Sunteți pe pagina 1din 14

Tke Assessment - ESwitching Final Exam - CCNA Exploration: LAN Switching and Wireless (Version 4.0)

1

Refer to the exhibit. The configuration steps that are listed in the exhibit have been entered in s S1 via the console. Subsequent attempts to telnet to the switch are not successful. What is cau the problem?

The switch must be configured with SSH version 1. to the switch are not successful. What is cau the problem? The transport input command must

The transport input command must specify Telnet access. The transport input

The RSA keys must be returned to zero before SSH will permit Telnet access. 1. The transport input command must specify Telnet access. The ip domain-name command must also be

The ip domain-name command must also be entered in line configuration mode for the vty The ip domain-name

2

Refer to the exhibit. How is port Gi1/1 on SWT-A functioning in the spanning-tree topology?

It is sending and receiving data frames. Gi1/1 on SWT-A functioning in the spanning-tree topology? It is receiving BPDUs, but not sending data

It is receiving BPDUs, but not sending data frames. topology? It is sending and receiving data frames. It is participating in the election process by

It is participating in the election process by forwarding the BPDUs it receives. frames. It is receiving BPDUs, but not sending data frames. It is receiving BPDUs and populating

It is receiving BPDUs and populating the MAC address table, but not sending data. in the election process by forwarding the BPDUs it receives. 3 Which parameter is a specific

3

Which parameter is a specific frequency at which a wireless access point will operate?

BSS 3 Which parameter is a specific frequency at which a wireless access point will operate? WEP

WEP 3 Which parameter is a specific frequency at which a wireless access point will operate? BSS

SSID data. 3 Which parameter is a specific frequency at which a wireless access point will operate?

ad hoc data. 3 Which parameter is a specific frequency at which a wireless access point will operate?

channel data. 3 Which parameter is a specific frequency at which a wireless access point will operate?

4

What will be the effect of the command S1# copy system:running-config

be the effect of the command S1# copy system:running-config The configuration file named tokyo-config will overwrite
be the effect of the command S1# copy system:running-config The configuration file named tokyo-config will overwrite

The configuration file named tokyo-config will overwrite the startup configuration file on S1.

The running configuration file on S1 will be saved via TFTP to a file named tokyo-config. The contents of NVRAM on S1 will become the startup configuration file on the tokyo

The contents of NVRAM on S1 will become the startup configuration file on the tokyo

5 What identifier in the BPDU creates a unique BID for a switch?

IP address identifier in the BPDU creates a unique BID for a switch? MAC address bridge priority VLAN

MAC address in the BPDU creates a unique BID for a switch? IP address bridge priority VLAN ID

bridge priority creates a unique BID for a switch? IP address MAC address VLAN ID port priority 6

VLAN ID BID for a switch? IP address MAC address bridge priority port priority 6 Refer to the

port priority for a switch? IP address MAC address bridge priority VLAN ID 6 Refer to the exhibit.

6 Refer to the exhibit. A wireless infrastructure has been established in a company building as sh The design goal was to allow roaming between the three APs for handheld devices. However, t devices lose connectivity when the users roam. How can this problem be fixed?

Assign different SSIDs to each AP. when the users roam. How can this problem be fixed? Reconfigure all APs to the same

Reconfigure all APs to the same channel. this problem be fixed? Assign different SSIDs to each AP. Use the same BSSID address for

Use the same BSSID address for each AP. SSIDs to each AP. Reconfigure all APs to the same channel. Reposition the APs so that

Reposition the APs so that each area of signal strength overlaps the neighbor by at least 10 to the same channel. Use the same BSSID address for each AP. 7 Refer to the

7 Refer to the exhibit. The network administrator wants to configure Switch1 to allow SSH connec and prohibit Telnet connections. How should the network administrator change the displayed configuration to satisfy the requirement?

