Sponsor

EWAN Chapter 5 CCNA 4 4.0 2012 100% Take Assessment – EWAN Chapter 5 – CCNA Exploration: Accessing the WAN (Version 4.0) - Answers – 2011 – 2012

Thứ Hai, 10 tháng 9, 2012


1. The following commands were entered on a router:
Router(config)# access-list 2 deny 172.16.5.24
Router(config)# access-list 2 permit any
The ACL is correctly applied to an interface. What can be concluded about this set of commands?
The wildcard mask 0.0.0.0 is assumed.
The access list statements are misconfigured.
All nodes on the 172.16.0.0 network will be denied access to other networks.
No traffic will be allowed to access any nodes or services on the 172.16.0.0 network.
2. Interface s0/0/0 already has an IP ACL applied inbound. What happens when the network administrator attempts to apply a second inbound IP ACL?
The second ACL is applied to the interface, replacing the first.
Both ACLs are applied to the interface.
The network administrator receives an error.
Only the first ACL remains applied to the interface.
3. Which two statements are correct about extended ACLs? (Choose two)
Extended ACLs use a number range from 1-99.
Extended ACLs end with an implicit permit statement.
Extended ACLs evaluate the source and destination addresses.
Port numbers can be used to add greater definition to an ACL.
Multiple ACLs can be placed on the same interface as long as they are in the same direction.
4. Which benefit does an extended ACL offer over a standard ACL?
Extended ACLs can be named, but standard ACLs cannot.
Unlike standard ACLs, extended ACLS can be applied in the inbound or outbound direction.
Based on payload content, an extended ACL can filter packets, such as information in an e-mail or instant message.
In addition to the source address, an extended ACL can also filter on destination address, destination port, and source port.
5.
1511 EWAN Chapter 5 CCNA 4 4.0 2012 100%
Refer to the exhibit. How will Router1 treat traffic matching the time-range requirement of EVERYOTHERDAY?
TCP traffic entering fa0/0 from 172.16.1.254/24 destined to the 10.1.1.0/24 network is permitted.
TCP traffic entering fa0/0 from 10.1.1.254/24 destined to the 172.16.1.0/24 network is permitted.
Telnet traffic entering fa0/0 from 172.16.1.254/24 destined to the 10.1.1.0/24 network is permitted.
Telnet traffic entering fa0/0 from 10.1.1.254/24 destined to the 172.16.1.0/24 network is permitted.
6. Which three statements describe ACL processing of packets? (Choose three.)
An implicit deny any rejects any packet that does not match any ACL statement.
A packet can either be rejected or forwarded as directed by the statement that is matched.
A packet that has been denied by one statement can be permitted by a subsequent statement.
A packet that does not match the conditions of any ACL statements will be forwarded by default.
Each statement is checked only until a match is detected or until the end of the ACL statement list.
Each packet is compared to the conditions of every statement in the ACL before a forwarding decision is made.
7.
172 EWAN Chapter 5 CCNA 4 4.0 2012 100%
Refer to the exhibit. The administrator wishes to block web traffic from 192.168.1.50 from reaching the default port of the web service on 192.168.3.30. To do this, the access control list name is applied inbound on the router R1 LAN interface. After testing the list, the administrator has noted that the web traffic remains successful. Why is web traffic reaching the destination?
Web traffic does not use port 80 by default.
The access list is applied in the wrong direction.
The access list needs to be placed closer to the destination, on R3.
The range of source addresses specified in line 10 does not include host 192.168.1.50.
8. Which feature will require the use of a named ACL rather than a numbered ACL?
the ability to filter traffic based on a specific protocol
the ability to filter traffic based on an entire protocol suite and destination
the ability to specify source and destination addresses to use when identifying traffic
the ability to edit the ACL and add additional statements in the middle of the list without removing and re-creating the list
9. Which two statements are true regarding the significance of the access control list wildcard mask 0.0.0.7? (Choose two.)
The first 29 bits of a given IP address will be ignored.
The last 3 bits of a given IP address will be ignored.
The first 32 bits of a given IP address will be checked.
The first 29 bits of a given IP address will be checked.
The last 3 bits of a given IP address will be checked.
10. Where should a standard access control list be placed?
close to the source
close to the destination
on an Ethernet port
on a serial port
11. How do Cisco standard ACLs filter traffic?
by destination UDP port
by protocol type
by source IP address
by source UDP port
by destination IP address
12. Which two statements are true regarding named ACLs? (Choose two.)
Only named ACLs allow comments.
Names can be used to help identify the function of the ACL.
Named ACLs offer more specific filtering options than numbered ACLs.
Certain complex ACLs, such as reflexive ACLs, must be defined with named ACLs.
More than one named IP ACL can be configured in each direction on a router interface.
13. Refer to the exhibit. What will be the effect of the configuration that is shown?
Users attempting to access hosts in the 192.168.30.0/24 network will be required to telnet to R3.
Hosts connecting to resources in the 191.68.30.0/24 network have an idle timeout of 15 minutes.
Anyone attempting to telnet into R3 will have an absolute time limit of five minutes.
Telnet access to R3 will only be permitted on Serial 0/0/1.
14.
25 EWAN Chapter 5 CCNA 4 4.0 2012 100%
Refer to the exhibit. An administrator has configured two access lists on R1. The list inbound on the serial interface is named Serial and the list inbound on the LAN interface is named LAN. What affect will be produced by the access control lists?
PC1 will be able to telnet to PC3.
R3 will not be able to communicate with PC1 and PC3.
PC3 cannot telnet to R3 and cannot communicate with PC1.
PC1 will not be able to telnet to R3 and PC3 will not be able to communicate with PC1.
15. Which two statements are true regarding the following extended ACL? (Choose two.)
access-list 101 deny tcp 172.16.3.0 0.0.0.255 any eq 20
access-list 101 deny tcp 172.16.3.0 0.0.0.255 any eq 21
access-list 101 permit ip any any
FTP traffic originating from network 172.16.3.0/24 is denied.
All traffic is implicitly denied.
FTP traffic destined for the 172.16.3.0/24 network is denied.
Telnet traffic originating on network 172.16.3.0/24 is denied.
Web traffic originating from 172.16.3.0 is permitted.
16. Which statement about standard ACLs is true?
Standard ACLS must be numbered and cannot be named.
They should be placed as close to the destination as possible.
They can filter based on source and destination address as well as on source and destination port.
When applied to an outbound interface, incoming packets are processed before they are routed to the outbound interface.
17.
23 EWAN Chapter 5 CCNA 4 4.0 2012 100%
Refer to the exhibit. Which statement is true about ACL 110 if ACL 110 is applied in the inbound direction on S0/0/0 of R1?
It will deny TCP traffic to the Internet if the traffic is sourced from the 172.22.10.0/24 network.
It will not allow TCP traffic coming from the Internet to enter the network 172.22.10.0/24.
It will allow any TCP traffic from the Internet to enter the network 172.22.10.0/24.
It will permit any TCP traffic that originated from network 172.22.10.0/24 to return inbound on the S0/0/0 interface.
18. Which three parameters can ACLs use to filter traffic? (Choose three.)
packet size
protocol suite
source address
destination address
source router interface
destination router interface
19.
131 EWAN Chapter 5 CCNA 4 4.0 2012 100%
Refer to the exhibit. How does this access list process a packet with the source address 10.1.1.1 and a destination of 192.168.10.13?
It is allowed because of the implicit deny any.
It is dropped because it does not match any of the items in the ACL.
It is allowed because line 10 of the ACL allows packets to 192.168.0.0/16.
It is allowed because line 20 of the ACL allows packets to the host 192.168.10.13.
20. By default, how is IP traffic filtered in a Cisco router?
blocked in and out of all interfaces
blocked on all inbound interfaces, but permitted on all outbound interfaces
permitted in and out of all interfaces
blocked on all outbound interfaces, but permitted on all inbound interfaces
21.
10 EWAN Chapter 5 CCNA 4 4.0 2012 100%
Refer to the exhibit. When creating an extended ACL to deny traffic from the 192.168.30.0 network destined for the Web server 209.165.201.30, where is the best location for applying the ACL?
ISP Fa0/0 outbound
R2 S0/0/1 inbound
R3 Fa0/0 inbound
R3 S0/0/1 outbound
22.
24 EWAN Chapter 5 CCNA 4 4.0 2012 100%
Refer to the exhibit. ACL 120 is configured inbound on the serial0/0/0 interface on router R1, but the hosts on network 172.11.10.0/24 are able to telnet to network 10.10.0.0/16. On the basis of the provided configuration, what should be done to remedy the problem?
Apply the ACL outbound on the serial0/0/0 interface on router R1.
Apply the ACL outbound on the FastEthernet0/0 interface on router R1.
Include the established keyword at the end of the first line in the ACL.
Include a statement in the ACL to deny the UDP traffic that originates from 172.11.10.0/24 network.
23. A network administrator needs to allow traffic through the firewall router for sessions that originate from within the company network, but the administrator must block traffic for sessions that originate outside the network of the company. What type of ACL is most appropriate?
dynamic
port-based
reflexive
time-based
24. A technician is creating an ACL and needs a way to indicate only the subnet 172.16.16.0/21. Which combination of network address and wildcard mask will accomplish the desired task?
172.16.0.0 0.0.255.255
127.16.16.0 0.0.0.255
172.16.16.0 0.0.7.255
172.16.16.0 0.0.15.255
172.16.16.0 0.0.255.255
25. Which three items must be configured before a dynamic ACL can become active on a router? (Choose three.)
extended ACL
reflexive ACL
console logging
authentication
Telnet connectivity
user account with a privilege level of 15
Read more ...

