> Best blogg: ccna
Showing posts with label ccna. Show all posts
Showing posts with label ccna. Show all posts

Saturday, February 22, 2014

CCNA 4 Chapter 1 v5.0 Exam Answers

CCNA 4 Chapter 1 v5.0 Exam Answers 2014

CCNA 4 Chapter 1

 

1.
What are two structured engineering principles necessary for successful implementation of a network design? (Choose two.)
quality of service
availability
security
resiliency
modularity

____________________________________________________________________
2
What is an important first consideration when starting to design a network?
access security
size of the network
protocols to be used
type of applications
____________________________________________________________________
3
Which two devices would commonly be found at the access layer of the hierarchical enterprise LAN design model? (Choose two.)
modular switch
access point
Layer 3 device
firewall
Layer 2 switch
____________________________________________________________________
4
A network engineer wants to redesign the wireless network and make use of wireless network controllers that manage the many deployed wireless access points. In which network design module of the campus network architecture would the centralized wireless network controllers be found?
enterprise edge
access-distribution
services
data center
____________________________________________________________________
5

Refer to the exhibit. Which type of Cisco hierarchical LAN design model is used at school site 1?
7 layer
three-tier
3 layer
two-tier collapsed core
____________________________________________________________________
6
In a hierarchical network design, which layers may be combined into a collapsed core for smaller networks?
core, distribution, and access
distribution and access
core and access
core and distribution
____________________________________________________________________
7
The network design for a college with users at five sites is being developed. Where in the campus network architecture would servers used by all users be located?
access-distribution
services
enterprise edge
data center
____________________________________________________________________
8
What is one advantage to designing networks in building block fashion for large companies?
redundancy
increased network access time
failure isolation
mobility
____________________________________________________________________
9
What is creating a new challenge for IT departments by changing the border of the enterprise network?
energy costs
company-owned desktops
access layer switching
tablets
____________________________________________________________________
10
Fill in the blank. Use the abbreviation.
Under the Cisco Enterprise Edge module, the submodule that provides remote access including authentication and IPS appliances is the and remote access submodule.
VPN
____________________________________________________________________
11
Which approach in networking allows for network changes, upgrades, or the introduction of new services in a controlled and staged fashion?
modular
borderless
static
network module
____________________________________________________________________
12
Refer to the exhibit. Which type of ISP connectivity to the service provider edge is being used by company A?
dual-homed
dual-multihomed
multihomed
single-homed
____________________________________________________________________
13
Which three network architectures have been introduced by Cisco to address the emerging technology challenges created by the evolving business models? (Choose three.)
Cisco Enterprise Campus
Cisco Enterprise Branch
Cisco Enterprise Edge
Cisco Borderless
Cisco Data Center
Cisco Collaboration
____________________________________________________________________
14
Which network module is the fundamental component of a campus design?
services module
access-distribution module
enterprise edge
data center

 

 

CCNA 4 Chapter 1,ccna

CCNA 4 

Thursday, January 23, 2014

ccna 1 chapter 11 answers 2013

CCNA 1 Chapter 11 v5.0 Exam Answers 

2013CCNA 1 Chapter 11

 


ccna 1 chapter 11 answers 2013

1
ccna 1 chapter 11 answers 2013
ccna 1 chapter 11 answers 2013

2
The failure rate in a certain brand of network interface card has been determined to be 15%. How many cards could be expected to fail in a company that has 80 of the cards installed? 10
12*
15
8
3
If a technician uses an average of 2 cans of compressed air per week for cleaning, how many cans should be ordered for 8 technicians over the next 10 weeks?
16
20
200
80
160*
4
A local real estate company can have its 25 computer systems upgraded for $1000. If the company chooses only to upgrade 10 systems, how much will the upgrade cost if the same rate is used?
$100
$200
$400*
$600
$500
5
Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.
11100111*
11100101
11101110
11110110
11011011
11110010
6
Which is a characteristic of the Internet?
It is not centrally governed.*
It is localized to specific geographic locations.
It uses only physical addresses.
It uses private IP addressing.
7
Which command can be used to test connectivity between two computers that are attached to a network?
nbtstst -s
ifconfig
winipcfg
ping*
ipconfig
8
Which two devices provide permanent data storage? (Choose two.)
hard drive*
keyboard
Blu-Ray disc*
RAM
monitor
9
ccna 1 chapter 11 answers 2013

