1. Trang chủ
  2. » Công Nghệ Thông Tin

CCNA final _part1 doc

10 183 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 10
Dung lượng 467,23 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Only the native VLAN will be allowed across the trunk.. Include VLAN 20 in the list of allowed VLANs o n the trunk link on SW2.. Remove VLAN 20 from the allowed VLANs on the trunk link o

Trang 1

Kiều Đình Luân

All VLANs will be allowed across the trunk

Only VLAN 1 will be allowed across the trunk

Only the native VLAN will be allowed across the trunk

The switches will negotiate via VTP which VLANs to allow across the trunk

The boot loader uses the self-contained switch operating system to boot the switch

The boot loader retrieves diagnostics routines via TFTP

The boot loader performs POST

The boot loader is loaded from RAM

The boot loader initializes the flash file system that is used to boot the system

The boot loader loads the default operating system if the flash-based operating system is corrupt or missing

3

Refer to the exhibit The switches in the exhibit have VTP pruning enabled What will be pruned in the VTP advertisements from switch ST-C to switch ST-1?

VLAN 30

VLAN 20 and VLAN 30

VLAN 1, VLAN 20, and VLAN 30

VLAN 2 through VLAN 29, and VLAN 31 through VLAN 1000

shared key

SSID

This is trial version www.adultpdf.com

Trang 2

ad hoc

channel

5

Refer to the exhibit A wireless infrastructure has been established in a company building as show n The design goal was to allow roaming between the three APs for handheld devices However, the devices lose connectivity when the users roam How can this problem be fixed?

Assign different SSIDs to each AP

Reconfigure all APs to the same channel

Use the same BSSID address for each AP

Reposition the APs so that each area of signal strength overlaps the neighbor by at least 10-15%

The service password-encryption command is entered at the privileged EXEC mode prompt

The service password-encryption command encrypts only passwords for the console and VTY ports The service password-encryption command encrypts all previously unencrypted passwords in the running

configuration

To see the passwords encrypted by the service password-encryption command, enter the no service

password-encryption command

7

This is trial version www.adultpdf.com

Trang 3

Refer to the exhibit What three statements describe why Host1 and Host2 are unable to communicate? (Choose three.)

The switch ports are on different VLANs

The switch IP address is on the wrong subnet

The hosts are configured on different logical networks

A router is required to forward traffic between Host1 and Host2

The VLAN port assignments must be contiguous for each VLAN

The host default gateway addresses must be on the same logical network

8

Refer to the exhibit How is port Gi1/1 on SWT-A functioning in the spanning-tree topology?

It is sending and receiving data frames

It is receiving BPDUs, but not sending data frames

It is participating in the election process by forwarding the BPDUs it receives

It is receiving BPDUs and populating the MAC address table, but not sending data

This is trial version www.adultpdf.com

Trang 4

9 Which benefit is gained by designing a network with a small network diameter?

lower latency

improved security

increased redundancy

higher interface bandwidth

requires no authentication

uses a 64-bit encryption algorithm

requires the use of an authentication server

requires a mutually agreed upon password

be dropped when the number of secure MAC addresses for a port is reached?

sticky

protect

restrict

shutdown

12

Refer to the exhibit A network administrator has designed and implemented a hierarchical network What is the maximum network diameter between any two hosts on the network?

five

six

ten

This is trial version www.adultpdf.com

Trang 5

twelve

WPA2

cloaking SSIDs

shared WEP key

MAC address filtering

14

Refer to the exhibit VLAN 20 was recently added on the network Users on VLAN 20 on SW1 start

complaining that they do not have connectivity to the users on the same VLAN on switch SW2 What should

be done to remedy the problem?

Configure the trunk port in a desirable mode on SW2

Include VLAN 20 in the list of allowed VLANs o n the trunk link on SW2

Configure VLAN 1 to be the native VLAN for both networks on SW1 and SW2

Remove VLAN 20 from the allowed VLANs on the trunk link on SW2, an action that w ill enable all VLANs on the trunk link

15

This is trial version www.adultpdf.com

Trang 6

Refer to the exhibit Computer A sends a broadcast message Which devices will see the broadcast? computer B

computer B and Router1

computer C and Router1

computer B, computer D, computer E and Router1

computer B, computer C, computer D, computer E and Router1

computer A, computer B, computer C, computer D, computer E and Router1

Take Assessment - ESwitching Practice Final Exam - CCNA Exploration: LAN Switching

and Wireless (Version 4.0)

47286

Time Remaining:

16

This is trial version www.adultpdf.com

Trang 7

Refer to the exhibit All switch interfaces are members of the same VLAN What information is used by Switch1

to determine if incoming frames from the hosts should be forwarded to Router1?

the source address field in the IP header

the destination port number in the TCP header

the destination address field in the Layer 3 header

the destination address field in the Ethernet header

17

This is trial version www.adultpdf.com

Trang 8

Refer to the exhibit A network administrator enters the displayed commands to configure VLAN 30 What is the result of running these commands?

VLAN 30 will be added to S1, S2, and S3, but not to S4

VLAN 30 will be pruned from the VLAN database of S3

VLAN 30 will be added to the VLAN database of S3 but will not be propagated to S4, S2 or S1

VLAN 30 will not be added to the VLAN database of S3 and an error message will be displayed

18

Refer to the exhibit Which switch will be elected as the root bridge of the spanning tree topology?

Cat-A

Cat-B

This is trial version www.adultpdf.com

Trang 9

Cat-C

Cat-D

19

Refer to the exhibit What is the result of issuing these commands?

The enable password will be set

The password will be set for the first Telnet connection

The password will be set for the console connection

The password will be set for the auxiliary connectio n

20

Refer to the exhibit The switches have been configured as shown The hosts that are connected to switch 101-2FL are not able to communicate with the hosts in their corresponding VLANs that are connected to switch 101-3FL What should be done to fix the problem?

Configure port Fa0/2 on switch 101-3FL as a static trunk link

Introduce a Layer 3 device or a switch with Layer 3 capability into the topology

Utilize the s witchport trunk allowe d vlan all command on switch 101-3FL to permit the VLAN traffic

Apply IP addresses that are in the same subnet to the interfaces that are used to connect switches 101-2FL and 101-3FL

This is trial version www.adultpdf.com

Trang 10

21 How are data frames identified and sent to the correct VLAN when exiting an Ethernet trunk?

Frames are forwarded to the correct VLAN based on the VLAN tag

Frames are always forwarded to the native VLAN when exiting a trunk

Frames are forwarded to the correct VLAN based on the source IP address

Frames are forwarded to the correct VLAN based on information in the MAC address table

Spanning Tree Protocol is disabled

Enable password is configured as cisco

All switch ports are assigned to VLAN1

The flash directory contains the IOS image

VLAN1 is configured with a management IP address

All interfaces are set to auto-negotiation of speed and duplex

23

Refer to the exhibit The network administrator wants to configure Switch1 to allow SSH connections and prohibit Telnet connections How should the network administrator change the displayed configuration to satisfy the requirement?

Use SSH version 1

Reconfigure the RSA key

Configure SSH on a different line

Modify the transport input command

It is calculated based on the total number of switches connected in a loop

It is calculated based on the utilization of all the switches along a given path

It is calculated based on the bridge priority of the switches along a given path

It is calculated based on the sum of the port cost value, determined by link speed, for each switch port along a given path

25

This is trial version www.adultpdf.com

Ngày đăng: 11/08/2014, 22:21

TỪ KHÓA LIÊN QUAN