ESwitching Final Exam - CCNA Exploration LAN Switching and Wireless (Version 4.0) By: Owey 1 Why is it important that the network administrator consider the spanning-tree network diameter when choosing the root bridge? The network diameter limitation is 9. BPDUs may be discarded because of expiring timers. The cabling distance between the switches is 100 meters. The network diameter must be set to the number of meters of the cable between the root bridge and its farthest connected switch. 2 Refer to the exhibit. A network administrator configures HyperTerminal with the parameters shown but is unable to connect to a switch via the console port. The administrator is using a tested rollover cable attached to the only COM port on the computer, and the connections have been verified. What is the likely problem? The cable is connected to the wrong port. The wrong connection speed is selected. The cable is the wrong type. The flow control setting is not correct. The stop bits should be set to zero.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
ESwitching Final Exam - CCNA Exploration LAN Switching and Wireless (Version 4.0)
By: Owey
1
Why is it important that the network administrator consider the spanning-tree network diameter when choosing the root
bridge?
The network diameter limitation is 9.
BPDUs may be discarded because of expiring timers.
The cabling distance between the switches is 100 meters.
The network diameter must be set to the number of meters of the cable between the root bridge and its farthest
connected switch.
2
Refer to the exhibit. A network administrator configures HyperTerminal with the parameters shown but is unable to connect
to a switch via the console port. The administrator is using a tested rollover cable attached to the only COM port on the
computer, and the connections have been verified. What is the likely problem?
The cable is connected to the wrong port.
The wrong connection speed is selected.
The cable is the wrong type.
The flow control setting is not correct.
The stop bits should be set to zero.
3
Refer to the exhibit. Switch SW2 was tested in a lab environment and then inserted into a production network without
reloading its configuration. After the trunk link between SW1 and SW2 was brought up, all users lost connectivity to the
network. What could be the source of the problem?
All the VLANs were pruned from the trunk port between SW1 and SW2.
SW1 and SW2 cannot be both set as VTP servers in the same VTP domain.
VTP configuration revision number of SW2 was higher than the configuration revision number of SW1.
The additional VLANs from SW2 created more VLANs than the VLAN database of SW1 could contain.
4
Refer to the exhibit. R1 is configured for traditional inter-VLAN routing. R1 can ping computer 3 but cannot ping computer 1.
What is a possible cause for this failure?
S1 port Fa0/11 is in the wrong VLAN.
R1 does not have an active routing protocol.
The IP address of computer 1 is in the wrong logical network.
Router interface Fa0/0 has the wrong trunk encapsulation type configured.
5
Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs
connected to switch SW2. What should be done to fix the problem?
Configure VLANs with different VLAN IDs on switch SW2.
Reconfigure the trunk port on switch SW2 with static trunk configuration.
Introduce a Layer 3 device or a switch with Layer 3 capability in the topology.
Apply IP addresses that are in the same subnet to the interfaces used to connect SW1 and SW2.
6
Which three actions are performed during the boot sequence of a Cisco switch? (Choose three.)
The boot loader uses the self-contained switch operating system to boot the switch.
The boot loader retrieves diagnostics routines via TFTP.
The boot loader performs POST.
The boot loader is loaded from RAM.
The boot loader initializes the flash file system that is used to boot the system.
The boot loader loads the default operating system if the flash-based operating system is corrupt or missing.
7
An administrator is viewing the running configuration for a switch on the network. The enable password is displayed in plain
text but the enable secret password has been encrypted. What level of access can be gained using the enable password?
no access to privileged mode
full access to privileged mode
full access to privileged mode on Telnet connections
full access to privileged mode if the enable password and the enable secret password are the same
8
Refer to the exhibit. A network administrator has segmented the network into two VLANs. The connected hosts can only
access resources in their own VLAN. What is the most scalable and cost effective solution to allow inter-VLAN
communication in this network?
Replace S1 with a router that has one FastEthernet interface for each PC.
Add a second switch and divide the PCs so that each VLAN is connected to its own switch.
Configure a router with two subinterfaces on one of its FastEthernet ports and connect it to S1 using a trunk
link.
Connect a router to a port on S1 and assign the IP address of VLAN1 to the connecting router interface.
9
Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of
192.168.1.85. What will the router do with this packet?
The router will ignore the packet.
The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.
The router will forward the packet out interface FastEthernet 0/1.1.
The router will forward the packet out interface FastEthernet 0/1.2.
The router will forward the packet out interface FastEthernet 0/1.3.
10
Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit. However, hosts
A and D cannot ping each other. What is the most likely cause of this problem?
The link between the switches is up but not trunked.
The Fa0/11 interface of Switch1 is not configured as a trunk.
Hosts A and D are configured with IP addresses from different subnets.
VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.
11
Refer to the exhibit. Which three options correctly describe the router configuration that is shown? (Choose three.)
An IEEE standard trunking protocol is in use.
Interface Fa0/1 has been configured with subinterfaces.
The shutdown command has been applied to interface Fa0/1.
Interface Fa0/1.3 is mapped to the default management VLAN.
The configuration is appropriate for a router-on-a-stick network design.
An IP address should be applied to interface Fa0/1 for routing to occur.
12
A network administrator needs to save the configuration file currently in RAM to NVRAM before rebooting the switch.
Which command should the administrator issue?
Switch1# copy startup-config flash:filename
Switch1# copy running-config startup-config
Switch1# copy startup-config running-config
Switch1# copy flash:config.txt running-config
13
Refer to the exhibit. The configuration steps that are listed in the exhibit have been entered in switch S1 via the console.
Subsequent attempts to telnet to the switch are not successful. What is causing the problem?
The switch must be configured with SSH version 1.
The transport input command must specify Telnet access.
The RSA keys must be returned to zero before SSH will permit Telnet access.
The ip domain-name command must also be entered in line configuration mode for the vty lines.
14
Which parameter is associated with wireless authentication?
shared key
SSID
ad hoc
channel
15
A wireless LAN access point will convert traffic between which two frame encapsulation types?
802.1 and 802.11
802.3 and 802.11
802.3 and 802.16
802.5 and 802.16
16
Refer to the exhibit. Switch SW2 has been newly purchased and added to the network. What configuration should be applied
to SW2 so that it participates in the same VTP domain as switch SW1, receives VLAN information from SW1, and
synchronizes VLAN information?
Disable VTP pruning on SW2.
Configure SW2 in VTP transparent mode.
Configure SW2 with the VTP domain password.
Configure SW2 as a VTP server with a higher revision number.
17
What is the correct order in which the STP components are chosen?