ccna 3 eswitching practice final exam v 4.0
DESCRIPTION
CCNA 3 ESwitching Practice Final Exam v 4.0 Score 100%TRANSCRIPT
CCNA ESwitching Final Practice Exam
1
CCNA3 FINAL Exam Score 100 pdf1.
2. What happens when the crypto key zeroize rsa command is entered
on a switch configured with the transport input ssh command on the vty
lines?
A new RSA key pair is created.
The switch defaults to allowing Telnet connections only.
The switch is no longer able to make SSH connections as an SSH
client.
The switch allows remote connections only after a new RSA key pair
is generated.
3. What VLANs are allowed across a trunk when the range of allowed VLANs is set
to the default value?
All VLANs will be allowed across the trunk.
Only VLAN 1 will be allowed across the trunk.
Only the native VLAN will be allowed across the trunk.
The switches will negotiate via VTP which VLANs to allow across the trunk.
CCNA ESwitching Final Practice Exam
2
4. Using the command copy tftp:backup.cfg startup-config, an administrator
downloaded a saved configuration from a TFTP server to a switch. Why does the
administrator not detect any changes in the switch configuration after the download
completes?
The command should have been copy startup-config tftp:backup.cfg.
A backup configuration from a TFTP server cannot be copied directly into the
startup-config.
The command copy running-config startup-config should be used to save the
changes on the switch.
Downloading to the startup-config requires the switch to be reloaded in order for
the configuration to take effect.
5.
CCNA ESwitching Final Practice Exam
3
6.
7. Which statement regarding the service password-encryption command is
true?
The service password-encryption command is entered at the privileged
EXEC mode prompt.
The service password-encryption command encrypts only passwords for
the console and VTY ports.
The service password-encryption command encrypts all previously
unencrypted passwords in the running configuration.
To see the passwords encrypted by the service password-encryption
command, enter the no service password-encryption command.
CCNA ESwitching Final Practice Exam
4
8. Which three statements are correct concerning the default configuration
of a new switch? (Choose three.)
Spanning Tree Protocol is disabled.
Enable password is configured as cisco.
All switch ports are assigned to VLAN1.
The flash directory contains the IOS image.
VLAN1 is configured with a management IP address.
All interfaces are set to auto-negotiation of speed and duplex.
9.
CCNA ESwitching Final Practice Exam
5
10.
11. What three tasks should be performed before moving a Catalyst switch to another
VTP management domain? (Choose three.)
Select the correct VTP mode and version.
Configure the switch with the name of the new management domain.
Download the VTP database from the VTP server in the new domain.
Configure the VTP server in the new domain to recognize the BID of the switch.
Reset the VTP counters to allow the switch to synchronize with the other switches in
the new domain.
Verify that the switch has a lower configuration revision number than the other
switches in the new domain.
12. How does Spanning Tree Protocol aid network architecture?
allows for redundant links by eliminating loops
provides greater scalability by eliminating collisions
reduces switch processor load by reducing broadcast traffic on trunk links
reduces administrative overhead by sharing VLAN databases between switches
across the network
CCNA ESwitching Final Practice Exam
6
13. Which type of frame contains information that is used in the election of the
spanning tree root bridge?
BID
LSA
LSU
BPDU
14.
15.
CCNA ESwitching Final Practice Exam
7
16. After unpacking a new Linksys WRT300N wireless multifunction device, a user
needs to change the default administrator password and make other configuration
changes. What must the user do to access the device in order to make these changes?
Use a wireless client to associate with the WRT300N and then open a
HyperTerminal session with the device.
Establish a wired connection with the device and then reboot the attached
computer to launch the configuration software.
Establish a wired connection from a computer in the same IP subnet as the
WRT300N and enter the default IP address of the device into a web browser on
the computer.
Modify the TCP/IP properties of the computer that is connected to the WRT300N
so that the computer and the WRT300N exist on the same network. Then reboot
the computer to establish a connection.
17.
CCNA ESwitching Final Practice Exam
8
18.
19.
CCNA ESwitching Final Practice Exam
9
20.
21.
CCNA ESwitching Final Practice Exam
11
22.
23. Which parameter is a specific frequency at which a wireless access point will
operate?
BSS
WEP
SSID
ad hoc
channel
24. Which parameter is associated with wireless authentication?
shared key
SSID
ad hoc
channel
CCNA ESwitching Final Practice Exam
11
25.
26.
CCNA ESwitching Final Practice Exam
12
27.
28. Which statement correctly describes the spanning-tree path cost?
It is calculated based on the total number of switches connected in a loop.
It is calculated based on the utilization of all the switches along a given path.
It is calculated based on the bridge priority of the switches along a given path.
It is calculated based on the sum of the port cost value, determined by link speed,
for each switch port along a given path
CCNA ESwitching Final Practice Exam
13
29.
30.
CCNA ESwitching Final Practice Exam
14
31.
32. Which three actions are performed during the boot sequence of a Cisco switch?
(Choose three.)
The boot loader uses the self-contained switch operating system to boot the
switch.
The boot loader retrieves diagnostics routines via TFTP
The boot loader performs POST.
The boot loader is loaded from RAM.
The boot loader initializes the flash file system that is used to boot the system.
The boot loader loads the default operating system if the flash-based operating
system is corrupt or missing.
33.
CCNA ESwitching Final Practice Exam
15
34.
35.
36. Which statement is true about open authentication when it is enabled on an access
point?
requires no authentication
uses a 64-bit encryption algorithm
requires the use of an authentication server
requires a mutually agreed upon password
CCNA ESwitching Final Practice Exam
16
37. How are data frames identified and sent to the correct VLAN when exiting an
Ethernet trunk?
Frames are forwarded to the correct VLAN based on the VLAN tag.
Frames are always forwarded to the native VLAN when exiting a trunk.
Frames are forwarded to the correct VLAN based on the source IP address.
Frames are forwarded to the correct VLAN based on information in the MAC
address table.
38.
CCNA ESwitching Final Practice Exam
17
39. When port security is used on a switch, which violation mode will cause an
SNMP trap to be sent and traffic to be dropped when the number of secure MAC
addresses for a port is reached?
sticky
protect
restrict
shutdown
40. A wireless access point can function as which type of shared medium, wired LAN
device?
hub
switch
router
gateway
41.
CCNA ESwitching Final Practice Exam
18
42.
43. Which benefit is gained by designing a network with a small network diameter?
lower latency
improved security
increased redundancy
higher interface bandwidth
CCNA ESwitching Final Practice Exam
19
44.
45.
CCNA ESwitching Final Practice Exam
21
46. Which security protocol or measure would provide the greatest protection for a
wireless LAN?
WPA2
cloaking SSIDs
shared WEP key
MAC address filtering
47.
48. Which two conditions would require a VTP client to send a request advertisement
to a VTP server? (Choose two.)
The switch has been reset.
A VLAN has been created or deleted.
A five minute time period has elapsed.
The name of a VLAN has been changed.
The VTP domain name has been changed.
CCNA ESwitching Final Practice Exam
21
49.
CCNA ESwitching Final Practice Exam
22
50.
Good Luck
Ahmed Farouk