<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Cisco</title><description>The use of IP, EIGRP, Frame Relay, RIPv2, VLANs, Ethernet, and access control lists is all included within the curriculum. CISCO produce a breakdown of the CCNA topics on their website. The exams themselves include a mixture of question types including Multiple choice, drag and drop, Testlets and simulations.</description><managingEditor>noreply@blogger.com (Unknown)</managingEditor><pubDate>Fri, 27 Feb 2026 16:53:45 +0530</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">334</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://testccnastudy.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><copyright>(c) 2012</copyright><itunes:keywords>CCNA,Exam,Answers,CCNA,Final,Exam,Answers,CCNA,Module,Answers,CCNA,Chapter,Answers,CCNA,Test,Answers,CCNA,Questions,and,Answers,CCNA,1,Answers,CCNA,2,Answers,CCNA,3,Answers,CCNA,4,Answers,CCNA,v4,Answers</itunes:keywords><itunes:summary>CCNA 3 Final Exam Answers 2012</itunes:summary><itunes:subtitle>CCNA 3 Final Exam Answers 2012</itunes:subtitle><itunes:category text="Education"><itunes:category text="Educational Technology"/></itunes:category><itunes:author>2012</itunes:author><itunes:owner><itunes:email>noreply@blogger.com</itunes:email><itunes:name>2012</itunes:name></itunes:owner><xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item><title>568A vs. 568B. Which should you use?</title><link>http://testccnastudy.blogspot.com/2012/12/568a-vs-568b-which-should-you-use.html</link><category>568A vs. 568B. Which should you use?</category><pubDate>Sun, 9 Dec 2012 16:09:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-4713753210503780877</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h1 id="section-contenttitle" style="background-color: white; color: #909090; font-family: Tahoma, Geneva, Verdana, sans-serif; font-size: 14px; margin: 0px 10px; padding: 4px 15px 6px;"&gt;
568A vs. 568B. Which should you use?&lt;/h1&gt;
&lt;div id="caption" style="background-color: white; font-family: Tahoma, Geneva, Verdana, sans-serif; font-size: 11px; margin: 25px; padding: 0px; zoom: 1;"&gt;
&lt;span class="image-r" style="display: block; float: right; margin: 0px 0px 10px 15px; padding: 5px;"&gt;&lt;img alt="568A vs. 568B. Which should you use?" border="0" height="250" hspace="0" src="http://ep.yimg.com/ca/I/phonegeek_2237_23546832" style="border: 0px; padding: 0px;" title="568A vs. 568B. Which should you use?" vspace="0" width="400" /&gt;&lt;/span&gt;&lt;div style="padding: 0px;"&gt;
&lt;span style="font-size: x-small; padding: 0px;"&gt;&lt;div style="margin-bottom: 10px; margin-top: 10px; padding: 0px;"&gt;
There are two accepted standards for 8-wire data network jacks (commonly and incorrectly called "RJ-45.")&lt;/div&gt;
&lt;div style="margin-bottom: 10px; margin-top: 10px; padding: 0px;"&gt;
ANSI/TIA/EIA-568-B "Commercial Building Telecommunications Cabling Standard" lists both wiring configurations. T568B is the most prevalent for commercial installations, and was used by AT&amp;amp;T for the original Merlin phone systems. To help you remember, associate "B" with "Bell."&lt;/div&gt;
&lt;div style="margin-bottom: 10px; margin-top: 10px; padding: 0px;"&gt;
ANSI/TIA/EIA-570-B "Residential Telecommunications Cabling Standards" recommends T568A&lt;/div&gt;
&lt;ul style="list-style-image: initial; list-style-position: outside; margin: 0px; padding: 0px;"&gt;
&lt;li style="margin: 0px 0px 0px 15px; padding: 0px;"&gt;If the installation is residential, choose T568A unless other conditions apply (see below). The two inner pairs of 568A are wired the same as a two-line phone jack.&lt;/li&gt;
&lt;li style="margin: 0px 0px 0px 15px; padding: 0px;"&gt;If there is pre-existing voice/data wiring (remodel, moves, adds, changes), duplicate this wiring scheme on any new connection.&lt;/li&gt;
&lt;li style="margin: 0px 0px 0px 15px; padding: 0px;"&gt;If project specifications are available, use the specified wiring configuration.&lt;/li&gt;
&lt;li style="margin: 0px 0px 0px 15px; padding: 0px;"&gt;If components used within the project are internally wired for either T568A or T568B, use that wiring scheme.&lt;/li&gt;
&lt;li style="margin: 0px 0px 0px 15px; padding: 0px;"&gt;Make sure both ends of a cable are wired the same way.&lt;br style="padding: 0px;" /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;table cellpadding="5" cellspacing="0" style="padding: 0px; width: 300px;"&gt;&lt;tbody style="padding: 0px;"&gt;
&lt;tr style="padding: 0px; vertical-align: top;"&gt;&lt;td colspan="3" style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;&lt;strong style="padding: 0px;"&gt;Jack Wiring&amp;nbsp;&lt;/strong&gt;&amp;nbsp;&lt;hr style="padding: 0px;" /&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;tr style="padding: 0px; vertical-align: top;"&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;Pin #&lt;/td&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;T568B&lt;/td&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;T568A&lt;/td&gt;&lt;/tr&gt;
&lt;tr align="left" style="padding: 0px; vertical-align: top;"&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;&lt;strong style="padding: 0px;"&gt;1&lt;/strong&gt;&lt;/td&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;White/Orange&lt;/td&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;White/Green&lt;/td&gt;&lt;/tr&gt;
&lt;tr style="padding: 0px; vertical-align: top;"&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;&lt;strong style="padding: 0px;"&gt;2&lt;/strong&gt;&lt;/td&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;Orange&lt;/td&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;Green&lt;/td&gt;&lt;/tr&gt;
&lt;tr style="padding: 0px; vertical-align: top;"&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;&lt;strong style="padding: 0px;"&gt;3&lt;/strong&gt;&lt;/td&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;White/Green&lt;/td&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;White/Orange&lt;/td&gt;&lt;/tr&gt;
&lt;tr style="padding: 0px; vertical-align: top;"&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;&lt;strong style="padding: 0px;"&gt;4&lt;/strong&gt;&lt;/td&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;Blue&lt;/td&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;Blue&lt;/td&gt;&lt;/tr&gt;
&lt;tr style="padding: 0px; vertical-align: top;"&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;&lt;strong style="padding: 0px;"&gt;5&lt;/strong&gt;&lt;/td&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;White/Blue&lt;/td&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;White/Blue&lt;/td&gt;&lt;/tr&gt;
&lt;tr style="padding: 0px; vertical-align: top;"&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;&lt;strong style="padding: 0px;"&gt;6&lt;/strong&gt;&lt;/td&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;Green&lt;/td&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;Orange&lt;/td&gt;&lt;/tr&gt;
&lt;tr style="padding: 0px; vertical-align: top;"&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;&lt;strong style="padding: 0px;"&gt;7&lt;/strong&gt;&lt;/td&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;White/Brown&lt;/td&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;White/Brown&lt;/td&gt;&lt;/tr&gt;
&lt;tr style="padding: 0px; vertical-align: top;"&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;&lt;strong style="padding: 0px;"&gt;8&lt;/strong&gt;&lt;/td&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;Brown&lt;/td&gt;&lt;td style="font-size: 11px; margin: 0px; padding: 0px; vertical-align: top;"&gt;Brown&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;script type="text/javascript"&gt;
ch_client = "demo";
ch_width = 400;
ch_height = 90;
ch_type = "mpu";
ch_sid = "Chitika Default";
ch_color_site_link = "0000CC";
ch_color_title = "0000CC";
ch_color_border = "FFFFFF";
ch_color_text = "000000";
ch_color_bg = "FFFFFF";
&lt;/script&gt;
&lt;script src="http://scripts.chitika.net/eminimalls/amm.js" type="text/javascript"&gt;
&lt;/script&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">18</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>Easy way to remember the color order of cat 5 cable</title><link>http://testccnastudy.blogspot.com/2012/12/easy-way-to-remember-color-order-of-cat.html</link><category>Easy way to remember the color order of cat 5 cable</category><pubDate>Sun, 9 Dec 2012 15:48:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-1266011788185223594</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, geneva, lucida, lucida grande, arial, helvetica, sans-serif; font-size: x-small;"&gt;"White-Orange Orange ... White-Green Blue ... Blue-White Green ... Brown-White Brown...la la la"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, geneva, lucida, lucida grande, arial, helvetica, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, geneva, lucida, lucida grande, arial, helvetica, sans-serif; font-size: x-small;"&gt;Sing it to yourself about a thousand times while terminating....you'll be able to recite it in your sleep...&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, geneva, lucida, lucida grande, arial, helvetica, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: verdana, geneva, lucida, lucida grande, arial, helvetica, sans-serif; font-size: x-small;"&gt;It worked for me......&lt;/span&gt;&lt;/div&gt;
&lt;script type="text/javascript"&gt;
ch_client = "demo";
ch_width = 400;
ch_height = 90;
ch_type = "mpu";
ch_sid = "Chitika Default";
ch_color_site_link = "0000CC";
ch_color_title = "0000CC";
ch_color_border = "FFFFFF";
ch_color_text = "000000";
ch_color_bg = "FFFFFF";
&lt;/script&gt;
&lt;script src="http://scripts.chitika.net/eminimalls/amm.js" type="text/javascript"&gt;
&lt;/script&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>Video Blogger Template Installations Guide</title><link>http://testccnastudy.blogspot.com/2012/07/video-blogger-template-installations.html</link><category>Video Blogger Template Installations Guide</category><pubDate>Mon, 23 Jul 2012 19:00:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-4221747778766171021</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;h1 class="post-title entry-title" style="background-color: #eeeeee; color: #333333; font-family: arial, serif; font-size: 25px; font-weight: normal; line-height: 25px; margin: 0.25em 0px 0px; padding: 0px 0px 4px;"&gt;Video Blogger Template Installations Guide&lt;/h1&gt;&lt;div class="post-header" style="background-color: #eeeeee; color: #333333; font-family: arial, serif; font-size: 13px;"&gt;&lt;div class="post-header-line-1" style="background-color: #f4f4f4; background-position: initial initial; background-repeat: initial initial; border: 1px solid rgb(238, 238, 238); margin: 0px 0px 10px; padding: 10px;"&gt;&lt;span class="post-author vcard"&gt;Posted by&amp;nbsp;&lt;span class="fn"&gt;Free Blogger Template&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="post-timestamp"&gt;at&amp;nbsp;&lt;a class="timestamp-link" href="http://www.blogteacher.net/2011/04/video-blogger-template-instalations.html" rel="bookmark" style="color: #fe6601; text-decoration: none;" title="permanent link"&gt;&lt;abbr class="published" title="2011-04-15T00:17:00-07:00"&gt;12:17 AM&lt;/abbr&gt;&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="post-comment-link"&gt;&lt;/span&gt;&lt;span class="post-labels"&gt;| Labels:&amp;nbsp;&lt;a href="http://www.blogteacher.net/search/label/Templates%20Instruction" rel="tag" style="color: #fe6601; text-decoration: none;"&gt;Templates Instruction&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="post-body entry-content" style="background-color: #eeeeee; color: #333333; font-family: arial, serif; font-size: 13px; line-height: 1.6em; margin: 0px 0px 0.75em;"&gt;Template Name: Video Blogger Template&lt;br /&gt;
By : www.freebloggertemplate.info&lt;br /&gt;
Download link:&amp;nbsp;&lt;a href="http://www.freebloggertemplate.info/2011/04/video-blogger-template.html" style="color: #fe6601; text-decoration: none;"&gt;Click here&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;b&gt;# HOW TO POST A VIDEO&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
Video Blogger Template only support&amp;nbsp;&lt;b&gt;video URL from Youtube&lt;/b&gt;.&lt;br /&gt;
A. Post a video only&lt;br /&gt;
Go to Youtube -&amp;gt; find a video -&amp;gt; Copy the url -&amp;gt; paste the url to&amp;nbsp;&lt;b&gt;Blogger post box&lt;/b&gt;.&lt;br /&gt;
&lt;a href="http://www.blogger.com/post-create.g?blogID=6163424516472512946" name="more"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjiJ8BOXwUkWTRoNJV3KESl30ZMkDIwivwQ3EuFF9nKEWq0thDpCnWmAHAxonya9_IxaQYDT5GYuE9NnwTixucMQ8_zZltAhMxNRQzZZKM32-bTe22GbVCM-wI7yaUp5UwYFz4ABIvGpA/s1600/1.JPG" imageanchor="1" style="color: #fe6601; margin-left: 1em; margin-right: 1em; text-decoration: none;"&gt;&lt;img border="0" height="123" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjiJ8BOXwUkWTRoNJV3KESl30ZMkDIwivwQ3EuFF9nKEWq0thDpCnWmAHAxonya9_IxaQYDT5GYuE9NnwTixucMQ8_zZltAhMxNRQzZZKM32-bTe22GbVCM-wI7yaUp5UwYFz4ABIvGpA/s400/1.JPG" style="-webkit-box-shadow: rgba(0, 0, 0, 0.0976563) 1px 1px 5px; background-color: white; background-position: initial initial; background-repeat: initial initial; border: 1px solid rgb(238, 238, 238); box-shadow: rgba(0, 0, 0, 0.0976563) 1px 1px 5px; padding: 5px;" width="400" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRkZegKor8JkbZ7_FCxITGDGmhSbGxeAah9hPFjb8rXo8_Mj8y56DQYd5teLavJySAYXMXNpN9uNoJnsg_3ZUN6RW8oqYskG2R-ih0yRhuYkwTl2lHFHaByhxRXl6sQlTZgIHXytG0lw0/s1600/2.JPG" imageanchor="1" style="color: #fe6601; margin-left: 1em; margin-right: 1em; text-decoration: none;"&gt;&lt;img border="0" height="144" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRkZegKor8JkbZ7_FCxITGDGmhSbGxeAah9hPFjb8rXo8_Mj8y56DQYd5teLavJySAYXMXNpN9uNoJnsg_3ZUN6RW8oqYskG2R-ih0yRhuYkwTl2lHFHaByhxRXl6sQlTZgIHXytG0lw0/s400/2.JPG" style="-webkit-box-shadow: rgba(0, 0, 0, 0.0976563) 1px 1px 5px; background-color: white; background-position: initial initial; background-repeat: initial initial; border: 1px solid rgb(238, 238, 238); box-shadow: rgba(0, 0, 0, 0.0976563) 1px 1px 5px; padding: 5px;" width="400" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9MkWLS0tigyrGJ_TxGB_9W7Bff1jtAevaE53dpfEk_Ht0fz5IalbVoWxUw-LrqyODMcqdXimvFwx5uA060_QPZlYwrU9zixHItrUYPwUF0fsegyvd6wOby8a8N1kNLxWpLl2u8kMrJKM/s1600/3.JPG" imageanchor="1" style="color: #fe6601; margin-left: 1em; margin-right: 1em; text-decoration: none;"&gt;&lt;img border="0" height="145" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9MkWLS0tigyrGJ_TxGB_9W7Bff1jtAevaE53dpfEk_Ht0fz5IalbVoWxUw-LrqyODMcqdXimvFwx5uA060_QPZlYwrU9zixHItrUYPwUF0fsegyvd6wOby8a8N1kNLxWpLl2u8kMrJKM/s400/3.JPG" style="-webkit-box-shadow: rgba(0, 0, 0, 0.0976563) 1px 1px 5px; background-color: white; background-position: initial initial; background-repeat: initial initial; border: 1px solid rgb(238, 238, 238); box-shadow: rgba(0, 0, 0, 0.0976563) 1px 1px 5px; padding: 5px;" width="400" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
B. Post a video with summary&lt;br /&gt;
Use "[starttext]" before and "[endtext]" after summary.&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjy8UbD6v8fIYiaVBDiPZMVzirgSGmLgW4wmLIt7KCEYm00W2Z12DBgEZIoSVTj_iwBrUw8SM6_X_8n6PLZIcIELk2RSPqnLFrwM1nw4nso5G214zX4g3PM0p6ftom9RKa3ozGx6QtaV_w/s1600/4.JPG" imageanchor="1" style="color: #fe6601; margin-left: 1em; margin-right: 1em; text-decoration: none;"&gt;&lt;img border="0" height="201" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjy8UbD6v8fIYiaVBDiPZMVzirgSGmLgW4wmLIt7KCEYm00W2Z12DBgEZIoSVTj_iwBrUw8SM6_X_8n6PLZIcIELk2RSPqnLFrwM1nw4nso5G214zX4g3PM0p6ftom9RKa3ozGx6QtaV_w/s400/4.JPG" style="-webkit-box-shadow: rgba(0, 0, 0, 0.0976563) 1px 1px 5px; background-color: white; background-position: initial initial; background-repeat: initial initial; border: 1px solid rgb(238, 238, 238); box-shadow: rgba(0, 0, 0, 0.0976563) 1px 1px 5px; padding: 5px;" width="400" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;b&gt;# SETUP TOP MENU NAVIGATION&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
Go to "Edit HTML" page&lt;br /&gt;
Search the codes like below&lt;br /&gt;
&lt;code style="background-color: #fafafa; background-position: initial initial; background-repeat: initial initial; border: 1px solid rgb(85, 85, 85); clear: both; color: #666666; display: block; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; line-height: 12px; margin: 10px 0px; max-height: 200px; overflow: auto; padding: 10px;"&gt;&amp;lt;div id='page_nav'&amp;gt;&amp;lt;!-- page nav html--&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li class='hometab'&amp;gt;&amp;lt;a href='/'&amp;gt;Home&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li class='page_item'&amp;gt;&amp;lt;a href='&lt;span style="color: blue;"&gt;#&lt;/span&gt;' title='About'&amp;gt;&lt;span style="color: red;"&gt;About&lt;/span&gt;&amp;lt;/a&amp;gt;&lt;br /&gt;
&amp;lt;ul class='children'&amp;gt;&lt;br /&gt;
&amp;lt;li class='page_item'&amp;gt;&amp;lt;a href='&lt;span style="color: blue;"&gt;#&lt;/span&gt;' title='Sub Page 1'&amp;gt;&lt;span style="color: red;"&gt;Sub Page 1&lt;/span&gt;&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li class='page_item'&amp;gt;&amp;lt;a href='&lt;span style="color: blue;"&gt;#&lt;/span&gt;' title='Sub Page 2'&amp;gt;&lt;span style="color: red;"&gt;Sub Page 2&lt;/span&gt;&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li class='page_item'&amp;gt;&amp;lt;a href='&lt;span style="color: blue;"&gt;#&lt;/span&gt;' title='FAQs'&amp;gt;&lt;span style="color: red;"&gt;FAQs&lt;/span&gt;&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li class='page_item'&amp;gt;&amp;lt;a href='&lt;span style="color: blue;"&gt;#&lt;/span&gt;' title='Terms'&amp;gt;&lt;span style="color: red;"&gt;Terms&lt;/span&gt;&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li class='page_item'&amp;gt;&amp;lt;a href='&lt;span style="color: blue;"&gt;#&lt;/span&gt;' title='Archive Pages'&amp;gt;&lt;span style="color: red;"&gt;Archive Pages&lt;/span&gt;&amp;lt;/a&amp;gt;&lt;br /&gt;
&amp;lt;ul class='children'&amp;gt;&lt;br /&gt;
&amp;lt;li class='page_item'&amp;gt;&amp;lt;a href='&lt;span style="color: blue;"&gt;#&lt;/span&gt;' title='Sub Page in 1'&amp;gt;&lt;span style="color: red;"&gt;Sub Page in 1&lt;/span&gt;&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li class='page_item'&amp;gt;&amp;lt;a href='&lt;span style="color: blue;"&gt;#&lt;/span&gt;' title='Sub Page in 2'&amp;gt;&lt;span style="color: red;"&gt;Sub Page in 2&lt;/span&gt;&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li class='page_item'&amp;gt;&amp;lt;a href='&lt;span style="color: blue;"&gt;#&lt;/span&gt;' title='Site Map'&amp;gt;&lt;span style="color: red;"&gt;Site Map&lt;/span&gt;&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt; &amp;lt;!-- page nav #end --&amp;gt;&lt;/code&gt;&lt;br /&gt;
Change "#" with your link anchor/url&lt;br /&gt;
Change "red text" with your text anchor&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;b&gt;# SETUP CATEGORIES MENU NAVIGATION&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
Go to "Edit HTML" page&lt;br /&gt;
Search the codes like below&lt;br /&gt;
&lt;code style="background-color: #fafafa; background-position: initial initial; background-repeat: initial initial; border: 1px solid rgb(85, 85, 85); clear: both; color: #666666; display: block; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; line-height: 12px; margin: 10px 0px; max-height: 200px; overflow: auto; padding: 10px;"&gt;&amp;lt;div id='main_nav'&amp;gt; &amp;lt;!-- main_nav html --&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li class='cat-item'&amp;gt;&amp;lt;a href='/search/label/&lt;span style="color: red;"&gt;Entertainment&lt;/span&gt;'&amp;gt;&lt;span style="color: red;"&gt;Entertainment&lt;/span&gt;&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li class='cat-item'&amp;gt;&amp;lt;a href='/search/label/&lt;span style="color: red;"&gt;Funny&lt;/span&gt;'&amp;gt;&lt;span style="color: red;"&gt;Funny&lt;/span&gt;&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li class='cat-item'&amp;gt;&amp;lt;a href='/search/label/&lt;span style="color: red;"&gt;Health&lt;/span&gt;'&amp;gt;&lt;span style="color: red;"&gt;Health&lt;/span&gt;&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li class='cat-item'&amp;gt;&amp;lt;a href='/search/label/&lt;span style="color: red;"&gt;Music&lt;/span&gt;'&amp;gt;&lt;span style="color: red;"&gt;Music&lt;/span&gt;&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li class='cat-item'&amp;gt;&amp;lt;a href='/search/label/&lt;span style="color: red;"&gt;Others&lt;/span&gt;'&amp;gt;&lt;span style="color: red;"&gt;Others&lt;/span&gt;&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li class='cat-item'&amp;gt;&amp;lt;a href='/search/label/&lt;span style="color: red;"&gt;Sports&lt;/span&gt;'&amp;gt;&lt;span style="color: red;"&gt;Sports&lt;/span&gt;&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li class='cat-item'&amp;gt;&amp;lt;a href='/search/label/&lt;span style="color: red;"&gt;Blog&lt;/span&gt;'&amp;gt;&lt;span style="color: red;"&gt;Blog&lt;/span&gt;&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;/code&gt;&lt;br /&gt;
Change "red text" with your own category&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;b&gt;# SETUP SLIDE VIDEO&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
Go to "Edit HTML" page&lt;br /&gt;
Search the codes like below&lt;br /&gt;
&lt;code style="background-color: #fafafa; background-position: initial initial; background-repeat: initial initial; border: 1px solid rgb(85, 85, 85); clear: both; color: #666666; display: block; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; line-height: 12px; margin: 10px 0px; max-height: 200px; overflow: auto; padding: 10px;"&gt;&amp;lt;li&amp;gt;&lt;br /&gt;
&amp;lt;div class='video_section'&amp;gt;&lt;br /&gt;
&amp;lt;object height='385' width='640'&amp;gt;&amp;lt;param name='movie' value='http://www.youtube.com/v/&lt;span style="color: red;"&gt;2Y2BEhvS-ck&lt;/span&gt;'/&amp;gt;&amp;lt;param name='allowFullScreen' value='true'/&amp;gt;&amp;lt;param name='allowscriptaccess' value='always'/&amp;gt;&amp;lt;embed allowfullscreen='true' allowscriptaccess='always' height='385' src='http://www.youtube.com/v/&lt;span style="color: red;"&gt;2Y2BEhvS-ck&lt;/span&gt;' type='application/x-shockwave-flash' width='640' wmode='transparent'/&amp;gt;&amp;lt;/object&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt; &amp;lt;a href='&lt;span style="color: blue;"&gt;#&lt;/span&gt;' rel='bookmark' title='&lt;span style="color: #6aa84f;"&gt;Inkheart Movie&lt;/span&gt;'&amp;gt;&lt;span style="color: #38761d;"&gt;Inkheart Movie&lt;/span&gt;&amp;lt;/a&amp;gt; &amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
&amp;lt;div class='video_section'&amp;gt;&lt;br /&gt;
&amp;lt;object height='385' width='640'&amp;gt;&amp;lt;param name='movie' value='http://www.youtube.com/v/&lt;span style="color: red;"&gt;FNQowwwwYa0&lt;/span&gt;'/&amp;gt;&amp;lt;param name='allowFullScreen' value='true'/&amp;gt;&amp;lt;param name='allowscriptaccess' value='always'/&amp;gt;&amp;lt;embed allowfullscreen='true' allowscriptaccess='always' height='385' src='http://www.youtube.com/v/&lt;span style="color: red;"&gt;FNQowwwwYa0&lt;/span&gt;' type='application/x-shockwave-flash' width='640' wmode='transparent'/&amp;gt;&amp;lt;/object&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt; &amp;lt;a href='&lt;span style="color: blue;"&gt;#&lt;/span&gt;' rel='bookmark' title='&lt;span style="color: #38761d;"&gt;Iron Man 2 Trailer 2 (OFFICIAL)&lt;/span&gt;'&amp;gt;&lt;span style="color: #38761d;"&gt;Iron Man 2 Trailer 2 (OFFICIAL)&lt;/span&gt;&amp;lt;/a&amp;gt; &amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
&amp;lt;div class='video_section'&amp;gt;&lt;br /&gt;