Use SSH version 1. the displayed configuration to satisfy the requirement? Reconfigure the RSA key. Configure SSH on a different

Reconfigure the RSA key. configuration to satisfy the requirement? Use SSH version 1. Configure SSH on a different line. Modify

Configure SSH on a different line. the requirement? Use SSH version 1. Reconfigure the RSA key. Modify the transport input command. 8

Modify the transport input command. Modify the transport input

8 How does Spanning Tree Protocol aid network architecture?

allows for redundant links by eliminating loops 8 How does Spanning Tree Protocol aid network architecture? provides greater scalability by eliminating collisions

provides greater scalability by eliminating collisions command. 8 How does Spanning Tree Protocol aid network architecture? allows for redundant links by eliminating

reduces switch processor load by reducing broadcast traffic on trunk links reduces administrative overhead by sharing VLAN databases between switches across the network 9 Refer to

reduces administrative overhead by sharing VLAN databases between switches across the

networkby sharing VLAN databases between switches across the 9 Refer to the exhibit. A new host

9 Refer to the exhibit. A new host needs to be connected to VLAN 3. Which IP address should be assigned to this new host?

192.168.1.22 /28

192.168.1.22

/28

192.168.1.31 /28

192.168.1.31

/28

192.168.1.32 /28

192.168.1.32

/28

192.168.1.52 /28

192.168.1.52 /28

192.168.1.63 /28

192.168.1.63

/28

10 In setting up a wireless infrastructure network, which device is used to associate a client compu the network?

an Ethernet switch an Ethernet

a wireless access point to associate a client compu the network? an Ethernet switch another wireless computer a hard-wired computer

another wireless computer the network? an Ethernet switch a wireless access point a hard-wired computer on the network 11

a hard-wired computer on the network switch a wireless access point another wireless computer 11 Which statement about STP network diameter is

11 Which statement about STP network diameter is correct?

STP diameters are restricted by convergence times. 11 Which statement about STP network diameter is correct? Layer 2 root elections should be optimized

Layer 2 root elections should be optimized by adjusting BPDU timers to match network diam correct? STP diameters are restricted by convergence times. Using lower bandwidth connections between switches will

Using lower bandwidth connections between switches will allow STP to have a larger netwo

diameter. Portfast can be used to increase the allowable switched network diameter because it disablbetween switches will allow STP to have a larger netwo forward delay and maximum age timers.

forward delay and maximum age timers.the allowable switched network diameter because it disabl 12 Refer to the exhibit. Hosts that are

12 Refer to the exhibit. Hosts that are connected to switch SW1 are not able to communicate with in the same VLAN that are connected to switch SW2. What should be done to fix the problem?

Introduce a Layer 3 device in the topology. to switch SW2. What should be done to fix the problem? Configure both switches in VTP

Configure both switches in VTP transparent mode to allow them to share VLAN information fix the problem? Introduce a Layer 3 device in the topology. Reconfigure the fa0/1 interface on

Reconfigure the fa0/1 interface on switch SW1 with a static trunk configuration.

  Apply IP addresses that are in the same subnet to FastEthernet 0/1 on SW1
 

Apply IP addresses that are in the same subnet to FastEthernet 0/1 on SW1 and FastEther

on SW2.

on SW2.

13 Refer to the exhibit. What would happen if the network administrator moved the network cable o

A from interface Fa0/1 to Fa0/3 on switch SW1?

Host A remains a member of VLAN 10, because the router is routing traffic between VLANs cable o A from interface Fa0/1 to Fa0/3 on switch SW1? Host A is no longer

Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigne

VLAN 30. Host A remains a member of VLAN 10, because the switch provides dynamic VLAN assign Host A remains a member of VLAN 10, because the switch provides dynamic VLAN assign

for the port. Host A maintains connectivity to all members of VLAN 10, because it is connected to the saof VLAN 10, because the switch provides dynamic VLAN assign physical network. Host A is no

physical network. Host A is no longer a member of VLAN 10, but because port Fa0/3 was unused, it is now ato all members of VLAN 10, because it is connected to the sa member of VLAN

member of VLAN 1.of VLAN 10, but because port Fa0/3 was unused, it is now a 14 Refer to

14 Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit data at the sa time. How do the hosts respond on the network? (Choose two.)

