP trap to be sent and traffic to be dropped when the number of secure MAC

addresses for a port is reached?

sticky

protect

restrict

shutdown

40. A wireless access point can function as which type of shared medium, wired LAN

device?

hub

switch

router

gateway

41.

Page 18: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

18

42.

43. Which benefit is gained by designing a network with a small network diameter?

lower latency

improved security

increased redundancy

higher interface bandwidth

Page 19: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

19

44.

45.

Page 20: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

21

46. Which security protocol or measure would provide the greatest protection for a

wireless LAN?

WPA2

cloaking SSIDs

shared WEP key

MAC address filtering

47.

48. Which two conditions would require a VTP client to send a request advertisement

to a VTP server? (Choose two.)

The switch has been reset.

A VLAN has been created or deleted.

A five minute time period has elapsed.

The name of a VLAN has been changed.

The VTP domain name has been changed.

Page 21: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

21

49.

Page 22: CCNA 3 ESwitching Practice Final Exam v 4.0

CCNA ESwitching Final Practice Exam

22

50.

Good Luck

Ahmed Farouk