CCNA 3 Module 8 V3.1 Answers

CCNA 3 Module 8 V3.1 Answers

1. Which approach to assigning VLAN membership maximizes forwarding performance?

membership by MAC address

membership by logical address

membership by protocol

membership by port

membership by operating system

 

2. What are the characteristics of VLAN1 in a default switch configuration? (Choose three.)

CDP messages are only sent on VLAN1.

VLAN1 is reserved for links between switches.

All switch ports are members of VLAN1.

VLAN1 must be created before ports can be assigned to it.

Only switch port 0/1 is assigned to VLAN1.

An IP address configured on the switch will only apply to ports on VLAN1.

CCNA 3 Module 7 V3.1 Answers

CCNA 3 Module 7 V3.1 Answers

1. Which of the following describe the BIDs used in a spanning tree topology? (Choose two.)

They are sent out by the root bridge only after the inferior BPDUs are sent.

They consist of a bridge priority and MAC address.

Only the root bridge will send out a BID.

They are used by the switches in a spanning tree topology to elect the root bridge.

The switch with the fastest processor will have the lowest BID.

 

2. Which algorithm is used to create a loop free switched topology?

Spanning Tree

Shortest Path First

Dykstra

Rapid Tree

Bellman-Ford

CCNA 3 Module 6 V3.1 Answers

1. A new policy for disaster recovery requires copying all critical network configurations and operating systems to a backup server that will be stored offsite. Which command will create a backup of the switch IOS image on the server?

Switch# copy tftp NVRAM

Switch# copy running-config tftp

Switch# copy flash tftp

Switch# copy IOS tftp

Switch# copy tftp flash

Switch# copy NVRAM tftp

 

2. Which commands can be used to change from Global Configuration mode to Privileged EXEC mode? (Choose three.)

Ctrl+z

disable

end

exit

logout

CCNA 3 Module 5 V3.1 Answers

1. At which layer of the hierarchical design model do users connect to the network?

application

access

distribution

network

core

 

2. Which layer of the hierarchical network design model is often referred to as the backbone?

access

distribution

network

core

workgroup

WAN

CCNA 3 Module 4 V3.1 Answers

CCNA 3 Module 4 V3.1 Answers

1. Which statements are true concerning the shared memory buffering used by an Ethernet switch? (Choose two.)

Frames are processed through a single queue.

All frames are placed in a common memory buffer.

Frames are placed in a queue for the destination port.

A port with a full memory buffer can cause frames for available ports to be delayed.

Each switch port is statically assigned a buffer of equal size.

 

2. What are the functions of routers? (Choose three.)

improving network performance by increasing latency by twenty to thirty percent

segmenting broadcast domains

forwarding packets based on destination network layer addresses

segmenting collision domains

forwarding packets as soon as the destination MAC address is read

developing routing table entries based on source IP addresses

CCNA 3 Module 3 V3.1 Answers

CCNA 3 Module 3 V3.1 Answers

1. Which Layer 4 protocol does EIGRP use to provide reliability for the transmission of routing information?

DUAL

IP

PDM

RTP

TCP

UDP

 

2. Which of the following statements describes the bounded updates used by EIGRP?

Bounded updates are sent to all routers within an autonomous system.

Partial updates are sent only to routers that need the information.

The updates are sent to all routers in the routing table.

Updates are bounded by the routers in the topology table.

CCNA 3 Module 2 V3.1 Answers

CCNA 3 Module 2 V3.1 Answers

1. What does OSPF use to calculate the cost to a destination network?

bandwidth

bandwidth and hop count

bandwidth and reliability

bandwidth, load, and reliablity

 

2. Which of the following should be considered when troubleshooting a problem with the establishment of neighbor relationships between OSPF routers? (Choose three.)

OSPF interval timers mismatch

gateway of last resort not redistributed

interface network type mismatch

no loopback interface configured

administrative distance mismatch

inconsistent authentication configuration

CCNA 3 Module 1 V3.1 Answers

1. Which of the following are contained in the routing updates of classless routing protocols? (Choose two.)

32-bit address

next hop router interface

subnet mask

unicast host address

Layer 2 address

 

2.

CCNA 3 Module 1 V3.1 Answers (1)
Router1 and Router2 shown in the topology have been configured with the no ip subnet-zero command. Which of the following valid VLSM network numbers could be used for the serial link between Router1 and Router2? (Choose two.)

192.168.1.0/30

192.168.1.4/30

192.168.1.8/30

192.168.1.96/30

192.168.1.138/30

192.168.1.190/30

CCNA 2 Practice Final Exam Answer V3.1

1. Which statements are true regarding VTY passwords? (Choose two.)

VTY passwords must be encrypted.

All VTY lines do not need to use the same password.

A VTY password is required to establish telnet sessions.

The VTY password is set with the command line console 0.

The VTY password must be identical with the enable secret password.

 

2.

CCNA 2 Practice Final Exam Answer V3.1 (1)
Refer to the network and routing table entries shown in the graphic. What will happen when a packet destined for network 192.66.7.0 is received by Router A?

It will be forwarded through interface S1.

It will be forwarded to the default route.

It will be directed toward the Internet.

It will be discarded.

CCNA 2 Final Exam Answers V3.1

CCNA 2 Final Exam Answers V3.1

1. What are two possible reasons a router would not load a valid IOS from flash? (Choose two.)

The configuration register is set to 0x2142.

The first boot system command executed in the startup configuration file is boot system rom.

The configuration register is set to 0x2100.

The boot field is set to the hexadecimal number 2.

The startup configuration file is missing or corrupt.

 

2. What are two recommended uses of login banners? (Choose two.)

to display security warning messages

to welcome any user to the router

to warn people about misusing privileged EXEC mode

to identify circuits and other devices connected to the router

to announce a scheduled system shutdown