After the end of the jam signal, a backoff algorithm is invoked. time. How do the hosts respond on the network? (Choose two.) Hosts 1 and 4 are

Hosts 1 and 4 are operating full duplex so no collision will exist. the end of the jam signal, a backoff algorithm is invoked. The hub will block the

The hub will block the port connected to Host 4 to prevent a collision. and 4 are operating full duplex so no collision will exist. Hosts 1 and 4 are

Hosts 1 and 4 are assigned shorter backoff values to provide them priority to access the me block the port connected to Host 4 to prevent a collision. If a host has data

If a host has data to transmit after the backoff period of that host, the host checks to determ

the line is idle before transmitting.the backoff period of that host, the host checks to determ 15 What are two requirements

15 What are two requirements for configuring inter-VLAN routing using the router-on-a-stick model (Choose two.) Each subinterface should be configured with its own IP address, subnet mask, and unique

assignment.configured with its own IP address, subnet mask, and unique The physical interface of the router

The physical interface of the router must be connected to a trunk link on the adjacent switch The physical interface of the router must be connected to a trunk link on the adjacent

The number of physical interfaces on the router should match the number of VLANs. must be connected to a trunk link on the adjacent switch Different static VLANs should be

Different static VLANs should be assigned to different interfaces of the router. interfaces on the router should match the number of VLANs. The router should be configured as

The router should be configured as the VTP server. should be assigned to different interfaces of the router. 16 Refer to the exhibit. Router R1

16 Refer to the exhibit. Router R1 is properly configured for router on a stick inter-VLAN routing, b

is unable to ping PC2. What needs to be done to resolve the problem?

Rename VLAN1. Connect one more port of S1 to R1. Configure the Fa0/1 port of S1 as

Connect one more port of S1 to R1. Rename VLAN1. Configure the Fa0/1 port of S1 as a trunk port. Move the Fa0/0 interface

Configure the Fa0/1 port of S1 as a trunk port. Rename VLAN1. Connect one more port of S1 to R1. Move the Fa0/0 interface of R1

Move the Fa0/0 interface of R1 to another VLAN. of S1 to R1. Configure the Fa0/1 port of S1 as a trunk port. 17 Refer

17 Refer to the exhibit. If switch SW1 is configured with the four VLANs as shown in the exhibit, ho many physical interfaces are needed on router R1 to configure inter-VLAN routing using subinterfaces?

zero R1 to configure inter-VLAN routing using subinterfaces? one two four 18 Refer to the exhibit. Router

one R1 to configure inter-VLAN routing using subinterfaces? zero two four 18 Refer to the exhibit. Router

two configure inter-VLAN routing using subinterfaces? zero one four 18 Refer to the exhibit. Router RA receives

four inter-VLAN routing using subinterfaces? zero one two 18 Refer to the exhibit. Router RA receives a

18 Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.35 and a destination address of 192.168.1.85. What will the router do with this packet?

The router will drop the packet. of 192.168.1.85. What will the router do with this packet? The router will forward the packet

The router will forward the packet out interface FastEthernet 0/1.1. router do with this packet? The router will drop the packet. The router will forward the

The router will forward the packet out interface FastEthernet 0/1.2. will forward the packet out interface FastEthernet 0/1.1. The router will forward the packet out interface

The router will forward the packet out interface FastEthernet 0/1.3. will forward the packet out interface FastEthernet 0/1.2. The router will forward the packet out interface

The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthern

0/1.3.out interface FastEthernet 0/1.2 and interface FastEthern 19 Refer to the exhibit. What does the term

19 Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?

This entry can only be removed from the MAC address table by a network administrator. does the term DYNAMIC indicate in the output that is shown? When forwarding a frame to

When forwarding a frame to the device with address 0060.5c5b.cd23, the switch does not h

perform a lookup to determine the final destination port.device with address 0060.5c5b.cd23, the switch does not h Only the device with MAC address 0060.5c5b.cd23

Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/1 h perform a lookup to determine the final destination port. The switch learned this MAC address

The switch learned this MAC address from the source address in a frame received on

Fa0/18.MAC address from the source address in a frame received on 20 Which parameter is associated

20 Which parameter is associated with wireless authentication? shared key

SSID ad hoc channel
SSID

SSID

ad hoc

ad hoc

channel

channel

21 Refer to the exhibit. Hosts B and C attempt to transmit a frame at the same time, but a collision occurs. Which hosts will receive the collision jamming signal?