ccna 1 chapter 11 answers 2013
10
Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below.
A1
BA*
85
B3
1C
90
11
What is a function of the BIOS?
provides graphic capabilities for games and applications
provides temporary data storage for the CPU
enables a computer to connect to a network
performs a power-on self test of internal components*
12
A person-hour is the amount of work that the average worker can do in one hour. It is anticipated that a company-wide system upgrade will take approximately 60 person-hours to complete. How long will it take five technicians to perform the refresh?
8 hours
10 hours
5 hours
12 hours*
13
p13 exa11 ccna1
p13 exa11 ccna1 respuesta
14
p14 exa11 ccna1
p14 exa11 ccna1 respuesta
15
p15 exa11 ccna1
p15 exa11 ccna1 respuesta
16
A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement?
MAN
WAN*
WLAN
LAN
17
Which subnet would include the address 192.168.1.96 as a usable host address?
192.168.1.64/29
192.168.1.64/26*
192.168.1.32/28
192.168.1.32/27
18
What is the purpose of having a converged network?
to achieve fault tolerance and high availability of data network infrastructure devices
to reduce the cost of deploying and maintaining the communication infrastructure*
to provide high speed connectivity to all end devices
to make sure that all types of data packets will be treated equally
19
A user is having problems accessing the Internet. The command ping www.cisco.com fails. However, pinging the IP address of cisco.com with the command ping 198.133.219.25 is successful. What is the problem?
The default gateway is incorrect.
There is a problem with DNS.*
The address of the ARP cache is incorrect.
The web server is down.
20
p20 exa11 ccna1
Refer to the exhibit. Host_A is preparing to send data to Server_B. How will Host_A address the packets and frames that will carry this data? (Choose two.)
The packet destination will be addressed with the IP address of the Router_B interface that is attached to Router_A.
The frame destination will be addressed with the MAC address of Server_B.
The packet destination will be addressed with the IP address of Server_B.*
The frame destination will be addressed with the MAC address of Switch_A.
The packet destination will be addressed with the IP address of the Router_A LAN interface.
The frame destination will be addressed with the MAC address of the Router_A LAN interface.*
21
Which three IP addresses are private ? (Choose three.)
10.1.1.1*
224.6.6.6
172.32.5.2
172.16.4.4*
192.167.10.10
192.168.5.5*
22
What is the general term that is used to describe a piece of data at any layer of a networking model?
segment
frame
protocol data unit*
packet
23
Which function is provided by TCP?
detection of missing packets*
path determination for data packets
communication session control
data encapsulation
24
Which option shows the proper notation for an IPv6 address?
2001.0db8.3c55.0015.abcd.ff13
2001-0db8-3c55-0015-abcd-ff13
2001,0db8,3c55,0015,abcd,ff13
2001:0db8:3c55:0015::abcd:ff13*
25
p25 exa11 ccna1
Refer to the exhibit.
Using the network in the exhibit, what would be the default gateway address for host A in the 192.133.219.0 network?
192.133.219.1*
192.133.219.0
192.135.250.1
192.31.7.1
26
Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address?
NAT*
DHCP
SMB
HTTP
ARP
DNS
27
A technician uses the ping 127.0.0.1 command. What is the technician testing?
the TCP/IP stack on a network host*
connectivity between two adjacent Cisco devices
connectivity between two PCs on the same network
physical connectivity of a particular PC and the network
connectivity between a PC and the default gateway
28
What is the purpose of ICMP messages?
to ensure the delivery of an IP packet
to inform routers about network topology changes
to provide feedback of IP packet transmissions*
to monitor the process of a domain name to IP address resolution
29
Which basic process is used to select the best path for forwarding data?
encapsulation
addressing
routing*
switching
30
Which wireless security procedure should be used to hide the WLAN ID from wireless clients?
Configure WEP only on the access point.
Configure MAC address filtering on the access point.
Decrease the antenna spectrum on each wireless client.
Install WAP on the wireless clients.
Disable the broadcast of the SSID on the access point.*
31
What statement describes the function of the Address Resolution Protocol?
ARP is used to discover the MAC address of any host on the local network.*
ARP is used to discover the IP address of any host on the local network.
ARP is used to discover the IP address of any host on a different network.
ARP is used to discover the MAC address of any host on a different network.
32
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
dial-up
cell modem
satellite
DSL*
cable modem
33
What is an advantage of using IPv6 ?
higher bandwidth
more addresses for networks and hosts*
more frequencies
faster connectivity
34
Which device should be used for enabling a host to communicate with another host on a different network?
router*
hub
switch
host
35
What is the purpose of the routing process?
to encapsulate data that is used to communicate across a network
to select the paths that are used to direct traffic to destination networks*
to convert a URL name into an IP address
to provide secure Internet file transfer
to forward traffic on the basis of MAC addresses
36
Which type of connector does a network interface card use?
DIN
RJ-11
RJ-45*
PS-2
37
Why would a network administrator use the tracert utility?
to display the IP address, default gateway, and DNS server address for a PC
to check information about a DNS name in the DNS server
to determine the active TCP connections on a PC
to identify where a packet was lost or delayed on a network*
38
How does a networked server manage requests from multiple clients for different services?
The server uses IP addresses to identify different services.
Each request is tracked through the physical address of the client.
The server sends all requests through a default gateway.
Each request is assigned source and destination port numbers.*
39
Which protocol translates a website name such as www.cisco.com into a network address?
FTP
DHCP
HTTP
DNS*
40
p40 exa11 ccna1
Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address?
It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.*
It is the IP address of Switch1 that connects PC1 to other devices on the same LAN.
It is the IP address of the Router1 interface that connects the company to the Internet.
It is the IP address of the ISP network device located in the cloud.

ccna 1 chapter 11 answers 2013 ,ccna 1,ccna 1,chapter 11,ccna 1 chapter 11 exam,cisco, sico ccna 1

Wednesday, January 22, 2014

CCNA 3 Chapter 2 Answers

 CCNA 3 Chapter 2 V4.0 Answers

 CCNA 3 Chapter 2
 Answers CCNA 3 Chapter 2

CCNA 3 Chapter Answers

1. If a network administrator enters these commands on a switch, what will be the result?
Switch1(config-line)# line console 0
Switch1(config-line)# password cisco
Switch1(config-line)# login
to secure the console port with the password "cisco"
to deny access to the console port by specifying 0 lines are available
to gain access to line configuration mode by supplying the required password
to configure the privilege exec password that will be used for remote access

2. Which command line interface (CLI) mode allows users to configure switch parameters, such as the hostname and password?
user EXEC mode
privileged EXEC mode
global configuration mode
interface configuration mode




3. What happens when the transport input ssh command is entered on the switch vty lines?

The SSH client on the switch is enabled.
Communication between the switch and remote users is encrypted.
A username/password combination is no longer needed to establish a secure remote connection to the switch.
The switch requires remote connections via proprietary client software.

4. A network administrator uses the CLI to enter a command that requires several parameters. The switch responds with "% Incomplete command". The administrator cannot remember the missing parameters. What can the administrator do to get the parameter information?
append ? to the last parameter
append a space and then ? to the last parameter
use Ctrl-P to show a parameter list use the Tab key to show which options are available

5. When a switch receives a frame and the source MAC address is not found in the switching table, what action will be taken by the switch to process the incoming frame?
The switch will request that the sending node resend the frame.
The switch will issue an ARP request to confirm that the source exists.
The switch will map the source MAC address to the port on which it was received.
The switch ends an acknowledgement frame to the source MAC of this incoming frame.

6.
CCNA3Chapter21 thumb CCNA 3 Chapter 2 V4.0 Answers
Refer to the exhibit. The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link?
No collisions will occur on this link.
Only one of the devices can transmit at a time.
The switch will have priority for transmitting data.
The devices will default back to half duplex if excessive collisions occur.

7.
CCNA3Chapter22 thumb CCNA 3 Chapter 2 V4.0 Answers
Refer to the exhibit. The exhibit shows partial output of the show running-config command. The enable password on this switch is "cisco." What can be determined from the output shown?
The enable password is encrypted by default.
An MD5 hashing algorithm was used on all encrypted passwords.
Any configured line mode passwords will be encrypted in this configuration.
This line represents most secure privileged EXEC mode password possible.

8. Which two statements about Layer 2 Ethernet switches are true? (Choose two.)
Layer 2 switches prevent broadcasts.
Layer 2 switches have multiple collision domains.
Layer 2 switches route traffic between different networks.
Layer 2 switches decrease the number of broadcast domains.
Layer 2 switches can send traffic based on the destination MAC address.

9. Which statement is true about the command banner login "Authorized personnel Only" issued on a switch?
The command is entered in privileged EXEC mode.
The command will cause the message Authorized personnel Only to display before a user logs in.
The command will generate the error message % Ambiguous command: "banner motd" ” to be displayed.
The command will cause the message End with the character “%” to be displayed after the command is entered into the switch.