EWAN Chapter 6 CCNA 4 4.0 2012 100% Take Assessment – EWAN Chapter 6 – CCNA Exploration: Accessing the WAN (Version 4.0) - Answers – 2011 – 2012

Thứ Hai, 10 tháng 9, 2012


1. Which two protocols can be used to encapsulate traffic that is traversing a VPN tunnel? (Choose two.)
ATM
CHAP
IPsec
IPX
MPLS
PPTP
2. What are the three main functions of a secure VPN? (Choose three.)
accounting
authentication
authorization
data availability
data confidentiality
data integrity
3. Data confidentiality through a VPN can be enhanced through the use of which three encryption protocols? (Choose three.)
AES
DES
AH
hash
MPLS
RSA
4. While monitoring traffic on a cable network, a technician notes that data is being transmitted at 38 MHz. Which statement describes the situation observed by the technician?
Data is being transmitted from the subscriber to the headend.
Data is flowing downstream.
Cable television transmissions are interfering with voice and data transmissions.
The system is experiencing congestion in the lower frequency ranges.
5. Which two statements are valid solutions for a cable ISP to reduce congestion for users? (Choose two.)
use higher RF frequencies
allocate an additional channel
subdivide the network to reduce users on each segment
reduce the length of the local loop to 5.5 kilometers or less
use filters and splitters at the customer site to separate voice from data traffic
6. Data confidentiality through a VPN is achieved through which two methods? (Choose two.)
digital certificates
encryption
encapsulation
hashing
passwords
7. What two protocols provide data authentication and integrity for IPsec? (Choose two.)
AH
L2TP
ESP
GRE
PPTP
8. Which two methods could an administrator use to authenticate users on a remote access VPN? (Choose two.)
digital certificates
ESP
hashing algorithms
smart cards
WPA
9. Which is an example of symmetric-key encryption?
Diffie-Hellman
digital certificate
pre-shared key
RSA signature
10.
1811 EWAN Chapter 6 CCNA 4 4.0 2012 100%
Refer to the exhibit. A teleworker is connected over the Internet to the HQ Office. What type of secure connection can be established between the teleworker and the HQ Office?
a GRE tunnel
a site-to-site VPN
a remote-access VPN
the user must be at the office location to establish a secure connection
11. After conducting research to learn about common remote connection options for teleworkers, a network administrator has decided to implement remote access over broadband to establish VPN connections over the public Internet. What is the result of this solution?
A reliable connection is established at greater speeds than what is offered from dialup over POTS. Security is increased, but username and password information are sent in plain text.
The connection has increased security and reliable connectivity. Users need a remote VPN router or VPN client software.
Security and reliability are increased at a substantial loss in throughput, which is considered acceptable when supporting a single user environment.
Reliability and security are increased without the need for additional equipment, when compared to dialup connections using POTS.
12. Which two statements about DSL are true? (Choose two.)
users are on a shared medium
uses RF signal transmission
local loop can be up to 3.5 miles (5.5km)
physical and data link layers are defined by DOCSIS
user connections are aggregated at a DSLAM located at the CO
13. A company is using WiMAX to provide access for teleworkers. What home equipment must the company provide at the teleworker’s site?
a WiMAX tower
a one-way multicast satellite
a WiMAX receiver
an access point connected to the company WLAN
14. A technician has been asked to configure a broadband connection for a teleworker. The technician has been instructed that all uploads and downloads for the connection must use existing phone lines. Which broadband technology should be used?
cable
DSL
ISDN
POTS
15. Which two Layer 1 requirements are outlined in the Data-over-Cable Service Interface Specification (DOCSIS)? (Choose two.)
channel widths
access method
maximum data rate
modulation techniques
compression techniques
16.
152 EWAN Chapter 6 CCNA 4 4.0 2012 100%
Refer to the exhibit. All users have a legitimate purpose and the necessary permissions to access the Corporate network. Based on the topology shown, which locations are able to establish VPN connectivity with the Corporate network?
Locations C, D, and E can support VPN connectivity. Locations A and B require an additional PIX Firewall appliance installed on the edge of the network.
Locations C and E can support VPN connectivity. Locations A, B, and D require an additional PIX Firewall appliance installed on the edge of the network.
Locations A, B, D, and E can support VPN connectivity. Location C requires an additional router on the edge of the network.
All locations can support VPN connectivity.
17. Which two features can be associated with the Worldwide Interoperability for Microwave Access (WiMAX) telecommunication technology? (Choose two.)
supports municipal wireless networks utilizing mesh technologies
covers areas as large as 7,500 square kilometers
supports point-to-point links, but not full mobile cellular-type access
connects directly to the Internet through high-bandwidth connections
operates at lower speeds than Wi-Fi, but supports many more users
18.
192 EWAN Chapter 6 CCNA 4 4.0 2012 100%
Refer to the exhibit. A VPN tunnel has been established between the HQ Office and the Branch Office over the public Internet. Which three mechanisms are required by the devices on each end of the VPN tunnel to protect the data from being intercepted and modified? (Choose three.)
The devices must use a dedicated Layer 2 connection.
The devices must have the VPN client software installed.
The two parties must inspect the traffic against the same ACLs.
The two parties must establish a secret key used by encryption and hash algorithms.
The two parties must agree on the encryption algorithm to be used over the VPN tunnel.
The devices must be authenticated before the communication path is considered secure.
19. Which statement describes cable?
Delivering services over a cable network requires downstream frequencies in the 50 to 860 MHz range, and upstream frequencies in the 5 to 42 MHz range.
The cable subscriber must purchase a cable modem termination system (CMTS)
Each cable subscriber has dedicated upstream and downstream bandwidth.
Cable subscribers may expect up to 27 Mbps of bandwidth on the upload path.
Read more ...