all hosts that are shown Which hosts will receive the collision jamming signal? only hosts B and C only hosts A,

only hosts B and C the collision jamming signal? all hosts that are shown only hosts A, B, and C only

only hosts A, B, and C jamming signal? all hosts that are shown only hosts B and C only hosts A, B,

only hosts A, B, C, and D that are shown only hosts B and C only hosts A, B, and C only hosts

only hosts A, D, E, and F B and C only hosts A, B, and C only hosts A, B, C, and D

only hosts D, E, and F B, and C only hosts A, B, C, and D only hosts A, D, E, and

22 What is an efficient and cost effective way to minimize the frequency and effects of broadcast s on an Ethernet LAN?

Connect each PC directly to a router port. the frequency and effects of broadcast s on an Ethernet LAN? Use access control lists to

Use access control lists to filter broadcasts from the network. an Ethernet LAN? Connect each PC directly to a router port. Divide the computers into separate

Divide the computers into separate VLANs on the existing switches. access control lists to filter broadcasts from the network. Divide the computers into separate workgroups using

Divide the computers into separate workgroups using different physical switches. the computers into separate VLANs on the existing switches. 23 Refer to the exhibit. The switches

23 Refer to the exhibit. The switches in the exhibit have VTP pruning enabled. Which VLAN(s) will allowed on the trunk to SW2 by SW4?

VLAN 20 only Which VLAN(s) will allowed on the trunk to SW2 by SW4? VLAN 10 and VLAN 30

VLAN 10 and VLAN 30 will allowed on the trunk to SW2 by SW4? VLAN 20 only VLAN 10, VLAN 20,

VLAN 10, VLAN 20, and VLAN 30 will allowed on the trunk to SW2 by SW4? VLAN 20 only VLAN 10 and VLAN

VLAN 1, VLAN 20 and VLANs 1002 through 1005 Which VLAN(s) will allowed on the trunk to SW2 by SW4? VLAN 20 only VLAN 10

24 What is the correct order in which the STP components are chosen?

designated ports, nondesignated ports, root bridge, root ports is the correct order in which the STP components are chosen? nondesignated ports, designated ports, root

nondesignated ports, designated ports, root ports, root bridge ports, nondesignated ports, root bridge, root ports root bridge, root ports, designated ports, nondesignated

root bridge, root ports, designated ports, nondesignated ports ports, designated ports, root ports, root bridge root ports, root bridge, nondesignated ports, designated

root ports, root bridge, nondesignated ports, designated ports bridge, root ports, designated ports, nondesignated ports 25 Refer to the exhibit. Hosts PC_A and PC_B

25 Refer to the exhibit. Hosts PC_A and PC_B send traffic simultaneously, and the frames from th transmitting stations collide. What is the last device to receive the collision?

hub HB1 collide. What is the last device to receive the collision? switch SW1 router R1 switch SW2

switch SW1 What is the last device to receive the collision? hub HB1 router R1 switch SW2 router

router R1 the last device to receive the collision? hub HB1 switch SW1 switch SW2 router R2 switch

switch SW2 to receive the collision? hub HB1 switch SW1 router R1 router R2 switch SW4 26 Refer

router R2 the collision? hub HB1 switch SW1 router R1 switch SW2 switch SW4 26 Refer to the

switch SW4 collision? hub HB1 switch SW1 router R1 switch SW2 router R2 26 Refer to the exhibit.

26 Refer to the exhibit. What three statements describe why Host1 and Host2 are unable to communicate? (Choose three.)

The switch ports are on different VLANs. Host1 and Host2 are unable to communicate? (Choose three.) The switch IP address is on the

The switch IP address is on the wrong subnet. (Choose three.) The switch ports are on different VLANs. The hosts are configured on different logical

The hosts are configured on different logical networks. VLANs. The switch IP address is on the wrong subnet. A router is required to forward

A router is required to forward traffic between Host1 and Host2. The hosts are configured on different logical networks. The VLAN port assignments must be contiguous for

The VLAN port assignments must be contiguous for each VLAN. is required to forward traffic between Host1 and Host2. The host default gateway addresses must be

The host default gateway addresses must be on the same logical network. The VLAN port assignments must be contiguous for each VLAN. 27 Which statement is correct about

27 Which statement is correct about STP architecture?

Spanning Tree Protocol will guarantee a loop free Layer 2 topology. 27 Which statement is correct about STP architecture? Spanning Tree Protocol guarantees the shortest path to