&amp;lt;object height='385' width='480'&amp;gt;&amp;lt;param name='movie' value='http://www.youtube.com/v/&lt;span style="color: red;"&gt;F9bV_v9b8go&lt;/span&gt;'/&amp;gt;&amp;lt;param name='allowFullScreen' value='true'/&amp;gt;&amp;lt;param name='allowscriptaccess' value='always'/&amp;gt;&amp;lt;embed allowfullscreen='true' allowscriptaccess='always' height='385' src='http://www.youtube.com/v/&lt;span style="color: red;"&gt;F9bV_v9b8go&lt;/span&gt;' type='application/x-shockwave-flash' width='480' wmode='transparent'/&amp;gt;&amp;lt;/object&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt; &amp;lt;a href='&lt;span style="color: blue;"&gt;#&lt;/span&gt;' rel='bookmark' title='&lt;span style="color: #38761d;"&gt;Kicked In The Nuts World Record Holder&lt;/span&gt;'&amp;gt;&lt;span style="color: #38761d;"&gt;Kicked In The Nuts World Record Holder&lt;/span&gt;&amp;lt;/a&amp;gt; &amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
&amp;lt;div class='video_section'&amp;gt;&lt;br /&gt;
&amp;lt;object height='385' width='640'&amp;gt;&amp;lt;param name='movie' value='http://www.youtube.com/v/&lt;span style="color: red;"&gt;Pki6jbSbXIY&lt;/span&gt;'/&amp;gt;&amp;lt;param name='allowFullScreen' value='true'/&amp;gt;&amp;lt;param name='allowscriptaccess' value='always'/&amp;gt;&amp;lt;embed allowfullscreen='true' allowscriptaccess='always' height='385' src='http://www.youtube.com/v/&lt;span style="color: red;"&gt;Pki6jbSbXIY&lt;/span&gt;' type='application/x-shockwave-flash' width='640' wmode='transparent'/&amp;gt;&amp;lt;/object&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt; &amp;lt;a href='&lt;span style="color: #38761d;"&gt;#&lt;/span&gt;' rel='bookmark' title='&lt;span style="color: #38761d;"&gt;Lord of the Rings: Fellowship of the ring trailer&lt;/span&gt;'&amp;gt;&lt;span style="color: #38761d;"&gt;Lord of the Rings: Fellowship of the ring trailer&lt;/span&gt;&amp;lt;/a&amp;gt; &amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
&amp;lt;div class='video_section'&amp;gt;&lt;br /&gt;
&amp;lt;object height='385' width='640'&amp;gt;&amp;lt;param name='movie' value='http://www.youtube.com/v/&lt;span style="color: red;"&gt;sjSG6z_13-Q&lt;/span&gt;'/&amp;gt;&amp;lt;param name='allowFullScreen' value='true'/&amp;gt;&amp;lt;param name='allowscriptaccess' value='always'/&amp;gt;&amp;lt;embed allowfullscreen='true' allowscriptaccess='always' height='385' src='http://www.youtube.com/v/&lt;span style="color: red;"&gt;sjSG6z_13-Q&lt;/span&gt;' type='application/x-shockwave-flash' width='640' wmode='transparent'/&amp;gt;&amp;lt;/object&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt; &amp;lt;a href='&lt;span style="color: blue;"&gt;#&lt;/span&gt;' rel='bookmark' title='&lt;span style="color: #38761d;"&gt;Miley Cyrus – Cant Be Tamed&lt;/span&gt;'&amp;gt;&lt;span style="color: #38761d;"&gt;Miley Cyrus - Cant Be Tamed&lt;/span&gt;&amp;lt;/a&amp;gt; &amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;/code&gt;&lt;br /&gt;
Red text = Code of video&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1jq_fIIGhx9FSa28_3Q4mVvIQoM2wdyrXiw5TehnLbpl9xhWIwYvuzeAlXKAJXpRCfFdvQuEPnRG5CbZ4_dVX3mgfSPooogIc1XNfKEuiHVsbo5TvIVMa0CNTPVfiIMwXotbMQ8hduxw/s1600/5.JPG" imageanchor="1" style="color: #fe6601; margin-left: 1em; margin-right: 1em; text-decoration: none;"&gt;&lt;img border="0" height="107" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1jq_fIIGhx9FSa28_3Q4mVvIQoM2wdyrXiw5TehnLbpl9xhWIwYvuzeAlXKAJXpRCfFdvQuEPnRG5CbZ4_dVX3mgfSPooogIc1XNfKEuiHVsbo5TvIVMa0CNTPVfiIMwXotbMQ8hduxw/s400/5.JPG" style="-webkit-box-shadow: rgba(0, 0, 0, 0.0976563) 1px 1px 5px; background-color: white; background-position: initial initial; background-repeat: initial initial; border: 1px solid rgb(238, 238, 238); box-shadow: rgba(0, 0, 0, 0.0976563) 1px 1px 5px; padding: 5px;" width="400" /&gt;&lt;/a&gt;&lt;br /&gt;
# = url&lt;br /&gt;
Green text = Title of video&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;b&gt;# RECENT VIDEO WIDGET&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
Go to "page elements" -&amp;gt; "add a gadget" sidebar -&amp;gt; "HTML/Javascript"&lt;br /&gt;
Copy this codes&lt;br /&gt;
&lt;code style="background-color: #fafafa; background-position: initial initial; background-repeat: initial initial; border: 1px solid rgb(85, 85, 85); clear: both; color: #666666; display: block; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; line-height: 12px; margin: 10px 0px; max-height: 200px; overflow: auto; padding: 10px;"&gt;&amp;lt;script type='text/javascript'&amp;gt;&lt;br /&gt;
//&amp;lt;![CDATA[&lt;br /&gt;
function showrecentpostswiththumbs(json) {&lt;br /&gt;
document.write('&amp;lt;ul class="recent_posts_with_thumbs"&amp;gt;');&lt;br /&gt;
for (var i = 0; i &amp;lt; numposts; i++) {&lt;br /&gt;
var entry = json.feed.entry[i];&lt;br /&gt;
var posttitle = entry.title.$t;&lt;br /&gt;
var posturl;if (i == json.feed.entry.length) break;&lt;br /&gt;
for (var k = 0; k &amp;lt; entry.link.length;k++){&lt;br /&gt;
if(entry.link[k].rel=='replies'&amp;amp;&amp;amp;entry.link[k].type=='text/html'){&lt;br /&gt;
var commenttext=entry.link[k].title;&lt;br /&gt;
var commenturl=entry.link[k].href;&lt;br /&gt;
}&lt;br /&gt;
if (entry.link[k].rel == 'alternate') {&lt;br /&gt;
posturl = entry.link[k].href;break;&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
if("content"in entry){&lt;br /&gt;
var postcontent=entry.content.$t;&lt;br /&gt;
}&lt;br /&gt;
var vidid = postcontent.substring(postcontent.indexOf("http://www.youtube.com/watch?v=")+31,postcontent.indexOf("&amp;lt;"));&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
try {thumburl='http://i2.ytimg.com/vi/'+vidid+'/default.jpg';}catch (error){&lt;br /&gt;
thumburl='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0ZmvP5yCKOcX5CfupYovDT8lYe1PloypRi8PzJQX5xEyEDYvLUMQ7OPZpPs88GX4MHfVpujdnTd4FG-1uV54oziwgUGQmo7u5UWk2mgUX37Ulyp2fg57OcOpDCTtTg_9Kr7cToF5tvA/s800/noimagethumb.png';&lt;br /&gt;
}&lt;br /&gt;
var postdate = entry.published.$t;&lt;br /&gt;
var cdyear = postdate.substring(0,4);&lt;br /&gt;
var cdmonth = postdate.substring(5,7);&lt;br /&gt;
var cdday = postdate.substring(8,10);&lt;br /&gt;
var monthnames = new Array();&lt;br /&gt;
monthnames[1] = "Jan";monthnames[2] = "Feb";monthnames[3] = "Mar";monthnames[4] = "Apr";monthnames[5] = "May";monthnames[6] = "Jun";monthnames[7] = "Jul";monthnames[8] = "Aug";monthnames[9] = "Sep";monthnames[10] = "Oct";monthnames[11] = "Nov";monthnames[12] = "Dec";&lt;br /&gt;
document.write('&amp;lt;li class="clearfix"&amp;gt;');&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
if(showpostthumbnails==true)&lt;br /&gt;
document.write('&amp;lt;a href="'+ posturl + '"&amp;gt;&amp;lt;img class="recent_thumb" src="'+thumburl+'"/&amp;gt;&amp;lt;/a&amp;gt;');&lt;br /&gt;
document.write('&amp;lt;div class="recent_video_title"&amp;gt;&amp;lt;a href="'+posturl+'" target ="_top"&amp;gt;'+posttitle+'&amp;lt;/a&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;br&amp;gt;');&lt;br /&gt;
var textinside = postcontent.substring(postcontent.indexOf("[starttext]")+11,postcontent.indexOf("[endtext]"));&lt;br /&gt;
var re = /&amp;lt;\S[^&amp;gt;]*&amp;gt;/g;&lt;br /&gt;
postcontent = textinside.replace(re, "");&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
if (showpostsummary == true) {&lt;br /&gt;
&lt;br /&gt;
if (postcontent.length &amp;lt; numchars) {&lt;br /&gt;
document.write('&amp;lt;div class="recent_video_desc"&amp;gt;');&lt;br /&gt;
document.write(postcontent);&lt;br /&gt;
document.write('&amp;lt;/div&amp;gt;');}&lt;br /&gt;
else {&lt;br /&gt;
document.write('&amp;lt;div class="recent_video_desc"&amp;gt;');&lt;br /&gt;
postcontent = postcontent.substring(0, numchars);&lt;br /&gt;
var quoteEnd = postcontent.lastIndexOf(" ");&lt;br /&gt;
postcontent = postcontent.substring(0,quoteEnd);&lt;br /&gt;
document.write(postcontent + '...');&lt;br /&gt;
document.write('&amp;lt;/div&amp;gt;');}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
var towrite='';var flag=0;&lt;br /&gt;
document.write('&amp;lt;br&amp;gt;&amp;lt;div class="recent_video_footer"&amp;gt;');&lt;br /&gt;
&lt;br /&gt;
if(showpostdate==true) {towrite=towrite+monthnames[parseInt(cdmonth,10)]+' '+cdday+' , '+cdyear;flag=1;}&lt;br /&gt;
&lt;br /&gt;
if(showcommentnum==true)&lt;br /&gt;
{&lt;br /&gt;
if (flag==1) {towrite=towrite+' | ';}&lt;br /&gt;
if(commenttext=='1 Comments') commenttext='1 Comment';&lt;br /&gt;
if(commenttext=='0 Comments') commenttext='No Comments';&lt;br /&gt;
commenttext = '&amp;lt;a href="'+commenturl+'" target ="_top"&amp;gt;'+commenttext+'&amp;lt;/a&amp;gt;';&lt;br /&gt;
towrite=towrite+commenttext;&lt;br /&gt;
flag=1;&lt;br /&gt;
;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
document.write(towrite);&lt;br /&gt;
&lt;br /&gt;
document.write('&amp;lt;/div&amp;gt;&amp;lt;/li&amp;gt;');&lt;br /&gt;
if(displayseparator==true)&lt;br /&gt;
if (i!=(numposts-1))&lt;br /&gt;
document.write('&amp;lt;hr size=0.5&amp;gt;');&lt;br /&gt;
&lt;br /&gt;
}document.write('&amp;lt;/ul&amp;gt;');&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
//]]&amp;gt;&lt;br /&gt;
&amp;lt;/script&amp;gt;&lt;br /&gt;
&amp;lt;script style="text/javascript"&amp;gt;&lt;br /&gt;
var numposts = 5;&lt;br /&gt;
var showpostthumbnails = true;&lt;br /&gt;
var displaymore = true;&lt;br /&gt;
var displayseparator = false;&lt;br /&gt;
var showcommentnum = true;&lt;br /&gt;
var showpostdate = true;&lt;br /&gt;
var showpostsummary = false;&lt;br /&gt;
var numchars = 50;&lt;br /&gt;
&amp;lt;/script&amp;gt;&lt;br /&gt;
&amp;lt;script src="/feeds/posts/default?orderby=published&amp;amp;alt=json-in-script&amp;amp;callback=showrecentpostswiththumbs"&amp;gt;&amp;lt;/script&amp;gt;&lt;br /&gt;
&amp;lt;div class="clear"/&amp;gt;&amp;lt;/div&amp;gt;&lt;/code&gt;&lt;br /&gt;
var numposts = 5; &amp;lt;- you can shange "5" with number of videos you wish to show&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;blink&gt;&lt;div style="border: 1px solid rgb(170, 170, 170); font-size: 20px; padding: 10px;"&gt;&lt;b&gt;&lt;a href="http://www.freebloggertemplate.info/2012/03/about-templates-error-or-not-work.html" rel="nofollow" style="color: red; text-decoration: none;"&gt;Click here for solution of Templates Error or Not Work Properly, slideshow not work, etc&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;&lt;/blink&gt;&lt;/div&gt;&lt;script type="text/javascript"&gt;
ch_client = "demo";
ch_width = 400;
ch_height = 90;
ch_type = "mpu";
ch_sid = "Chitika Default";
ch_color_site_link = "0000CC";
ch_color_title = "0000CC";
ch_color_border = "FFFFFF";
ch_color_text = "000000";
ch_color_bg = "FFFFFF";
&lt;/script&gt; &lt;script src="http://scripts.chitika.net/eminimalls/amm.js" type="text/javascript"&gt;
&lt;/script&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjiJ8BOXwUkWTRoNJV3KESl30ZMkDIwivwQ3EuFF9nKEWq0thDpCnWmAHAxonya9_IxaQYDT5GYuE9NnwTixucMQ8_zZltAhMxNRQzZZKM32-bTe22GbVCM-wI7yaUp5UwYFz4ABIvGpA/s72-c/1.JPG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>CCNA Interview Questions - Ccna Latest questions</title><link>http://testccnastudy.blogspot.com/2012/06/ccna-interview-questions-ccna-latest.html</link><category>CCNA Interview Questions - Ccna Latest questions</category><pubDate>Tue, 26 Jun 2012 19:49:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-4972792279235920676</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;span style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;"&gt;In 1992 main products of Cisco were Gateway Servers i.e.&amp;nbsp;&lt;/span&gt;&lt;br style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;" /&gt;&lt;span style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;"&gt;AGS – Advanced Gateway Server&lt;/span&gt;&lt;br style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;" /&gt;&lt;span style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;"&gt;MGS – Mid-Range Gateway Server&lt;/span&gt;&lt;br style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;" /&gt;&lt;span style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;"&gt;IGS – Integrated Gateway Server&lt;/span&gt;&lt;br style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;" /&gt;&lt;span style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;"&gt;CGS – Compact Gateway Server&lt;/span&gt;&lt;br style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;" /&gt;&lt;span style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;"&gt;AGS+ - Advanced Gateway Server Plus&lt;/span&gt;&lt;br style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;" /&gt;&lt;br style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;" /&gt;&lt;span style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;"&gt;Routers are of two types, Modular and Non-Modular&lt;/span&gt;&lt;br style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;" /&gt;&lt;span style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;"&gt;1.Modular&lt;/span&gt;&lt;br style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;" /&gt;&lt;span style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;"&gt;Routers will not have fix interfaces, can be added or removed whenever required.&lt;/span&gt;&lt;br style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;" /&gt;&lt;span style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;"&gt;2.Non-Modular&lt;/span&gt;&lt;br style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;" /&gt;&lt;span style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;"&gt;Routers will have fix interfaces, cannot be added or removed, they are fixed.&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: tahoma, verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 13px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;script type="text/javascript"&gt;
ch_client = "demo";
ch_width = 400;
ch_height = 90;
ch_type = "mpu";
ch_sid = "Chitika Default";
ch_color_site_link = "0000CC";
ch_color_title = "0000CC";
ch_color_border = "FFFFFF";
ch_color_text = "000000";
ch_color_bg = "FFFFFF";
&lt;/script&gt; &lt;script src="http://scripts.chitika.net/eminimalls/amm.js" type="text/javascript"&gt;
&lt;/script&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>CCNA 3 exploration - Final Exam (update - 1)</title><link>http://testccnastudy.blogspot.com/2012/06/ccna-3-exploration-final-exam-update-1.html</link><category>CCNA 3 - Final Exam</category><pubDate>Thu, 21 Jun 2012 10:14:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-3410072134399288087</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;span style="line-height: 19px;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;1&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;In a three-layer hierarchical network design, which distribution layer function delineates broadcast domains?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;routing between VLANs***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;aggregating traffic flows&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;providing redundant links&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;reducing the network diameter&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;2&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;What two methods can be used to remove MAC address table entries from a switch? (Choose two.)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Power cycle the switch to clear all dynamically learned addresses. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The clear switching-tables command will remove statically configured entries.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The clear mac-address-table command will remove statically and dynamically configured table entries.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The erase flash command will clear all statically configured table entries.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Statically configured MAC addresses will automatically be removed from the address table 300 minutes after the last activity on a switch port.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;3&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;only hosts A and B&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;only hosts A, B, and C ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;only hosts A, B, C, and D&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;only hosts A, B, C, and E&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;4&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;What impact does the use of the mdix auto configuration command have on an Ethernet interface on a switch?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;automatically detects duplex settings&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;automatically detects interface speed&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;automatically detects copper cable type ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;automatically assigns the first detected MAC address to an interface&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;5&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Which three statements are correct concerning the default configuration of a new switch? (Choose three.)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;It is configured in VTP server mode.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;STP is automatically enabled. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The first VTY line is automatically configured to allow remote connections.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;VLAN1 is configured with a management IP address.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;All switch ports are assigned to VLAN1. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The enable password is configured as cisco.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;6&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;While configuring a new switch, a network administrator configures the switch as an HTTP server. What benefits does this configuration provide?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;This allows the switch to host web pages for the network.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;This allows remote VPN connections to the switch over the Internet.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;This is required if a web server or web farm is attached to the switch.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;This allows web-based configuration tools to be used with the switch. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;7&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. The configuration steps that are listed in the exhibit have been entered in switch S1 via the console. Subsequent attempts to telnet to the switch are not successful. What is causing the problem?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The switch must be configured with SSH version 1.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The transport input command must specify Telnet access. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The RSA keys must be returned to zero before SSH will permit Telnet access.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The ip domain-name command must also be entered in line configuration mode for the vty lines.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;8&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;What is a possible impact of setting too short an aging time in the MAC address table of a switch?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;overly large address table&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;unnecessary flooding of packets ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;excessive timeouts of static addresses&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;impaired ability to dynamically learn new addresses&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;9&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;This entry can only be removed from the MAC address table by a network administrator.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;When forwarding a frame to the device with address 0060.5c5b.cd23, the switch does not have to perform a lookup to determine the final destination port.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The switch learned this MAC address from the source address in a frame received on Fa0/18.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;10&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;An administrator is troubleshooting a PC on the network which is suffering from slow and intermittent connectivity. The PC has a ping success rate to the default gateway of less than half the ping attempts. Other PCs on the switch can consistently ping the default gateway. The switch port is configured for auto duplex and the PC is configured for full duplex. What will commonly cause this problem?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The PC is set to full duplex. The switch port fails to autonegotiate the duplex setting and defaults to half duplex, which causes a duplex mismatch. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The switch traffic is exceeding available frame buffers. The result is that frames are being dropped.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The PC and the default gateway have different bandwidth Ethernet ports.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The default gateway is not on the same switch that the PC is.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;11&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Using the command copy tftp:backup.cfg startup-config, an administrator downloaded a saved configuration from a TFTP server to a switch. Why does the administrator not detect any changes in the switch configuration after the download completes?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The command should have been copy startup-config tftp:backup.cfg.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;A backup configuration from a TFTP server cannot be copied directly into the startup-config.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The command copy running-config startup-config should be used to save the changes on the switch.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Downloading to the startup-config requires the switch to be reloaded in order for the configuration to take effect. ****&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;12&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. The teacher host is connected to port Fa0/7 on switch STW. A student has decided to share access to the Internet by attaching a hub and laptop to STW as shown. What will be the result of the student making this connection?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The Fa0/7 port of STW will be shutdown.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The student will gain full access to the Internet.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Both the teacher and student will be able to receive data but only the teacher will be able to send.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The frames from the laptop will be dropped, but the teacher host will maintain connectivity with the network. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;13&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Why is it advisable that a network administrator use SSH instead of Telnet when managing switches?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;SSH uses TCP whereas Telnet does not.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;SSH encrypts only the username and password when logging in.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;SSH encrypts all remote management communications whereas Telnet does not. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;SSH sends a clear text message steam which reduces the bandwidth use for management.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;14&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. The Layer 2 switching design that is shown has been implemented in a campus environment that is using Spanning Tree Protocol. All inter-switch links that are shown are trunks. Whenever an inter-switch link fails, the network takes nearly a minute to completely converge. How can the convergence time be reduced?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Increase the capacity of the distribution and core trunk links to 10 Gb/s.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Add a trunk link that directly connects D1 and D2.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Use Layer 3 switching on the core switch.