10. When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respond after the backoff period has expired?
The hosts return to a listen-before-transmit mode.
The hosts creating the collision have priority to send data.
The hosts creating the collision retransmit the last 16 frames.
The hosts extend their delay period to allow for rapid transmission.

11. Which two statements are true about EXEC mode passwords? (Choose two.)
The enable secret password command stores the configured password in plain text.
The enable secret password command provides better security than the enable password.
The enable password and enable secret password protect access to privileged EXEC mode.
The service password-encryption command is required to encrypt the enable secret password.
Best practices require both the enable password and enable secret password to be configured and used simultaneously.

12.
CCNA3Chapter23 thumb CCNA 3 Chapter 2 V4.0 Answers
Refer to the exhibit. How many collision domains are depicted in the network?
1
2
4
6
7
8

13. Which two statements are true regarding switch port security? (Choose two.)
The three configurable violation modes all log violations via SNMP.
Dynamically learned secure MAC addresses are lost when the switch reboots.
The three configurable violation modes all require user intervention to re-enable ports.
After entering the sticky parameter, only MAC addresses subsequently learned are converted to secure MAC addresses.
If fewer than the maximum number of MAC addresses for a port are configured statically, dynamically learned addresses are added to CAM until the maximum number is reached.

CCNA 3 Chapter  Answers



14. What are two ways to make a switch less vulnerable to attacks like MAC address flooding, CDP attacks, and Telnet attacks? (Choose two.)
Enable CDP on the switch.
Change passwords regularly.
Turn off unnecessary services.
Enable the HTTP server on the switch.
Use the enable password rather than the enable secret password.

15.
CCNA3Chapter24 thumb CCNA 3 Chapter 2 V4.0 Answers
Refer to the exhibit. What action does SW1 take on a frame sent from PC_A to PC_C if the MAC address table of SW1 is empty?
SW1 drops the frame.
SW1 floods the frame on all ports on SW1, except port Fa0/1.
SW1 floods the frame on all ports on the switch, except Fa0/23 and Fa0/1.
SW1 uses the CDP protocol to synchronize the MAC tables on both switches and then forwards the frame to all ports on SW2.

16.
CCNA3Chapter25 thumb CCNA 3 Chapter 2 V4.0 Answers
Refer to the exhibit. The network administrator has decided to allow only Secure Shell connections to Switch1. After the commands are applied, the administrator is able to connect to Switch1 using both Secure Shell and Telnet. What is most likely the problem?
incorrect vty lines configured
incorrect default gateway address
incompatible Secure Shell version
missing transport input ssh command
vty lines that are configured to allow only Telnet

17. Where is the startup configuration stored?
DRAM
NVRAM
ROM
startup-config.text

CCNA 3 Chapter  Answers



18.
CCNA3Chapter26 thumb CCNA 3 Chapter 2 V4.0 Answers
Refer to the exhibit. The switch and the hub have default configurations, and the switch has built its CAM table. Which of the hosts will capture a copy of the frame when workstation A sends a unicast packet to workstation C?
workstation C
workstations B and C
workstations A, B, C, and the interfaces of the router
workstations B, C, D, E, F, and interfaces of the router

19.
CCNA3Chapter27 thumb CCNA 3 Chapter 2 V4.0 Answers
Refer to the exhibit. What happens when Host 1 attempts to send data?
Frames from Host 1 cause the interface to shut down.
Frames from Host 1 are dropped and no log message is sent.
Frames from Host 1 create a MAC address entry in the running-config.
Frames from Host 1 will remove all MAC address entries in the address table.

20.
CCNA3Chapter28 thumb CCNA 3 Chapter 2 V4.0 Answers
Refer to the exhibit. Which hosts will receive a broadcast frame sent from Host A?
hosts A and B
hosts B and C
hosts D and E
hosts A, B, and C
hosts B, C, D, and E
hosts A, B, C, D, E, and F


ccna answers, ccna 3 chapter 2, ccna 3 chapter 2 answers, ccna 1 final, What are two purposes for configuring a banner on a router, When a switch receives a frame and the source MAC address is not found in the switching table what action will be taken by the switch to process the incoming frame?, What are the default terminal emulation software settings when configuring a Cisco device through a console port?, cisco 3 chapter 2 answers, ccna 3 chapter 2 exam answers, ccna3 chapter 2

Tuesday, January 21, 2014

cana 4 chapter 3 answers 2013

Take Assessment – EWAN Chapter 3 – CCNA Exploration: Accessing the WAN (Version 4.0) - Answers – 2012 – 2013

