CCNA 3

CCNA 3 Final Exam Answers 2012

1. A wireless client is attempting to establish a connection with a wireless access point. What process does the client use to discover the access points which are available to it?

probing

beaconing

association

authentication

 

2.

LAN Switching and Wireless

Refer to the exhibit. Each switch is shown with its MAC address. Which switch will be elected as the spanning-tree root bridge if the switches are configured with their default priority values?

switch A

switch B

switch C

switch D

switch E

switch F

CCNA 3 Final Exam V4.0 Answers

1. Which security protocol or measure would provide the greatest protection for a wireless LAN?

WPA2

cloaking SSIDs

shared WEP key

MAC address filtering

 

2.

CCNA 1 Final Exam V4.0 Answers
Refer to the exhibit. All trunk links are operational and all VLANs are allowed on all trunk links. An ARP request is sent by computer 5. Which device or devices will receive this message?

only computer 4

computer 3 and RTR-A

computer 4 and RTR-A

computer 1, computer 2, computer 4, and RTR-A

computer 1, computer 2, computer 3, computer 4, and RTR-A

all of the computers and the router

 

CCNA 3 Chapter 7 V4.0 Answers

CCNA 3 Chapter 7 V4.0 Answers

1. Which two statements concerning network security are accurate? (Choose two.)

802.11i uses 3DES for encryption.

Open authentication uses no client or AP verification.

The 802.11i protocol is functionally identical to WPA.

802.11i incorporates a RADIUS server for enterprise authentication.

A wireless client first associates with an AP and then authenticates for network access.

 

2. Which installation method will allow connectivity for a new wireless network?

set up WEP on the access point only

set up open access on both the access point and each device connected to it

set up full encryption on the access point while leaving each device connected to the network open

set up full encryption on each device of the WLAN while leaving the access point settings open

CCNA 3 Chapter 6 V4.0 Answers

1. What are the steps which must be completed in order to enable inter-VLAN routing using router-on-a-stick?

Configure the physical interfaces on the router and enable a routing protocol.

Create the VLANs on the router and define the port membership assignments on the switch.

Create the VLANs on the switch to include port membership assignment and enable a routing protocol on the router.

Create the VLANs on the switch to include port membership assignment and configure subinterfaces on the router matching the VLANs.

 

2.

CCNA 3 Chapter 6 V4.0 Answers (1)
Refer to the exhibit. R1 is routing between networks 192.168.10.0/28 and 192.168.30.0/28. PC1 can ping R1 interface F0/1, but cannot ping PC3. What is causing this failure?

PC1 and PC3 are not in the same VLAN.

The PC3 network address configuration is incorrect.

The S1 interface F0/11 should be assigned to VLAN30.

The F0/0 and F0/1 interfaces on R1 must be configured as trunks.

CCNA 3 Chapter 5 V4.0 Answers

CCNA 3 Chapter 5 V4.0 Answers

1. Which two criteria does a switch use to select the root bridge? (Choose two.)

bridge priority

switching speed

number of ports

base MAC address

switch location

memory size

 

2. Which two statements are true about the default operation of STP in a Layer 2 switched environment that has redundant connections between switches? (Choose two.)

The root switch is the switch with the highest speed ports.

Decisions on which port to block when two ports have equal cost depend on the port priority and identity.

All trunking ports are designated and not blocked.

Root switches have all ports set as root ports.

Non-root switches each have only one root port.

CCNA 3 Chapter 4 V4.0 Answers

1. Which statement is true when VTP is configured on a switched network that incorporates VLANs?

VTP is only compatible with the 802.1Q standard.

VTP adds to the complexity of managing a switched network.

VTP allows a switch to be configured to belong to more than one VTP domain.

VTP dynamically communicates VLAN changes to all switches in the same VTP domain.

 

2.

CCNA 3 Chapter 4 V4.0 Answers (1)
Refer to the exhibit. What information can be learned from the output provided?

It verifies the configured VTP password.

It verifies the VTP domain is configured to use VTP version 2.

It verifies VTP advertisements are being exchanged.

It verifies the VTP domain name is V1.

CCNA 3 Chapter 3 V4.0 Answers

1.

CCNA 3 Chapter 3 (1)
Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2 and assigned hosts on the IP addresses of the VLAN in the 10.1.50.0/24 subnet range. Computer A can communicate with computer B, but not with computer C or computer D. What is the most likely cause of this problem?

There is a native VLAN mismatch.

The link between Switch1 and Switch2 is up but not trunked.

The router is not properly configured for inter-VLAN routing.

VLAN 50 is not allowed to entering the trunk between Switch1 and Switch2.

 

2.

CCNA 3 Chapter 3 (2)
Refer to the exhibit. The exhibited configurations do not allow the switches to form a trunk. What is the most likely cause of this problem?

Cisco switches only support the ISL trunking protocol.

The trunk cannot be negotiated with both ends set to auto.

By default, Switch1 will only allow VLAN 5 across the link.

A common native VLAN should have been configured on the switches.

CCNA 3 Chapter 2 V4.0 Answers

CCNA 3 Chapter 2 V4.0 Answers

1. If a network administrator enters these commands on a switch, what will be the result?
Switch1(config-line)# line console 0
Switch1(config-line)# password cisco
Switch1(config-line)# login

to secure the console port with the password "cisco"

to deny access to the console port by specifying 0 lines are available

to gain access to line configuration mode by supplying the required password

to configure the privilege exec password that will be used for remote access

 

2. Which command line interface (CLI) mode allows users to configure switch parameters, such as the hostname and password?

user EXEC mode

privileged EXEC mode

global configuration mode

interface configuration mode

CCNA 3 Chapter 1 V4.0 Answers

CCNA 3 Chapter 1 V4.0 Answers

1. Which layer of the hierarchical network design model is refered to as the high-speed backbone of the internetwork, where high availability and redundancy are critical?

access layer

core layer

data-link layer

distribution layer

network layer

physical layer

 

2. Which two characteristics are associated with enterprise level switches? (Choose two.)

low port density

high forwarding rate

high latency level

support link aggregation

predefined number of ports