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Implement Rapid Spanning Tree Protocol. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;15&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Cat-A&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Cat-B&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Cat-C ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Cat-D&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;16&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. How is port Gi1/1 on SWT-A functioning in the spanning-tree topology?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;It is sending and receiving data frames.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;It is receiving BPDUs, but not sending data frames.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;It is participating in the election process by forwarding the BPDUs it receives.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;It is receiving BPDUs and populating the MAC address table, but not sending data.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;17&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Which value determines if a switch becomes the central point of reference in the spanning tree topology?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;lowest bridge ID ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;highest revision number&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;lowest numeric IP address&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;highest numeric MAC address&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;18&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;What is the purpose of the Spanning Tree algorithm?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;It propagates VLAN configurations to other switches.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;It restricts broadcast packets to a single VLAN.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;It segments a network into multiple broadcast domains.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;It prevents loops in a switched network with redundant paths.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;19&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Which STP port type can only appear once on a segment, and must be present in order for traffic to flow on that segment?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;non-root port&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;disabled port&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;designated port ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;non-designated port&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;20&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Which type of traffic can still be received on a switch interface that is in STP blocking mode?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;BPDU frames ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;multicast frames&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;broadcast frames&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Layer 3 packets&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;21&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Each switch is configured to participate in STP for VLANs 1, 10, 20, and 30. Which switch will become the root for VLAN 20?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;A&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;B&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;C&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;D ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;22&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. All edge ports are configured with the spanning-tree portfast command. Host1 is recently connected to port Fa0/1 on switch SW1 . Which statement is true about the status of port Fa0/1?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The port will transition into blocking state.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The port will transition immediately into forwarding state.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The port will transition into blocking state and then immediately into forwarding state.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The port will transition into blocking state and immediately transition through the listening and learning states.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;23&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Which statement describes the use of voice VLANs in Cisco IP telephony?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The voice VLAN carries both tagged and untagged traffic.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The voice VLAN carries untagged traffic having special QoS markings.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The voice VLAN must be configured on the switch port to which the IP phone attaches.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Data and voice frames are tagged with same VLAN ID between the IP phone and the switch when a voice VLAN is configured.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;24&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. All trunk links are operational and all VLANs are allowed on all trunk links. An ARP request is sent by computer 5. Which device or devices will receive this message?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;only computer 4&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;computer 3 and RTR-A***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;computer 4 and RTR-A&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;computer 1, computer 2, computer 4, and RTR-A&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;computer 1, computer 2, computer 3, computer 4, and RTR-A&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;all of the computers and the router&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;25&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;only the management VLAN&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;all VLANs except the extended range VLANs&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;all VLANs except 1 and 1002-1005&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;all VLANs ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;26&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. What would happen if the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Host A remains a member of VLAN 10, because the router is routing traffic between VLANs.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Host A remains a member of VLAN 10, because the switch provides dynamic VLAN assignment for the port.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Host A maintains connectivity to all members of VLAN 10, because it is connected to the same physical network.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Host A is no longer a member of VLAN 10, but because port Fa0/3 was unused, it is now a member of VLAN 1.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;27&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit. However, hosts B and D cannot ping each other. What is the most likely cause of this problem?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The link between the switches is up but not trunked.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The Fa0/11 interface of Switch1 is not configured as a trunk.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Hosts B and D are configured with IP addresses from different subnets.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;28&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. What is true of the configuration of switch S1?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;A Cisco proprietary protocol is in use for ports Fa0/1 and Fa0/3.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Switch ports Fa0/1 and Fa0/3 have been configured with the switchport mode access command.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Untagged frames received on ports Fa0/1 and Fa0/3 will be placed on VLAN 1.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Switch ports Fa0/1 and Fa0/3 are configured to carry data from multiple VLANs.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;29&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. How does SW1 manage traffic coming from Host A?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;SW1 drops the traffic because it is untagged.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;SW1 leaves the traffic untagged and forwards it over the trunk. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;SW1 tags the traffic with the lowest VLAN ID value and forwards it over the trunk link.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;SW1 encapsulates the traffic with 802.1Q encapsulation and forwards it over the trunk link.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;30&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Which two statements are true about the operation of the interfaces? (Choose two.)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Incoming traffic with VLAN ID 0 is processed by interface fa0/0.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Both subinterfaces remain up with line protocol up, even if fa0/0 line protocol is down.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Subinterfaces use unique MAC addresses by adding the 802.1Q VLAN ID to the hardware address.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Traffic inbound on this router is processed by different subinterfaces, depending on the VLAN from which the traffic originated. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;31&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. A company has acquired a new office in a campus environment. Switches in the existing office and the new office are directly connected by a trunk link. The VLANs and IP addressing are setup as shown in the exhibit. The computers in each office are not able to ping each other. What will fix the problem?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Use an access link between S2 and S3.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Connect S2 and S3 to a common router.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Set the subnet mask in the new office to /24.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Configure the new office default gateway to 172.17.10.1&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Change the port assignments in the new office to a different VLAN.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;32&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. If switch SW1 is configured with the four VLANs as shown in the exhibit, how many physical interfaces are needed on router R1 to configure inter-VLAN routing using subinterfaces?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;zero&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;one ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;two&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;four&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;33&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161. What will the router do with this packet?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The router will drop the packet.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The router will forward the packet out interface FastEthernet 0/1.1.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The router will forward the packet out interface FastEthernet 0/1.2.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The router will forward the packet out interface FastEthernet 0/1.3.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;34&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;A network administrator configures a switch port with the command switchport mode dynamic auto. What is the resulting behavior of the switch port?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The switch port is able to trunk if the remote switch port is set to auto.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The switch port is able to trunk if the remote switch port is set to desirable.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The switch port will be disabled if it is unable to successfully negotiate trunking.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;A successful trunk will be established if the remote switch is non-Cisco but the port is configured for trunking.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;35&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Which three options correctly identify information that could be associated with this output?(Choose three.)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Interface FastEthernet3/0/0 is subinterfaced. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;A non-proprietary trunking protocol is in use. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The configuration is appropriate for a router-on-a-stick network design.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;A shutdown command has been applied to interface FastEthernet3/0/0. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Interface FastEthernet3/0/0.3 is mapped to the default management VLAN.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;An IP address should be applied to FastEthernet3/0/0 for correct data routing.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;36&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Users complain that they do not have connectivity to the web server that is connected to SW1. What should be done to remedy the problem?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Allow all VLANs on the trunk link.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Configure VLAN 100 as the native VLAN for SW1.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Configure the trunk port in trunk mode on SW1.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Attach the web server to a router and configure inter-VLAN routing.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;37&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP address should be assigned to this new host?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;192.168.1.11 /28&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;192.168.1.22 /28 ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;192.168.1.33 /28&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;192.168.1.44 /28&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;192.168.1.55 /28&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;38&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. A network administrator has segmented the network into two VLANs and configured Router1 for inter-VLAN routing. A test of the network, however, shows that hosts on each VLAN can only access local resources and not resources on the other VLAN. What is the most likely cause of this problem?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Switch port Fa0/1 is not trunking. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Router interface Fa0/0 is possibly down.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;No routing protocol is configured on Router1.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;One of the router subinterfaces is possibly down.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;39&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2. Hosts A, B, C, and D are correctly configured with IP addresses in the subnet range for VLAN 50. Host A can communicate with host B, but cannot communicate with host C or host D. What is the cause of this problem?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;There is a native VLAN mismatch.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The Fa0/11 interface of Switch1 is not configured as a trunk.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The link between Switch1 and Switch2 is up but not trunked.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;VLAN 50 is not allowed on the trunk link between Switch1 and Switch2. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;40&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Which configuration changes will increment the configuration revision number on the VTP server?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;configuring trunk links on the VTP server&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;configuring or changing the VTP password&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;configuring or changing the VTP domain name&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;configuring or changing the VTP version number&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;configuring or deleting a VLAN or creating a VLAN name ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;41&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The network administrator wants to configure a switch to pass VLAN update information to other switches in the domain but not update its own local VLAN database. Which two steps should the administrator perform to achieve this? (Choose two.)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Reset the VTP counters.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Configure VTP version 1 on the switch.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Configure the VTP mode of the switch to transparent. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Verify that the switch has a higher configuration revision number.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Configure the switch with the same VTP domain name as other switches in the network.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;42&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. VLAN 10 has been configured on the VTP server. Users who are assigned to VLAN 10 are connected as shown in the exhibit. On the basis of the outputs that are provided, which group of users will be able to communicate with the users on VLAN 10 on SW1?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;all the users who are connected only to SW2&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;users on VLAN 10 who are connected only to SW3***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;users on VLAN 10 who are connected only to SW4&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;users on VLAN 10 who are connected to both SW3 and SW4&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;43&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Switches S2 and S3 are properly connected using an ethernet cable. A network administrator has configured both switches with VTP, but S3 is unable to propagate VLANs to S2. What could be the reason for this?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The VTP configuration revision is different on both switches.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The VTP domains are different on both switches. ****&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;VTP pruning is disabled.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;VTP v2 is disabled.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;44&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. The VTP domain has been configured as shown in the exhibit. The network technician accidentally configured the VTP server as a VTP client. After the technician reloaded the switches, all users in the VTP domain started to complain that they lost connectivity to the users on the same VLANs that are connected to other switches. What should be done in the future to prevent losing all VLAN configurations in a VTP domain?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Configure all switches in VTP transparent mode and copy the VLAN configuration into flash.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Configure all switches in the network as VTP clients and copy the VLAN configuration into NVRAM.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Create a new domain and configure a second switch as a VTP server to take over in case of a primary VTP server failure.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;In the same domain, configure a second switch as a VTP server to take over in case of a primary VTP server failure.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;45&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Which two settings show the default value of VTP configuration on a Cisco 2960 switch? (Choose two.)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;revision number***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;existing VLANs&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;operating mode&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;domain name&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;pruning mode ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;46&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;What are two benefits of the IEEE 802.11n standard over the IEEE 802.11G? (Choose two.)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;requires less equipment&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;provides improved range** *&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;permits increased data rates***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;has a single-input and a single-output&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;needs no hardware upgrade for compatibility&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;47&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Which parameter is used to uniquely identify one wireless network from another?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;SSID ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;OFDM&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;WEP&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;DSSS&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;48&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Which security protocol or measure would provide the greatest protection for a wireless LAN?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;WPA2 ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;cloaking SSIDs&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;shared WEP key&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;MAC address filtering&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;49&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Associate with the access point and then open a HyperTerminal session with the access point.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Physically connect to the access point and then reboot the computer to launch the configuration software.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Modify the TCP/IP properties of the computer connected to the access point so that it exists on the same network, and then reboot your computer to establish a connection.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;50&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installation surveys showed strong signal strength from the AP locations to the client locations. Outside electrical interference has been eliminated. What will fix the problem?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Relocate the APs closer to each other.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Increase the distance between the clients.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Change the channel on AP-B to 6 or 11.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Place AP-A and AP-B on the same wireless channel.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;script src="http://scripts.chitika.net/eminimalls/amm.js" type="text/javascript"&gt;
