Only the native VLAN will be allowed across the trunk.. Include VLAN 20 in the list of allowed VLANs o n the trunk link on SW2.. Remove VLAN 20 from the allowed VLANs on the trunk link o
Trang 1Kiều Đình Luân
All VLANs will be allowed across the trunk
Only VLAN 1 will be allowed across the trunk
Only the native VLAN will be allowed across the trunk
The switches will negotiate via VTP which VLANs to allow across the trunk
The boot loader uses the self-contained switch operating system to boot the switch
The boot loader retrieves diagnostics routines via TFTP
The boot loader performs POST
The boot loader is loaded from RAM
The boot loader initializes the flash file system that is used to boot the system
The boot loader loads the default operating system if the flash-based operating system is corrupt or missing
3
Refer to the exhibit The switches in the exhibit have VTP pruning enabled What will be pruned in the VTP advertisements from switch ST-C to switch ST-1?
VLAN 30
VLAN 20 and VLAN 30
VLAN 1, VLAN 20, and VLAN 30
VLAN 2 through VLAN 29, and VLAN 31 through VLAN 1000
shared key
SSID
This is trial version www.adultpdf.com
Trang 2ad hoc
channel
5
Refer to the exhibit A wireless infrastructure has been established in a company building as show n The design goal was to allow roaming between the three APs for handheld devices However, the devices lose connectivity when the users roam How can this problem be fixed?
Assign different SSIDs to each AP
Reconfigure all APs to the same channel
Use the same BSSID address for each AP
Reposition the APs so that each area of signal strength overlaps the neighbor by at least 10-15%
The service password-encryption command is entered at the privileged EXEC mode prompt
The service password-encryption command encrypts only passwords for the console and VTY ports The service password-encryption command encrypts all previously unencrypted passwords in the running
configuration
To see the passwords encrypted by the service password-encryption command, enter the no service
password-encryption command
7
This is trial version www.adultpdf.com
Trang 3Refer to the exhibit What three statements describe why Host1 and Host2 are unable to communicate? (Choose three.)
The switch ports are on different VLANs
The switch IP address is on the wrong subnet
The hosts are configured on different logical networks
A router is required to forward traffic between Host1 and Host2
The VLAN port assignments must be contiguous for each VLAN
The host default gateway addresses must be on the same logical network
8
Refer to the exhibit How is port Gi1/1 on SWT-A functioning in the spanning-tree topology?
It is sending and receiving data frames
It is receiving BPDUs, but not sending data frames
It is participating in the election process by forwarding the BPDUs it receives
It is receiving BPDUs and populating the MAC address table, but not sending data
This is trial version www.adultpdf.com
Trang 49 Which benefit is gained by designing a network with a small network diameter?
lower latency
improved security
increased redundancy
higher interface bandwidth
requires no authentication
uses a 64-bit encryption algorithm
requires the use of an authentication server
requires a mutually agreed upon password
be dropped when the number of secure MAC addresses for a port is reached?
sticky
protect
restrict
shutdown
12
Refer to the exhibit A network administrator has designed and implemented a hierarchical network What is the maximum network diameter between any two hosts on the network?
five
six
ten
This is trial version www.adultpdf.com
Trang 5twelve
WPA2
cloaking SSIDs
shared WEP key
MAC address filtering
14
Refer to the exhibit VLAN 20 was recently added on the network Users on VLAN 20 on SW1 start
complaining that they do not have connectivity to the users on the same VLAN on switch SW2 What should
be done to remedy the problem?
Configure the trunk port in a desirable mode on SW2
Include VLAN 20 in the list of allowed VLANs o n the trunk link on SW2
Configure VLAN 1 to be the native VLAN for both networks on SW1 and SW2
Remove VLAN 20 from the allowed VLANs on the trunk link on SW2, an action that w ill enable all VLANs on the trunk link
15
This is trial version www.adultpdf.com
Trang 6Refer to the exhibit Computer A sends a broadcast message Which devices will see the broadcast? computer B
computer B and Router1
computer C and Router1
computer B, computer D, computer E and Router1
computer B, computer C, computer D, computer E and Router1
computer A, computer B, computer C, computer D, computer E and Router1
Take Assessment - ESwitching Practice Final Exam - CCNA Exploration: LAN Switching
and Wireless (Version 4.0)
47286
Time Remaining:
16
This is trial version www.adultpdf.com
Trang 7Refer to the exhibit All switch interfaces are members of the same VLAN What information is used by Switch1
to determine if incoming frames from the hosts should be forwarded to Router1?
the source address field in the IP header
the destination port number in the TCP header
the destination address field in the Layer 3 header
the destination address field in the Ethernet header
17
This is trial version www.adultpdf.com
Trang 8Refer to the exhibit A network administrator enters the displayed commands to configure VLAN 30 What is the result of running these commands?
VLAN 30 will be added to S1, S2, and S3, but not to S4
VLAN 30 will be pruned from the VLAN database of S3
VLAN 30 will be added to the VLAN database of S3 but will not be propagated to S4, S2 or S1
VLAN 30 will not be added to the VLAN database of S3 and an error message will be displayed
18
Refer to the exhibit Which switch will be elected as the root bridge of the spanning tree topology?
Cat-A
Cat-B
This is trial version www.adultpdf.com
Trang 9Cat-C
Cat-D
19
Refer to the exhibit What is the result of issuing these commands?
The enable password will be set
The password will be set for the first Telnet connection
The password will be set for the console connection
The password will be set for the auxiliary connectio n
20
Refer to the exhibit The switches have been configured as shown The hosts that are connected to switch 101-2FL are not able to communicate with the hosts in their corresponding VLANs that are connected to switch 101-3FL What should be done to fix the problem?
Configure port Fa0/2 on switch 101-3FL as a static trunk link
Introduce a Layer 3 device or a switch with Layer 3 capability into the topology
Utilize the s witchport trunk allowe d vlan all command on switch 101-3FL to permit the VLAN traffic
Apply IP addresses that are in the same subnet to the interfaces that are used to connect switches 101-2FL and 101-3FL
This is trial version www.adultpdf.com
Trang 1021 How are data frames identified and sent to the correct VLAN when exiting an Ethernet trunk?
Frames are forwarded to the correct VLAN based on the VLAN tag
Frames are always forwarded to the native VLAN when exiting a trunk
Frames are forwarded to the correct VLAN based on the source IP address
Frames are forwarded to the correct VLAN based on information in the MAC address table
Spanning Tree Protocol is disabled
Enable password is configured as cisco
All switch ports are assigned to VLAN1
The flash directory contains the IOS image
VLAN1 is configured with a management IP address
All interfaces are set to auto-negotiation of speed and duplex
23
Refer to the exhibit The network administrator wants to configure Switch1 to allow SSH connections and prohibit Telnet connections How should the network administrator change the displayed configuration to satisfy the requirement?
Use SSH version 1
Reconfigure the RSA key
Configure SSH on a different line
Modify the transport input command
It is calculated based on the total number of switches connected in a loop
It is calculated based on the utilization of all the switches along a given path
It is calculated based on the bridge priority of the switches along a given path
It is calculated based on the sum of the port cost value, determined by link speed, for each switch port along a given path
25
This is trial version www.adultpdf.com