 
cana 4 chapter 3 answers 2013

cana 4 chapter 3 answers 2013

1. Which three actions might a Frame Relay switch perform when it detects an excessive build-up of frames in its queue? (Choose three.)
puts a hold on accepting frames in excess of the CIR
drops frames from the queue that have the DE bit set
reduces the number of frames it sends over the link
re-negotiates flow control with the connected device
sets the FECN bit on all frames it receives on the congested link
sets the BECN bit on all frames it places on the congested link
2. Which best describes the benefit of using Frame Relay as opposed to a leased line or ISDN service?
Customers can define their virtual circuit needs in far greater combinations, with increments as small as 64 kbps.
Customers pay for an end-to-end connection that includes the local loop and the network link.
Customers only pay for the local loop and the bandwidth they purchase from the network provider.
Connecting new sites requires new lower cost circuit installations when compared to ISDN dialup costs or adding additional hardware for leased service.
3.
cana 4 chapter 3 answers 2013
Refer to the exhibit. Router R1 has been configured for Frame Relay connectivity to routers R2 and R3. What configuration option should be configured on the R2 and R3 serial interfaces in order for all routers to ping each other successfully?
R2(config-if)# frame-relay interface-dlci 201 broadcast
R3(config-if)# frame-relay interface-dlci 301 broadcast
R2(config-if)# frame-relay map ip 10.1.1.1 201 broadcast
R3(config-if)# frame-relay map ip 10.1.1.1 301 broadcast
R2(config-if)# frame-relay map ip 10.1.1.3 201 broadcast
R3(config-if)# frame-relay map ip 10.1.1.2 301 broadcast
R2(config-if)# frame-relay map ip 10.1.1.1 201 broadcast
R2(config-if)# frame-relay map ip 10.1.1.3 201 broadcast
R3(config-if)# frame-relay map ip 10.1.1.1 301 broadcast
R3(config-if)# frame-relay map ip 10.1.1.2 301 broadcast
4. Which two items allow the router to map data link layer addresses to network layer addresses in a Frame Relay network? (Choose two.)
ARP
RARP
Proxy ARP
Inverse ARP
LMI status messages
ICMP
5.
cana 4 chapter 3 answers 2013
Refer to the exhibit. Which two outcomes occur from the configuration shown? (Choose two.)
The broadcasts will be forwarded to 10.1.1.1.
The router will use DLCI 22 to forward data to 10.1.1.1.
DLCI 22 will replace the MAC address in the ARP table for entry 10.1.1.1
Inverse-ARP will now add an entry for 10.1.1.1 into the Frame Relay map table using DLCI 22.
Frames sent by 10.1.1.1 arriving on interface serial 0/0/0 of RT_1 will have a data link layer address of 22.
6. Refer to the exhibit. What can be determined about the Frame Relay switch from the output shown?
It is currently not transmitting data.
It is in the process of establishing the PVC.
It has put a hold on processing frames in excess of the CIR.
It is experiencing congestion.
7.
cana 4 chapter 3 answers 2013
Refer to the exhibit. What can be determined from the output?
Serial 0/0/0 has been configured with an DLCI of 201.
Serial 0/0/0 has the feature frame-relay inverse-arp enabled.
Serial 0/0/0 has been configured with an IP address of 172.16.4.3.
Serial 0/0/0 has been configured with the command frame-relay map ip 172.16.4.3 201 broadcast.
8.
071 EWAN Chapter 3 CCNA 4 4.0 2012 2013 100%
Refer to the exhibit. What effect does the point-to-point configuration on subinterface S0/0.110 have on the operation of the router?
It helps to conserve IP addresses.
It establishes multiple PVC connections to multiple physical interfaces.
It eliminates split horizon issues without increasing the likelihood of routing loops.
It requires the configuration of the encapsulation command on the subinterface.
9.
161 EWAN Chapter 3 CCNA 4 4.0 2012 2013 100%
Refer to the exhibit. Which statement explains why the Frame Relay connection between R1 and R2 is failing?
Split horizon must be disabled.
The LMI type must be specified.
Logical subinterfaces must be used instead.
The frame-relay map commands are using incorrect DLCIs.
10. What best describes the use of a data-link connection identifier (DLCI)?
local address identifying a destination router across a Frame Relay network
locally significant address used to identify a virtual circuit
logical address identifying the interface between a router and a Frame Relay switch
logical address used to identify the DCE
11.
171 EWAN Chapter 3 CCNA 4 4.0 2012 2013 100%
Refer to the exhibit. Router R1 has been configured for Frame Relay connectivity to routers R2 and R3. Which set of configuration options for routers R2 and R3 would provide each router connectivity to R1?
R2(config)# interface serial0/0/1
R2(config-if)# frame-relay map ip 10.1.1.1 102
R3(config)# interface serial0/0/1
R3(config-if)# frame-relay map ip 10.1.2.1 103
R2(config)# interface serial0/0/1
R2(config-if)# frame-relay map ip 10.1.1.1 102
R2(config-if)# frame-relay map ip 10.1.2.3 301
R3(config)# interface serial0/0/1
R3(config-if)# frame-relay map ip 10.1.2.1 103
R3(config-if)# frame-relay map ip 10.1.1.2 201
R2(config)# interface serial0/0/1.201 point-to-point
R2(config-if)# no frame-relay invers-arp
R3(config)# interface serial0/0/1.301 point-to-point
R3(config-if)# no frame-relay invers-arp
R2(config)# interface serial0/0/1.201 point-to-point
R2(config-if)# frame-relay interface-dlci 201
R3(config)# interface serial0/0/1.301 point-to-point
R3(config-if)# frame-relay interface-dlci 301
12.
121 EWAN Chapter 3 CCNA 4 4.0 2012 2013 100%
Refer to the exhibit. Frame Relay connectivity has been configured in the network and OSPF is used as the routing protocol. Router R1 can successfully ping the router R2 serial interface. When R1 attempts to ping network 192.168.3.0/24 the ping fails. What additional configuration should be applied on all routers to remedy the problem?
Add the broadcast keyword in the Frame Relay map command on both routers.
Issue the frame-relay interface-dlci command in addition to the frame-relay map command on both router interfaces.
Remove the frame-relay map command and replace with the frame-relay interface-dlci command on both router interfaces.
Apply the no frame-relay inverse-arp command on both router interfaces.
13. Which statement about Frame Relay subinterfaces is correct?
Multipoint interfaces will automatically forward routing broadcasts but will consume more IP addresses than point-to-point subinterfaces will consume.
Point-to-point subinterfaces act like leased lines and eliminate split-horizon routing issues.
Interfaces with multiple PVCs require a separate subinterface for each PVC.
Multipoint configurations cannot use subinterfaces.
14.
1911 EWAN Chapter 3 CCNA 4 4.0 2012 2013 100%
Refer to the exhibit. What can be determined about the configuration of router R1 from the exhibited output?
LMI updates are not being received properly.
The LMI type for the Serial 0/0/0 interface has been left to its default configuration.
Cisco HDLC is used as a Layer 2 encapsulation protocol on the Serial 0/0/0 interface.
The Serial 0/0/0 interface has been configured as a data communications equipment device.
15. What is created between two DTEs in a Frame Relay network?
ISDN circuit
limited access circuit
switched parallel circuit
virtual circuit
16. Which Frame Relay topology is a compromise of costs, reliability, and complexity when the WAN contains one headquarters site, 40 regional sites, and several sites within each regional site?
star
full mesh
partial mesh
point-to-multipoint
point-to-point
17.
06 EWAN Chapter 3 CCNA 4 4.0 2012 2013 100%
Refer to the exhibit. A ping is sent to address 192.168.50.10 from the Peanut router. Which DLCI will be used to send the ping?
110
115
220
225
18. What two methods does Frame Relay technology use to process frames that contain errors? (Choose two.)
Frame Relay services depend on the upper layer protocols to handle error recovery.
It requires the receiving device to request that the sender retransmit erroneous frames.
FECN, BECN, and DE bits are set in the frames to minimize errors.
The receiving device drops any frames that contain errors without notifying the sender.
The frame relay switch notifies the sender that errors were detected.
19.
091 EWAN Chapter 3 CCNA 4 4.0 2012 2013 100%
Refer to the exhibit. Which two statements are true given the output shown? (Choose two.)
The IP address of the local Frame Relay interface is 172.16.1.4.
The local DLCI number is 401.
Inverse ARP is being used on this connection.
This interface is in the active state and in the process of negotiating configuration parameters.
Multicast is not enabled on this connection.
20.
182 EWAN Chapter 3 CCNA 4 4.0 2012 2013 100%
Refer to the exhibit. What can be known about the configuration of router R1 from the output?
The Frame Relay LMI DLCI has been incorrectly configured as DLCI 1023.
The Frame Relay LMI type has been changed from its default.
The Serial 0/0/0 interface has been configured as a data communications equipment device.
The command encapsulation frame-relay ietf has been used on the Serial 0/0/0 interface.
21. What consideration must be taken into account if RIP is used on Frame Relay multiaccess networks?
To forward routing updates, address-to-DLCI mapping must be done via the use of the frame-relay map command coupled with the broadcast keyword.
Inverse ARP must be enabled to turn routing update broadcasts into unicast traffic that can be propagated to other Frame Relay nodes.
Because broadcast traffic is not supported, RIPv1 cannot be implemented on Frame Relay networks.
To forward broadcast routing updates, dynamic mapping must be enabled.
22.
141 EWAN Chapter 3 CCNA 4 4.0 2012 2013 100%
Refer to the exhibit. You are a network administrator who has been tasked with completing the Frame Relay topology that interconnects two remote sites. Router HQ belongs to both the 172.16.1.0/24 and 172.16.2.0/24 subnets with IP addresses of 172.16.1.3 and 172.16.2.3 respectively. Traffic between R1 and R2 must travel through HQ first. How should the serial interface on HQ be configured to complete the topology?
one multipoint subinterface
two point-to-point subinterfaces
with the physical interface configured with two ip addresses
one IP address on a point-to-point subinterface and one IP address on the physical interface

