Solo disponible en BuenasTareas
  • Páginas : 9 (2109 palabras )
  • Descarga(s) : 0
  • Publicado : 18 de diciembre de 2009
Leer documento completo
Vista previa del texto
CCNA 3 – Final by

Refer to the exhibit. The network administrator needs to setup Switch1 for remote access from HostA. The show ip interface brief is issued on Router1 and the show interfaces trunk command is issued on the
Switch1 to verify the current status. The administrator applies the additional configuration shown in the exhibit to Switch1. However, the telnet fromHostA fails. What additional commands need to be applied to the switch?
Switch(config)# interface vlan 10
Switch(config-if)# ip address
Switch(config-if)# no shutdown
Switch(config-if)# ip default-gateway

Refer to the exhibit. On the basis of the configuration shown, how will an Ethernet frame on port GigabitEthernet0/1 be modified?
802.1Qencapsulation inserts a 4-byte tag field into the original Ethernet frame between the source address and type/length fields and recomputes the frame check sequence (FCS) on the modified frame.

What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?
All VLANs will be allowed across the trunk.

Which parameter is used to uniquely identify one wirelessnetwork from another?

Refer to the exhibit. What is the consequence if SW1 port F0/1 is configured as an edge port?
SW1 port F0/1 can generate a temporary loop.

Refer to the exhibit. What will allow a host on VLAN 40 on switch X to communicate with a host in VLAN 40 on switch Y?

Refer to the exhibit. Spanning-tree port priorities are 128 for all interfaces. Thenetwork administrator enters the spanning-tree vlan 1 root primary command on S4. Which two port results are correct? (Choose two.)
S1 Gi0/1 becomes a root port.
S4 Gi0/2 becomes a designated port.

Refer to the exhibit. Which two facts can be confirmed by this output? (Choose two.)
This switch is configured to advertise its VLAN configuration to other VTP-enabled switches in the same VTPdomain.
This switch will cause no disruption in the VTP domain operations if the rest of the switches in the same VTP domain have a higher configuration revision number.

Refer to the exhibit. R1 is configured for traditional inter-VLAN routing. R1 can ping computer 3 but cannot ping computer 1. What is a possible cause for this failure?
S1 port Fa0/11 is in the wrong VLAN.

Refer to theexhibit. Both switches are interconnected via a trunk link. Host A and host B are on the default VLAN but are not able to exchange traffic. What should be done to fix the problem?
Configure the same native VLAN on both ends of the trunk.

Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. What shouldbe done to fix the problem?
Reconfigure the trunk port on switch SW2 with static trunk configuration.

What happens when the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines?
The switch allows remote connections only after a new RSA key pair is generated.

Refer to the exhibit. An Ethernet switch has developed theCAM table shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit?
forward the frame out all interfaces except Interface3

Which two statements describe Spanning Tree Protocol? (Choose two.)
It eliminates Layer 2 loops in network topologies.
It can only be used in networks in which Layer 2 switching is in use.

Refer to the exhibit. Anew host needs to be connected to VLAN 1. Which IP addresses should be assigned to this new host? /28

Refer to the exhibit. How does SW1 manage traffic coming from Host A?
SW1 leaves the traffic untagged and forwards it over the trunk.

Refer to the exhibit. The switches are configured for VTP as shown. Which two statements correctly describe the operation of these...
tracking img