EWAN Chapter 2 CCNA 4 4.0 2012 100% Take Assessment – EWAN Chapter 2 – CCNA Exploration: Accessing the WAN (Version 4.0) - Answers – 2011 – 2012

Thứ Hai, 10 tháng 9, 2012

1.

20 EWAN Chapter 2 CCNA 4 4.0 2012 100%
Refer to the exhibit. Router R1, the DCE device, has just been configured for PPP encapsulation with authentication. What series of commands will allow another router, the DTE device, to communicate over its serial 0/0/0 interface to router R1?
Router(config)# hostname R3
R3(config)# username R1 password Cisco
R3(config)# interface Serial 0/0/0
R3(config-if)# encapsulation ppp
R3(config-if)# ip address 172.16.3.3 255.255.255.0
R3(config-if)# ppp authentication chap
Router(config)# hostname R3
R3(config)# username R3 password Cisco
R3(config)# interface Serial 0/0/0
R3(config-if)# encapsulation ppp
R3(config-if)# ip address 172.16.3.3 255.255.255.0
R3(config-if)# ppp authentication chap
Router (config)# username Router password Cisco
Router (config)# interface Serial 0/0/0
Router (config-if)# clockrate 64000
Router (config-if)# encapsulation ppp
Router (config-if)# ip address 172.16.3.1 255.255.255.0
Router config-if)# ppp authentication chap
Router (config)# username R1 password Cisco
Router config)# interface Serial 0/0/0
Router (config-if)# clockrate 64000
Router config-if)# encapsulation ppp
Router (config-if)# ip address 172.16.3.1 255.255.255.0
Router (config-if)# ppp authentication chap
2. Which serial communications DTE/DCE interface standard is used to provide high-speed connectivity of up to 52 Mbps between LANs and is found on many high-end Cisco routers?
EIA/TIA 232 (RS-232)
EIA/TIA 422 (RS-422)
EIA/TIA 423 (RS-423)
EIA/TIA-612/613 (HSSI)
ITU V.35
3. Which three statements are true regarding LCP? (Choose three.)
It is responsible for negotiating link establishment.
It negotiates options for Layer 3 protocols running over PPP.
It uses MD5 encryption while negotiating link establishment parameters.
It terminates the link upon user request or the expiration of an inactivity timer.
It can test the link to determine if link quality is sufficient to bring up the link.
It monitors the link for congestion and dynamically adjusts the acceptable window size.
4.
112 EWAN Chapter 2 CCNA 4 4.0 2012 100%
Refer to the exhibit. On the basis of the show interface Serial0/0 output, how many NCP sessions have been established?
one
two
three
four
5. Which two statements are true about time-division multiplexing (TDM)? (Choose two.)
TDM relies on Layer 3 protocols to operate.
Multiple channels can transmit over a single link.
Original data streams must be reconstructed at the destination.
TDM methods vary depending on the Layer 2 protocol that is used.
It allows information from multiple channels to be allocated bandwidth on multiple wires.
6. Which authentication protocol can be spoofed to allow playback attacks?
MD5
CHAP
PAP
NCP
7. Refer to the exhibit. What can be concluded about the function of the Serial 0/0/0 interface on the router after the commands are entered?
All username and password information that is sent will be encrypted.
All authentication on the serial link will be accomplished using a two-way handshake.
The Predictor algorithm will be used to compress all packets that are sent and received on the serial link.
The serial link will be closed if the number of received packets at the destination node falls below 90 percent of the packets that are sent.
8. Which three statements are correct about HDLC encapsulation? (Choose three.)
HDLC does not support CDP.
HDLC and PPP are compatible.
HDLC supports PAP and CHAP authentication.
HDLC implementation in Cisco routers is proprietary.
HDLC is the default serial interface encapsulation on Cisco routers.
HDLC uses frame delimiters to mark the beginnings and ends of frames.
9. What function do Network Control Protocols provide for a PPP connection?
to supply error detection
to establish and terminate data links
to provide authentication capabilities to PPP
to manage network congestion and to allow quality testing of the link
to allow multiple Layer 3 protocols to operate over the same physical link
10. What advantage does PPP have over HDLC for serial communications?
It can communicate more efficiently with other Cisco devices
It is less complex to configure
It has less Layer 2 overhead
It supports authentication
11.
153 EWAN Chapter 2 CCNA 4 4.0 2012 100%
Refer to the exhibit. What statement is true regarding the output shown?
LCP is in the process of negotiating a link.
LCP and NCP are waiting for CHAP authentication to complete.
LCP negotiation has been successful, but NCP negotiation is in progress.
Data is able to flow across this link.
12.
162 EWAN Chapter 2 CCNA 4 4.0 2012 100%
Refer to the exhibit. What statement is true regarding the output shown?
NCP has successfully negotiated.
The PAP passwords did not match, so the routers are trying CHAP authentication.
One router has suggested PAP authentication, and the other has accepted authentication but suggested CHAP authentication.
One router can only use PAP authentication while the other router can only use CHAP, so the connection has been rejected.
13. Which three statements correctly describe PPP authentication? (Choose three.)
PAP sends passwords in clear text.
PAP uses a 3-way handshake to establish a link.
PAP provides protection from repeated trial-and-error attacks.
CHAP uses a 2-way handshake to establish a link.
CHAP uses a challenge/response that is based on the MD5 hash algorithm.
CHAP uses repeated challenges for verification.
14.
193 EWAN Chapter 2 CCNA 4 4.0 2012 100%
Refer to the exhibit. While troubleshooting a serial interface, a technician enters the command show interface serial 0/0/0 . If the interface is in DCE mode, what two problems are likely to cause the indicated problem? (Choose two.)
The remote CSU or DSU has failed.
The router is not sensing a CD signal.
A timing problem has occurred on the cable.
The line is not physically connected to the CSU/DSU.
The router configuration contains the shutdown interface configuration command.
15. Why are serial connections preferred over parallel connections for long transmission lengths?
Parallel connections do not support error checking.
Parallel connections are subject to excessive attenuation.
Parallel connections are subject to clock skew and to crosstalk between wires.
Parallel connections transmit over only two wires and therefore transmit data more slowly.
16.
173 EWAN Chapter 2 CCNA 4 4.0 2012 100%
Refer to the exhibit. Which two statements are true regarding the output shown? (Choose two.)
The router has agreed on IP parameters.
The router has negotiated LCP successfully.
The router is negotiating IP compression options.
The router is requesting an IP address from its peer.
The router has accepted IP but not the suggested IP options.
17. What does the demarcation point represent in data communication physical circuits?
DTE/DCE interface on the device connecting to the Internet
location of the firewall or router
physical point at which the public network ends and the private customer network begins
tag assigned to the physical block where a cross-connect occurs
18.
122 EWAN Chapter 2 CCNA 4 4.0 2012 100%
Refer to the exhibit. Which statement is true about PPP operation?
Layer 2 is down.
LCP, IPCP, and CDPCP negotiations are in progress.
Only the link-establishment phase completed successfully.
Both the link-establishment and network-layer phase completed successfully.
19. Which two options can LCP negotiate? (Choose two.)
link quality
authentication
dynamic flow control
compression and network layer address for IP
connection-oriented or connectionless communication methods
20. Which PPP configuration option can be used to establish load balancing over the interfaces of a router?
callback
multilink
compression
error detection
21.
213 EWAN Chapter 2 CCNA 4 4.0 2012 100%
Refer to the exhibit. Router R1 is not able to communicate with a neighbor router that is directly connected to serial 0/0/0. What is the reason for this?
Interface Serial0/0/0 resets very frequently.
PPP LQM has shutdown the serial interface.
The serial interface has no input or output queues available.
The serial interface is not configured for a Layer 2 protocol.
The interface has been administratively shutdown with the shutdown command.
Read more ...