ccna 4 chapter 3 answers 2013

tags ccna 4 chapter 3 answers 2013,ccna 4 chapter 3 answers,ccna 4,cisco,ccna 4 chapter 3

ccna 4 chapter 9

1
Which two statements describe factors that influence the layout of a
proposal? (Choose two.)

Proposal layouts are required to use sans serif typefaces.

A specific proposal layout is followed when one is specified in the RFP.

A designer chooses the layout if a written RFP does not specify an outline.


The software that is used to create the proposal dictates the proposal layouts.

Proposal layouts are required to use a format that is designed by the network engineer.


2
What two items are typically included in the executive summary of a
proposal? (Choose two.)

project scope summary

high-level implementation plan

quotes for all needed equipment

technical requirements for the design

emphasis on the benefits that meet the goals of the customer


3
Which proposal section describes the intended routing protocol, security
mechanisms, and addressing for the planned network?

logical design
physical design

executive summary

implementation plan

network requirements


4
Which occurrence would indicate a failure of the design phase?

The incorrect model switches were ordered.

There is no customer signoff for task completion.

New requirements are identified after implementation begins.

The new network capacity is inadequate to support required traffic.


5
A network installation team is assigned to replace all core switches in an
existing data center. No other upgrades are planned. Which kind of installation is this?

a new installation

a fork-lift installation

a phased installation

a green field installation

ccna 4 chapitre 9
 
6
What service is provided Cisco standard warranty?

software application maintenance

replacement of defected hardware

next business day delivery of replacement parts

access to the Cisco Technical Assistance Center (TAC) 24 hours a day, 7 days a week


7
An upgraded version of the Cisco IOS has been purchased. However,
the CD arrived damaged. How will this loss be covered?

a hardware warranty

a software warranty

the Cisco SMARTnet Service

an additional service contract


8
A company informs the account manager that the installation of a new
edge router at the customer remote branch location cannot be done at the scheduled time
because of a large order that the branch office needs to complete. As a result, the end date of the
project must be adjusted to accommodate the additional time. What is the action should the
account manager take?

Cancel the order for the new edge router.

Work with designer to redesign the branch network.

Instruct the technician to complete the install of the router at on the date in the contract.

Adjust the timeline documentation to show the company how the delay will affect the
project completion date.



9
NetworkingCompany completes the installation of a network upgrade for
a retail customer. All of the onsite tests complete successfully and the customer IT staff approves
the results of the tests. The manager of the retail store contacts NetworkingCompany to inform
the company that the store will not pay for the upgrade until a recently purchased software
package is installed and tested on the network. Which two items that are contained in the
proposal can the account manager refer to when discussing this issue with the store manager?(Choose two.)

the project scope

the bill-of-material

the project timeline

the terms and conditions

the business goals of the customer

the evaluation of the current network


10
The operation of a new branch location network is delayed because a
VPN cannot be configured and established between the branch location and the main office. It is
determined that the router at the main office does not have enough memory and does not have
the correct Cisco IOS version image to support the VPN features. To prevent this delay, this
problem should have been identified and corrected during which part of the design project?

the preparation of the business case

the prioritizing of the technical goals

the characterization of the existing network

the implementation of the approved design


11
The NetworkingCompany team is tasked to prepare an implementation
schedule for a customer. It is determined that the new firewalls and wireless controllers that are
specified in the design cannot be delivered and installed within the agreed upon time frame. The
NetworkingCompany informs the customer of the problem. What two options can the
NetworkingCompany team take to ensure the success of the project? (Choose two.)

plan to add additional staff and resources to shorten the installation time after the new
equipment is delivered


eliminate redundancy in the design to reduce the amount of equipment that is needed

renegotiate a new time frame with the customer to accommodate the delay

delay the installation of the security devices and controllers until a later time

redesign the network to use only readily available equipment and software


12
AAA Financial Services Company is performing implementation planning
for a core switch upgrade. The company has 200 financial software programmers that work
billable hours during the week. They have critical, scheduled money transfer transmissions that
occur at hourly intervals every night. There are two, two-hour long IT maintenance windows
scheduled for software upgrades, one on Saturday and one on Sunday. The bank advertises
online banking as available 24 hours on business days and 21 hours on the weekends. However,
a network upgrade that is necessary to replace some switches is expected to take four hours.
Because of rack constraints, this time includes three hours to remove the old switches before the
new switches can be installed and one hour to test the logical configuration. How should the
implementation scheduling be handled

Defer the software upgrades. Use the Saturday window to perform the hardware
installation. Use the Sunday window to perform the logical testing.

Coordinate and publish a separate four-hour downtime during Friday to perform the
complete switch installation and testing process. Use the Saturday and Sunday windows to
correct any outage problems after the Friday window.

Coordinate and publish two, four-hour downtimes incorporating the published Saturday
and Sunday windows. Defer any software upgrades until the new network is proven to be working
correctly with the old software. Use the Sunday window as a fallback scheduling period if there
are problems necessitating backing out of the Saturday window.

Coordinate and publish an eight-hour downtime incorporating the Saturday window. This
will allow four hours for installation and logical testing, one hour for troubleshooting and decision,
and three hours to roll back to the previous configuration if the new switching cannot pass the
logical testing. Defer any software upgrades until the new network is proven to be working
correctly with the old software.