&lt;/script&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>CCNA 3 exploration - Final Exam (update - 2)</title><link>http://testccnastudy.blogspot.com/2012/06/ccna-3-exploration-final-exam-update-2.html</link><category>CCNA 3 - Final Exam</category><pubDate>Thu, 21 Jun 2012 10:13:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-2727796607502281423</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;span style="line-height: 19px;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;1.Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;AS1 and AS2***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;DS1 and DS2 DS1,&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;DS2, and CS1 AS1,&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;AS2, DS1, and DS2&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;2 What advantage does cut-through switching provide?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;It enables QoS It forwards frames quickly.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;It provides an analysis of frames.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;It allows reduction of traffic by using error checking to drop corrupt frames.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;3 Which switch forwarding method should be used on a network that employs frame&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;classification based on an assigned Quality of Service (QoS) value? cut-through fast-forward fragment-free store-and-forward***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;4&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;only hosts A and B only hosts A, B, and C***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;only hosts A, B, C, and D&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;only hosts A, B, C, and E&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;5&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. The network consists of four hubs and a switch. The hosts connected to each hub are assigned addresses in the respective VLAN as shown. PC1 on VLAN 1 becomes infected with a virus and initiates a continuous IP broadcast. Which hubs will receive the broadcasts?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Hub A&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Hubs A andB&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Hubs A and C***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Hubs A, B, C, and D&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;6 Which three statements are correct concerning the default configuration of a new switch? (Choose three.)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;It is configured in VTP server mode.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;STP is automatically enabled.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The first VTY line is automatically configured to allow remote connections.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;VLAN1 is configured with a management IP address. All switch ports are assigned toVLAN1.****&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The enable password is configured as cisco.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;7 What will be the effect of the command S1# copy system:running-config tftp://172.16.2.155/tokyo-config?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The IOS will be copied to the TFTP server.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The configuration file named tokyo-config will overwrite the startup configuration file on S1.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The running configuration file on S1 will be saved via TFTP to a file named tokyo-config.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The contents of NVRAM on S1 will become the startup configuration file on the tokyo switch.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;8&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. The network administrator wants to allow both SSH and Telnet connections to Switch1. However, the SSH connections fail. What is the most likely cause of this problem? The RSA key has been removed.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;SSH has been configured on the wrong line.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The transport input command is applied incorrectly.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The domain name has been configured in the wrong configuration mode.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;9 What is the benefit of the auto-MDIX feature on a Cisco Catalyst switch?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;dynamically assigns a new management VLAN ID&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;autonegotiates IP address information for initial management connections&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;allows the use of straight-through patch cables regardless of connected device types***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;places a port immediately in the forwarding state to reduce the time for the spanning tree to reconverge&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;10&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;This entry can only be removed from the MAC address table by a network administrator.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;When forwarding a frame to the device with address 0060.5c5b.cd23, the switch does not have to perform a lookup to determine the final destination port.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18. The switch learned this MAC address from the source address in a frame received on Fa0/18.****&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;11&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. The teacher host is connected to port Fa0/7 on switch STW. A student has decided to share access to the Internet by attaching a hub and laptop to STW as shown. What will be the result of the student making this connection?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The Fa0/7 port of STW will be shutdown.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The student will gain full access to the Internet.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Both the teacher and student will be able to receive data but only the teacher will be able to send.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The frames from the laptop will be dropped, but the teacher host will maintain connectivity with the network.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;12 Which statement regarding the service password-encryption command is true?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The service password-encryption command is entered at the privileged EXEC mode prompt. The service password-encryption command encrypts only passwords for the console and VTY ports.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The service password-encryption command encrypts all previously unencrypted passwords in the running configuration.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;To see the passwords encrypted by the service password-encryption command, enter the no service password-encryption command.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;13 A network administrator enables sticky learning on all access mode interfaces of a Catalyst switch, saves the configuration, then connects hosts to the switch. After the switch operates for several days, the administrator reboots the switch without saving the running configuration. What is the result?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;All previously learned MAC addresses are lost.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The switch reverts to non-sticky dynamic learning.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Connected hosts are no longer able to communicate with the switch.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Previously learned sticky addresses are retained in the switch configuration.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;14&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. The Layer 2 switching design that is shown has been implemented in a campus environment that is using Spanning Tree Protocol. All inter-switch links that are shown are trunks. Whenever an inter-switch link fails, the network takes nearly a minute to completely converge. How can the convergence time be reduced?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Increase the capacity of the distribution and core trunk links to 10 Gb/s.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Add a trunk link that directly connects D1 and D2.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Use Layer 3 switching on the core switch.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Implement Rapid Spanning Tree Protocol.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;15 What is a result of improperly implementing a network with redundancy at Layer 2?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;an increase of unicast and multicast errors at Layer 3&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;a decrease in the amount of broadcast traffic&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;end device malfunction because of broadcast storms***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;an increase in throughput at all points in the network&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;16 Why is it important that the network administrator consider the spanning-tree network diameter when choosing the root bridge?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The network diameter limitation is 9.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;BPDUs may be discarded because of expiring timers.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The cabling distance between the switches is 100 meters.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The network diameter must be set to the number of meters of the cable between the root bridge and its farthest connected switch.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;17&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. What does "FORWARDING" mean in the command output shown?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The switch is sending and receiving data frames.-***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The switch is receiving BPDUs, but not sending data frames. The switch is participating in an election process by forwarding the BPDUs it receives. The switch is receiving BPDUs and populating the MAC address table, but not sending data.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;18&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Which device or devices should have the Spanning Tree Protocol enabled to prevent host traffic from creating a broadcast storm?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Core_S1 Access_S2 and Access_S3&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Core_S1, Access_S2, and Access_S3****&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Core_S1, Access_S2, Access_S3, and R1&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;19&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Cat-A Cat-B Cat-C Cat-D***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;20 RSTP is enabled in a switched network that is active and converged. Which switch port type assumes a discarding state on non-root switches? root port edge port alternate port*** designated port&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;21 In the implementation of PVST+ in a specific VLAN where all switches have default spanning tree priorities, which spanning-tree command setting could be assigned to force one of the Catalyst switches to become and remain the root bridge? root primary-*** priority 8192 priority 2048 spanning-tree mode rapid pvst&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;22&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. All edge ports are configured with the spanning-tree portfast command. Host1 is recently connected to port Fa0/1 on switch SW1 . Which statement is true about the status of port Fa0/1?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The port will transition into blocking state.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The port will transition immediately into forwarding state.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The port will transition into blocking state and then immediately into forwarding state. The port will transition into blocking state and immediately transition through the listening and learning states.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;23 While monitoring LAN traffic, a network technician notices an excessive number of broadcasts. Which two steps could be included in the processes that are needed to reduce the number of broadcasts on the network? (Choose two.)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Replace any existing hubs with switches. Add a Layer 3 device to route between networks.*** Subnet the existing IP network to create two networks.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Increase the backbone speed by three times the current speed. Add additional switches and spread out the number of hosts evenly between them.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;24 How does a switch that is configured for 802.1Q trunking handle untagged frames that are received on a trunk port?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The frames are dropped.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The frames are assigned to the native VLAN.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The frames are assigned to the default VLAN. The frames are assigned to the management VLAN.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;25&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. What would happen if the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Host A remains a member of VLAN 10, because the router is routing traffic between VLANs. Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Host A remains a member of VLAN 10, because the switch provides dynamic VLAN assignment for the port. Host A maintains connectivity to all members of VLAN 10, because it is connected to the same physical network. Host A is no longer a member of VLAN 10, but because port Fa0/3 was unused, it is now a member of VLAN 1.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;26&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit. However, hosts B and D cannot ping each other. What is the most likely cause of this problem?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The link between the switches is up but not trunked. The Fa0/11 interface of Switch1 is not configured as a trunk.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Hosts B and D are configured with IP addresses from different subnets.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;27&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. A network administrator issues the show interfaces fastEthernet 0/8 switchport command to check the status of the port. What can be concluded from the output? Port Fa0/8 is configured as a trunk with 802.1q encapsulation.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Port Fa0/8 is configured as a trunk in VLAN 1.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Port Fa0/8 is configured in access mode and associated with VLAN 1.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Port Fa0/8 is configured as a trunk and VLAN 1 is a native VLAN for the trunk.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;28&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. SW-T has been configured with a single trunking interface. Which VLANs will be allowed across the trunk?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Only VLAN 1 will be allowed across the trunk.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;All configured VLANs will be allowed across the trunk.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Only the native VLAN will be allowed across the trunk.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Only the the management and native VLANs will be allowed across the trunk. Only VLANs that are configured on the VTP server in the domain will be allowed across the trunk.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;29&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. How will switch S2 manage traffic coming from host PC1?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;S2 will drop the traffic, unless it is management traffic.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;S2 will tag the frame with VLAN ID 99 when it forwards it over the trunk link.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;S2 will leave the traffic untagged when it forwards it over a trunk link.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;S2 will tag the traffic with the highest VLAN ID value when it forwards it over the trunk link.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;30 What is the purpose of VLAN trunking?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;It improves network performance by reducing broadcast traffic. It selects the best path to transmit data in a switched network.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;It carries the traffic of multiple VLANs through a single link.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;It avoids spanning tree loops in a switched network.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;31 A network administrator implements inter-VLAN routing by configuring subinterfaces on a router. What is one important fact that must be considered?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The physical interface must have an IP address configured.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The subinterface numbers must match the VLAN ID number.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The no shutdown command must be issued on each subinterface.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The IP address of each router subinterface must be used as the default gateway for hosts on the corresponding VLAN.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;32&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. What should be done to fix the problem?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Configure VLANs with different VLAN IDs on switch SW2.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Reconfigure the trunk port on switch SW2 with static trunk configuration.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Introduce a Layer 3 device or a switch with Layer 3 capability in the topology.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Apply IP addresses that are in the same subnet to the interfaces used to connect SW1 and SW2.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;33&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Which three options correctly describe the router configuration that is shown? (Choose three.)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;An IEEE standard trunking protocol is in use.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Interface Fa0/1 has been configured with subinterfaces.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The shutdown command has been applied to interface Fa0/1. Interface Fa0/1.3 is mapped to the default management VLAN.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The configuration is appropriate for a router-on-a-stick network design.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;An IP address should be applied to interface Fa0/1 for routing to occur.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;34&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. A new host needs to be connected to VLAN 3. Which IP address should be assigned to this new host?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;192.168.1.22 /28&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;192.168.1.31 /28&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;192.168.1.32 /28&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;192.168.1.52 /28***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;192.168.1.63 /28&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;35&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. A network administrator is configuring RT1 for inter-VLAN routing. The switch is configured correctly and is functional. Host1, Host2, and Host3 cannot communicate with each other. Based on the router configuration, what is causing the problem?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Interface Fa0/0 is missing IP address configuration information.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;IP addresses on the subinterfaces are incorrectly matched to the VLANs.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Each subinterface of Fa0/0 needs separate no shutdown commands.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Routers do not support 892.1Q encapsulation on subinterfaces.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;36&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Router R1 is properly configured for router on a stick inter-VLAN routing, but PC1 is unable to ping PC2. What needs to be done to resolve the problem?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Rename VLAN1.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Connect one more port of S1 to R1. Configure the Fa0/1 port of S1 as a trunk port.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Move the Fa0/0 interface of R1 to another VLAN.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;37&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and host B are on the default VLAN but are not able to exchange traffic. What should be done to fix the problem?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Allow all VLANs on the trunk link.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Remove the native VLAN from the trunk.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Include a router or switch with Layer 3 capabilities.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Configure the same native VLAN on both ends of the trunk.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;38&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. A network administrator has segmented the network into two VLANs. The connected hosts can only access resources in their own VLAN. What is the most scalable and cost effective solution to allow inter-VLAN communication in this network?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Replace S1 with a router that has one FastEthernet interface for each PC.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Add a second switch and divide the PCs so that each VLAN is connected to its own switch. Configure a router with two subinterfaces on one of its FastEthernet ports and connect it to S1 using a trunk link.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Connect a router to a port on S1 and assign the IP address of VLAN1 to the connecting router interface.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;39&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. This switch is to be added to the production network. Which two facts about VLANs and VTP operation can be confirmed by this output? (Choose two.)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The network administrator will be able to configure VLANs of local significance on this switch. VLANs can only be added to the VLAN database on this switch by a VTP advertisement.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;All VLANs that are configured on this switch will be sent to all other switches in the same VTP domain.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;This switch will drop all VTP advertisements that come from switches that are configured in the same VTP domain.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Adding this switch to the network will cause no disruption in the VTP domain operations if the rest of the switches in the same VTP domain have a higher configuration revision number.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;40&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. VTP pruning is enabled in the VTP domain that is shown. How will switch ST-1 handle Layer 2 broadcast traffic originating from host A on switch ST-C?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;It will be dropped. It will be forwarded out port Fa0/5 only.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;It will be forwarded out ports Fa0/5 and Fa0/10.