Spanning Tree Protocol guarantees the shortest path to destination networks. 27 Which statement is correct about STP architecture? Spanning Tree Protocol will guarantee a loop free

The switch with the highest priority will be assigned the lowest BID in the root election. The first step in the spanning-tree election process is to determine the root port. To

The first step in the spanning-tree election process is to determine the root port. will be assigned the lowest BID in the root election. To select designated ports, the spanning-tree

To select designated ports, the spanning-tree algorithm must determine the longest contigu

path from the root bridge.spanning-tree algorithm must determine the longest contigu 28 While configuring a new switch, a network administrator

28 While configuring a new switch, a network administrator configures the switch as an HTTP serv What benefits does this configuration provide?

This allows the switch to host web pages for the network. an HTTP serv What benefits does this configuration provide? This allows remote VPN connections to the

This allows remote VPN connections to the switch over the Internet. This allows the switch to host web pages for the network. This is required if a

This is required if a web server or web farm is attached to the switch. This is required if a web server or web farm is attached to the switch

This allows web-based configuration tools to be used with the switch. This allows web-based configuration tools to be used with the switch

29 What are two benefits of the IEEE 802.11n standard over the IEEE 802.11G? (Choose two.)

requires less equipment IEEE 802.11n standard over the IEEE 802.11G? (Choose two.) provides improved range permits increased data rates

provides improved range over the IEEE 802.11G? (Choose two.) requires less equipment permits increased data rates has a single-input

permits increased data rates two.) requires less equipment provides improved range has a single-input and a single-output needs no hardware

has a single-input and a single-output provides improved range permits increased data rates needs no hardware upgrade for compatibility 30 Refer to

needs no hardware upgrade for compatibility increased data rates has a single-input and a single-output 30 Refer to the exhibit. The network

30 Refer to the exhibit. The network administrator wants to allow both SSH and Telnet connections Switch1. However, the SSH connections fail. What is the most likely cause of this problem?

The RSA key has been removed. fail. What is the most likely cause of this problem? SSH has been configured on the

SSH has been configured on the wrong line. likely cause of this problem? The RSA key has been removed. The transport input command is

The transport input command is applied incorrectly. The transport input

The domain name has been configured in the wrong configuration mode. line. The transport input command is applied incorrectly. 31 Refer to the exhibit. A new switch,

31 Refer to the exhibit. A new switch, SW3, has been added to the network. The network administ determines that VLAN information is not propagating to SW3. Which command will remedy the problem?

SW2(config)# vtp mode client SW2(config)#

SW3(config)# vtp domain Cisco1 SW3(config)#

SW3(config)# vtp mode transparent SW3(config)#

32 Which CLI mode allows users to access all device commands, such as those used for configura management, and troubleshooting?

user EXEC mode as those used for configura management, and troubleshooting? privileged EXEC mode global configuration mode interface

privileged EXEC mode configura management, and troubleshooting? user EXEC mode global configuration mode interface configuration mode 33

global configuration mode and troubleshooting? user EXEC mode privileged EXEC mode interface configuration mode 33 Refer to the exhibit.

interface configuration mode EXEC mode privileged EXEC mode global configuration mode 33 Refer to the exhibit. Users A and

33 Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installa surveys showed strong signal strength from the AP locations to the client locations. Outside ele interference has been eliminated. What will fix the problem?

Relocate the APs closer to each other. interference has been eliminated. What will fix the problem? Increase the distance between the clients. Change

Increase the distance between the clients. will fix the problem? Relocate the APs closer to each other. Change the channel on AP-B

Change the channel on AP-B to 6 or 11. to each other. Increase the distance between the clients. Place AP-A and AP-B on the same

Place AP-A and AP-B on the same wireless channel. between the clients. Change the channel on AP-B to 6 or 11. 34 A switch that

34 A switch that is using port-based memory buffering receives two incoming frames on the same The destination port for the first frame that is received is busy. How will the switch handle the se frame that it received?

The second frame will have to wait to be delivered even if its destination port is available. How will the switch handle the se frame that it received? The second frame will be

The second frame will be delivered to the memory buffer for its destination port. to be delivered even if its destination port is available. The second frame will be placed

The second frame will be placed in a common memory buffer to await delivery. be delivered to the memory buffer for its destination port. The second frame will be dropped.

