CCNA Final exam first 50 question and answers for CCNA 3 First 50 questions FINAL EXAM -.- :( :@ missjbooth published on January 15, 2013 Stacked 1/25 Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit aframe at the same time but a collision occurs. Which hosts will receive the collisionjamming signal? Hint: 1 choice only hosts A and B only hosts A, B, and C only hosts A, B, C, and D only hosts A, B, C, and E 2/25 Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP addressshould be assigned to this new host? Hint: 1 choice 192.168.1.22 /28 192.168.1.11 /28 192.168.1.33 /28 192.168.1.44 /28 192.168.1.55 /28 3/25 Refer to the exhibit. A network administrator has segmented the network into twoVLANs and configured Router1 for inter-VLAN routing. A test of the network, however,shows that hosts on each VLAN can only access local resources and not resources on theother VLAN. What is the most likely cause of this problem? Hint: 1 choice Switch port Fa0/1 is not trunking. Router interface Fa0/0 is possibly down. No routing protocol is configured on Router1. One of the router subinterfaces is possibly down. 4/25 Refer to the exhibit. If switch SW1 is configured with the four VLANs as shown in theexhibit, how many physical interfaces are needed on router R1 to configure inter-VLANrouting using subinterfaces? Hint: 1 choice zero one two four 5/25 An administrator is troubleshooting a PC on the network which is suffering fromslow and intermittent connectivity. The PC has a ping success rate to the defaultgateway of less than half the ping attempts. Other PCs on the switch can consistentlyping the default gateway. The switch port is configured for auto duplex and the PC isconfigured for full duplex. What will commonly cause this problem? Hint: 1 choice The PC and the default gateway have different bandwidth Ethernet ports. The PC is set to full duplex. The switch port fails to autonegotiate the duplex setting and defaults to half duplex, which causes a duplex mismatch. The switch traffic is exceeding available frame buffers. The result is that frames are being dropped. The default gateway is not on the same switch that the PC is. 6/25 Which method establishes an administrative connection for configuring the LinksysWRT300N wireless access point? Hint: 1 choice Associate with the access point and then open a HyperTerminal session with the access point. Physically connect to the access point and then reboot the computer to launch the configuration software. From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser. Modify the TCP/IP properties of the computer connected to the access point so that it exists on thesame network, and then reboot your computer to establish ... 7/25 What is the purpose of the Spanning Tree algorithm? Hint: 1 choice It propagates VLAN configurations to other switches. It restricts broadcast packets to a single VLAN. It segments a network into multiple broadcast domains. It prevents loops in a switched network with redundant paths. 8/25 Which three statements are correct concerning the default configuration of a newswitch? (Choose three.) Hint: 3 choices It is configured in VTP server mode. STP is automatically enabled. The first VTY line is automatically configured to allow remote connections. VLAN1 is configured with a management IP address. All switch ports are assigned to VLAN1. The enable password is configured as cisco. 9/25 Refer to the exhibit. What is the maximum number of VLANs that can be deletedfrom the Switch as it is configured? Hint: 1 choice zero four five eight nine 10/25 Refer to the exhibit. An administrator documented the output of a CAM table from anEthernet switch as shown. What action will the switch take when it receives the frameshown at the bottom of the exhibit? Hint: 1 choice discard the frame forward the frame out port 3 forward the frame out port 2 forward the frame out all ports forward the frame out all ports except port 3 add station 00-00-3D-1F-11-05 to port 2 in the forwarding table 11/25 Which configuration changes will increment the configuration revision number onthe VTP server? Hint: 1 choice configuring trunk links on the VTP server configuring or changing the VTP password configuring or deleting a VLAN or creating a VLAN name configuring or changing the VTP domain name configuring or changing the VTP version number 12/25 Refer to the exhibit. Each switch is configured to participate in STP for VLANs 1, 10,20, and 30. Which switch will become the root for VLAN 20? Hint: 1 choice A B C D 13/25 Refer to the exhibit. VTP pruning is enabled in the VTP domain that is shown. Howwill switch ST-1 handle Layer 2 broadcast traffic originating from host A on switch ST-C? Hint: 1 choice It will be dropped. It will be forwarded out port Fa0/5 only. It will be forwarded out ports Fa0/5 and Fa0/10. It will be forwarded out ports Fa0/5, Fa0/10, and Fa0/15. 14/25 What VLANs are allowed across a trunk when the range of allowed VLANs is set tothe default value? Hint: 1 choice only the management VLAN all VLANs except the extended range VLANs all VLANs except 1 and 1002-1005 all VLANs 15/25 Refer to the exhibit. Which three options correctly identify information that could beassociated with this output?(Choose three.) Hint: 3 choices Interface FastEthernet3/0/0 is subinterfaced. A non-proprietary trunking protocol is in use. The configuration is appropriate for a router-on-a-stick network design. A shutdown command has been applied to interface FastEthernet3/0/0. Interface FastEthernet3/0/0.3 is mapped to the default management VLAN. An IP address should be applied to FastEthernet3/0/0 for correct data routing. 16/25 Why is MAC address filtering considered a poor choice in securing a WLAN? Hint: 1 choice Available bandwidth is reduced MAC addresses are easily spoofed. APs are more susceptible to DoS attacks. The payload encryption is easily broken. 17/25 When port security is used on a switch, which violation mode will cause an SNMPtrap to be sent and traffic to be dropped when the number of secure MAC addresses fora port is reached? Hint: 1 choice sticky protect restrict shutdown 18/25 Which CLI mode allows users to access all device commands, such as those used forconfiguration, management, and troubleshooting? Hint: 1 choice user EXEC mode privileged EXEC mode global configuration mode interface configuration mode 19/25 Refer to the exhibit. A network administrator needs to add IP phones to thenetwork. To which devices should the IP phones connect? Hint: 1 choice AS1 and AS2 DS1 and DS2 DS1, DS2, and CS1 AS1, AS2, DS1, and DS2 20/25 Which value determines if a switch becomes the central point of reference in thespanning tree topology? Hint: 1 choice lowest bridge ID highest revision number lowest numeric IP address highest numeric MAC address 21/25 Using the command copy tftp:backup.cfg startup-config, an administratordownloaded a saved configuration from a TFTP server to a switch. Why does theadministrator not detect any changes in the switch configuration after the downloadcompletes? Hint: 1 choice The command should have been copy startup-config tftp:backup.cfg. A backup configuration from a TFTP server cannot be copied directly into the startup-config. The command copy running-config startup-config should be used to save the changes on the switch. Downloading to the startup-config requires the switch to be reloaded in order for the configuration to take effect. 22/25 Refer to the exhibit. Which Spanning Tree Protocol version is in effect? Hint: 1 choice Per VLAN Spanning Tree (PVST) Per VLAN Spanning Tree + (PVST+) Common Spanning Tree (CST) Rapid Spanning Tree Protocol (RSTP) Multiple Spanning Tree Protocol (MSTP) 23/25 In which mode is a VTP switch operating if it does not allow for the creation of localVLANs but it does accept VLAN updates from other switches in the same domain? Hint: 1 choice Client root server transparent 24/25 Which parameter is used to uniquely identify one wireless network from another? Hint: 1 choice SSID OFDM WEP DSSS 25/25 Refer to the exhibit. After entering the commands in the exhibit, the administratorreceives a “password required, but none set” message when attempting to connect toS1. What is the problem? S1 does not have a password configured for the vty lines. S1 does not have login configured on the vty lines. The enable secret password was not set. The crypto key is not properly configured to generate passwords. The VLAN1 interface has not be enabled with the no shutdown command.