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;It will be forwarded out ports Fa0/5, Fa0/10, and Fa0/15.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;41 In which mode is a VTP switch operating if it does not allow for the creation of local VLANs but it does accept VLAN updates from other switches in the same domain?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;client***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;root&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;server&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;transparent&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;42 The network administrator wants to configure a switch to pass VLAN update information to other switches in the domain but not update its own local VLAN database. Which two steps should the administrator perform to achieve this? (Choose two.)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Reset the VTP counters.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Configure VTP version 1 on the switch.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Configure the VTP mode of the switch to transparent.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Verify that the switch has a higher configuration revision number.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Configure the switch with the same VTP domain name as other switches in the network.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;43&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Switch SW2 has been newly purchased and added to the network. What configuration should be applied to SW2 so that it participates in the same VTP domain as switch SW1, receives VLAN information from SW1, and synchronizes VLAN information?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Disable VTP pruning on SW2. Configure SW2 in VTP transparent mode.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Configure SW2 with the VTP domain password.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Configure SW2 as a VTP server with a higher revision number.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;44&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Switch SW2 was tested in a lab environment and then inserted into a production network without reloading its configuration. After the trunk link between SW1 and SW2 was brought up, all users lost connectivity to the network. What could be the source of the problem?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;All the VLANs were pruned from the trunk port between SW1 and SW2.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;SW1 and SW2 cannot be both set as VTP servers in the same VTP domain.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;VTP configuration revision number of SW2 was higher than the configuration revision number of SW1.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The additional VLANs from SW2 created more VLANs than the VLAN database of SW1 could contain.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;45&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Switches S2 and S3 are properly connected using an ethernet cable. A network administrator has configured both switches with VTP, but S3 is unable to propagate VLANs to S2. What could be the reason for this?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The VTP configuration revision is different on both switches.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The VTP domains are different on both switches.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;VTP pruning is disabled. VTP v2 is disabled.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;46 A wireless LAN access point will convert traffic between which two frame encapsulation types?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;802.1 and 802.11&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;802.3 and 802.11***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;802.3 and 802.16&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;802.5 and 802.16&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;47 Which parameter is used to uniquely identify one wireless network from another?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;SSID***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;OFDM&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;WEP&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;DSSS&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;48 What provides an authentication mechanism for 802.11-based wireless networks?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;DSSS&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;OFDM&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;SSID&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;WPA***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;49 Why is MAC address filtering considered a poor choice in securing a WLAN?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Available bandwidth is reduced.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;MAC addresses are easily spoofed.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;APs are more susceptible to DoS attacks.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The payload encryption is easily broken.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;50&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installation surveys showed strong signal strength from the AP locations to the client locations. Outside electrical interference has been eliminated. What will fix the problem?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Relocate the APs closer to each other.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Increase the distance between the clients.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Change the channel on AP-B to 6 or 11.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Place AP-A and AP-B on the same wireless channel. &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;script src="http://scripts.chitika.net/eminimalls/amm.js" type="text/javascript"&gt;
&lt;/script&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>CCNA 3 exploration - Final Exam (update - 3)</title><link>http://testccnastudy.blogspot.com/2012/06/ccna-3-exploration-final-exam-update-3.html</link><category>CCNA 3 - Final Exam</category><pubDate>Thu, 21 Jun 2012 10:11:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-1731175713819943694</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;span style="line-height: 19px;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;1&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices should the IP phones connect?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;AS1 and AS2***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;DS1 and DS2&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;DS1, DS2, and CS1&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;AS1, AS2, DS1, and DS2&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;2&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Which switching method provides error-free data transmission?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;fragment-free&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;fast-forward&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;integrity-checking&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;store-and-forward***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;3&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit data at the same time. How do the hosts respond on the network? (Choose two.)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;After the end of the jam signal, a backoff algorithm is invoked. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Hosts 1 and 4 are operating full duplex so no collision will exist.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The hub will block the port connected to Host 4 to prevent a collision.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Hosts 1 and 4 are assigned shorter backoff values to provide them priority to access the media.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;If a host has data to transmit after the backoff period of that host, the host checks to determine if the line is idle before transmitting. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;4&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;What information in an Ethernet frame is used by a Layer 2 switch to build its address table?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;source IP address&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;source MAC address***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;destination IP address&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;destination MAC address&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;5&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Which three actions are performed during the boot sequence of a Cisco switch? (Choose three.)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The boot loader uses the self-contained switch operating system to boot the switch.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The boot loader retrieves diagnostics routines via TFTP.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The boot loader performs POST. **&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The boot loader is loaded from RAM.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The boot loader initializes the flash file system that is used to boot the system. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The boot loader loads the default operating system if the flash-based operating system is corrupt or missing. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;6&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;While configuring a new switch, a network administrator configures the switch as an HTTP server. What benefits does this configuration provide?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;This allows the switch to host web pages for the network.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;This allows remote VPN connections to the switch over the Internet.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;This is required if a web server or web farm is attached to the switch.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;This allows web-based configuration tools to be used with the switch. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;7&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Company policy requires disabling the command history buffer on network devices. An administrator enters terminal no history size at the command prompt on a Cisco Catalyst switch and receives no error messages back, but the command history buffer is still available. What is the problem?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The command contained a syntax error.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The Cisco IOS version does not support disabling the command history buffer.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The command history can only be disabled on a router, not a switch.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The size parameter reset the default buffer size but did not disable access to the buffer. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;8&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;What is the purpose of issuing the command switchport mode access on a switch interface?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;disable port security&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;make the port operational&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;override the default port behavior&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;force the port to be a part of a single vlan ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;9&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;What is a possible impact of setting too short an aging time in the MAC address table of a switch?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;overly large address table&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;unnecessary flooding of packets ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;excessive timeouts of static addresses&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;impaired ability to dynamically learn new addresses&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;10&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. What does STATIC indicate in the output that is shown?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Switch port Fa0/24 can only work in VLAN 99.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;VLAN 99 was manually added to the VLAN database.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;MAC address 0001.637b.b267 was learned from the source address of a frame that was received on switch port Fa0/24.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;MAC address 0001.637b.b267 was manually associated with the switch port Fa0/24. /****&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;11&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. What will be the result of the commands that are shown in the exhibit?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Only clients on VLAN 2 will be able to use DHCP for addressing.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;DHCP server responses will only be permitted on interface Fa0/2.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Only 100 clients are permitted to request DHCP addresses on VLAN 2.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Client requests for DHCP addresses will be filtered out if the requests are not received on interface Fa0/2.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;12&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Why is it advisable that a network administrator use SSH instead of Telnet when managing switches?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;SSH uses TCP whereas Telnet does not.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;SSH encrypts only the username and password when logging in.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;SSH encrypts all remote management communications whereas Telnet does not. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;SSH sends a clear text message steam which reduces the bandwidth use for management.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;13&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Which service should be disabled on a Cisco switch or router to prevent packet sniffers from capturing information about the device?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;SSH&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;VTP&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;CDP ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;SNMP&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;14&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. The Layer 2 switching design that is shown has been implemented in a campus environment that is using Spanning Tree Protocol. All inter-switch links that are shown are trunks. Whenever an inter-switch link fails, the network takes nearly a minute to completely converge. How can the convergence time be reduced?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Increase the capacity of the distribution and core trunk links to 10 Gb/s.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Add a trunk link that directly connects D1 and D2.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Use Layer 3 switching on the core switch.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Implement Rapid Spanning Tree Protocol. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;15&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Which statement is correct about STP architecture?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Spanning Tree Protocol will guarantee a loop free Layer 2 topology. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Spanning Tree Protocol guarantees the shortest path to destination networks.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The switch with the highest priority will be assigned the lowest BID in the root election.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The first step in the spanning-tree election process is to determine the root port.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;To select designated ports, the spanning-tree algorithm must determine the longest contiguous path from the root bridge.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;16&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;What identifier in the BPDU creates a unique BID for a switch?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;IP address&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;MAC address ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;bridge priority&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;VLAN ID&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;port priority&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;17&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Each switch is shown with its MAC address. Which switch will be elected as the spanning-tree root bridge if the switches are configured with their default priority values?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;switch A&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;switch B&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;switch C&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;switch D&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;switch E&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;switch F ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;18&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Which device or devices should have the Spanning Tree Protocol enabled to prevent host traffic from creating a broadcast storm?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Core_S1&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Access_S2 and Access_S3&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Core_S1, Access_S2, and Access_S3 ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Core_S1, Access_S2, Access_S3, and R1&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;19&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. What are two reasons for the Fa0/24 port being placed in the blocking state? (Choose two.)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;This switch is not the root bridge.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The Fa0/24 port is administratively down.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;STP has detected links that create a loop.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;There is a change in the VTP configuration.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The Fa0/24 port is overloaded with too much traffic for its configured bandwidth.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;20&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Which STP port type can only appear once on a segment, and must be present in order for traffic to flow on that segment?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;non-root port&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;disabled port&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;designated port ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;non-designated port&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;21&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Which Spanning Tree Protocol version is in effect?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Per VLAN Spanning Tree (PVST)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Per VLAN Spanning Tree + (PVST+)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Common Spanning Tree (CST)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Rapid Spanning Tree Protocol (RSTP) ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Multiple Spanning Tree Protocol (MSTP)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;22&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. All edge ports are configured with the spanning-tree portfast command. Host1 is recently connected to port Fa0/1 on switch SW1 . Which statement is true about the status of port Fa0/1?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The port will transition into blocking state.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The port will transition immediately into forwarding state. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The port will transition into blocking state and then immediately into forwarding state.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The port will transition into blocking state and immediately transition through the listening and learning states.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;23&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. What is the maximum number of VLANs that can be deleted from the Switch as it is configured?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;zero&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;four ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;five&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;eight&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;nine&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;24&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;What are two characteristics of normal range VLANs? (Choose two.)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;not learned by VTP&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;stored in vlan.dat file ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;designed for service providers&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;can contain ports used as trunks&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;identified by a VLAN ID between 1 and 1005 ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;25&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;How are data frames identified and sent to the correct VLAN when exiting an Ethernet trunk?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Frames are forwarded to the correct VLAN based on the VLAN tag***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Frames are always forwarded to the native VLAN when exiting a trunk.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Frames are forwarded to the correct VLAN based on the source IP address.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Frames are forwarded to the correct VLAN based on information in the MAC address table.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;26&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. What is the purpose of the configuration commands that are shown?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;to activate port Fa0/10&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;to make the port a member of VLAN 30 ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;to activate port security on port Fa0/10&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;to add VLAN 30 to the trunk that is connected to port Fa0/10&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;27&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;How does a switch that is configured for 802.1Q trunking handle untagged frames that are received on a trunk port?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The frames are dropped.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The frames are assigned to the native VLAN. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The frames are assigned to the default VLAN.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The frames are assigned to the management VLAN.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;28&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. R1 is configured for traditional inter-VLAN routing. R1 can ping computer 3 but cannot ping computer 1. What is a possible cause for this failure?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;S1 port Fa0/11 is in the wrong VLAN. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;R1 does not have an active routing protocol.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The IP address of computer 1 is in the wrong logical network.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Router interface Fa0/0 has the wrong trunk encapsulation type configured.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;29&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. What will allow a host on VLAN 40 on switch X to communicate with a host in VLAN 40 on switch Y?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;QoS&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;routing&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;trunking ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;VPN&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;30&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. What is true of the configuration of switch S1?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Only VLAN 99 will be allowed to use the trunk links.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Switch ports Fa0/1 and Fa0/3 are configured with a standard trunking protocol. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Switch ports Fa0/1 and Fa0/3 should be configured as access ports to allow data from multiple VLANs to access switch S1.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The switch negotiated trunk links for interfaces Fa0/1 and Fa0/3 because all connected interfaces have been configured with the switchport mode dynamic auto command.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;31&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Which two statements are true about the operation of the interfaces? (Choose two.)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Incoming traffic with VLAN ID 0 is processed by interface fa0/0.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Both subinterfaces remain up with line protocol up, even if fa0/0 line protocol is down.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Subinterfaces use unique MAC addresses by adding the 802.1Q VLAN ID to the hardware address.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Traffic inbound on this router is processed by different subinterfaces, depending on the VLAN from which the traffic originated.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;32&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;A network administrator is asked to connect four switches that are each configured with eight VLANs. Routers that have two FastEthernet ports each that support trunking are available. What is the minimum number of routers needed to interconnect traffic from all of the VLANs if trunking is allowed?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;1 ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;2&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;4&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;8&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;16&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;33&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.85. What will the router do with this packet?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The router will ignore the packet. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The router will forward the packet out interface FastEthernet 0/1.1.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The router will forward the packet out interface FastEthernet 0/1.2.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The router will forward the packet out interface FastEthernet 0/1.3.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;34&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;What are two requirements for configuring inter-VLAN routing using the router-on-a-stick model? (Choose two.)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Each subinterface should be configured with its own IP address, subnet mask, and unique VLAN assignment. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The physical interface of the router must be connected to a trunk link on the adjacent switch.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The number of physical interfaces on the router should match the number of VLANs.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Different static VLANs should be assigned to different interfaces of the router.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The router should be configured as the VTP server.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;35&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and host B are on the default VLAN but are not able to exchange traffic. What should be done to fix the problem?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Allow all VLANs on the trunk link.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Remove the native VLAN from the trunk.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Include a router or switch with Layer 3 capabilities.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Configure the same native VLAN on both ends of the trunk.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;36&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit. However, hosts A and D cannot ping each other. What is the most likely cause of this problem?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The link between the switches is up but not trunked.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The Fa0/11 interface of Switch1 is not configured as a trunk. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Hosts A and D are configured with IP addresses from different subnets.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;37&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. A network administrator has segmented the network into two VLANs. The connected hosts can only access resources in their own VLAN. What is the most scalable and cost effective solution to allow inter-VLAN communication in this network?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Replace S1 with a router that has one FastEthernet interface for each PC.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Add a second switch and divide the PCs so that each VLAN is connected to its own switch.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Configure a router with two subinterfaces on one of its FastEthernet ports and connect it to S1 using a trunk link. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Connect a router to a port on S1 and assign the IP address of VLAN1 to the connecting router interface.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;38&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. After the listed commands are entered into router R1 and switch S1, the administrator enters the show interface fa0/1 trunk and gets the results shown. What is the likely problem?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The trunk is established, but no VLANs have been configured to use it.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The router is missing the dynamic trunking protocol statements necessary to form a trunk.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The trunk has not been established because the router does not support dynamic trunking protocol.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The router, the switch, or both must be configured with the dynamic desirable option for dynamic trunking protocol to establish a trunk.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;39&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2. Hosts A, B, C, and D are correctly configured with IP addresses in the subnet range for VLAN 50. Host A can communicate with host B, but cannot communicate with host C or host D. What is the cause of this problem?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;There is a native VLAN mismatch.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The Fa0/11 interface of Switch1 is not configured as a trunk.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The link between Switch1 and Switch2 is up but not trunked.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;VLAN 50 is not allowed on the trunk link between Switch1 and Switch2. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;40&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Which configuration changes will increment the configuration revision number on the VTP server?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;configuring trunk links on the VTP server&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;configuring or changing the VTP password&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;configuring or changing the VTP domain name&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;configuring or changing the VTP version number&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;configuring or deleting a VLAN or creating a VLAN name ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;41&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;What is the purpose of VTP pruning?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;to restrict traffic on specified trunk lines ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;to designate switches that do not participate in VTP&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;to advertise VTP domain information to specified switches only&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;to reduce the propagation of VTP advertisements in the switched network&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;42&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;A new switch is to be added to an existing network in a remote office. The network administrator does not want the technicians in the remote office to be able to add new VLANs to the switch, but the switch should receive VLAN updates from the VTP domain. Which two steps must be performed to configure VTP on the new switch to meet these conditions? (Choose two.)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Configure an IP address on the new switch.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Configure the existing VTP domain name on the new switch.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Configure all ports of both switches to access mode.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Configure the new switch as a VTP client. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Enable VTP pruning.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;43&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Switch SW2 was tested in a lab environment and then inserted into a production network without reloading its configuration. After the trunk link between SW1 and SW2 was brought up, all users lost connectivity to the network. What could be the source of the problem?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;All the VLANs were pruned from the trunk port between SW1 and SW2.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;SW1 and SW2 cannot be both set as VTP servers in the same VTP domain.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;VTP configuration revision number of SW2 was higher than the configuration revision number of SW1.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The additional VLANs from SW2 created more VLANs than the VLAN database of SW1 could contain.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;44&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. The network administrator is planning five additional VLANs to be shared throughout the VTP domain on S3. What action should the administrator take before creating the additional VLANs?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Create the VLANs on a switch in VTP server mode and allow them to propogate to the other switches in the domain. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Modify the configuration revision to 10 to support the additional VLANs.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Enable the VTP pruning mode in order to create the VLANs on S3.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Enable the VTP v2 mode.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;45&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Refer to the exhibit. Switches S2 and S3 are properly connected using an ethernet cable. A network administrator has configured both switches with VTP, but S3 is unable to propagate VLANs to S2. What could be the reason for this?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The VTP configuration revision is different on both switches.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The VTP domains are different on both switches.***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;VTP pruning is disabled.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;VTP v2 is disabled.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;46&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;A wireless LAN access point will convert traffic between which two frame encapsulation types?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;802.1 and 802.11&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;802.3 and 802.11 ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;802.3 and 802.16&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;802.5 and 802.16&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;47&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Which parameter is used to uniquely identify one wireless network from another?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;SSID ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;OFDM&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;WEP&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;DSSS&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;48&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;A wireless client is attempting to establish a connection with a wireless access point. What process does the client use to discover the access points which are available to it?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;probing ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;beaconing&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;association&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;authentication&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;49&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Why is MAC address filtering considered a poor choice in securing a WLAN?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Available bandwidth is reduced.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;MAC addresses are easily spoofed. ***&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;APs are more susceptible to DoS attacks.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;The payload encryption is easily broken.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;50&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;Which combination is required to establish a connection to initially configure the Linksys WRT300N wireless access device?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;a computer with a console connection to the WRT300N&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;a computer with a wireless connection to the WRT300N&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;a computer with an AUX port connection to the WRT300N&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #09121a; font-family: Verdana, sans-serif; font-size: x-small;"&gt;a computer configured in the same IP subnet as the WRT300N and a direct cable connection to it *** &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;script src="http://scripts.chitika.net/eminimalls/amm.js" type="text/javascript"&gt;
&lt;/script&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>IP Network Numbering</title><link>http://testccnastudy.blogspot.com/2012/04/ip-network-numbering.html</link><category>IP Network Numbering</category><pubDate>Wed, 4 Apr 2012 22:31:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-294771248955878699</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;span style="font-family: verdana,geneva,helvetica; font-size: x-small;"&gt;      &lt;/span&gt;&lt;br /&gt;
&lt;h5&gt;&lt;span style="font-family: verdana,geneva,helvetica; font-size: x-small;"&gt;IP Network Partioning&lt;/span&gt;&lt;/h5&gt;&lt;span style="font-family: verdana,geneva,helvetica; font-size: x-small;"&gt;  Computer networks consist of individual  &lt;a href="http://compnetworking.about.com/library/glossary/bldef-segment.htm"&gt;segments&lt;/a&gt;  of network cable. The electrical properties of cabling limit the useful  size of any given segment such that even a modestly-sized  &lt;a href="http://compnetworking.about.com/library/glossary/bldef-lan.htm"&gt;local-area network (LAN)&lt;/a&gt; will require several of them.   &lt;a href="http://compnetworking.about.com/library/glossary/bldef-gateway.htm"&gt;Gateway devices&lt;/a&gt; like  &lt;a href="http://compnetworking.about.com/library/glossary/bldef-router.htm"&gt;routers&lt;/a&gt; and bridges connect these segments together although not in a perfectly seamless way... &lt;i&gt;(see below)&lt;/i&gt; &lt;/span&gt;&lt;br /&gt;
&lt;img height="6" src="http://z.about.com/" width="1" /&gt;&lt;br /&gt;
Besides partitioning through the use of cable, subdividing of the network can also be done at a higher level.  &lt;b&gt;Subnets&lt;/b&gt;  support virtual network segments that partition traffic flowing through  the cable rather than the cables themselves. The subnet configuration  often matches the segment layout one-to-one, but subnets can also  subdivide a given network segment.   &lt;br /&gt;
&lt;h5&gt;IP Network Numbering&lt;/h5&gt;Even without subnetting (explained later), hosts on the Internet or any other IP network are assigned a &lt;b&gt;network number&lt;/b&gt;.   Network numbering allows a group of hosts (peers) to communicate  efficiently with each other. Hosts on the same network may be computers  located in the same facility or all computers used by a workgroup, for  example. &lt;b&gt;Multi-homed&lt;/b&gt; hosts, that contain multiple network  adapters, can belong to multiple networks, but each adapter is assigned  exactly one network number.   Network numbers look very much like IP addresses, but the two should not  be confused. Consider for example the host IP address 10.0.0.1, an  address commonly used on private networks. Because it is a Class A  address, with no subnetting employed, its leftmost byte (eight bits) by  default refer to the network address  and all other bits remain set at  zero.  Thus, 10.0.0.0 is the network number corresponding to IP address  10.0.0.1. &lt;br /&gt;
The portion of the IP address that does not refer to the network refers instead to the &lt;b&gt;host address&lt;/b&gt;  - literally, the unique identifier of the host on that network.  In the  above example, the host address becomes '0.0.0.1' or simply '1'.  Also  note that a network address becomes a reserved address that should not  be assigned to any actual host.  Configuring a live host at 10.0.0.0 in  the example above could impact communications for all hosts on that  network. &lt;br /&gt;
The table below illustrates the default numbering scheme for Class A, B, and C networks.  &lt;br /&gt;
&lt;br /&gt;
&lt;table border="1" style="font-size: 11;"&gt;&lt;tbody&gt;
&lt;tr align="center"&gt; &lt;td&gt;&lt;b&gt;Class&lt;/b&gt;&lt;/td&gt;&lt;td&gt;&lt;b&gt;Host address range&lt;/b&gt;&lt;/td&gt;&lt;td&gt;&lt;b&gt;Network address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;&lt;b&gt;Default mask&lt;/b&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr align="center"&gt; &lt;td&gt;A&lt;/td&gt;&lt;td&gt; &amp;nbsp; &amp;nbsp; 0.0.0.0 - 127.255.255.255&lt;/td&gt;&lt;td&gt;x.0.0.0&lt;/td&gt;&lt;td&gt;255.0.0.0&lt;/td&gt; &lt;/tr&gt;
&lt;tr align="center"&gt; &lt;td&gt;B&lt;/td&gt;&lt;td&gt;128.0.0.0 - 191.255.255.255&lt;/td&gt;&lt;td&gt;x.x.0.0&lt;/td&gt;&lt;td&gt;255.255.0.0&lt;/td&gt; &lt;/tr&gt;
&lt;tr align="center"&gt; &lt;td&gt;C&lt;/td&gt;&lt;td&gt;192.0.0.0 - 223.255.255.255&lt;/td&gt;&lt;td&gt;x.x.x.0&lt;/td&gt;&lt;td&gt;255.255.255.0&lt;/td&gt; &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;In general, a network address uses the leftmost byte of its hosts'  addressing if the hosts fall within the Class A range, the leftmost two  bytes for hosts in Class B, and the leftmost three bytes for hosts in  Class C.  This algorithm is applied in practice through the use of a &lt;b&gt;network mask&lt;/b&gt;.   The above table shows the decimal representation of the default  network masks that is commonly used by network operating systems.  Note  that the decimal value '255' corresponds to one byte that has all bits  set to one (11111111).  &lt;br /&gt;
&lt;h5&gt;Benefit of Network Addressing&lt;/h5&gt;Network addressing fundamentally organizes hosts into groups.  This can  improve security (by isolating critical nodes) and can reduce network  traffic (by preventing transmissions between nodes that do not need to  communicate with each other).  Overall, network addressing becomes even  more powerful when introducing subnetting and/or supernetting&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;script type="text/javascript"&gt;
ch_client = "demo";
ch_width = 400;
ch_height = 90;
ch_type = "mpu";
ch_sid = "Chitika Default";
ch_color_site_link = "0000CC";
ch_color_title = "0000CC";
ch_color_border = "FFFFFF";
ch_color_text = "000000";
ch_color_bg = "FFFFFF";
&lt;/script&gt; &lt;script src="http://scripts.chitika.net/eminimalls/amm.js" type="text/javascript"&gt;
&lt;/script&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>Wired technologies</title><link>http://testccnastudy.blogspot.com/2012/04/wired-technologies.html</link><pubDate>Wed, 4 Apr 2012 22:28:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-1533376407005364119</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;The order of the following wired technologies is, roughly, from slowest to fastest transmission speed.&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;i&gt;Twisted pair wire&lt;/i&gt;  is the most widely used medium for telecommunication. Twisted-pair  cabling consist of copper wires that are twisted into pairs. Ordinary  telephone wires consist of two insulated copper wires twisted into  pairs. Computer networking cabling (wired Ethernet as defined by IEEE 802.3)  consists of 4 pairs of copper cabling that can be utilized for both  voice and data transmission. The use of two wires twisted together helps  to reduce crosstalk and electromagnetic induction.  The transmission speed ranges from 2 million bits per second to 10  billion bits per second. Twisted pair cabling comes in two forms:  unshielded twisted pair (UTP) and shielded twisted-pair (STP). Each form  comes in several category ratings, designed for use in various  scenarios.&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;i&gt;Coaxial cable&lt;/i&gt;  is widely used for cable television systems, office buildings, and  other work-sites for local area networks. The cables consist of copper  or aluminum wire surrounded by an insulating layer (typically a flexible  material with a high dielectric constant), which itself is surrounded  by a conductive layer. The insulation helps minimize interference and  distortion. Transmission speed ranges from 200 million bits per second  to more than 500 million bits per second.&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;ITU-T &lt;a href="http://en.wikipedia.org/wiki/G.hn" title="G.hn"&gt;G.hn&lt;/a&gt; technology uses existing home wiring (coaxial cable, phone lines and power lines) to create a high-speed (up to 1 Gigabit/s) local area network.&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;An optical fiber  is a glass fiber. It uses pulses of light to transmit data. Some  advantages of optical fibers over metal wires are less transmission  loss, immunity from electromagnetic radiation, and very fast tramission  speed, up to trillions of bits per second. One can use different colors  of lights to increase the number of messages being sent over a fiber  optic cable.&lt;/li&gt;
&lt;/ul&gt;&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;script type="text/javascript"&gt;