EWAN Chapter 3 CCNA 4 4.0 2012 100% Take Assessment – EWAN Chapter 3 – CCNA Exploration: Accessing the WAN (Version 4.0) - Answers – 2011 – 2012

Thứ Hai, 10 tháng 9, 2012

1. Which three actions might a Frame Relay switch perform when it detects an excessive build-up of frames in its queue? (Choose three.)

puts a hold on accepting frames in excess of the CIR
drops frames from the queue that have the DE bit set
reduces the number of frames it sends over the link
re-negotiates flow control with the connected device
sets the FECN bit on all frames it receives on the congested link
sets the BECN bit on all frames it places on the congested link
2. Which best describes the benefit of using Frame Relay as opposed to a leased line or ISDN service?
Customers can define their virtual circuit needs in far greater combinations, with increments as small as 64 kbps.
Customers pay for an end-to-end connection that includes the local loop and the network link.
Customers only pay for the local loop and the bandwidth they purchase from the network provider.
Connecting new sites requires new lower cost circuit installations when compared to ISDN dialup costs or adding additional hardware for leased service.
3.
211 EWAN Chapter 3 CCNA 4 4.0 2012 100%
Refer to the exhibit. Router R1 has been configured for Frame Relay connectivity to routers R2 and R3. What configuration option should be configured on the R2 and R3 serial interfaces in order for all routers to ping each other successfully?
R2(config-if)# frame-relay interface-dlci 201 broadcast
R3(config-if)# frame-relay interface-dlci 301 broadcast
R2(config-if)# frame-relay map ip 10.1.1.1 201 broadcast
R3(config-if)# frame-relay map ip 10.1.1.1 301 broadcast
R2(config-if)# frame-relay map ip 10.1.1.3 201 broadcast
R3(config-if)# frame-relay map ip 10.1.1.2 301 broadcast
R2(config-if)# frame-relay map ip 10.1.1.1 201 broadcast
R2(config-if)# frame-relay map ip 10.1.1.3 201 broadcast
R3(config-if)# frame-relay map ip 10.1.1.1 301 broadcast
R3(config-if)# frame-relay map ip 10.1.1.2 301 broadcast
4. Which two items allow the router to map data link layer addresses to network layer addresses in a Frame Relay network? (Choose two.)
ARP
RARP
Proxy ARP
Inverse ARP
LMI status messages
ICMP
5.
221 EWAN Chapter 3 CCNA 4 4.0 2012 100%
Refer to the exhibit. Which two outcomes occur from the configuration shown? (Choose two.)
The broadcasts will be forwarded to 10.1.1.1.
The router will use DLCI 22 to forward data to 10.1.1.1.
DLCI 22 will replace the MAC address in the ARP table for entry 10.1.1.1
Inverse-ARP will now add an entry for 10.1.1.1 into the Frame Relay map table using DLCI 22.
Frames sent by 10.1.1.1 arriving on interface serial 0/0/0 of RT_1 will have a data link layer address of 22.
6. Refer to the exhibit. What can be determined about the Frame Relay switch from the output shown?
It is currently not transmitting data.
It is in the process of establishing the PVC.
It has put a hold on processing frames in excess of the CIR.
It is experiencing congestion.
7.
201 EWAN Chapter 3 CCNA 4 4.0 2012 100%
Refer to the exhibit. What can be determined from the output?
Serial 0/0/0 has been configured with an DLCI of 201.
Serial 0/0/0 has the feature frame-relay inverse-arp enabled.
Serial 0/0/0 has been configured with an IP address of 172.16.4.3.
Serial 0/0/0 has been configured with the command frame-relay map ip 172.16.4.3 201 broadcast.
8.
071 EWAN Chapter 3 CCNA 4 4.0 2012 100%
Refer to the exhibit. What effect does the point-to-point configuration on subinterface S0/0.110 have on the operation of the router?
It helps to conserve IP addresses.
It establishes multiple PVC connections to multiple physical interfaces.
It eliminates split horizon issues without increasing the likelihood of routing loops.
It requires the configuration of the encapsulation command on the subinterface.
9.
161 EWAN Chapter 3 CCNA 4 4.0 2012 100%
Refer to the exhibit. Which statement explains why the Frame Relay connection between R1 and R2 is failing?
Split horizon must be disabled.
The LMI type must be specified.
Logical subinterfaces must be used instead.
The frame-relay map commands are using incorrect DLCIs.
10. What best describes the use of a data-link connection identifier (DLCI)?
local address identifying a destination router across a Frame Relay network
locally significant address used to identify a virtual circuit
logical address identifying the interface between a router and a Frame Relay switch
logical address used to identify the DCE
11.
171 EWAN Chapter 3 CCNA 4 4.0 2012 100%
Refer to the exhibit. Router R1 has been configured for Frame Relay connectivity to routers R2 and R3. Which set of configuration options for routers R2 and R3 would provide each router connectivity to R1?
R2(config)# interface serial0/0/1
R2(config-if)# frame-relay map ip 10.1.1.1 102
R3(config)# interface serial0/0/1
R3(config-if)# frame-relay map ip 10.1.2.1 103
R2(config)# interface serial0/0/1
R2(config-if)# frame-relay map ip 10.1.1.1 102
R2(config-if)# frame-relay map ip 10.1.2.3 301
R3(config)# interface serial0/0/1
R3(config-if)# frame-relay map ip 10.1.2.1 103
R3(config-if)# frame-relay map ip 10.1.1.2 201
R2(config)# interface serial0/0/1.201 point-to-point
R2(config-if)# no frame-relay invers-arp
R3(config)# interface serial0/0/1.301 point-to-point
R3(config-if)# no frame-relay invers-arp
R2(config)# interface serial0/0/1.201 point-to-point
R2(config-if)# frame-relay interface-dlci 201
R3(config)# interface serial0/0/1.301 point-to-point
R3(config-if)# frame-relay interface-dlci 301
12.
121 EWAN Chapter 3 CCNA 4 4.0 2012 100%
Refer to the exhibit. Frame Relay connectivity has been configured in the network and OSPF is used as the routing protocol. Router R1 can successfully ping the router R2 serial interface. When R1 attempts to ping network 192.168.3.0/24 the ping fails. What additional configuration should be applied on all routers to remedy the problem?
Add the broadcast keyword in the Frame Relay map command on both routers.
Issue the frame-relay interface-dlci command in addition to the frame-relay map command on both router interfaces.
Remove the frame-relay map command and replace with the frame-relay interface-dlci command on both router interfaces.
Apply the no frame-relay inverse-arp command on both router interfaces.
13. Which statement about Frame Relay subinterfaces is correct?
Multipoint interfaces will automatically forward routing broadcasts but will consume more IP addresses than point-to-point subinterfaces will consume.
Point-to-point subinterfaces act like leased lines and eliminate split-horizon routing issues.
Interfaces with multiple PVCs require a separate subinterface for each PVC.
Multipoint configurations cannot use subinterfaces.
14.
1911 EWAN Chapter 3 CCNA 4 4.0 2012 100%
Refer to the exhibit. What can be determined about the configuration of router R1 from the exhibited output?
LMI updates are not being received properly.
The LMI type for the Serial 0/0/0 interface has been left to its default configuration.
Cisco HDLC is used as a Layer 2 encapsulation protocol on the Serial 0/0/0 interface.
The Serial 0/0/0 interface has been configured as a data communications equipment device.
15. What is created between two DTEs in a Frame Relay network?
ISDN circuit
limited access circuit
switched parallel circuit
virtual circuit
16. Which Frame Relay topology is a compromise of costs, reliability, and complexity when the WAN contains one headquarters site, 40 regional sites, and several sites within each regional site?
star
full mesh
partial mesh
point-to-multipoint
point-to-point
17.
06 EWAN Chapter 3 CCNA 4 4.0 2012 100%
Refer to the exhibit. A ping is sent to address 192.168.50.10 from the Peanut router. Which DLCI will be used to send the ping?
110
115
220
225
18. What two methods does Frame Relay technology use to process frames that contain errors? (Choose two.)
Frame Relay services depend on the upper layer protocols to handle error recovery.
It requires the receiving device to request that the sender retransmit erroneous frames.
FECN, BECN, and DE bits are set in the frames to minimize errors.
The receiving device drops any frames that contain errors without notifying the sender.
The frame relay switch notifies the sender that errors were detected.
19.
091 EWAN Chapter 3 CCNA 4 4.0 2012 100%
Refer to the exhibit. Which two statements are true given the output shown? (Choose two.)
The IP address of the local Frame Relay interface is 172.16.1.4.
The local DLCI number is 401.
Inverse ARP is being used on this connection.
This interface is in the active state and in the process of negotiating configuration parameters.
Multicast is not enabled on this connection.
20.
182 EWAN Chapter 3 CCNA 4 4.0 2012 100%
Refer to the exhibit. What can be known about the configuration of router R1 from the output?
The Frame Relay LMI DLCI has been incorrectly configured as DLCI 1023.
The Frame Relay LMI type has been changed from its default.
The Serial 0/0/0 interface has been configured as a data communications equipment device.
The command encapsulation frame-relay ietf has been used on the Serial 0/0/0 interface.
21. What consideration must be taken into account if RIP is used on Frame Relay multiaccess networks?
To forward routing updates, address-to-DLCI mapping must be done via the use of the frame-relay map command coupled with the broadcast keyword.
Inverse ARP must be enabled to turn routing update broadcasts into unicast traffic that can be propagated to other Frame Relay nodes.
Because broadcast traffic is not supported, RIPv1 cannot be implemented on Frame Relay networks.
To forward broadcast routing updates, dynamic mapping must be enabled.
22.
141 EWAN Chapter 3 CCNA 4 4.0 2012 100%
Refer to the exhibit. You are a network administrator who has been tasked with completing the Frame Relay topology that interconnects two remote sites. Router HQ belongs to both the 172.16.1.0/24 and 172.16.2.0/24 subnets with IP addresses of 172.16.1.3 and 172.16.2.3 respectively. Traffic between R1 and R2 must travel through HQ first. How should the serial interface on HQ be configured to complete the topology?
one multipoint subinterface
two point-to-point subinterfaces
with the physical interface configured with two ip addresses
one IP address on a point-to-point subinterface and one IP address on the physical interface
Read more ...