The second frame will be dropped. will be placed in a common memory buffer to await delivery. 35 Refer to the exhibit.

35 Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2 A, B, C, and D are correctly configured with IP addresses in the subnet range for VLAN 50. Hos communicate with host B, but cannot communicate with host C or host D. What is the cause of problem?

There is a native VLAN mismatch. The Fa0/11 interface of Switch1 is not configured as a trunk. The link between Switch1

The Fa0/11 interface of Switch1 is not configured as a trunk. There is a native VLAN mismatch. The link between Switch1 and Switch2 is up but not

The link between Switch1 and Switch2 is up but not trunked. Fa0/11 interface of Switch1 is not configured as a trunk. VLAN 50 is not allowed on

VLAN 50 is not allowed on the trunk link between Switch1 and Switch2. The link between Switch1 and Switch2 is up but not trunked. 36 Refer to the exhibit

36 Refer to the exhibit. Switch SW2 was tested in a lab environment and then inserted into a produ network without reloading its configuration. After the trunk link between SW1 and SW2 was bro up, all users lost connectivity to the network. What could be the source of the problem?

All the VLANs were pruned from the trunk port between SW1 and SW2. to the network. What could be the source of the problem? SW1 and SW2 cannot be

SW1 and SW2 cannot be both set as VTP servers in the same VTP domain. VLANs were pruned from the trunk port between SW1 and SW2. VTP configuration revision number of

VTP configuration revision number of SW2 was higher than the configuration revisio

number of SW1. The additional VLANs from SW2 created more VLANs than the VLAN database of SW1 cou The additional VLANs from SW2 created more VLANs than the VLAN database of SW1 cou

contain.SW2 created more VLANs than the VLAN database of SW1 cou 37 Company policy requires disabling

37 Company policy requires disabling the command history buffer on network devices. An adminis enters terminal no history size at the command prompt on a Cisco Catalyst switch and receiv error messages back, but the command history buffer is still available. What is the problem?

The command contained a syntax error. history buffer is still available. What is the problem? The Cisco IOS version does not support

The Cisco IOS version does not support disabling the command history buffer. What is the problem? The command contained a syntax error. The command history can only be

The command history can only be disabled on a router, not a switch. does not support disabling the command history buffer. The size parameter reset the default buffer size

The size parameter reset the default buffer size but did not disable access to the buffer. The size

38 Refer to the exhibit. Which two options correctly describe the router configuration that is shown (Choose two.) Routing between the 192.168.1.0 and 192.168.3.0 networks will not succeed until a routing

protocol is configured on the router.and 192.168.3.0 networks will not succeed until a routing VLANs have not been appropriately configured on

VLANs have not been appropriately configured on the router subinterfaces. until a routing protocol is configured on the router. The configuration is appropriate for a router-on-a-stick

The configuration is appropriate for a router-on-a-stick network design. been appropriately configured on the router subinterfaces. Trunking has been appropriately configured on the router

Trunking has been appropriately configured on the router subinterfaces. is appropriate for a router-on-a-stick network design. An IP address should be applied to interface Fa0/1

An IP address should be applied to interface Fa0/1 for routing to occur. for a router-on-a-stick network design. Trunking has been appropriately configured on the router subinterfaces.

39 Refer to the exhibit. After entering the commands in the exhibit, the administrator receives a “password required, but none set” message when attempting to connect to S1. What is the prob

The enable secret password was not set. The enable secret

S1 does not have login configured on the vty lines. S1 does not have login

S1 does not have a password configured for the vty lines. set. S1 does not have login configured on the vty lines. The crypto key is not

The crypto key is not properly configured to generate passwords. The crypto key

The VLAN1 interface has not be enabled with the no shutdown command. The VLAN1 interface has not be enabled with the no shutdown

40 Refer to the exhibit. A network administrator has segmented the network into two VLANs and configured R1 and S1 as displayed. However, PC1 is unable to access PC2. What is the likely problem?