ch_client = "demo";
ch_width = 400;
ch_height = 90;
ch_type = "mpu";
ch_sid = "Chitika Default";
ch_color_site_link = "0000CC";
ch_color_title = "0000CC";
ch_color_border = "FFFFFF";
ch_color_text = "000000";
ch_color_bg = "FFFFFF";
&lt;/script&gt; &lt;script src="http://scripts.chitika.net/eminimalls/amm.js" type="text/javascript"&gt;
&lt;/script&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>Domain Name System - DNS</title><link>http://testccnastudy.blogspot.com/2012/04/domain-name-system-dns.html</link><category>Domain Name System - DNS</category><pubDate>Wed, 4 Apr 2012 22:27:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-4354420891552173650</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;h5&gt;&lt;span style="font-family: verdana,geneva,helvetica; font-size: x-small;"&gt;Domain Naming and Registration with DNS&lt;/span&gt;&lt;/h5&gt;&lt;span style="font-family: verdana,geneva,helvetica; font-size: x-small;"&gt;Though  IP addresses allow computers and routers to identify each other  efficiently, humans prefer to work with names rather than numbers. The &lt;b&gt;Domain Name System - DNS&lt;/b&gt; - supports the best of both worlds... &lt;i&gt;(see below)&lt;/i&gt;&lt;/span&gt;                        &lt;br /&gt;
&lt;table&gt;&lt;tbody&gt;
&lt;tr&gt;       &lt;td&gt;&lt;img height="6" src="http://z.about.com/" width="1" /&gt;&lt;/td&gt;     &lt;/tr&gt;
&lt;tr&gt;       &lt;td colspan="2"&gt;&lt;table align="right" border="0" cellpadding="0" cellspacing="0" style="width: 170px;"&gt;&lt;tbody&gt;
&lt;tr&gt;             &lt;td&gt;&lt;table border="0" cellpadding="2" cellspacing="0"&gt;&lt;tbody&gt;
&lt;tr bgcolor="#CCCCFF"&gt;                   &lt;td&gt;&lt;span style="color: #330066; font-family: verdana,geneva,helvetica; font-size: xx-small;"&gt; &lt;b&gt;More of this Feature&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;                 &lt;/tr&gt;
&lt;tr bgcolor="#EEEEEE"&gt;                   &lt;td&gt;&lt;span style="font-family: verdana,geneva,helvetica; font-size: xx-small;"&gt;• IP Address Notation&lt;br /&gt;
• IP Address Classes, Broadcast and Multicast&lt;br /&gt;
• IP Loopback and Private Addresses, IPv6 Anycast&lt;br /&gt;
• &lt;b&gt;DNS - Domain Name System&lt;/b&gt;&lt;br /&gt;
• IP Network Numbering&lt;br /&gt;
• &lt;a href="http://compnetworking.about.com/library/weekly/aa043000a.htm"&gt;IP Subnetting&lt;/a&gt;&lt;br /&gt;
• CIDR - Classless Internet Domain Routing&lt;br /&gt;
&lt;/span&gt;&lt;/td&gt;                 &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/td&gt;           &lt;/tr&gt;
&lt;tr&gt;             &lt;td bgcolor="#CC0000"&gt;&lt;img height="1" src="http://z.about.com/" width="1" /&gt;&lt;/td&gt;           &lt;/tr&gt;
&lt;tr&gt;             &lt;td&gt;&lt;img height="6" src="http://z.about.com/" width="1" /&gt;&lt;/td&gt;           &lt;/tr&gt;
&lt;tr&gt;             &lt;td&gt;&lt;table border="0" cellpadding="2" cellspacing="0"&gt;&lt;tbody&gt;
&lt;tr bgcolor="#CCCCFF"&gt;                   &lt;td&gt;&lt;span style="color: #330066; font-family: verdana,geneva,helvetica; font-size: xx-small;"&gt; &lt;b&gt;Related Resources&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;                 &lt;/tr&gt;
&lt;tr bgcolor="#EEEEEE"&gt;                   &lt;td valign="top"&gt;&lt;span style="font-family: verdana,geneva,helvetica; font-size: xx-small;"&gt;• IP Practice Test&lt;br /&gt;
• TCP/IP Resources&lt;br /&gt;
• Network Protocol Resources&lt;br /&gt;
&lt;/span&gt;&lt;/td&gt;                 &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/td&gt;           &lt;/tr&gt;
&lt;tr&gt;             &lt;td bgcolor="#CC0000"&gt;&lt;img height="1" src="http://z.about.com/" width="1" /&gt;&lt;/td&gt;           &lt;/tr&gt;
&lt;tr&gt;             &lt;td&gt;&lt;img height="6" src="http://z.about.com/" width="1" /&gt;&lt;/td&gt;           &lt;/tr&gt;
&lt;tr&gt;             &lt;td&gt;&lt;table border="0" cellpadding="2" cellspacing="0"&gt;&lt;tbody&gt;
&lt;tr bgcolor="#CCCCFF"&gt;                   &lt;td&gt;&lt;span style="color: #330066; font-family: verdana,geneva,helvetica; font-size: xx-small;"&gt; &lt;b&gt;Elsewhere on the Web&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;                 &lt;/tr&gt;
&lt;tr bgcolor="#EEEEEE"&gt;                   &lt;td valign="top"&gt;&lt;span style="font-family: verdana,geneva,helvetica; font-size: xx-small;"&gt;• ICANN&lt;br /&gt;
&lt;/span&gt;&lt;/td&gt;                 &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/td&gt;           &lt;/tr&gt;
&lt;tr&gt;             &lt;td bgcolor="#CC0000"&gt;&lt;img height="1" src="http://z.about.com/" width="1" /&gt;&lt;/td&gt;           &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;... . DNS allows nodes on the public Internet to be assigned both an IP address and a corresponding name, called a &lt;b&gt;domain name&lt;/b&gt;.  For DNS to work as designed, these names must be unique worldwide.  Hence an entire "cottage industry" has emerged around the purchasing of  domain names in the Internet name space.&lt;br /&gt;
&lt;h5&gt;DNS Name Space&lt;/h5&gt;DNS is a &lt;b&gt;hierarchical&lt;/b&gt; system. DNS organizes all registered names in a tree structure.          At the base or &lt;b&gt;root&lt;/b&gt; of the tree are a group of &lt;b&gt;top-level domains&lt;/b&gt; including familiar names like &lt;span style="font-size: small;"&gt;&lt;tt&gt;com&lt;/tt&gt;&lt;/span&gt;, &lt;span style="font-size: small;"&gt;&lt;tt&gt;org&lt;/tt&gt;&lt;/span&gt;, and &lt;span style="font-size: small;"&gt;&lt;tt&gt;edu&lt;/tt&gt;&lt;/span&gt; and numerous &lt;b&gt;country-level domains&lt;/b&gt; like &lt;span style="font-size: small;"&gt;&lt;tt&gt;fi&lt;/tt&gt;&lt;/span&gt; (Finland), &lt;span style="font-size: small;"&gt;&lt;tt&gt;ca&lt;/tt&gt;&lt;/span&gt; (Canada), and &lt;span style="font-size: small;"&gt;&lt;tt&gt;my&lt;/tt&gt;&lt;/span&gt;  (Malaysia). One generally cannot purchase names at this level. However,  in a well-publicized and controversial event in 2000, the island nation  of Tuvalu agreed to receive a large payment in return for rights to the  root domain &lt;span style="font-size: small;"&gt;&lt;tt&gt;tv&lt;/tt&gt;&lt;/span&gt;.&lt;br /&gt;
Below this level are the second-level &lt;b&gt;registered domains&lt;/b&gt; such as &lt;span style="font-size: small;"&gt;&lt;tt&gt;about.com&lt;/tt&gt;&lt;/span&gt;. These are domains that organizations can purchase from any of numerous accredited &lt;b&gt;registrars&lt;/b&gt;. For nodes in the &lt;span style="font-size: small;"&gt;&lt;tt&gt;com&lt;/tt&gt;&lt;/span&gt;, &lt;span style="font-size: small;"&gt;&lt;tt&gt;org&lt;/tt&gt;&lt;/span&gt;, and &lt;span style="font-size: small;"&gt;&lt;tt&gt;edu&lt;/tt&gt;&lt;/span&gt; domains, the Internet Corporation for Assigned Names and Numbers (ICANN) oversees registrations.&lt;br /&gt;
Below that, &lt;b&gt;local domains&lt;/b&gt; like &lt;span style="font-size: small;"&gt;&lt;tt&gt;compnetworking.about.com&lt;/tt&gt;&lt;/span&gt;  are defined and administered by the overall domain owner. DNS supports  additional tree levels as well. The period ('.') always separates each  level of the hierarchy in DNS.&lt;br /&gt;
&lt;h5&gt;DNS Root Level and Other Servers&lt;/h5&gt;DNS is also a &lt;b&gt;distributed&lt;/b&gt; system. The DNS database  contains a list of registered domain names. It further contains a  mapping or conversion between each name and one or more IP addresses.  However, DNS requires a coordinated effort among many computers  (servers); no one computer holds the entire DNS database. Each &lt;b&gt;DNS server&lt;/b&gt; maintain just one piece of the overall hierarchy - one level of the tree and then only a subset or &lt;b&gt;zone&lt;/b&gt; within that level.&lt;br /&gt;
The top level of the DNS hierarchy, also called the &lt;b&gt;root&lt;/b&gt; level, is maintained by a set of 13 servers called &lt;b&gt;root name servers&lt;/b&gt;.  These servers have gained some notoriety for their unique role on the  Internet. Maintained by various independent agencies, the servers are  uniquely named &lt;span style="font-size: small;"&gt;&lt;tt&gt;A&lt;/tt&gt;&lt;/span&gt;, &lt;span style="font-size: small;"&gt;&lt;tt&gt;B&lt;/tt&gt;&lt;/span&gt;, &lt;span style="font-size: small;"&gt;&lt;tt&gt;C&lt;/tt&gt;&lt;/span&gt; and so on up to &lt;span style="font-size: small;"&gt;&lt;tt&gt;M&lt;/tt&gt;&lt;/span&gt;. Ten of these servers reside in the United States, one in Japan, one in London, and one in Stockholm, Sweden.&lt;br /&gt;
&lt;h5&gt;DNS Resolvers&lt;/h5&gt;DNS works in a client/server fashion. DNS servers respond to requests from DNS clients called &lt;b&gt;resolvers&lt;/b&gt;. &lt;a href="http://compnetworking.about.com/library/glossary/bldef-isp.htm"&gt;ISPs&lt;/a&gt;  and other organizations set up local DNS resolvers as well as servers.  Most DNS servers also act as resolvers, routing requests up the tree to  higher-level DNS servers, and also delegating requests to other servers.  DNS servers eventually return the requested mapping (either  address-to-name or name-to-address) to the resolver.          &lt;br /&gt;
&lt;h5&gt;DNS and DHCP&lt;/h5&gt;DNS was not designed to work with dynamic addressing such as that supported by DHCP. DNS requires that fixed (&lt;b&gt;static&lt;/b&gt;) addresses be maintained in the database. Web servers in particular require fixed IP addresses for this reason. &lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;script type="text/javascript"&gt;
ch_client = "demo";
ch_width = 400;
ch_height = 90;
ch_type = "mpu";
ch_sid = "Chitika Default";
ch_color_site_link = "0000CC";
ch_color_title = "0000CC";
ch_color_border = "FFFFFF";
ch_color_text = "000000";
ch_color_bg = "FFFFFF";
&lt;/script&gt; &lt;script src="http://scripts.chitika.net/eminimalls/amm.js" type="text/javascript"&gt;
&lt;/script&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>Free Cisco Certification books - cisco boot camp - cisco certification training</title><link>http://testccnastudy.blogspot.com/2012/04/free-cisco-certification-books-cisco.html</link><category>Free Cisco Certification books - cisco boot camp - cisco certification training</category><pubDate>Tue, 3 Apr 2012 12:04:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-168138763321448804</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;CBT Nuggets Check Point CCSA Certified Security Administrator NGX R65 DVD | 759 MB&lt;br /&gt;
&lt;br /&gt;
Check  Point is the global leader in IT security, and Check Point CCSA  certification says you’ve got the expertise to handle corporate security  needs.&lt;br /&gt;
&lt;br /&gt;
Trainer Bobby Meador’s step-by-step instructions show you  how to improve the security of your current Check Point firewall  deployment or build a Check Point security solution from the ground up.&lt;br /&gt;
&lt;br /&gt;
This  series maps to Check Point’s Certified Security Administrator NGX R65  156-215.65 exam. Passing the test earns you Check Point CCSA  certification.&lt;br /&gt;
&lt;br /&gt;
Prerequisites&lt;br /&gt;
&lt;br /&gt;
Suggested prerequisites  include an understanding of networking (such as Cisco CCNA or CompTIA  Network+), Windows (such as 70-642 MCTS Windows 2008 Network  Infrastructure, Configuring), or Linux (such as CompTIA Linux+).&lt;br /&gt;
&lt;br /&gt;
Check Point Certified Security Administrator contents:&lt;br /&gt;
&lt;br /&gt;
* CCSA Welcome&lt;br /&gt;
&lt;br /&gt;
* Methods of attack&lt;br /&gt;
&lt;br /&gt;
* Firewall Concepts&lt;br /&gt;
&lt;br /&gt;
* Product Installation Part 1&lt;br /&gt;
&lt;br /&gt;
* Product Installation Part 2&lt;br /&gt;
&lt;br /&gt;
* Product Installation Part 3&lt;br /&gt;
&lt;br /&gt;
* Advanced Splat Config I&lt;br /&gt;
&lt;br /&gt;
* Advanced Splat Config II&lt;br /&gt;
&lt;br /&gt;
* NAT&lt;br /&gt;
&lt;br /&gt;
* Security Policy &amp;amp; Rule Base Design&lt;br /&gt;
&lt;br /&gt;
* VOIP Security&lt;br /&gt;
&lt;br /&gt;
* Traffic and System Monitoring (Smart View Tracker)&lt;br /&gt;
&lt;br /&gt;
* Smart View Monitor Review&lt;br /&gt;
&lt;br /&gt;
* Eventia Analyzer and Reporter&lt;br /&gt;
&lt;br /&gt;
* User Mgmt and Authentication I&lt;br /&gt;
&lt;br /&gt;
* User Mgmt and Authentication II&lt;br /&gt;
&lt;br /&gt;
* User Mgmt and Authentication III&lt;br /&gt;
&lt;br /&gt;
* (QOS) Quality of Service&lt;br /&gt;
&lt;br /&gt;
* Web Filtering and Anti virus&lt;br /&gt;
&lt;br /&gt;
* Smart Defense Part 1&lt;br /&gt;
&lt;br /&gt;
* Smart Defense Part 2&lt;br /&gt;
&lt;br /&gt;
* Smart Update/Licensing&lt;br /&gt;
&lt;br /&gt;
* Disaster Recovery/System backup&lt;br /&gt;
&lt;br /&gt;
&lt;pre class="alt2" dir="ltr" style="border: 1px inset; height: 146px; margin: 0px; overflow: auto; padding: 6px; text-align: left; width: 640px;"&gt;http://rapidshare.com/files/292272465/CNCPCCSACSANR65.part1.rar
http://rapidshare.com/files/292272685/CNCPCCSACSANR65.part2.rar
http://rapidshare.com/files/292273319/CNCPCCSACSANR65.part3.rar
http://rapidshare.com/files/292272590/CNCPCCSACSANR65.part4.rar
http://rapidshare.com/files/292273336/CNCPCCSACSANR65.part5.rar
http://rapidshare.com/files/292272556/CNCPCCSACSANR65.part6.rar
http://rapidshare.com/files/292272588/CNCPCCSACSANR65.part7.rar
http://rapidshare.com/files/292272462/CNCPCCSACSANR65.part8.rar&lt;/pre&gt;&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;script type="text/javascript"&gt;
ch_client = "demo";
ch_width = 400;
ch_height = 90;
ch_type = "mpu";
ch_sid = "Chitika Default";
ch_color_site_link = "0000CC";
ch_color_title = "0000CC";
ch_color_border = "FFFFFF";
ch_color_text = "000000";
ch_color_bg = "FFFFFF";
&lt;/script&gt; &lt;script src="http://scripts.chitika.net/eminimalls/amm.js" type="text/javascript"&gt;
&lt;/script&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>Cisco AIO Tutorials LABS</title><link>http://testccnastudy.blogspot.com/2012/04/cisco-aio-tutorials-labs.html</link><category>Cisco AIO Tutorials LABS</category><pubDate>Tue, 3 Apr 2012 12:02:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-6222466347827270265</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;Most of them are in iso files format, Its not just a video tutorials,  those are mostly Labs, it means you open an html file inside that, and  you will see 2 parts, one in flash and another in text.&lt;br /&gt;
At each  lesson you finished, you will get to challange flash where you have to  practice things you have learned, its like working on real cisco device.&lt;br /&gt;
You'll  have the flash SSH shell, and you have to type in the cisco commands,  and in case you make a mistake, you'll get wrong alerts and you can then  either correct it or need to read and listen to the section again and  see the correct answer by clicking the DEMO option, that will show you  the entire solution.&lt;br /&gt;
by the way, this is original cisco materials that you need to pay $$$$$$ for it, but for keen learners it is for freeee!!&lt;br /&gt;
&lt;br /&gt;
http://rapidshare.com/files/60597302/Cisco_AIO.part01.rar&lt;br /&gt;
http://rapidshare.com/files/60584606/Cisco_AIO.part02.rar&lt;br /&gt;
http://rapidshare.com/files/60575330/Cisco_AIO.part03.rar&lt;br /&gt;
http://rapidshare.com/files/60563480/Cisco_AIO.part04.rar&lt;br /&gt;
http://rapidshare.com/files/60525175/Cisco_AIO.part05.rar &lt;br /&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;script type="text/javascript"&gt;
ch_client = "demo";
ch_width = 400;
ch_height = 90;
ch_type = "mpu";
ch_sid = "Chitika Default";
ch_color_site_link = "0000CC";
ch_color_title = "0000CC";
ch_color_border = "FFFFFF";
ch_color_text = "000000";
ch_color_bg = "FFFFFF";
&lt;/script&gt; &lt;script src="http://scripts.chitika.net/eminimalls/amm.js" type="text/javascript"&gt;
&lt;/script&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item><item><title/><link>http://testccnastudy.blogspot.com/2012/04/ccna-chapter-answers-ccna-3-answers.html</link><pubDate>Sun, 1 Apr 2012 23:43:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-1597369614291542960</guid><description>CCNA Chapter Answers, CCNA 3 Answers, CCNA 3 Final Exam Answers 2012, final exam ccna 3 answer 2012&lt;br /&gt;&lt;a href="http://ping.fm/DHlIM"&gt;http://ping.fm/DHlIM&lt;/a&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>Download Free Cisco Material</title><link>http://testccnastudy.blogspot.com/2012/03/download-free-cisco-material.html</link><category>Download Free Cisco Material</category><pubDate>Sat, 31 Mar 2012 19:46:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-1508848312125517943</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;ul&gt;&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCNA%20640-802"&gt;CCNA 640-802&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CBT%20Nuggets"&gt;CBT Nuggets&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCNP%20Tshoot%20642-832"&gt;CCNP Tshoot 642-832&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/642-436%20CCVP%20Cvoice"&gt;642-436 CCVP Cvoice&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/642-642%20QoS"&gt;642-642 QoS&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/BGP%20642-661"&gt;BGP 642-661&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/BGP%20MPLS%20Ebooks"&gt;BGP MPLS Ebooks&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/BGP-MPLS%20642-691"&gt;BGP-MPLS 642-691&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCDA%20640-863"&gt;CCDA 640-863&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCDP%20ARCH%20642-873"&gt;CCDP ARCH 642-873&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCIE%20Dumps%20AIO"&gt;CCIE Dumps AIO&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCIE%20RS%20350-001"&gt;CCIE RS 350-001&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCIE%20RS%20Lab"&gt;CCIE RS Lab&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCIE%20SP%20Lab"&gt;CCIE SP Lab&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCIP%20MPLS%20642-611"&gt;CCIP MPLS 642-611&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCNA%20ICND1%20ICND2"&gt;CCNA ICND1 ICND2&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCNA%20Security%20640-553"&gt;CCNA Security 640-553&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCNA%20Voice%20640-460"&gt;CCNA Voice 640-460&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCNA%20Wireless%20640-721"&gt;CCNA Wireless 640-721&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCNP%20Route%20642-902"&gt;CCNP Route 642-902&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCNP%20Switch%20642-813"&gt;CCNP Switch 642-813&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCNP%20Wireless%20642-731%20CUWSS"&gt;CCNP Wireless 642-731 CUWSS&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCNP%20Wireless%20642-736%20IAUWS"&gt;CCNP Wireless 642-736 IAUWS&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCNP%20Wireless%20642-741%20IUWVN"&gt;CCNP Wireless 642-741 IUWVN&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCNP%20Wireless%20642-746%20IUWMS"&gt;CCNP Wireless 642-746 IUWMS&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCSP%20IPS%20642-533%20Dumps"&gt;CCSP IPS 642-533 Dumps&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCSP%20Mars%20642-545"&gt;CCSP Mars 642-545&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCSP%20SNAA%20642-515%20dumps"&gt;CCSP SNAA 642-515 dumps&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCSP%20SNAF%20642-524%20Dumps"&gt;CCSP SNAF 642-524 Dumps&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCSP%20SNRS%20642-504%20Dumps"&gt;CCSP SNRS 642-504 Dumps&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCVP%20CIPT1%20642-446"&gt;CCVP CIPT1 642-446&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCVP%20CIPT2%20642-456"&gt;CCVP CIPT2 642-456&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/CCVP%20TUC%20642-426"&gt;CCVP TUC 642-426&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/Download%20VCE%20Full%20Version"&gt;Download VCE Full Version&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a dir="ltr" href="http://ccna-ccnp-ccsp-ccie-training-gurgaon.blogspot.com/search/label/Interview%20Questions"&gt;Interview Questions&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;&lt;script type="text/javascript"&gt;
ch_client = "demo";
ch_width = 400;
ch_height = 90;
ch_type = "mpu";
ch_sid = "Chitika Default";
ch_color_site_link = "0000CC";
ch_color_title = "0000CC";
ch_color_border = "FFFFFF";
ch_color_text = "000000";
ch_color_bg = "FFFFFF";
&lt;/script&gt; &lt;script src="http://scripts.chitika.net/eminimalls/amm.js" type="text/javascript"&gt;
&lt;/script&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>Download Free Cisco IOS Images</title><link>http://testccnastudy.blogspot.com/2012/03/download-free-cisco-ios-images.html</link><category>Download Free Cisco IOS Images</category><pubDate>Sat, 31 Mar 2012 19:42:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-4197263015635546313</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;span style="color: #009900; font-size: 130%; font-weight: bold;"&gt;IOS  1700:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66647138/0554937/c1700-advipservicesk9-mz.124-15.T11.bin.html" target="_blank"&gt;c1700-advipservicesk9-mz.124-15.T11.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66649450/b5d0176/c1700-advipservicesk9-mz.124-15.T7.bin.html" target="_blank"&gt;c1700-advipservicesk9-mz.124-15.T7.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66586506/5267f7d/c1700-advipservicesk9-mz.124-15.T8.bin.html" target="_blank"&gt;c1700-advipservicesk9-mz.124-15.T8.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66587431/e111185/c1700-advipservicesk9-mz.124-15.T9.bin.html" target="_blank"&gt;c1700-advipservicesk9-mz.124-15.T9.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66588391/9d3339e/c1700-advipservicesk9-mz.124-23.bin.html" target="_blank"&gt;c1700-advipservicesk9-mz.124-23.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66589096/aa75168/c1700-advsecurityk9-mz.123-26.bin.html" target="_blank"&gt;c1700-advsecurityk9-mz.123-26.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66589401/5d57ed5/c1700-advsecurityk9-mz.124-10.bin.html" target="_blank"&gt;c1700-advsecurityk9-mz.124-10.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66589843/108a48a/c1700-advsecurityk9-mz.124-18.bin.html" target="_blank"&gt;c1700-advsecurityk9-mz.124-18.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66590308/d1d82af/c1700-advsecurityk9-mz.124-19.bin.html" target="_blank"&gt;c1700-advsecurityk9-mz.124-19.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66590752/e747f7c/c1700-advsecurityk9-mz.124-9.T.bin.html" target="_blank"&gt;c1700-advsecurityk9-mz.124-9.T.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66591232/3c03974/c1700-sy7-mz.124-21.bin.html" target="_blank"&gt;c1700-sy7-mz.124-21.bin&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
......................................................................................................&lt;br /&gt;