EWAN Chapter 1 CCNA 4 4.0 2012 100% Take Assessment – EWAN Chapter 1 – CCNA Exploration: Accessing the WAN (Version 4.0) - Answers – 2011 – 2012

Thứ Hai, 10 tháng 9, 2012


1. Which statement is true about the differences between a WAN and a LAN?
WANs generally support higher bandwidth than LANs support.
A WAN link typically traverses shorter geographic distances than a LAN link traverses.
A WAN often relies on the services of carriers, such as telephone or cable companies, but a LAN does not.
All WAN implementations generally use the same Layer 2 protocol but there are many accepted LAN Layer 2 protocols in use.
2. A U.S. company requires a WAN connection used only to transfer sales data from individual stores to the home office. All transfers will occur after business hours. The required bandwidth for this connection is estimated to be less than 38 kbps. Which type of connection requires the least investment for this company?
ATM
ISDN
analog dialup
T1 Leased Line
3. What are two advantages of an analog PSTN WAN connection? (Choose two.)
low cost
availability
traffic encryption
available bandwidth
support for voice and video
4. Which WAN technology uses a fixed payload of 48 bytes and is transported across both switched and permanent virtual circuits?
ATM
ISDN
Frame Relay
metro Ethernet
5. Which three WAN devices can be found in the cloud? (Choose three.)
ATM switches
core routers
CSU/DSU
Ethernet switches
Frame Relay switches
repeaters
6. Which term describes a device that will put data on the local loop?
DLCI
DTE
DCE
BRI
PRI
7. What is an advantage of packet-switched technology over circuit-switched technology?
Packet-switched networks are less susceptible to jitter than circuit-switched networks are.
Packet-switched networks can efficiently use multiple routes inside a service provider network.
Packet-switched networks do not require an expensive permanent connection to each endpoint.
Packet-switched networks usually experience lower latency than circuit-switched networks experience.
8. Which statement is true about data connectivity between a customer and a service provider?
Normally the CSU/DSU is the designated demarcation point for the service provider but not the customer.
The segment between the demarcation point and the central office is known as the “last mile.”
The local loop is the segment between the CSU/DSU and the serial port on a router.
Putting data on the local loop is the responsibility of the DTE.
9. A company needs a WAN connection that is capable of transferring voice, video, and data at a minimum data rate of 155 Mbps. Which WAN connection is the best choice?
X.25
DSL
ATM
ISDN BRI
ISDN PRI
10. Which statement is true of the functionality of the layers in the hierarchical network model?
The purpose of the access layer is to provide very high bandwidth communications between network devices.
Most security screening to prevent unauthorized entry to the network happens at the core layer.
Untrusted external connections are segmented from the rest of the network at all three levels.
The distribution layer aggregates WAN connections at the edge of the campus.
11. Why is the call setup time of a circuit-switched WAN implementation considered a drawback?
Routing protocols are incompatible with this function.
It restricts the communication sent to voice traffic only.
A telephone must be used to initially start transferring data.
Data cannot be transferred until a circuit has been established.
12. For digital lines, which device is used to establish the communications link between the customer equipment and the local loop?
CSU/DSU
Frame Relay switch
ISDN switch
modem
PBX switch
13. Which packet-switched WAN technology offers high-bandwidth connectivity capable of managing data, voice, and video all on the same infrastructure?
Time Division Multiplexing (TDM)
metro Ethernet
Integrated Services Digital Network (ISDN)
Public Switched Telephone Network (PSTN)
14. Which networking device is typically used to concentrate the dial-in and dial-out traffic of multiple users to and from a network?
core router
access server
Frame Relay switch
ATM switch
15. Which two devices are commonly used as data communications equipment? (Choose two.)
modem
router
CSU/DSU
ISDN switch
Ethernet switch
16. Which two features are identified with Frame Relay connections? (Choose two.)
53-byte cells
DLCI
DSLAM
PVC
SPID
17. Which statement about WAN protocols is correct?
ATM differs from other WAN protocols in that it uses variably sized packets.
Most WAN protocols use HDLC or a variant of HDLC as a framing mechanism.
The frame header consists of the frame check sequence and cyclic redundancy check.
ISDN differs from Frame Relay, HDLC, and ATM in that it is packet-switched rather than circuit-switched technology.
18. Which switching type will allow the communication devices in the provider network to be shared and only allocated to an individual subscriber during data transfer?
circuit-switched
dedicated switched lines
frame-switched
packet-switched
19. What can cause a reduction in available bandwidth on a cable broadbandconnection?
smaller cells
number of subscribers
committed information rate
distance from the central office of the provider
20. What three terms are associated with ISDN PRI? (Choose three.)
cell
DLCI
circuit switching
packet switching
data bearer channels
time-division multiplexing
21. At which two layers of the OSI model does a WAN operate? (Choose two.)
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Presentation Layer
Application Layer
22. What type of connectivity is established when VPNs are used from the remote site to the private network?
PVCs
DLCIs
tunnels
dedicated Layer 2 links
Read more ...

