CCNA Final exam first 50

CCNA Final exam first 50

question and answers for CCNA 3 First 50 questions FINAL EXAM -.- :( :@

published on January 15, 201349 responses 1 5.0★ / 5

Refer to the exhibit. A network administrator needs to add IP phones to the
network. To which devices should the IP phones connect?

Select the one correct answers
AS1 and AS2
DS1 and DS2
DS1, DS2, and CS1
AS1, AS2, DS1, and DS2

Refer to the exhibit. Which Spanning Tree Protocol version is in effect?

Select the one correct answers
Per VLAN Spanning Tree (PVST)
Per VLAN Spanning Tree + (PVST+)
Common Spanning Tree (CST)
Rapid Spanning Tree Protocol (RSTP)
Multiple Spanning Tree Protocol (MSTP)

Refer to the exhibit. What is the maximum number of VLANs that can be deleted
from the Switch as it is configured?

Select the one correct answers
zero
four
five
eight
nine

What is the purpose of the Spanning Tree algorithm?

Select the one correct answers
It propagates VLAN configurations to other switches.
It restricts broadcast packets to a single VLAN.
It segments a network into multiple broadcast domains.
It prevents loops in a switched network with redundant paths.

Refer to the exhibit. An administrator documented the output of a CAM table from an
Ethernet switch as shown. What action will the switch take when it receives the frame
shown at the bottom of the exhibit?

Select the one correct answers
discard the frame
forward the frame out port 3
forward the frame out port 2
forward the frame out all ports
forward the frame out all ports except port 3
add station 00-00-3D-1F-11-05 to port 2 in the forwarding table

Refer to the exhibit. Each switch is configured to participate in STP for VLANs 1, 10,
20, and 30. Which switch will become the root for VLAN 20?

Select the one correct answers
A
B
C
D

Which three statements are correct concerning the default configuration of a new
switch? (Choose three.)

Select the three correct answers
It is configured in VTP server mode.
STP is automatically enabled.
The first VTY line is automatically configured to allow remote connections.
VLAN1 is configured with a management IP address.
All switch ports are assigned to VLAN1.
The enable password is configured as cisco.

Which CLI mode allows users to access all device commands, such as those used for
configuration, management, and troubleshooting?

Select the one correct answers
user EXEC mode
privileged EXEC mode
global configuration mode
interface configuration mode

Refer to the exhibit. VTP pruning is enabled in the VTP domain that is shown. How
will switch ST-1 handle Layer 2 broadcast traffic originating from host A on switch ST-C?

Select the one correct answers
It will be dropped.
It will be forwarded out port Fa0/5 only.
It will be forwarded out ports Fa0/5 and Fa0/10.
It will be forwarded out ports Fa0/5, Fa0/10, and Fa0/15.

Refer to the exhibit. A network administrator has segmented the network into two
VLANs and configured Router1 for inter-VLAN routing. A test of the network, however,
shows that hosts on each VLAN can only access local resources and not resources on the
other VLAN. What is the most likely cause of this problem?

Select the one correct answers
Switch port Fa0/1 is not trunking.
Router interface Fa0/0 is possibly down.
No routing protocol is configured on Router1.
One of the router subinterfaces is possibly down.

What VLANs are allowed across a trunk when the range of allowed VLANs is set to
the default value?

Select the one correct answers
only the management VLAN
all VLANs except the extended range VLANs
all VLANs except 1 and 1002-1005
all VLANs

Refer to the exhibit. After entering the commands in the exhibit, the administrator
receives a “password required, but none set” message when attempting to connect to
S1. What is the problem?

S1 does not have a password configured for the vty lines.
S1 does not have login configured on the vty lines.
The enable secret password was not set.
The crypto key is not properly configured to generate passwords.
The VLAN1 interface has not be enabled with the no shutdown command.

Refer to the exhibit. Which three options correctly identify information that could be
associated with this output?(Choose three.)

Select the three correct answers
Interface FastEthernet3/0/0 is subinterfaced.
A non-proprietary trunking protocol is in use.
The configuration is appropriate for a router-on-a-stick network design.
A shutdown command has been applied to interface FastEthernet3/0/0.
Interface FastEthernet3/0/0.3 is mapped to the default management VLAN.
An IP address should be applied to FastEthernet3/0/0 for correct data routing.

Which parameter is used to uniquely identify one wireless network from another?

Select the one correct answers
SSID
OFDM
WEP
DSSS

Which configuration changes will increment the configuration revision number on
the VTP server?

Select the one correct answers
configuring trunk links on the VTP server
configuring or changing the VTP password
configuring or deleting a VLAN or creating a VLAN name
configuring or changing the VTP domain name
configuring or changing the VTP version number

In which mode is a VTP switch operating if it does not allow for the creation of local
VLANs but it does accept VLAN updates from other switches in the same domain?

Select the one correct answers
Client
root
server
transparent

Using the command copy tftp:backup.cfg startup-config, an administrator
downloaded a saved configuration from a TFTP server to a switch. Why does the
administrator not detect any changes in the switch configuration after the download
completes?

Select the one correct answers
The command should have been copy startup-config tftp:backup.cfg.
A backup configuration from a TFTP server cannot be copied directly into the startup-config.
The command copy running-config startup-config should be used to save the changes on the switch.
Downloading to the startup-config requires the switch to be reloaded in order for the configuration to take effect.

Which method establishes an administrative connection for configuring the Linksys
WRT300N wireless access point?

Select the one correct answers
Associate with the access point and then open a HyperTerminal session with the access point.
Physically connect to the access point and then reboot the computer to launch the configuration software.
From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.
Modify the TCP/IP properties of the computer connected to the access point so that it exists on the
same network, and then reboot your computer to establish a connection.

Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP address
should be assigned to this new host?

Select the one correct answers
192.168.1.22 /28
192.168.1.11 /28
192.168.1.33 /28
192.168.1.44 /28
192.168.1.55 /28

An administrator is troubleshooting a PC on the network which is suffering from
slow and intermittent connectivity. The PC has a ping success rate to the default
gateway of less than half the ping attempts. Other PCs on the switch can consistently
ping the default gateway. The switch port is configured for auto duplex and the PC is
configured for full duplex. What will commonly cause this problem?

Select the one correct answers
The PC and the default gateway have different bandwidth Ethernet ports.
The PC is set to full duplex. The switch port fails to autonegotiate the duplex setting and defaults to half duplex, which causes a duplex mismatch.
The switch traffic is exceeding available frame buffers. The result is that frames are being dropped.
The default gateway is not on the same switch that the PC is.

Refer to the exhibit. If switch SW1 is configured with the four VLANs as shown in the
exhibit, how many physical interfaces are needed on router R1 to configure inter-VLAN
routing using subinterfaces?

Select the one correct answers
zero
one
two
four

Which value determines if a switch becomes the central point of reference in the
spanning tree topology?

Select the one correct answers
lowest bridge ID
highest revision number
lowest numeric IP address
highest numeric MAC address

Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a
frame at the same time but a collision occurs. Which hosts will receive the collision
jamming signal?

Select the one correct answers
only hosts A and B
only hosts A, B, and C
only hosts A, B, C, and D
only hosts A, B, C, and E

When port security is used on a switch, which violation mode will cause an SNMP
trap to be sent and traffic to be dropped when the number of secure MAC addresses for
a port is reached?

Select the one correct answers
sticky
protect
restrict
shutdown

Why is MAC address filtering considered a poor choice in securing a WLAN?

Select the one correct answers
Available bandwidth is reduced
MAC addresses are easily spoofed.
APs are more susceptible to DoS attacks.
The payload encryption is easily broken.