CCNA Final exam first 50

CCNA Final exam first 50

question and answers for CCNA 3 First 50 questions FINAL EXAM -.- :( :@

published on January 15, 2013
1/25

Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a
frame at the same time but a collision occurs. Which hosts will receive the collision
jamming signal?

Hint: 1 choice
only hosts A and B
only hosts A, B, and C
only hosts A, B, C, and D
only hosts A, B, C, and E
2/25

Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP address
should be assigned to this new host?

Hint: 1 choice
192.168.1.22 /28
192.168.1.11 /28
192.168.1.33 /28
192.168.1.44 /28
192.168.1.55 /28
3/25

Refer to the exhibit. A network administrator has segmented the network into two
VLANs and configured Router1 for inter-VLAN routing. A test of the network, however,
shows that hosts on each VLAN can only access local resources and not resources on the
other VLAN. What is the most likely cause of this problem?

Hint: 1 choice
Switch port Fa0/1 is not trunking.
Router interface Fa0/0 is possibly down.
No routing protocol is configured on Router1.
One of the router subinterfaces is possibly down.
4/25

Refer to the exhibit. If switch SW1 is configured with the four VLANs as shown in the
exhibit, how many physical interfaces are needed on router R1 to configure inter-VLAN
routing using subinterfaces?

Hint: 1 choice
zero
one
two
four
5/25

An administrator is troubleshooting a PC on the network which is suffering from
slow and intermittent connectivity. The PC has a ping success rate to the default
gateway of less than half the ping attempts. Other PCs on the switch can consistently
ping the default gateway. The switch port is configured for auto duplex and the PC is
configured for full duplex. What will commonly cause this problem?

Hint: 1 choice
The PC and the default gateway have different bandwidth Ethernet ports.
The PC is set to full duplex. The switch port fails to autonegotiate the duplex setting and defaults to half duplex, which causes a duplex mismatch.
The switch traffic is exceeding available frame buffers. The result is that frames are being dropped.
The default gateway is not on the same switch that the PC is.
6/25

Which method establishes an administrative connection for configuring the Linksys
WRT300N wireless access point?

Hint: 1 choice
Associate with the access point and then open a HyperTerminal session with the access point.
Physically connect to the access point and then reboot the computer to launch the configuration software.
From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.
Modify the TCP/IP properties of the computer connected to the access point so that it exists on the
same network, and then reboot your computer to establish ...
7/25

What is the purpose of the Spanning Tree algorithm?

Hint: 1 choice
It propagates VLAN configurations to other switches.
It restricts broadcast packets to a single VLAN.
It segments a network into multiple broadcast domains.
It prevents loops in a switched network with redundant paths.
8/25

Which three statements are correct concerning the default configuration of a new
switch? (Choose three.)

Hint: 3 choices
It is configured in VTP server mode.
STP is automatically enabled.
The first VTY line is automatically configured to allow remote connections.
VLAN1 is configured with a management IP address.
All switch ports are assigned to VLAN1.
The enable password is configured as cisco.
9/25

Refer to the exhibit. What is the maximum number of VLANs that can be deleted
from the Switch as it is configured?

Hint: 1 choice
zero
four
five
eight
nine
10/25

Refer to the exhibit. An administrator documented the output of a CAM table from an
Ethernet switch as shown. What action will the switch take when it receives the frame
shown at the bottom of the exhibit?

Hint: 1 choice
discard the frame
forward the frame out port 3
forward the frame out port 2
forward the frame out all ports
forward the frame out all ports except port 3
add station 00-00-3D-1F-11-05 to port 2 in the forwarding table
11/25

Which configuration changes will increment the configuration revision number on
the VTP server?

Hint: 1 choice
configuring trunk links on the VTP server
configuring or changing the VTP password
configuring or deleting a VLAN or creating a VLAN name
configuring or changing the VTP domain name
configuring or changing the VTP version number
12/25

Refer to the exhibit. Each switch is configured to participate in STP for VLANs 1, 10,
20, and 30. Which switch will become the root for VLAN 20?