ESwitching Chapter 7 CCNA 3 4.0 2012 100% Take Assessment – ESwitching Chapter 7 – CCNA Exploration: LAN Switching and Wireless (Version 4.0) - Answers – 2011 – 2012

Thứ Hai, 10 tháng 9, 2012


1. Which two statements concerning network security are accurate? (Choose two.)
802.11i uses 3DES for encryption.
Open authentication uses no client or AP verification.
The 802.11i protocol is functionally identical to WPA.
802.11i incorporates a RADIUS server for enterprise authentication.
A wireless client first associates with an AP and then authenticates for network access.
2. Which installation method will allow connectivity for a new wireless network?
set up WEP on the access point only
set up open access on both the access point and each device connected to it
set up full encryption on the access point while leaving each device connected to the network open
set up full encryption on each device of the WLAN while leaving the access point settings open
3. Which function is provided by a wireless access point?
dynamically assigns an IP address to the host
provides local DHCP services
converts data from 802.11 to 802.3 frame encapsulation
provides a gateway for connecting to other networks
4. What procedure can prevent man-in-the-middle attacks?
Force all devices on a WLAN to authenticate and monitor for any unknown devices.
Enable access points to send an SSID to each device wanting to use the network.
Configure MAC filtering on all authorized access points.
Disable SSID broadcasts.
5. What does a wireless access point use to allow WLAN clients to learn which networks are available in a given area?
association response
beacon
key
probe request
6. What wireless security feature allows a network administrator to configure an access point with wireless NIC unique identifiers so that only these NICs can connect to the wireless network?
authentication
SSID broadcasting
MAC address filtering
EAP (Extensible Authentication Protocol)
Radius (Remote Authentication Dial-In User Service)
7. Wireless users on a network complain about poor performance within a small area of a room. Moving away from this area in any direction improves performance dramatically. What is the first step in designing a solution to this problem?
This might be RF channel overlap, so the technician should verify the channels in use on each wireless access point and change to non-overlapping channels.
The RF power settings might be set too low on the wireless access points servicing the room. Increase the RF output power on all wireless access points.
Install a new wireless access point in this center area to provide coverage.
Verify that the wireless access points have sufficient in-line power and connectivity to the wired network.
8. Which two statements characterize wireless network security? (Choose two.)
A rogue access point represents a security risk for the local network.
Wireless networks offer the same security features as wired networks.
Using encryption prevents unauthorized clients from associating with an access point.
An attacker needs physical access to at least one network device to launch an attack.
With SSID broadcast disabled, an attacker must sniff the SSID before being able to connect.
9. Which network design process identifies where to place access points?
site survey
risk assessment
scalability design
network protocol analysis
10. Refer to the exhibit. When configuring the wireless access point, which setting does the network administrator use to configure the unique identifier that client devices use to distinguish this wireless network from others?
Network Mode
Network Name (SSID)
Radio Band
Wide Channel
Standard Channel
11. Which two conditions have favored adoption of 802.11g over 802.11a? (Choose two.)
802.11a suffers from a shorter range than 802.11g.
The 2.4 GHz frequency band is not as crowded as the 5 GHz band.
802.11a is more susceptible to RF interference from common commercial items.
802.11a uses a more expensive modulation technique than 802.11g.
802.11g is backward compatible with 802.11b, but 802.11a is not.
12. What occurs when a rogue access point is added to a WLAN?
Authorized access points can transmit excess traffic to rogue access points to help alleviate congestion.
Unauthorized users can gain access to internal servers, thus causing a security hole.
All traffic that uses the same channel as the rogue access point will be encrypted.
All traffic that uses the same channel as the rogue access point will be required to authenticate.
13. In a WLAN network, why should wireless access points be implemented with each access point using a different channel?
to keep users segregated on separate subnets
to control the amount of bandwidth that is utilized
to keep signals from interfering with each other
to keep traffic secure
14. Which two statements are true regarding wireless security? (Choose two.)
MAC address filtering prevents the contents of wireless frames from being viewable.
Providing a wireless client with the network key allows an available network to be visible.
Disabling an access point from broadcasting the SSID prevents the access point from being discovered.
Default SSIDs on specific manufacturer APs are generally known and may permit hostile wireless connections. 
Manually adding a network and setting the known SSID on a wireless client makes the network visible even if the SSID is not being broadcast.
15. Why is security so important in wireless networks?
Wireless networks are typically slower than wired networks.
Televisions and other devices can interfere with wireless signals.
Wireless networks broadcast data over a medium that allows easy access. 
Environmental factors such as thunderstorms can affect wireless networks.
16. Which wireless technology standard provides the most compatibility with older wireless standards, but has greater performance?
802.11a
802.11b
802.11g
802.11n
17. Which three devices do many wireless routers incorporate? (Choose three.)
gateway for connecting to other network infrastructures
built-in Ethernet switch
network management station
VTP server
wireless access point
VPN concentrator
18. What will a wireless client transmit to discover the available WLAN networks?
beacon
password
probe request
association request
19. Which major problem does CSMA/CA overcome in wireless networks?
bandwidth saturation
privacy concerns
media contention
device interoperability
20. Which access method does a wireless access point use to allow for multiple user connectivity and distributed access?
CSMA/CD
token passing
CSMA/CA
polling
21. What purpose does authentication serve in a WLAN?
converts clear text data before transmission
indicates which channel the data should flow on
determines that the correct host is utilizing the network
allows the host to choose which channel to use
Read more ...

ESwitching Chapter 3 CCNA 3 4.0 2012 100% Take Assessment – ESwitching Chapter 3 – CCNA Exploration: LAN Switching and Wireless (Version 4.0) - Answers – 2011 – 2012

Thứ Hai, 10 tháng 9, 2012

1.

13 300x169 ESwitching Chapter 3 CCNA 3 4.0 2012 100%
Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2 and assigned hosts on the IP addresses of the VLAN in the 10.1.50.0/24 subnet range. Computer A can communicate with computer B, but not with computer C or computer D. What is the most likely cause of this problem?

There is a native VLAN mismatch.
The link between Switch1 and Switch2 is up but not trunked.
The router is not properly configured for inter-VLAN routing.
VLAN 50 is not allowed to entering the trunk between Switch1 and Switch2.
2.
10 273x300 ESwitching Chapter 3 CCNA 3 4.0 2012 100%
Refer to the exhibit. The exhibited configurations do not allow the switches to form a trunk. What is the most likely cause of this problem?

Cisco switches only support the ISL trunking protocol.
The trunk cannot be negotiated with both ends set to auto.
By default, Switch1 will only allow VLAN 5 across the link.
A common native VLAN should have been configured on the switches.
3.
06 300x155 ESwitching Chapter 3 CCNA 3 4.0 2012 100%
Refer to the exhibit. Which two conclusions can be drawn regarding the switch that produced the output shown? (Choose two.)

The network administrator configured VLANs 1002-1005.
The VLANs are in the active state and are in the process of negotiatingconfiguration parameters.
A FDDI trunk has been configured on this switch.
The command switchport access vlan 20 was entered in interface configurationmode for Fast Ethernet interface 0/1.
Devices attached to ports fa0/5 through fa0/8 cannot communicate with devices attached to ports fa0/9 through fa0/12 without the use of a Layer 3 device.
4. What statements describe how hosts on VLANs communicate?
Hosts on different VLANs use VTP to negotiate a trunk.
Hosts on different VLANs communicate through routers. 
Hosts on different VLANs should be in the same IP network.
Hosts on different VLANs examine VLAN ID in the frame tagging to determine if the frame for their network.
5. Switch port fa0/1 was manually configured as a trunk, but now it will be used to connect a host to the network. How should the network administrator reconfigure switch port Fa0/1?
Disable DTP.
Delete any VLANs currently being trunked through port Fa0/1.
Administratively shut down and re-enable the interface to return it to default.
Enter the switchport mode access command in interface configuration mode.
6.
03 300x176 ESwitching Chapter 3 CCNA 3 4.0 2012 100%
Refer to the exhibit. SW1 and SW2 are new switches being installed in the topology shown in the exhibit. Interface Fa0/1 on switch SW1 has been configured with trunk mode “on”. Which statement is true about forming a trunk link between the switches SW1 and SW2?