No routing protocol is configured on R1. PC1 is unable to access PC2. What is the likely problem? The Fa0/1 port of S1

The Fa0/1 port of S1 is not a trunk port. the likely problem? No routing protocol is configured on R1. The default gateway address is not

The default gateway address is not set on S1. configured on R1. The Fa0/1 port of S1 is not a trunk port. Only one physical

Only one physical link between S1 and R1 is configured for inter-VLAN routing. a trunk port. The default gateway address is not set on S1. 41 Refer to the

41 Refer to the exhibit. The Layer 2 switching design that is shown has been implemented in a ca environment that is using Spanning Tree Protocol. All inter-switch links that are shown are trunk Whenever an inter-switch link fails, the network takes nearly a minute to completely converge. can the convergence time be reduced?

Increase the capacity of the distribution and core trunk links to 10 Gb/s. to completely converge. can the convergence time be reduced? Add a trunk link that directly connects

Add a trunk link that directly connects D1 and D2. of the distribution and core trunk links to 10 Gb/s. Use Layer 3 switching on the

Use Layer 3 switching on the core switch. 10 Gb/s. Add a trunk link that directly connects D1 and D2. Implement Rapid Spanning Tree

Implement Rapid Spanning Tree Protocol. D1 and D2. Use Layer 3 switching on the core switch. 42 Refer to the exhibit.

42 Refer to the exhibit. What are two reasons for the Fa0/24 port being placed in the blocking state (Choose two.)

This switch is not the root bridge. Fa0/24 port being placed in the blocking state (Choose two.) The Fa0/24 port is administratively down.

The Fa0/24 port is administratively down. placed in the blocking state (Choose two.) This switch is not the root bridge. STP has

STP has detected links that create a loop. placed in the blocking state (Choose two.) This switch is not the root bridge. The Fa0/24

There is a change in the VTP configuration. The Fa0/24 port is overloaded with too much traffic for its configured bandwidth. 43 Which

The Fa0/24 port is overloaded with too much traffic for its configured bandwidth. There is a change in the VTP configuration. 43 Which three actions are performed during the

43 Which three actions are performed during the boot sequence of a Cisco switch? (Choose three.

The boot loader uses the self-contained switch operating system to boot the switch. The boot loader uses the self-contained switch operating system to boot the switch

The boot loader retrieves diagnostics routines via TFTP. switch operating system to boot the switch . The boot loader performs POST. The boot loader

The boot loader performs POST. . The boot loader retrieves diagnostics routines via TFTP. The boot loader is loaded from RAM.

The boot loader is loaded from RAM. routines via TFTP. The boot loader performs POST. The boot loader initializes the flash file system

The boot loader initializes the flash file system that is used to boot the system. loader performs POST. The boot loader is loaded from RAM. The boot loader loads the default

The boot loader loads the default operating system if the flash-based operating system is c

or missing.operating system if the flash-based operating system is c 44 Which combination is required to establish

44 Which combination is required to establish a connection to initially configure the Linksys WRT3 wireless access device?

a computer with a console connection to the WRT300N
a computer with a console connection to the WRT300N

a computer with a wireless connection to the WRT300N
a computer with a wireless connection to the WRT300N

a computer with an AUX port connection to the WRT300N
a computer with an AUX port connection to the WRT300N

a computer configured in the same IP subnet as the WRT300N and a direct cable

connection to itin the same IP subnet as the WRT300N and a direct cable 45 Refer to the

45Refer to the exhibit. RTB is configured for traditional inter-VLAN routing. RTB can ping computer cannot ping computer B. What is a possible cause of this failure?

Port Fa0/11 is in the wrong VLAN. Port Fa0/11 is in the wrong VLAN

RTB does not have an active routing protocol. cause of this failure? Port Fa0/11 is in the wrong VLAN . The IP address of

The IP address of computer B is in the wrong logical network. wrong VLAN . RTB does not have an active routing protocol. Router interface Fa0/1 has the

Router interface Fa0/1 has the wrong trunk encapsulation type configured. IP address of computer B is in the wrong logical network. 46 In which mode is

46 In which mode is a VTP switch operating if it has been configured to only forward VTP advertisements?

client 46 In which mode is a VTP switch operating if it has been configured to only

root

server transparent
server

server

transparent

transparent

47 Refer to the exhibit. Switch SW2 has been newly purchased and added to the network. What configuration should be applied to SW2 so that it participates in the same VTP domain as switc receives VLAN information from SW1, and synchronizes VLAN information?