Hint: 1 choice
A
B
C
D
13/25

Refer to the exhibit. VTP pruning is enabled in the VTP domain that is shown. How
will switch ST-1 handle Layer 2 broadcast traffic originating from host A on switch ST-C?

Hint: 1 choice
It will be dropped.
It will be forwarded out port Fa0/5 only.
It will be forwarded out ports Fa0/5 and Fa0/10.
It will be forwarded out ports Fa0/5, Fa0/10, and Fa0/15.
14/25

What VLANs are allowed across a trunk when the range of allowed VLANs is set to
the default value?

Hint: 1 choice
only the management VLAN
all VLANs except the extended range VLANs
all VLANs except 1 and 1002-1005
all VLANs
15/25

Refer to the exhibit. Which three options correctly identify information that could be
associated with this output?(Choose three.)

Hint: 3 choices
Interface FastEthernet3/0/0 is subinterfaced.
A non-proprietary trunking protocol is in use.
The configuration is appropriate for a router-on-a-stick network design.
A shutdown command has been applied to interface FastEthernet3/0/0.
Interface FastEthernet3/0/0.3 is mapped to the default management VLAN.
An IP address should be applied to FastEthernet3/0/0 for correct data routing.
16/25

Why is MAC address filtering considered a poor choice in securing a WLAN?

Hint: 1 choice
Available bandwidth is reduced
MAC addresses are easily spoofed.
APs are more susceptible to DoS attacks.
The payload encryption is easily broken.
17/25

When port security is used on a switch, which violation mode will cause an SNMP
trap to be sent and traffic to be dropped when the number of secure MAC addresses for
a port is reached?

Hint: 1 choice
sticky
protect
restrict
shutdown
18/25

Which CLI mode allows users to access all device commands, such as those used for
configuration, management, and troubleshooting?

Hint: 1 choice
user EXEC mode
privileged EXEC mode
global configuration mode
interface configuration mode
19/25

Refer to the exhibit. A network administrator needs to add IP phones to the
network. To which devices should the IP phones connect?

Hint: 1 choice
AS1 and AS2
DS1 and DS2
DS1, DS2, and CS1
AS1, AS2, DS1, and DS2
20/25

Which value determines if a switch becomes the central point of reference in the
spanning tree topology?

Hint: 1 choice
lowest bridge ID
highest revision number
lowest numeric IP address
highest numeric MAC address
21/25

Using the command copy tftp:backup.cfg startup-config, an administrator
downloaded a saved configuration from a TFTP server to a switch. Why does the
administrator not detect any changes in the switch configuration after the download
completes?

Hint: 1 choice
The command should have been copy startup-config tftp:backup.cfg.
A backup configuration from a TFTP server cannot be copied directly into the startup-config.
The command copy running-config startup-config should be used to save the changes on the switch.
Downloading to the startup-config requires the switch to be reloaded in order for the configuration to take effect.
22/25

Refer to the exhibit. Which Spanning Tree Protocol version is in effect?

Hint: 1 choice
Per VLAN Spanning Tree (PVST)
Per VLAN Spanning Tree + (PVST+)
Common Spanning Tree (CST)
Rapid Spanning Tree Protocol (RSTP)
Multiple Spanning Tree Protocol (MSTP)
23/25

In which mode is a VTP switch operating if it does not allow for the creation of local
VLANs but it does accept VLAN updates from other switches in the same domain?

Hint: 1 choice
Client
root
server
transparent
24/25

Which parameter is used to uniquely identify one wireless network from another?

Hint: 1 choice
SSID
OFDM
WEP
DSSS
25/25

Refer to the exhibit. After entering the commands in the exhibit, the administrator
receives a “password required, but none set” message when attempting to connect to
S1. What is the problem?

S1 does not have a password configured for the vty lines.
S1 does not have login configured on the vty lines.
The enable secret password was not set.
The crypto key is not properly configured to generate passwords.
The VLAN1 interface has not be enabled with the no shutdown command.