CCNA 3 Module 6 V3.1 Answers

1. A new policy for disaster recovery requires copying all critical network configurations and operating systems to a backup server that will be stored offsite. Which command will create a backup of the switch IOS image on the server?

Switch# copy tftp NVRAM

Switch# copy running-config tftp

Switch# copy flash tftp

Switch# copy IOS tftp

Switch# copy tftp flash

Switch# copy NVRAM tftp


2. Which commands can be used to change from Global Configuration mode to Privileged EXEC mode? (Choose three.)







3. An administrator is using the switch help facility to find the command elements available to the configure command. What would the user type at the command prompt to display the next set of arguments available in the syntax for this command?

Switch# c?

Switch# c ?

Switch# configure?

Switch# configure ?


4. Which switch command mode should always be password protected?

User Command

User Config


User Privileged

Privileged EXEC


5. What must be done in order to initiate the password recovery procedure on a Catalyst 2900 series switch?

Rename the Flash file.

Enter the setup program by deleting the switch configuration file and rebooting the switch.

Hold down the MODE button during switch startup.

Wait for the STAT LED to turn green while holding down the Break key.

Hold down the Ctrl-Break keys during switch startup.


6. Which protocol is used to copy a new IOS image to a Catalyst switch during the upgrade procedure?







7. A group of hosts has been connected to a new Fast Ethernet switch. Which of the following statements describe this newly created LAN, if the new switch has not yet been configured? (Choose three.)

The hosts will negotiate 10 Mbps or 100 Mbps bandwidth with the switch, as required by their NICs.

The hosts will be in separate broadcast domains.

All of the hosts will be in the same VLAN.

Hosts with 10 Mbps NICs will be unable to communicate with the network.

All of the hosts should be able to send and receive ARP messages from each other.

All of the hosts connected by Ethernet can manage the switch over Telnet or HTTP.


8. A workstation on a switched Ethernet LAN is to be upgraded with a new Fast Ethernet NIC. What should be done to ensure that the workstation will be able to gain access to the network?

delete the configuration file from the switch and reload IOS

deactivate port security on the port until the new host has connected to the network

remove the host from the the management VLAN until the new MAC address has been learned by the switch

delete the VLAN.dat file from flash and reboot the switch

configure the attached switch port for full-duplex mode


9. Although the backup configuration file on a Catalyst 2950 switch has been erased, it is found that VLANs are still configured in the switch. What must be done to clear the configured VLANs?

The vlan.dat file must be erased and the switch reloaded.

The switch flash memory must be purged and the switch rebooted.

The vlan.cfg file must be renamed and IOS restarted.

Each VLAN needs to be deleted individually and the configuration saved.

The switch needs to be restarted, because the old running configuration is still in memory.


10. Which type of cable is used to connect to the console port on a switch?

a crossover cable

a patch cable

a rollover cable

a straight-thru cable


11. From which switch command mode can the configure command be used?


user EXEC

privileged EXEC

command EXEC



12. An old workstation has been replaced with a new one. The workgroup switch, a Catalyst 2950, is not learning the MAC address of the new workstation. A network technician has verified that a static MAC address is not configured on the attached switch port. Which two commands can the technician issue at the switch CLI to further troubleshoot the problem? (Choose two.)

Switch# show port security

Switch# show version

Switch# show startup-config

Switch# clear mac-address-table dynamic

Switch# reload

Switch# delete flash:vlan.dat


13. Which methods can be used to perform the initial configuration of a new switch? (Choose two.)

copy a configuration from a FTP server

type commands manually after entering the Privileged EXEC mode

enter the System Configuration dialog

Telnet to a local server to copy a configuration file

connect to the switch using a web browser


14. How long will a host MAC address remain in the address table of a switch after the host has been turned off or moved to another device?

30 seconds

180 seconds

300 seconds

30 minutes


15. What is the name of the series of tests that execute every time a switch is powered on?



power-on self test

system STAT



16. After powering up a switch, the network technician notices that the system LED is amber. What can the technician assume? (Choose two.)

The switch is negotiating full or half-duplex mode.

The switch has completed negotiating 10 or 100 Mbps speed.

The POST has failed.

The boot sequence is in process.

A fatal error has occurred.

The switch is operating properly and is ready for service.


17. When the copy tftp flash command is used to upgrade the IOS on a switch, which symbol indicates that the image was copied successfully?







18. What color is the System LED if the switch fails the POST?







19. How can a switch be configured to prevent unauthorized hosts from access to a network? (Choose three.)

Host MAC addresses can be statically assigned to each switch port.

Layer 2 access control lists can be used to prevent unauthorized network access.

Unused ports can be shutdown.

Passwords and usernames can be set for each Ethernet switch port.

Unused switch ports can be assigned to the management VLAN.

Port security can be activated to allow only the host with the first MAC address learned on a port to access the network.


20. Which files must be deleted in order to completely remove an existing configuration from a Cisco 2950 switch? (Choose two.)







Leave a Reply