13
Included in a Bill of Materials (BOM) for a SOHO wired implementation is
a Cisco 2811 router, Catalyst 2560 switch, four PCs, three laptops, and a networked printer.
Wireless LAN capability will be implemented on this network. Which two equipment types must be
added to the BOM to implement this request? (Choose two.)

DNS server

LAN switch

wireless NICs

DHCP server

wireless access points


14
A customer has just taken delivery of a Cisco 2811 router and Catalyst
3560 switch. Included with the purchase is the SMARTnet Service. Which two resources are
included with SMARTnet Service? (Choose two.)

signature file updates

technical support from TAC

maintenance releases for OS


software application major releases

software application maintenance and minor releases


15
A Cisco 1841 router has been purchased without an agreement for
SMARTnet Service. What two items are guaranteed under the standard warranty? (Choose two.)

access to TAC

replacement of defective physical media

advanced replacement of hardware parts

access to a renewable standard warranty contract

under normal use, replacement of defective hardware



16
Upon completion of a proposal, a network design team must sell their
ideas to two key stakeholders. Who are these two stakeholders? (Choose two.)

customers

licensing boards

cabling contractors

internal management

project implementation team


17
What are two important guidelines when creating a slide presentation for
a meeting with a customer? (Choose two.)

Use all capital letters on words and phrases when possible for added emphasis.

Provide varied background graphics to enhance viewer interest.

Use contrasting colors for background and text to aid visibility.

Change fonts frequently to denote differences in subject matter.

Use bulleted text to lead the discussion.



18
In order to finalize a project proposal, an account manager of a
networking company creates the terms and conditions section. What are two clauses that should
be included in this section? (Choose two.)

cost summary

installation steps

change order procedures

problem resolution process


maintenance contract quotation


19
Which two items will a systems engineer include in an implementation plan? (Choose two.)

references to design documents

the business goals of the customer

diagrams of the existing traffic flows

the steps to install and test the network

cost of each network device and component


20
Which statement describes a phased installation into an existing network?

A phased installation generally takes less time and expense than a green-field installation.

A phased installation is not suitable for large, multi-site network installations or upgrades.

A phased installation requires detailed planning in order to avoid disruption of user services.
A phased installation involves building an entire replacement network and migrating users
over to it.
tag: ccna 4 chapter 9 answers,ccna 4,ccna 4 chapter 9 ,chapter 9 ccna 4,ccna,cisco,ccna 4,ccna 2,ccna 4 chapter 9 answers

Monday, January 20, 2014

CCNA 2 Chapter 10

CCNA 2 Chapter 10 v5.0 Exam Answers 2013


1
p1 exa10 ccna2
Refer to the exhibit. What should be done to allow PC-A to receive an IPv6 address from the DHCPv6 server?
Add the IPv6 address 2001:DB8:1234:5678::10/64 to the interface configuration of the DHCPv6 server.
Configure the ipv6 nd managed-config-flag command on interface Fa0/1.
Change the ipv6 nd managed-config-flag command to ipv6 nd other-config-flag.
Add the ipv6 dhcp relay command to interface Fa0/0.*
2
What is the reason why the DHCPREQUEST message is sent as a broadcast during the DHCPv4 process?
for routers to fill their routing tables with this new information
to notify other hosts not to request the same IP address
to notify other DHCP servers on the subnet that the IP address was leased*
for hosts on other subnets to receive the information
3
A company uses DHCP servers to dynamically assign IPv4 addresses to employee workstations. The address lease duration is set as 5 days. An employee returns to the office after an absence of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain?
FF-FF-FF-FF-FF-FF and 255.255.255.255*
MAC address of the DHCP server and 255.255.255.255
FF-FF-FF-FF-FF-FF and IPv4 address of the DHCP server
both MAC and IPv4 addresses of the DHCP server
4
Fill in the blank. Do not abbreviate.
Type a command to exclude the first fifteen useable IP addresses from a DHCPv4 address pool of the network 10.0.15.0/24.
Router(config)# ip dhcpexcluded-address 10.0.15.1 10.0.15.15
5
p5 exa10 ccna2