Interface Fa0/2 on switch SW2 will negotiate to become a trunk link if it supports DTP.
Interface Fa0/2 on switch SW2 can only become a trunk link if statically configured as a trunk.
Interface Fa0/1 converts the neighboring link on the adjacent switch into a trunk link if the neighboring interface is configured in nonegotiate mode.
Interface Fa0/1 converts the neighboring link on the adjacent switch into a trunk link automatically with no consideration of the configuration on the neighboring interface.
7. The network administrator wants to separate hosts in Building A into two VLANs numbered 20 and 30. Which two statements are true concerning VLAN configuration? (Choose two.)
The VLANs may be named.
VLAN information is saved in the startup configuration.
Non-default VLANs created manually must use the extended range VLAN numbers.
The network administrator may create the VLANs in either global configurationmode or VLAN database mode.
Both VLANs may be named BUILDING_A to distinguish them from other VLANs in different geographical locations.
8. What is a valid consideration for planning VLAN traffic across multiple switches?
Configuring interswitch connections as trunks will cause all hosts on any VLAN to receive broadcasts from the other VLANs.
A trunk connection is affected by broadcast storms on any particular VLAN that is carried by that trunk.
Restricting trunk connections between switches to a single VLAN will improve efficiency of port usage.
Carrying all required VLANs on a single access port will ensure proper traffic separation.
9. What are two characteristics of VLAN1 in a default switch configuration? (Choose two.)
VLAN1 should renamed.
VLAN 1 is the management VLAN.
All switch ports are members of VLAN1.
Only switch port 0/1 is assigned to VLAN1.
Links between switches must be members of VLAN1.
10.
142 ESwitching Chapter 3 CCNA 3 4.0 2012 100%
Refer to the exhibit. Which statement is true concerning interface Fa0/5?

The default native VLAN is being used.
The trunking mode is set to auto.
Trunking can occur with non-Cisco switches.
VLAN information about the interface encapsulates the Ethernet frames.
11. What statement about the 802.1q trunking protocol is true?
802.1q is Cisco proprietary.
802.1q frames are mapped to VLANs by MAC address.
802.1q does NOT require the FCS of the original frame to be recalculated.
802.1q will not perform operations on frames that are forwarded out access ports.
12. What is the effect of the switchport mode dynamic desirable command?
DTP cannot negotiate the trunk since the native VLAN is not the default VLAN.
The remote connected interface cannot negotiate a trunk unless it is also configured as dynamic desirable.
The connected devices dynamically determine when data for multiple VLANs must be transmitted across the link and bring the trunk up as needed.
A trunk link is formed if the remote connected device is configured with the switchport mode dynamic auto or switchport mode trunk commands.
13. A network administrator is removing several VLANs from a switch. When the administrator enters the no vlan 1 command, an error is received. Why did this command generate an error?
VLAN 1 can never be deleted.
VLAN 1 can only be deleted by deleting the vlan.dat file.
VLAN 1 can not be deleted until all ports have been removed from it.
VLAN 1 can not be deleted until another VLAN has been assigned its responsibilities.
14.
20 289x300 ESwitching Chapter 3 CCNA 3 4.0 2012 100%
Refer to the exhibit. Company HR is adding PC4, a specialized application workstation, to a new company office. The company will add a switch, S3, connected via a trunk link to S2, another switch. For security reasons the new PC will reside in the HR VLAN, VLAN 10. The new office will use the 172.17.11.0/24 subnet. After installation, users on PC1 are unable to access shares on PC4. What is the likely cause?

The switch to switch connection must be configured as an access port to permit access to VLAN 10 on S3.
The new PC is on a different subnet so Fa0/2 on S3 must be configured as a trunk port.
PC4 must use the same subnet as PC1.
A single VLAN cannot span multiple switches.
15.
04 300x132 ESwitching Chapter 3 CCNA 3 4.0 2012 100%
Refer to the exhibit. Computer 1 sends a frame to computer 4. On which links along the path between computer 1 and computer 4 will a VLAN ID tag be included with the frame?

A
A, B
A, B, D, G
A, D, F
C, E
C, E, F
16.
12 300x169 ESwitching Chapter 3 CCNA 3 4.0 2012 100%
Refer to the exhibit. Computer B is unable to communicate with computer D. What is the most likely cause of this problem?

The link between the switches is up but not trunked.
VLAN 3 is not an allowed VLAN to enter the trunk between the switches.
The router is not properly configured to route traffic between the VLANs.
Computer D does not have a proper address for the VLAN 3 address space.
17. What happens to the member ports of a VLAN when the VLAN is deleted?
The ports cannot communicate with other ports.
The ports default back to the management VLAN.
The ports automatically become a part of VLAN1.
The ports remain a part of that VLAN until the switch is rebooted. They then become members of the management VLAN.
18. Which two statements describe the benefits of VLANs? (Choose two.)
VLANs improve network performance by regulating flow control and window size.
VLANs enable switches to route packets to remote networks via VLAN ID filtering.
VLANs reduce network cost by reducing the number of physical ports required on switches.
VLANs improve network security by isolating users that have access to sensitive data and applications.
VLANs divide a network into smaller logical networks, resulting in lower susceptibility to broadcast storms.
19. What switch port modes will allow a switch to successfully form a trunking link if the neighboring switch port is in “dynamic desirable” mode?
dynamic desirable mode
on or dynamic desirable mode
on, auto, or dynamic desirable mode
on, auto, dynamic desirable, or nonegotiate mode
20. What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3?
Enter the no vlan 2 and the vlan 3 commands in global configuration mode.
Enter the switchport access vlan 3 command in interface configuration mode.
Enter the switchport trunk native vlan 3 command in interface configuration mode.
Enter the no shutdown in interface configuration mode to return it to the default configuration and then configure the port for VLAN 3.
21.
16 300x273 ESwitching Chapter 3 CCNA 3 4.0 2012 100%
Refer to the exhibit. How far is a broadcast frame that is sent by computer A propagated in the LAN domain?

none of the computers will receive the broadcast frame
computer A, computer B, computer C
computer A, computer D, computer G
computer B, computer C
computer D, computer G
computer A, computer B, computer C, computer D, computer E, computer F, computer G, computer H, computer I
Read more ...

ESwitching Chapter 4 CCNA 3 4.0 2012 100% Take Assessment – ESwitching Chapter 4 – CCNA Exploration: LAN Switching and Wireless (Version 4.0) - Answers – 2011 – 2012

Thứ Hai, 10 tháng 9, 2012


1. Which statement is true when VTP is configured on a switched network that incorporates VLANs?
VTP is only compatible with the 802.1Q standard.
VTP adds to the complexity of managing a switched network.
VTP allows a switch to be configured to belong to more than one VTP domain.
VTP dynamically communicates VLAN changes to all switches in the same VTP domain.
2.
156 ESwitching Chapter 4 CCNA 3 4.0 2012 100%
Refer to the exhibit. What information can be learned from the output provided?

It verifies the configured VTP password.
It verifies the VTP domain is configured to use VTP version 2.
It verifies VTP advertisements are being exchanged.
It verifies the VTP domain name is V1.
3.
155 ESwitching Chapter 4 CCNA 3 4.0 2012 100%
Refer to the exhibit. Which two facts can be confirmed by this output? (Choose two.)