Disable VTP pruning on SW2. information from SW1, and synchronizes VLAN information? Configure SW2 in VTP transparent mode. Configure SW2 with

Configure SW2 in VTP transparent mode. synchronizes VLAN information? Disable VTP pruning on SW2. Configure SW2 with the VTP domain password. Configure

Configure SW2 with the VTP domain password. VTP pruning on SW2. Configure SW2 in VTP transparent mode. Configure SW2 as a VTP server

Configure SW2 as a VTP server with a higher revision number. mode. Configure SW2 with the VTP domain password. 48 Refer to the exhibit. What is the

48 Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integ router?

WEP identifies the wireless LAN. the security mode to WEP on the Linksys integ router? WEP allows the access point to

WEP allows the access point to inform clients of its presence. the Linksys integ router? WEP identifies the wireless LAN. WEP translates IP addresses into easy-to-remember domain

WEP translates IP addresses into easy-to-remember domain names. allows the access point to inform clients of its presence. WEP encrypts data between the wireless

WEP encrypts data between the wireless client and the access point. translates IP addresses into easy-to-remember domain names. WEP ensures that only authenticated users are allowed access

WEP ensures that only authenticated users are allowed access to the WLAN. data between the wireless client and the access point. WEP translates an internal address or group

WEP translates an internal address or group of addresses into an outside, public address. only authenticated users are allowed access to the WLAN. 49 Refer to the exhibit. What will

49 Refer to the exhibit. What will allow a host on VLAN 40 on switch X to communicate with a host VLAN 40 on switch Y?

QoS on switch X to communicate with a host VLAN 40 on switch Y? routing trunking VPN

routing switch X to communicate with a host VLAN 40 on switch Y? QoS trunking VPN 50

trunking to communicate with a host VLAN 40 on switch Y? QoS routing VPN 50 Refer to

VPN with a host VLAN 40 on switch Y? QoS routing trunking 50 Refer to the exhibit.

50 Refer to the exhibit. All switches are configured with the default bridge priority. Which port will a non-designated port if all links are operating at the same bandwidth?

Fa0/1 interface of switch A Fa0/2 interface of switch A Fa0/1 interface of switch B Fa0/2 interface of switch B

Fa0/2 interface of switch A Fa0/2 interface of switch

Fa0/1 interface of switch B Fa0/1 interface of switch

Fa0/2 interface of switch B Fa0/2 interface of switch

Fa0/1 interface of switch C Fa0/1 interface of switch

Fa0/2 interface of switch C Fa0/2 interface of switch

51 What provides an authentication mechanism for 802.11-based wireless networks?

DSSS authentication mechanism for 802.11-based wireless networks? OFDM SSID WPA 52 Refer to the exhibit. Computer D

OFDM mechanism for 802.11-based wireless networks? DSSS SSID WPA 52 Refer to the exhibit. Computer D sends

SSID mechanism for 802.11-based wireless networks? DSSS OFDM WPA 52 Refer to the exhibit. Computer D sends

WPA mechanism for 802.11-based wireless networks? DSSS OFDM SSID 52 Refer to the exhibit. Computer D sends

52 Refer to the exhibit. Computer D sends a broadcast message. Which devices will process the broadcast message?

computer E message. Which devices will process the broadcast message? computer D and computer E computer D, computer

computer D and computer E Which devices will process the broadcast message? computer E computer D, computer E, and Router1 computer

computer D, computer E, and Router1 the broadcast message? computer E computer D and computer E computer B and computer E computer

computer B and computer E D and computer E computer D, computer E, and Router1 computer B, computer E, and Router1

computer B, computer E, and Router1 D, computer E, and Router1 computer B and computer E computer C, computer D, and computer

computer C, computer D, and computer E B and computer E computer B, computer E, and Router1 computer C, computer D, computer E,

computer C, computer D, computer E, and Router1 computer E, and Router1 computer C, computer D, and computer E computer A, computer B, computer

computer A, computer B, computer C, computer D, computer E, computer B, computer E, and Router1 computer C, computer D, and computer E computer C, computer