CCNA 100-150

CCNA 100-150

Delete foreverNot spam More 1 of 3 Why this ad? Lumosity.com - Get smarter, think faster - Train your brain with Lumosity, the personal trainer designed by scientists. Try a free workout! Reset your password Spam x Qfeast <info@qfeast.com> 3:15 PM (5 minutes ago) to me Why is this message in Spam? It contains content that's typically used in spam messages. Learn more Hi maxlovell2, You have received this email because you requested a password reset. In order to set a new password please click on link bellow: http://www.qfeast.com/reset-password?prt=ea4d6acc2de942e1b6ac6b8af3ed41 (If clicking on the link doesn't work in your email, please copy and paste it into your browser) All the best, The qFeast Team http://www.qfeast.com

published on January 21, 20132 responses 0
CCNA 100-150
Next »
1/25

101. Refer to the exhibit. The network administrator wants to allow both SSH and Telnet
connections to Switch1. However, the SSH connections fail. What is the most likely
cause of this problem?

The RSA key has been removed.
SSH has been configured on the wrong line.
The transport input command is applied incorrectly.
The domain name has been configured in the wrong configuration mode.
2/25

102. Company policy requires disabling the command history buffer on network devices.
An administrator enters terminal no history size at the command prompt on a Cisco
Catalyst switch and receives no error messages back, but the command history buffer is
still available. What is the problem?

The command contained a syntax error.
The Cisco IOS version does not support disabling the command history buffer.
The command history can only be disabled on a router, not a switch.
The size parameter reset the default buffer size but did not disable access to the buffer.
3/25

103. Refer to the exhibit. What would happen if the network administrator moved the
network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1?

Host A remains a member of VLAN 10, because the router is routing traffic between VLANs.
Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually
assigned to VLAN 30.
Host A remains a member of VLAN 10, because the switch provides dynamic VLAN assignment for
the port.
Host A maintains connectivity to all members of VLAN 10, because it is connected to the same
physical network.
Host A is no longer a member of VLAN 10, but because port Fa0/3 was unused, it is now a
member of VLAN 1.
4/25

104. What identifier in the BPDU creates a unique BID for a switch?

IP address
MAC address
bridge priority
VLAN ID
port priority
5/25

105. Refer to the exhibit. The devices in the network are operational and configured as
indicated in the exhibit. However, hosts B and D cannot ping each other. What is the
most likely cause of this problem?

The link between the switches is up but not trunked.
The Fa0/11 interface of Switch1 is not configured as a trunk.
Hosts B and D are configured with IP addresses from different subnets.
VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.
6/25

106. Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and
host B are on the default VLAN but are not able to exchange traffic. What should be done
to fix the problem?

Allow all VLANs on the trunk link.
Remove the native VLAN from the trunk.
Include a router or switch with Layer 3 capabilities.
Configure the same native VLAN on both ends of the trunk.
7/25

107. Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a
frame at the same time but a collision occurs. Which hosts will receive the collision
jamming signal?

only hosts A and B
only hosts A, B, and C
only hosts A, B, C, and D
only hosts A, B, C, and E
8/25

108. In which mode is a VTP switch operating if it has been configured to only forward
VTP advertisements?

client
root
server
transparent
9/25

109. Which method establishes an administrative connection for configuring the Linksys
WRT300N wireless access point?

Associate with the access point and then open a HyperTerminal session with the access point.
Physically connect to the access point and then reboot the computer to launch the configuration
software.
From a computer in the same IP subnet as the access point, enter the default IP address
of the access point in a web browser.
Modify the TCP/IP properties of the computer connected to the access point so that it exists on the
same network, and then reboot your computer to establish a connection.
10/25

110. Which three statements are true regarding router-on-a-stick inter-VLAN routing?
(Choose three.)

Hint: 3 choices
requires the use of subinterfaces on the router
requires an access link between the router and Layer 2 switch
more cost-efficient and scalable than using multiple physical interfaces
requires each subinterface to be configured with the no shutdown command
can impact performance if many VLANs compete for bandwidth on a single router
interface
makes troubleshooting the inter-VLAN routing configuration much less complex than when using
multiple physical interfaces
11/25

111. Refer to the exhibit. What does “FORWARDING” mean in the command output
shown?

The switch is sending and receiving data frames.
The switch is receiving BPDUs, but not sending data frames.
The switch is participating in an election process by forwarding the BPDUs it receives.
The switch is receiving BPDUs and populating the MAC address table, but not sending data.
12/25

112. What are two benefits of the IEEE 802.11n standard over the IEEE 802.11G?
(Choose two.)

Hint: 2 choices
requires less equipment
provides improved range
permits increased data rates
has a single-input and a single-output
needs no hardware upgrade for compatibility
13/25

113. Which parameter is used to uniquely identify one wireless network from another?

SSID
OFDM
WEP
DSSS
14/25

114. Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit
data at the same time. How do the hosts respond on the network? (Choose two.)