If this switch is added to an established network, the other VTP-enabled switches in the same VTP domain will consider their own VLAN information to be more recent than the VLAN information advertised by this switch.
This switch shows no configuration revision errors.
This switch has established two-way communication with the neighboring devices.
This switch is configured to advertise its VLAN configuration to other VTP-enabled switches in the same VTP domain.
This switch is configured to allows the network manager to maximize bandwidth by restricting traffic to specific network devices.
4. A network administrator is replacing a failed switch with a switch that was previously on the network. What precautionary step should the administrator take on the replacement switch to avoid incorrect VLAN information from propagating through the network?
Enable VTP pruning.
Change the VTP domain name.
Change the VTP mode to client.
Change all the interfaces on the switch to access ports.
5. Which two statements are true about VTP pruning? (Choose two.)
Pruning is enabled by default.
Pruning can only be configured on VTP servers.
Pruning must be configured on all VTP servers in the domain.
VLANs on VTP client-mode switches will not be pruned.
Pruning will prevent unnecessary flooding of broadcasts across trunks.
6. What are two features of VTP client mode operation? (Choose two.)
unable to add VLANs
can add VLANs of local significance
forward broadcasts out all ports with no respect to VLAN information
can only pass VLAN management information without adopting changes
can forward VLAN information to other switches in the same VTP domain
7. What does a client mode switch in a VTP management domain do when it receives a summary advertisement with a revision number higher than its current revision number?
It suspends forwarding until a subset advertisement update arrives.
It issues an advertisement request for new VLAN information.
It increments the revision number and forwards it to other switches.
It deletes the VLANs not included in the summary advertisement.
It issues summary advertisements to advise other switches of status changes.
8.
1311 ESwitching Chapter 4 CCNA 3 4.0 2012 100%Refer to the exhibit. Switch1 is not participating in the VTP management process with the other switches that are shown in the exhibit. What are two possible explanations for this? (Choose two.)

Switch1 is in client mode.
Switch2 is in server mode.
Switch2 is in transparent mode.
Switch1 is in a different management domain.
Switch1 has end devices that are connected to the ports.
Switch1 is using VTP version 1, and Switch2 is using VTP version 2.
9.
114 ESwitching Chapter 4 CCNA 3 4.0 2012 100%
Refer to the exhibit. All switches in the network participate in the same VTP domain. What happens when the new switch SW2 with a default configuration and revision number of 0 is inserted in the existing VTP domain Lab_Network?

The switch operates as a VTP client.
The switch operates in VTP transparent mode.
The switch operates as a VTP server and deletes the existing VLAN configurationin the domain.
The switch operates as a VTP server, but does not impact the existing VLANconfiguration in the domain.
The switch operates as a VTP server in the default VTP domain and does not affect the configuration in the existing VTP domain.
10.
1211 ESwitching Chapter 4 CCNA 3 4.0 2012 100%
Refer to the exhibit. Switches SW1 and SW2 are interconnected via a trunk link but failed to exchange VLAN information. The network administrator issued the show vtp status command to troubleshoot the problem. On the basis of the provided command output, what could be done to correct the problem?

Switch SW2 must be configured as a VTP client.
The switches must be interconnected via an access link.
The switches must be configured with the same VTP domain name.
Both switches must be configured with the same VTP revision number.
11. Which two statements describe VTP transparent mode operation? (Choose two.)
Transparent mode switches can create VLAN management information.
Transparent mode switches can add VLANs of local significance only.
Transparent mode switches pass any VLAN management information that they receive to other switches.
Transparent mode switches can adopt VLAN management changes that are received from other switches.
Transparent mode switches originate updates about the status of their VLANS and inform other switches about that status.
12.
041 ESwitching Chapter 4 CCNA 3 4.0 2012 100%
Refer to the exhibit. All switches in the VTP domain are new. Switch SW1 is configured as a VTP server, switches SW2 and SW4 are configured as VTP clients, and switch SW3 is configured in VTP transparent mode. Which switch or switches receive VTP updates and synchronize their VLAN configuration based on those updates?

All switches receive updates and synchronize VLAN information.
Only switch SW2 receives updates and synchronizes VLAN information.
Only switches SW3 and SW4 receive updates and synchronize VLAN information.
SW3 and SW4 receive updates, but only switch SW4 synchronizes VLAN information.
13.
0311 ESwitching Chapter 4 CCNA 3 4.0 2012 100%
Refer to the exhibit. Switch S1 is in VTP server mode. Switches S2 and S3 are in client mode. An administrator accidentally disconnects the cable from F0/1 on S2. What will the effect be on S2?

S2 will retain the VLANs as of the latest known revision.
S2 will automatically transition to VTP transparent mode.
S2 will remove all VLANs from the VLAN database until the cable is reconnected.
S2 will automatically send a VTP request advertisement to 172.17.99.11 when the cable is reconnected.
14. What causes a VTP configured switch to issue a summary advertisement?
A five-minute update timer has elapsed.
A port on the switch has been shutdown.
The switch is changed to the transparent mode.
A new host has been attached to a switch in the management domain.
15. How are VTP messages sent between switches in a domain?
Layer 2 broadcast
Layer 2 multicast
Layer 2 unicast
Layer 3 broadcast
Layer 3 multicast
Layer 3 unicast
16.
05 ESwitching Chapter 4 CCNA 3 4.0 2012 100%
Refer to the exhibit. The switches in the exhibit are connected with trunks within the same VTP management domain. Each switch is labeled with its VTP mode. A new VLAN is added to Switch3. This VLAN does not show up on the other switches. What is the reason for this?

VLANs cannot be created on transparent mode switches.
Transparent mode switches do not forward VTP advertisements.
VLANs created on transparent mode switches are not included in VTPadvertisements.
Server mode switches neither listen to nor forward VTP messages from transparent mode switches.
17. Which two statements are true about the implementation of VTP? (Choose two.)
Switches must be connected via trunks.
The VTP domain name is case sensitive.
Transparent mode switches cannot be configured with new VLANs.
The VTP password is mandatory and case sensitive.
Switches that use VTP must have the same switch name.
18. Which three VTP parameters must be identical on all switches to participate in the same VTP domain? (Choose three.)
revision number
domain name
pruning
mode
domain password
version number
19. What statement describes the default propagation of VLANs on a trunked link?
only the native VLAN
VLANs 1 to 1005
only VLAN 1
all VLANs
no VLANs
20.
061 ESwitching Chapter 4 CCNA 3 4.0 2012 100%
Refer to the exhibit. S2 was previously used in a lab environment and has been added to the production network in server mode. The lab and production networks use the same VTP domain name, so the network administrator made no configuration changes to S2 before adding it to the production network. The lab domain has a higher revision number. After S2 was added to the production network, many computers lost network connectivity. What will solve the problem?

Reset the revision number on S2 with either the delete VTP command or by changing the domain name and then changing it back.
Re-enter all appropriate VLANs, except VLAN 1, manually on Switch1 so that they propagate throughout the network.
Change S1 to transparent VTP mode to reclaim all VLANs in vlan.dat and change back to server mode.
Change S2 to client mode so the VLANs will automatically propagate.
21.
061 ESwitching Chapter 4 CCNA 3 4.0 2012 100%
Refer to the exhibit. S2 was previously used in a lab environment and has been added to the production network in server mode. The lab and production networks use the same VTP domain name, so the network administrator made no configuration changes to S2 before adding it to the production network. The lab domain has a higher revision number. After S2 was added to the production network, many computers lost network connectivity. What will solve the problem?

Reset the revision number on S2 with either the delete VTP command or by changing the domain name and then changing it back.
Reset each switch back to an earlier configuration and then re-enter all appropriate VLANs, except VLAN 1, manually on Switch1 so that they propagate throughout the network.
Change S1 to transparent VTP mode to reclaim all VLANs in vlan.dat and change back to server mode.
Change S2 to client mode so the VLANs will automatically propagate.
22. Which two events will cause the VTP revision number on a VTP server to change? (Choose two.)
adding VLANs
rebooting the switch
changing the VTP domain name
changing the switch to a VTP client
changing interface VLAN designations
Read more ...

Advertisment