Place the options in the following order:
[+] enabled in RA messages with the ipv6 nd other-config-flag command
[+] clients send only DHCPv6 INFORMATION-REQUEST messages to the server
[+] enabled on the client with the ipv6 address autoconfig command
[#] the M flag is set to 1 in RA messages
[#] uses the address command to create a pool of addresses for clients
[#] enabled on the client with the ipv6 address dhcp command [+] Order does not matter within this group.
[#] Order does not matter within this group.
6
p6 exa10 ccna2
Refer to the exhibit. A network administrator is implementing stateful DHCPv6 operation for the company. However, the clients are not using the prefix and prefix-length information that is configured in the DHCP pool. The administrator issues a show ipv6 interface command. What could be the cause of the problem?
The router is configured for stateless DHCPv6 operation.*
No virtual link-local address is configured.
The router is configured for SLAAC DHCPv6 operation.
The Duplicate Address Detection feature is disabled.
7
A network engineer is troubleshooting hosts on a LAN that are not being assigned an IPv4 address from a DHCP server after a new Ethernet switch has been installed on the LAN. The configuration of the DHCP server has been confirmed as correct and the clients have network connectivity to other networks if a static IP address is configured on each one. What step should the engineer take next to solve the issue?
Issue the ipconfig/release command on each client.
Issue the show ip dhcp binding command on the switch.
Issue the show interface command on the router to confirm that the LAN gateway is operational.
Confirm that ports on the Layer 2 LAN switch are configured as edge ports.*
8
A network administrator configures a router to send RA messages with M flag as 0 and O flag as 1. Which statement describes the effect of this configuration when a PC tries to configure its IPv6 address?
It should use the information that is contained in the RA message exclusively.
It should contact a DHCPv6 server for the prefix, the prefix-length information, and an interface ID that is both random and unique.
It should use the information that is contained in the RA message and contact a DHCPv6 server for additional information.*
It should contact a DHCPv6 server for all the information that it needs.
9
Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host?
UDP
ICMPv6*
ARPv6
DHCPv6
10
A network administrator is implementing DHCPv6 for the company. The administrator configures a router to send RA messages with M flag as 1 by using the interface command ipv6 nd managed-config-flag. What effect will this configuration have on the operation of the clients?
Clients must use the prefix and prefix length that are provided by a DHCPv6 server and generate a random interface ID.
Clients must use the information that is contained in RA messages.
Clients must use the prefix and prefix length that are provided by RA messages and obtain additional information from a DHCPv6 server.
Clients must use all configuration information that is provided by a DHCPv6 server.*
11
Under which two circumstances would a router usually be configured as a DHCPv4 client? (Choose two.)
The router is meant to provide IP addresses to the hosts.
The router has a fixed IP address.
The router is intended to be used as a SOHO gateway.*
The administrator needs the router to act as a relay agent.
This is an ISP requirement.*
12
A company uses the SLAAC method to configure IPv6 addresses for the employee workstations. Which address will a client use as its default gateway?​
the unique local address of the router interface that is attached to the network
the global unicast address of the router interface that is attached to the network
the link-local address of the router interface that is attached to the network*
the all-routers multicast address
13
p13 exa10 ccna2
Refer to the exhibit. Based on the output that is shown, what kind of IPv6 addressing is being configured?
static link-local
stateful DHCPv6
stateless DHCPv6*
SLAAC
14
A company implements the stateless DHCPv6 method for configuring IPv6 addresses on employee workstations. After a workstation receives messages from multiple DHCPv6 servers to indicate their availability for DHCPv6 service, which message does it send to a server for configuration information?
DHCPv6 INFORMATION-REQUEST*
DHCPv6 ADVERTISE
DHCPv6 REQUEST
DHCPv6 SOLICIT
15
An administrator issues the commands:
Router(config)# interface g0/1
Router(config-if)# ip address dhcp
What is the administrator trying to achieve?
configuring the router to obtain IP parameters from a DHCPv4 server*
configuring the router to act as a relay agent
configuring the router to resolve IP address conflicts
configuring the router to act as a DHCPv4 server
16
Which set of commands will configure a router as a DHCP server that will assign IPv4 addresses to the 192.168.100.0/23 LAN while reserving the first 10 and the last addresses for static assignment?
dhcp pool LAN-POOL-100
ip dhcp excluded-address 192.168.100.1 192.168.100.9
ip dhcp excluded-address 192.168.100.254
network 192.168.100.0 255.255.254.0
default-router 192.168.101.1
ip dhcp excluded-address 192.168.100.1 192.168.100.9
ip dhcp excluded-address 192.168.101.254
ip dhcp pool LAN-POOL-100
ip network 192.168.100.0 255.255.254.0
ip default-gateway 192.168.100.1
ip dhcp excluded-address 192.168.100.1 192.168.100.10
ip dhcp excluded-address 192.168.101.254
ip dhcp pool LAN-POOL-100
network 192.168.100.0 255.255.254.0
default-router 192.168.100.1 ************************
ip dhcp excluded-address 192.168.100.1 192.168.100.10
ip dhcp excluded-address 192.168.100.254
ip dhcp pool LAN-POOL-100
network 192.168.100.0 255.255.255.0
ip default-gateway 192.168.100.1
17
Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server?
broadcast DHCPACK
unicast DHCPACK
broadcast DHCPREQUEST*
unicast DHCPREQUEST
18
p18 exa10 ccna2
Launch PT Hide and Save PT
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
How many IP addresses has the DHCP server leased and what is the number of DHCP pools configured? (Choose two.)
one pool*
three leases*
two pools
six pools
seven leases
five leases
19
p19 exa10 ccna2
Refer to the exhibit. A network administrator is implementing the stateless DHCPv6 operation for the company. Clients are configuring IPv6 addresses as expected. However, the clients are not getting the DNS server address and the domain name information configured in the DHCP pool. What could be the cause of the problem?
The DNS server address is not on the same network as the clients are on.
The clients cannot communicate with the DHCPv6 server, evidenced by the number of active clients being 0.
The GigabitEthernet interface is not activated.
The router is configured for SLAAC DHCPv6 operation.*
20
A host on the 10.10.100.0/24 LAN is not being assigned an IPv4 address by an enterprise DHCP server with the address 10.10.200.10/24. What is the best way for the network engineer to resolve this problem?
Issue the command ip helper-address 10.10.100.0 on the router interface that is the 10.10.200.0/24 gateway.
Issue the command default-router 10.10.200.10 at the DHCP configuration prompt on the 10.10.100.0/24 LAN gateway router.
Issue the command ip helper-address 10.10.200.10 on the router interface that is the 10.10.100.0/24 gateway.*
Issue the command network 10.10.200.0 255.255.255.0 at the DHCP configuration prompt on the 10.10.100.0/24 LAN gateway router.
21
Which is a DHCPv4 address allocation method that assigns IPv4 addresses for a limited lease period?
pre-allocation
manual allocation
automatic allocation
dynamic allocation*
22
p22 exa10 ccna2
Place the options in the following order:
[+] Step 2
[+] Step 1
– not scored –
[+] Step 3
– not scored -
[+] Order does not matter within this group.
23
An administrator wants to configure hosts to automatically assign IPv6 addresses to themselves by the use of Router Advertisement messages, but also to obtain the DNS server address from a DHCPv6 server. Which address assignment method should be configured?
RA and EUI-64
stateful DHCPv6
stateless DHCPv6*
SLAAC
24
A company uses the method SLAAC to configure IPv6 addresses for the workstations of the employees. A network administrator configured the IPv6 address on the LAN interface of the router. The interface status is UP. However, the workstations on the LAN segment did not obtain the correct prefix and prefix length. What else should be configured on the router that is attached to the LAN segment for the workstations to obtain the information?​
R1(config-if)# ipv6 nd other-config-flag
R1(config-if)# ipv6 enable
R1(config)# ipv6 dhcp pool <name of the pool>
R1(config)# ipv6 unicast-routing*

CCNA 2 Chapter 10,ccna 2,ccna 2 chapter 10 exam answers 2013,ccna 2 chapter 10 answers,CCNA 2 Chapter 3 v5.0 Exam Answers 2013,

Friday, December 27, 2013

CCNA 2 Chapter 3 v5.0 Exam Answers 2013


CCNA 2 Chapter 3 v5.0 Exam Answers 2013


1
A network administrator is determining the best placement of VLAN trunk links. Which two types of point-to-point connections utilize VLAN trunking?​ (Choose two.)
between two switches that share a common VLAN
between a switch and a server that has an 802.1Q NIC*
between a switch and a client PC
between a switch and a network printer
between two switches that utilize multiple VLANs*
2
What happens to a port that is associated with VLAN 10 when the administrator deletes VLAN 10 from the switch?
The port automatically associates itself with the native VLAN.
The port creates the VLAN again.
The port goes back to the default VLAN.
The port becomes inactive.*
3
ccna 2