Hint: 2 choices
After the end of the jam signal, a backoff algorithm is invoked.
Hosts 1 and 4 are operating full duplex so no collision will exist.
The hub will block the port connected to Host 4 to prevent a collision.
Hosts 1 and 4 are assigned shorter backoff values to provide them priority to access the media.
If a host has data to transmit after the backoff period of that host, the host checks to
determine if the line is idle before transmitting.
15/25

115. Refer to the exhibit. The hosts connected to switch SW1 are not able to
communicate with the hosts in the same VLANs connected to switch SW2. What should
be done to fix the problem?

Configure VLANs with different VLAN IDs on switch SW2.
Reconfigure the trunk port on switch SW2 with static trunk configuration.
Introduce a Layer 3 device or a switch with Layer 3 capability in the topology.
Apply IP addresses that are in the same subnet to the interfaces used to connect SW1 and SW2.
16/25

116. Which value determines if a switch becomes the central point of reference in the
spanning tree topology?

lowest bridge ID
highest revision number
lowest numeric IP address
highest numeric MAC address
17/25

117. An administrator is troubleshooting a PC on the network which is suffering from
slow and intermittent connectivity. The PC has a ping success rate to the default
gateway of less than half the ping attempts. Other PCs on the switch can consistently
ping the default gateway. The switch port is configured for auto duplex and the PC is
configured for full duplex. What will commonly cause this problem?

The PC is set to full duplex. The switch port fails to autonegotiate the duplex setting and
defaults to half duplex, which causes a duplex mismatch.
The switch traffic is exceeding available frame buffers. The result is that frames are being dropped.
The PC and the default gateway have different bandwidth Ethernet ports.
The default gateway is not on the same switch that the PC is.
18/25

118. What will be the effect of the command S1# copy system:running-config
tftp://172.16.2.155/tokyo-config?

The IOS will be copied to the TFTP server.
The configuration file named tokyo-config will overwrite the startup configuration file on S1.
The running configuration file on S1 will be saved via TFTP to a file named tokyo-config.
The contents of NVRAM on S1 will become the startup configuration file on the tokyo switch.
19/25

119. What is an efficient and cost effective way to minimize the frequency and effects of
broadcast storms on an Ethernet LAN?

Connect each PC directly to a router port.
Use access control lists to filter broadcasts from the network.
Divide the computers into separate VLANs on the existing switches.
Divide the computers into separate workgroups using different physical switches.
20/25

120. Which combination of DTP modes set on adjacent switches will cause the link to
become an access link instead of a trunk link?

dynamic desirable – trunk
dynamic auto – dynamic auto
dynamic desirable – dynamic auto
dynamic desirable – dynamic desirable
21/25

121. Refer to the exhibit. A network administrator needs to add IP phones to the
network. To which devices should the IP phones connect?

AS1 and AS2
DS1 and DS2
DS1, DS2, and CS1
AS1, AS2, DS1, and DS2
22/25

122. Refer to the exhibit. This switch is to be added to the production network. Which
two facts about VLANs and VTP operation can be confirmed by this output? (Choose
two.)

Hint: 2 choices
The network administrator will be able to configure VLANs of local significance on this switch.
VLANs can only be added to the VLAN database on this switch by a VTP advertisement.
All VLANs that are configured on this switch will be sent to all other switches in the same VTP
domain.
This switch will drop all VTP advertisements that come from switches that are configured in the
same VTP domain.
Adding this switch to the network will cause no disruption in the VTP domain operations
if the rest of the switches in the same VTP domain have a higher configuration revision
number.
23/25

123. Refer to the exhibit. What does the term DYNAMIC indicate in the output that is
shown?

This entry can only be removed from the MAC address table by a network administrator.
When forwarding a frame to the device with address 0060.5c5b.cd23, the switch does not have to
perform a lookup to determine the final destination port.
Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18
The switch learned this MAC address from the source address in a frame received on
Fa0/18.
24/25

124. Refer to the exhibit. Router R1 is properly configured for router on a stick inter-
VLAN routing, but PC1 is unable to ping PC2. What needs to be done to resolve the
problem?

Rename VLAN1.
Connect one more port of S1 to R1.
Configure the Fa0/1 port of S1 as a trunk port.
Move the Fa0/0 interface of R1 to another VLAN.
25/25

125. Refer to the exhibit. A network administrator has segmented the network into two
VLANs. The connected hosts can only access resources in their own VLAN. What is the
most scalable and cost effective solution to allow inter-VLAN communication in this
network?

Replace S1 with a router that has one FastEthernet interface for each PC.
Add a second switch and divide the PCs so that each VLAN is connected to its own switch.
Configure a router with two subinterfaces on one of its FastEthernet ports and connect it
to S1 using a trunk link.
Connect a router to a port on S1 and assign the IP address of VLAN1 to the connecting router
interface.