Refer to the exhibit. Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to another switch. All other ports are unused. Which security best practice did the administrator forget to configure?Configure all unused ports to a ‘black-hole’ VLAN that is not used for anything on the network.
Disable autonegotiation and set ports to either static access or static trunk.
Change the native VLAN to a fixed VLAN that is distinct from all user VLANs and to a VLAN number that is not VLAN 1.
All user ports are associated with VLANs distinct from VLAN 1 and distinct from the ‘black-hole’ VLAN.*
4
Which command is used to remove only VLAN 20 from a switch?
no switchport access vlan 20
delete flash:vlan.dat
no vlan 20*
delete vlan.dat
5
A Cisco Catalyst switch has been added to support the use of multiple VLANs as part of an enterprise network. The network technician finds it necessary to clear all VLAN information from the switch in order to incorporate a new network design. What should the technician do to accomplish this task?
Erase the startup configuration and reboot the switch.
Erase the running configuration and reboot the switch.
Delete the startup configuration and the vlan.dat file in the flash memory of the switch and reboot the switch.*
Delete the IP address that is assigned to the management VLAN and reboot the switch.
6
What is the effect of issuing a switchport access vlan 20 command on the Fa0/18 port of a switch that does not have this VLAN in the VLAN database?
VLAN 20 will be created automatically.*
The command will have no effect on the switch.
Port Fa0/18 will be shut down.
An error stating that VLAN 20 does not exist will be displayed and VLAN 20 is not created.
7
Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface?
show mac address-table interface Fa0/1
show interfaces Fa0/1 switchport*
show interfaces trunk
show vlan brief
8
p8 exa3 ccna2
Place the options in the following order:
- not scored -
dynamic auto
nonegotiate
dynamic desirable
trunk
9
Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport access vlan 30 is entered on the Fa0/11 interface, what will happen?
Port Fa0/11 will be returned to VLAN 1.*
VLAN 30 will be deleted.
An error message would be displayed.
Port Fa0/11 will be shutdown.
10
What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3?
Enter the no vlan 2 and the vlan 3 commands in global configuration mode.
Enter the switchport trunk native vlan 3 command in interface configuration mode.
Enter the switchport access vlan 3 command in interface configuration mode.*
Enter the no shutdown in interface configuration mode to return it to the default configuration and then configure the port for VLAN 3.
11
Which two Layer 2 security best practices would help prevent VLAN hopping attacks? (Choose two.)
Disable DTP autonegotiation on end-user ports.*
Change the management VLAN to a distinct VLAN that is not accessible by regular users.
Statically configure all ports that connect to end-user host devices to be in trunk mode.
Change the native VLAN number to one that is distinct from all user VLANs and is not VLAN 1.*
Use SSH for all remote management access.
12
In a basic VLAN hopping attack, which switch feature do attackers take advantage of?
automatic encapsulation negotiation
the default automatic trunking configuration*
an open Telnet connection
forwarding of broadcasts
13
A Cisco switch currently allows traffic tagged with VLANs 10 and 20 across trunk port Fa0/5. What is the effect of issuing a switchport trunk allowed vlan 30 command on Fa0/5?
It allows only VLAN 30 on Fa0/5.*
It allows a native VLAN of 30 to be implemented on Fa0/5.
It allows VLANs 1 to 30 on Fa0/5.
It allows VLANs 10, 20, and 30 on Fa0/5.
14
p14 exa3 ccna2
Refer to the exhibit. A frame is traveling between PC-A and PC-B through the switch. Which statement is true concerning VLAN tagging of the frame?
No VLAN tag is added to the frame.*
A VLAN tag is added when the frame is accepted by the switch.
A VLAN tag is added when the frame is forwarded out the port to PC-B.
A VLAN tag is added when the frame leaves PC-A.
15
p15 exa3 ccna2
Refer to the exhibit. PC-A and PC-B are both in VLAN 60. PC-A is unable to communicate with PC-B. What is the problem?
The native VLAN is being pruned from the link.
The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk.*
The trunk has been configured with the switchport nonegotiate command.
The native VLAN should be VLAN 60.
16
What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?
All VLANs will be allowed across the trunk.*
Only the native VLAN will be allowed across the trunk.
The switches will negotiate via VTP which VLANs to allow across the trunk.
Only VLAN 1 will be allowed across the trunk.
17
Under which two occasions should an administrator disable DTP while managing a local area network? (Choose two.)
on links that should not be trunking*
when connecting a Cisco switch to a non-Cisco switch*
on links that should dynamically attempt trunking
when a neighbor switch uses a DTP mode of dynamic auto
when a neighbor switch uses a DTP mode of dynamic desirable
18
p18 exa3 ccna2
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
Which PCs will receive the broadcast sent by PC-C?
PC-D, PC-E*
PC-A, PC-B, PC-D, PC-E
PC-A, PC-B
PC-A, PC-B, PC-D, PC-E, PC-F
PC-A, PC-B, PC-E
19
Which two statements are true about VLAN implementation? (Choose two.)
The network load increases significantly because of added trunking information.
Devices in one VLAN do not hear the broadcasts from devices in another VLAN.*
The size of the collision domain is reduced.
VLANs logically group hosts, regardless of physical location.*
The number of required switches in a network decreases.
20
p20 exa3 ccna2
Refer to the exhibit. DLS1 is connected to another switch, DLS2, via a trunk link. A host that is connected to DLS1 is not able to communicate to a host that is connected to DLS2, even though they are both in VLAN 99. Which command should be added to Fa0/1 on DLS1 to correct the problem?
switchport trunk allowed vlan add 99
switchport trunk native vlan 66*
switchport mode dynamic auto
switchport nonegotiate
21
Which switch feature ensures that no unicast, multicast, or broadcast traffic is passed between ports that are configured with this feature?
switch port security
PVLAN protected port*
ACL
VLAN
22
Fill in the blank. Use the full command syntax.
The ” show vlan brief ” command displays the VLAN assignment for all ports as well as the existing VLANs on the switch.
23
Which three statements accurately describe VLAN types? (Choose three).
An 802.1Q trunk port, with a native VLAN assigned, supports both tagged and untagged traffic.*
A management VLAN is any VLAN that is configured to access management features of the switch.*
A data VLAN is used to carry VLAN management data and user-generated traffic.
Voice VLANs are used to support user phone and e-mail traffic on a network.
VLAN 1 is always used as the management VLAN.
After the initial boot of an unconfigured switch, all ports are members of the default VLAN.*
24
Which command should the network administrator implement to prevent the transfer of DTP frames between a Cisco switch and a non-Cisco switch?
S1(config-if)# switchport mode trunk
S1(config-if)# switchport mode access
S1(config-if)# switchport nonegotiate*
S1(config-if)# switchport mode dynamic desirable
S1(config-if)# switchport trunk allowed vlan none

source : /ccna5.net
Tags :  ccna, ccna cisco, ccna 2, correction ccna, CCNA 2 Chapter 3 v5.0 Exam Answers 2013, Cisco,

Popular Posts

 

Copyright @ 2013 Best blogg.

Designed by Templateify & Sponsored By Twigplay