&lt;span style="color: #009900; font-size: 130%; font-weight: bold;"&gt;IOS  26xx:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66593662/fcce709/c2600-adventerprisek9-mz.124-15.T7.bin.html" target="_blank"&gt;c2600-adventerprisek9-mz.124-15.T7.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66594864/47b98c0/c2600-adventerprisek9-mz.124-23.bin.html" target="_blank"&gt;c2600-adventerprisek9-mz.124-23.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66595900/b6f2665/c2600-adventerprisek9_ivs-mz.124-19.bin.html" target="_blank"&gt;c2600-adventerprisek9_ivs-mz.124-19.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66596938/bc4a8f5/c2600-adventerprisek9_ivs-mz.124-21a.bin.html" target="_blank"&gt;c2600-adventerprisek9_ivs-mz.124-21a.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66597952/36b57b1/c2600-advipservicesk9-mz.124-17.bin.html" target="_blank"&gt;c2600-advipservicesk9-mz.124-17.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66598817/b030c50/c2600-advipservicesk9-mz.124-23.bin.html" target="_blank"&gt;c2600-advipservicesk9-mz.124-23.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66599785/0c7b627/c2600-advipservicesk9-mz.124-25b.bin.html" target="_blank"&gt;c2600-advipservicesk9-mz.124-25b.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66600730/78c80a9/c2600-advsecurityk9-mz.124-23.bin.html" target="_blank"&gt;c2600-advsecurityk9-mz.124-23.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66601378/272e7bb/c2600-ipbasek9-mz.124-23.bin.html" target="_blank"&gt;c2600-ipbasek9-mz.124-23.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66601854/6d5c58a/c2600-ipvoice_ivs-mz.124-21a.bin.html" target="_blank"&gt;c2600-ipvoice_ivs-mz.124-21a.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66602550/c5bc89d/c2600-telco-mz.124-25c.bin.html" target="_blank"&gt;c2600-telco-mz.124-25c.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66602953/86d43a4/c2691-adventerprisek9-mz.124-25c.bin.html" target="_blank"&gt;c2691-adventerprisek9-mz.124-25c.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66604039/ba96bde/c2691-adventerprisek9_ivs-mz.124-15.T12.bin.html" target="_blank"&gt;c2691-adventerprisek9_ivs-mz.124-15.T12.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66605589/5ab7318/c2691-advipservicesk9-mz.124-15.T12.bin.html" target="_blank"&gt;c2691-advipservicesk9-mz.124-15.T12.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66606812/56ebbf7/c2691-advipservicesk9-mz.124-15.T6.bin.html" target="_blank"&gt;c2691-advipservicesk9-mz.124-15.T6.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66608066/aa23abf/c2691-entbase-mz.124-23.bin.html" target="_blank"&gt;c2691-entbase-mz.124-23.bin&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
...............................................................................................................&lt;br /&gt;
&lt;span style="color: #009900; font-size: 130%; font-weight: bold;"&gt;IOS  36xx:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66608619/e3cb021/c3640-ik9o3s-mz.124-13.bin.html" target="_blank"&gt;c3640-ik9o3s-mz.124-13.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66609413/05ebce0/c3640-ik9o3s-mz.124-25a.bin.html" target="_blank"&gt;c3640-ik9o3s-mz.124-25a.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66610213/cc93f16/c3640-ik9o3s-mz.124-25c.bin.html" target="_blank"&gt;c3640-ik9o3s-mz.124-25c.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66611041/89241db/c3640-ik9s-mz.123-26.bin.html" target="_blank"&gt;c3640-ik9s-mz.123-26.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66611575/865ac7a/c3640-is-mz.124-13b.bin.html" target="_blank"&gt;c3640-is-mz.124-13b.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66612271/f1e5434/c3640-is-mz.124-21.bin.html" target="_blank"&gt;c3640-is-mz.124-21.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66613030/355c744/c3640-js-mz.124-13.bin.html" target="_blank"&gt;c3640-js-mz.124-13.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66614119/5a676d8/c3640-js-mz.124-25a.bin.html" target="_blank"&gt;c3640-js-mz.124-25a.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66614925/fb3254a/c3640-jsx-mz.124-19.bin.html" target="_blank"&gt;c3640-jsx-mz.124-19.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.4shared.com/file/107438077/ce999990/c3660-ik9o3s-mz124-13b.html" target="_blank"&gt;c3660-ik9o3s-mz.124-13b.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66615774/ce49cad/c3660-ik9s-mz.123-26.bin.html" target="_blank"&gt;c3660-ik9s-mz.123-26.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66616405/92ad41d/c3660-jk9o3s-mz.124-6.XT2.bin.html" target="_blank"&gt;c3660-jk9o3s-mz.124-6.XT2.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66617362/bb3e1f7/c3660-jk9s-mz.124-6.XT2.bin.html" target="_blank"&gt;c3660-jk9s-mz.124-6.XT2.bin&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
............................................................................................................&lt;br /&gt;
&lt;span style="color: #009900; font-size: 130%; font-weight: bold;"&gt;IOS  37xx:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.4shared.com/file/107437520/73222acb/c3725-adventerprisek9-mz124-15T5bin.html" target="_blank"&gt;c3725-adventerprisek9-mz.124-15.T5.bin.7z&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66618274/7a42eec/c3725-adventerprisek9-mz.124-11.XW7.bin.html" target="_blank"&gt;c3725-adventerprisek9-mz.124-11.XW7.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66619511/22d3be7/c3725-adventerprisek9-mz.124-15.T7.bin.html" target="_blank"&gt;c3725-adventerprisek9-mz.124-15.T7.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66620718/0388ca5/c3725-adventerprisek9-mz.124-23.bin.html" target="_blank"&gt;c3725-adventerprisek9-mz.124-23.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66621705/66e768a/c3725-adventerprisek9-mz.124-25.bin.html" target="_blank"&gt;c3725-adventerprisek9-mz.124-25.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66622884/a3f98ad/c3725-adventerprisek9_ivs-mz.124-25b.bin.html" target="_blank"&gt;c3725-adventerprisek9_ivs-mz.124-25b.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66624006/ddec4e7/c3725-advipservicesk9-mz.124-23.bin.html" target="_blank"&gt;c3725-advipservicesk9-mz.124-23.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66624892/4fc15b9/c3725-advipservicesk9-mz.124-25b.bin.html" target="_blank"&gt;c3725-advipservicesk9-mz.124-25b.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66625781/7492bca/c3725-advsecurityk9-mz.124-15.T12.bin.html" target="_blank"&gt;c3725-advsecurityk9-mz.124-15.T12.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66626458/a9e35f1/c3745-adventerprisek9-mz.123-26.bin.html" target="_blank"&gt;c3745-adventerprisek9-mz.123-26.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66627045/32b24c1/c3745-adventerprisek9-mz.124-25.bin.html" target="_blank"&gt;c3745-adventerprisek9-mz.124-25.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66628178/1b8e70d/c3745-adventerprisek9_ivs-mz.124-15.T8.bin.html" target="_blank"&gt;c3745-adventerprisek9_ivs-mz.124-15.T8.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66629513/033cad2/c3745-advipservicesk9-mz.124-15.T6.bin.html" target="_blank"&gt;c3745-advipservicesk9-mz.124-15.T6.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66630769/d898dff/c3745-advipservicesk9-mz.124-4.T1.bin.html" target="_blank"&gt;c3745-advipservicesk9-mz.124-4.T1.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66631719/1ab6d63/c3745-advsecurityk9-mz.124-23.bin.html" target="_blank"&gt;c3745-advsecurityk9-mz.124-23.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66632368/a80c851/c3745-ipbasek9-mz.124-25b.bin.html" target="_blank"&gt;c3745-ipbasek9-mz.124-25b.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66632863/a228695/c3745-ipvoice_ivs-mz.124-23.bin.html" target="_blank"&gt;c3745-ipvoice_ivs-mz.124-23.bin&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
.............................................................................................................&lt;br /&gt;
&lt;span style="color: #009900; font-size: 130%; font-weight: bold;"&gt;IOS  7200:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.4shared.com/file/129172876/6f675389/c7200-pk9u2-mz124-17.html" target="_blank"&gt;c7200-pk9u2-mz124-17.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66637069/8c9b064/c7200-adventerprisek9-mz.124-15.T9.bin.html" target="_blank"&gt;c7200-adventerprisek9-mz.124-15.T9.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66638200/2745dc6/c7200-adventerprisek9-mz.124-20.T.bin.html" target="_blank"&gt;c7200-adventerprisek9-mz.124-20.T.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66651582/2acc0f1/c7200-adventerprisek9-mz.124-22.T.bin.html" target="_blank"&gt;c7200-adventerprisek9-mz.124-22.T.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66655670/05af24e/c7200-adventerprisek9-mz.124-24.T.bin.html" target="_blank"&gt;c7200-adventerprisek9-mz.124-24.T.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66663188/1719859/c7200-advipservicesk9-mz.124-20.T.bin.html" target="_blank"&gt;c7200-advipservicesk9-mz.124-20.T.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66664518/36b7c66/c7200-advipservicesk9-mz.150-1.M.bin.html" target="_blank"&gt;c7200-advipservicesk9-mz.150-1.M.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66684252/f3d0af1/c7200-spservicesk9-mz.124-22.T.bin.html" target="_blank"&gt;c7200-spservicesk9-mz.124-22.T.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66665710/7feed9a/c7200-jk9o3s-mz.124-25a.bin.html" target="_blank"&gt;c7200-jk9o3s-mz.124-25a.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66666610/cb9f968/c7200-jk9o3s-mz.124-25b.bin.html" target="_blank"&gt;c7200-jk9o3s-mz.124-25b.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66668314/01a0306/c7200-jk9s-mz.124-21a.bin.html" target="_blank"&gt;c7200-jk9s-mz.124-21a.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66667387/3d114a0/c7200-jk9s-mz.124-21.bin.html" target="_blank"&gt;c7200-jk9s-mz.124-21.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66683279/a3eb2cd/c7200-p-mz.124-21a.bin.html" target="_blank"&gt;c7200-p-mz.124-21a.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66643225/74fcd19/c7200p-adventerprisek9-mz.124-4.XD9.bin.html" target="_blank"&gt;c7200p-adventerprisek9-mz.124-4.XD9.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66644417/b557a53/c7200p-advipservicesk9-mz.124-4.XD10.bin.html" target="_blank"&gt;c7200p-advipservicesk9-mz.124-4.XD10.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66672800/8aef31e/c7200p-adventerprisek9-mz.124-15.T1.bin.html" target="_blank"&gt;c7200p-adventerprisek9-mz.124-15.T1.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66674111/fa8d4d3/c7200p-adventerprisek9-mz.124-15.T7.bin.html" target="_blank"&gt;c7200p-adventerprisek9-mz.124-15.T7.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66675076/b34d1de/c7200p-adventerprisek9-mz.124-15.T8.bin.html" target="_blank"&gt;c7200p-adventerprisek9-mz.124-15.T8.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66675973/91e37df/c7200p-adventerprisek9-mz.124-20.T.bin.html" target="_blank"&gt;c7200p-adventerprisek9-mz.124-20.T.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66677049/e7e2740/c7200p-adventerprisek9-mz.124-22.T.bin.html" target="_blank"&gt;c7200p-adventerprisek9-mz.124-22.T.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66678390/5918b06/c7200p-adventerprisek9-mz.124-24.T.bin.html" target="_blank"&gt;c7200p-adventerprisek9-mz.124-24.T.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66679751/f5d21f0/c7200p-adventerprisek9-mz.124-4.XD11.bin.html" target="_blank"&gt;c7200p-adventerprisek9-mz.124-4.XD11.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66680811/c6308e7/c7200p-adventerprisek9-mz.124-4.XD12.bin.html" target="_blank"&gt;c7200p-adventerprisek9-mz.124-4.XD12.bin&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://hotfile.com/dl/66681892/41dcd21/c7200p-adventerprisek9_sna-mz.124-24.T1.bin.html" target="_blank"&gt;c7200p-adventerprisek9_sna-mz.124-24.T1.bin&lt;/a&gt;&lt;script type="text/javascript"&gt;
ch_client = "demo";
ch_width = 400;
ch_height = 90;
ch_type = "mpu";
ch_sid = "Chitika Default";
ch_color_site_link = "0000CC";
ch_color_title = "0000CC";
ch_color_border = "FFFFFF";
ch_color_text = "000000";
ch_color_bg = "FFFFFF";
&lt;/script&gt; &lt;script src="http://scripts.chitika.net/eminimalls/amm.js" type="text/javascript"&gt;
&lt;/script&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>CCNA 3 Practice Questions 2012</title><link>http://testccnastudy.blogspot.com/2012/03/ccna-3-practice-questions-2012.html</link><category>CCNA 3 Practice Questions 2012</category><pubDate>Wed, 28 Mar 2012 23:50:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-4060818279834071515</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;table cellpadding="0" cellspacing="0"&gt;&lt;tbody&gt;
&lt;tr&gt;     &lt;td&gt;&lt;b&gt;Q1&lt;/b&gt;&lt;/td&gt;     &lt;td&gt;&lt;a href="http://www.simulationexams.com/SampleQuestions/ccna_q1.htm"&gt;IP address range  classification&lt;/a&gt;&lt;/td&gt;     &lt;td&gt;&lt;b&gt;Q11&lt;/b&gt;&lt;/td&gt;     &lt;td&gt;&lt;a href="http://www.simulationexams.com/SampleQuestions/ccna_q11.htm"&gt;Cisco IOS -show cdp&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;     &lt;td&gt;&lt;b&gt;Q2&lt;/b&gt;&lt;/td&gt;     &lt;td&gt;&lt;a href="http://www.simulationexams.com/SampleQuestions/ccna_q2.htm"&gt;IP host subnet  calculation&lt;/a&gt; &lt;/td&gt;     &lt;td&gt;&lt;b&gt;Q12&lt;/b&gt;&lt;/td&gt;     &lt;td&gt;&lt;a href="http://www.simulationexams.com/SampleQuestions/ccna_q12.htm"&gt;Cisco IOS show interface&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;     &lt;td&gt;&lt;b&gt;Q3&lt;/b&gt;&lt;/td&gt;     &lt;td&gt;&lt;a href="http://www.simulationexams.com/SampleQuestions/ccna_q3.htm"&gt;OSI data link layer and sub layers&lt;/a&gt;&lt;/td&gt;     &lt;td&gt;&lt;b&gt;Q13&lt;/b&gt;&lt;/td&gt;     &lt;td&gt;&lt;a href="http://www.simulationexams.com/SampleQuestions/ccna_q13.htm"&gt;Ehternet frame  types&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;     &lt;td&gt;&lt;b&gt;Q4&lt;/b&gt;&lt;/td&gt;     &lt;td&gt;&lt;a href="http://www.simulationexams.com/SampleQuestions/ccna_q4.htm"&gt;Repeaters, bridges, and routers&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/td&gt;     &lt;td&gt;&lt;b&gt;Q14&lt;/b&gt;&lt;/td&gt;     &lt;td&gt;&lt;a href="http://www.simulationexams.com/SampleQuestions/ccna_q14.htm"&gt;IPX access list&lt;/a&gt;s&lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;     &lt;td&gt;&lt;b&gt;Q5&lt;/b&gt;&lt;/td&gt;     &lt;td&gt;&lt;a href="http://www.simulationexams.com/SampleQuestions/ccna_q5.htm"&gt;OSI session layer standards&amp;nbsp; &lt;/a&gt;&amp;nbsp;&lt;/td&gt;     &lt;td&gt;&lt;b&gt;Q15&lt;/b&gt;&lt;/td&gt;     &lt;td&gt;&lt;a href="http://www.simulationexams.com/SampleQuestions/ccna_q15.htm"&gt;IP access lists&lt;/a&gt;&lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;     &lt;td&gt;&lt;b&gt;Q6&lt;/b&gt;&lt;/td&gt;     &lt;td&gt;&lt;a href="http://www.simulationexams.com/SampleQuestions/ccna_q6.htm"&gt;OSI and DoD models&lt;/a&gt;&lt;/td&gt;     &lt;td&gt;&lt;b&gt;Q16&lt;/b&gt;&lt;/td&gt;     &lt;td&gt;&lt;a href="http://www.simulationexams.com/SampleQuestions/ccna_q16.htm"&gt;ISDN reference points&lt;/a&gt;&lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;     &lt;td&gt;&lt;b&gt;Q7&lt;/b&gt;&lt;/td&gt;     &lt;td&gt;&lt;a href="http://www.simulationexams.com/SampleQuestions/ccna_q7.htm"&gt;Cisco IOS banner motd &lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/td&gt;     &lt;td&gt;&lt;b&gt;Q17&lt;/b&gt;&lt;/td&gt;     &lt;td&gt;&lt;a href="http://www.simulationexams.com/SampleQuestions/ccna_q17.htm"&gt;VLAN Trunk Protocol&lt;/a&gt;&amp;nbsp;&lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;     &lt;td&gt;&lt;b&gt;Q8&lt;/b&gt;&lt;/td&gt;     &lt;td&gt;&lt;a href="http://www.simulationexams.com/SampleQuestions/ccna_q8.htm"&gt;Routing protocol- administrative distance&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/td&gt;     &lt;td&gt;&lt;b&gt;Q18&lt;/b&gt;&lt;/td&gt;     &lt;td&gt;&lt;a href="http://www.simulationexams.com/SampleQuestions/ccna_q18.htm"&gt;WAN terms Demarc, CSU/DSU, Modem&lt;/a&gt;&amp;nbsp;&lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;     &lt;td&gt;&lt;b&gt;Q9&lt;/b&gt;&lt;/td&gt;     &lt;td&gt;&lt;a href="http://www.simulationexams.com/SampleQuestions/ccna_q9.htm"&gt;LAN  technologies &lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/td&gt;     &lt;td&gt;&lt;b&gt;Q19&lt;/b&gt;&lt;/td&gt;     &lt;td&gt;&lt;a href="http://www.simulationexams.com/SampleQuestions/ccna_q19.htm"&gt;Cisco  IOS command history buffer navigation&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;     &lt;td&gt;&lt;b&gt;Q10&lt;/b&gt;&lt;/td&gt;     &lt;td&gt;&lt;a href="http://www.simulationexams.com/SampleQuestions/ccna_q10.htm"&gt;VLAN&lt;/a&gt;&lt;/td&gt;     &lt;td&gt;&lt;b&gt;Q20&lt;/b&gt;&lt;/td&gt;     &lt;td&gt;&lt;a href="http://www.simulationexams.com/SampleQuestions/ccna_q20.htm"&gt;Static VLANs&lt;/a&gt;&lt;/td&gt;   &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div dir="ltr" style="text-align: center;" trbidi="on"&gt;&lt;script type="text/javascript"&gt;
ch_client = "demo";
ch_width = 400;
ch_height = 90;
ch_type = "mpu";
ch_sid = "Chitika Default";
ch_color_site_link = "0000CC";
ch_color_title = "0000CC";
ch_color_border = "FFFFFF";
ch_color_text = "000000";
ch_color_bg = "FFFFFF";
&lt;/script&gt; &lt;script src="http://scripts.chitika.net/eminimalls/amm.js" type="text/javascript"&gt;
&lt;/script&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>CCNA 2 Final Exam Answers (1)</title><link>http://testccnastudy.blogspot.com/2012/03/ccna-2-final-exam-answers-1.html</link><category>CCNA 2 Final Exam Answers (1)</category><pubDate>Fri, 23 Mar 2012 15:14:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-6394904749701796039</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;strong&gt;1. Refer to the exhibit. A new PC was deployed in the Sales network. It was given the host address of 192.168.10.31 with a &lt;span class="IL_AD" id="IL_AD1"&gt;default gateway&lt;/span&gt; of 192.168.10.17. The PC is not communicating with the network properly. What is the cause? &lt;/strong&gt;&lt;br /&gt;
The address is in the wrong subnet. &lt;br /&gt;
***192.168.10.31 is the broadcast address for this subnet. &lt;br /&gt;
The default gateway is incorrect. &lt;br /&gt;
The host address and default gateway are swapped. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;2. Refer to the routing table shown in the exhibit. What is the meaning of the highlighted value 192? &lt;/strong&gt;&lt;br /&gt;
It is the value assigned by the Dijkstra algorithm that designates the number of hops in the network. &lt;br /&gt;
It is the value used by the DUAL algorithm to determine the &lt;span class="IL_AD" id="IL_AD2"&gt;bandwidth&lt;/span&gt; for the link. &lt;br /&gt;
***It is the metric, which is &lt;span class="IL_AD" id="IL_AD8"&gt;cost&lt;/span&gt;. &lt;br /&gt;
It is the administrative distance. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;3. Refer to exhibit. Given the topology shown in the exhibit,  what three commands are needed to configure EIGRP on the Paris router?  (Choose three.) &lt;/strong&gt;&lt;br /&gt;
***Paris(config)# router eigrp 100 &lt;br /&gt;
Paris(config)# router eigrp &lt;br /&gt;
Paris(configrouter)# network 192.168.6.0 &lt;br /&gt;
***Paris(configrouter)# network 192.168.7.0 &lt;br /&gt;
***Paris(configrouter)# network 192.168.8.0 &lt;br /&gt;
Paris(configrouter)# network 192.168.9.0 &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;4. What are three features of CDP? (Choose three.) &lt;/strong&gt;&lt;br /&gt;
***tests Layer 2 connectivity &lt;br /&gt;
provides a layer of security &lt;br /&gt;
operates a OSI layers 2 and 3 &lt;br /&gt;
***enabled by default on each interface &lt;br /&gt;
used for debugging Layer 4 connectivity issues &lt;br /&gt;
***provides information on directly connected devices that have CDP enabled &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;5. Refer to the exhibit. What two &lt;span class="IL_AD" id="IL_AD12"&gt;statements&lt;/span&gt; are true based on the output shown? (Choose two.) &lt;/strong&gt;&lt;br /&gt;
the reported distance to network 172.16.1.0 is 2172416 &lt;br /&gt;
192.168.10.5 and 192.168.10.9 are feasible successors &lt;br /&gt;
***&lt;span class="IL_AD" id="IL_AD11"&gt;neighbors&lt;/span&gt; 192.168.10.9 and 192.168.10.5 have auto summary disabled. &lt;br /&gt;
***router 3 is load balancing traffic to the 172.16.3.0 network across its serial interfaces. &lt;br /&gt;
all interfaces shown on Router3 are in the passive state and will not send EIGRP advertisements &lt;br /&gt;
&lt;span id="more-13"&gt;&lt;/span&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;6. Which of the following should be considered when troubleshooting a problem with the establishment of &lt;span class="IL_AD" id="IL_AD10"&gt;neighbor&lt;/span&gt; relationships between OSPF routers? (Choose three.) &lt;/strong&gt;&lt;br /&gt;
***OSPF interval timers mismatch &lt;br /&gt;
gateway of last resort not redistributed &lt;br /&gt;
***interface network type mismatch &lt;br /&gt;
no loopback interface configured &lt;br /&gt;
administrative distance mismatch &lt;br /&gt;
***inconsistent authentication configuration &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;7. Refer to the exhibit. Which three statements are true of the routing table for Router1? (Choose three.) &lt;/strong&gt;&lt;br /&gt;
The route to network 172.16.0.0 has an AD of 156160. &lt;br /&gt;
Network 192.168.0.16 can best be reached using FastEthernet0/0. &lt;br /&gt;
***The AD of EIGRP routes has been manually changed to a value other than the default value. &lt;br /&gt;
***Router1 is running both the EIGRP and OSPF routing process. &lt;br /&gt;
Network 172.17.0.0 can only be reached using a default route. &lt;br /&gt;
***No default route has been configured. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;8. Refer to the exhibit. The ORL router is unable to form a neighbor relationship with the JAX router. What is a possible cause of this problem? &lt;/strong&gt;&lt;br /&gt;
Router JAX has the wrong autonomoussystem number. &lt;br /&gt;
***The command network 192.168.2.0 is missing from the EIGRP configuration on the JAX router. &lt;br /&gt;
Automatic summarization is not disabled on the JAX router. &lt;br /&gt;
Router JAX has the wrong IP address on the Fa0/1 interface. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;9. Which &lt;span class="IL_AD" id="IL_AD7"&gt;statement&lt;/span&gt; is true regarding routing metrics? &lt;/strong&gt;&lt;br /&gt;
All routing protocols use the same metrics. &lt;br /&gt;
EIGRP uses bandwidth as its only metric. &lt;br /&gt;
***Routers compare metrics to determine the best route. &lt;br /&gt;
The larger metric generally represents the better path. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;10. Which three statements are true of holddown timers? (Choose three.) &lt;/strong&gt;&lt;br /&gt;
used by link state routing protocols to prevent routing loops &lt;br /&gt;
***prevent update messages from reinstating a route that may have gone bad &lt;br /&gt;
***allow routers to still forward packets to &lt;span class="IL_AD" id="IL_AD5"&gt;destination&lt;/span&gt; networks that are in holddown &lt;br /&gt;
limit the number of hops a packet can traverse through the network before it is discarded &lt;br /&gt;
prevent a router advertising a network through the same interface from which the network was learned &lt;br /&gt;
***permit lower metric updates received from any neighboring router to reinstate the route to a possibly down network &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;11. A router has learned about a network through static and  dynamic routing processes. Which route will be used to reach network  192.168.168.0? &lt;/strong&gt;&lt;br /&gt;
D 192.168.168.0/24 [90/2195456] via 192.168.200.1, 00:00:09, Ethernet0 &lt;br /&gt;
O 192.168.168.0/24 [110/1012] via 192.168.200.1, 00:00:22, Ethernet0 &lt;br /&gt;
R 192.168.168.0/24 [120/1] via 192.168.200.1, 00:00:17, Ethernet0 &lt;br /&gt;
***S 192.168.168.0/24 [1/0] via 192.168.200.1 &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;12. The Suffolk router is directly connected to the networks  shown in the graphic and has a default route that points to the Richmond  router. All interfaces are active and properly addressed. However, when  the workstation on network 172.29.5.0/24 sends a packet to destination address 172.29.198.5, it is discarded by the Suffolk router. What can be a reason for this result? &lt;/strong&gt;&lt;br /&gt;
The ip classless command is not enabled on the Richmond router. &lt;br /&gt;
The route was ignored if the Richmond router did not include the 172.29.198.0/24 network in its routing updates. &lt;br /&gt;
The Richmond router is in a different autonomous system than the Suffolk router. &lt;br /&gt;
The ip subnetzero command was not configured on the Suffolk router. &lt;br /&gt;
***The ip classless command is not enabled on the Suffolk router. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;13. Which three statements are true regarding the encapsulation and deencapsulation of packets when traveling through a router? (Choose three.) &lt;/strong&gt;&lt;br /&gt;
***The router modifies the TTL field, decrementing it by one. &lt;br /&gt;
The router changes the source IP to the IP of the exit interface. &lt;br /&gt;
***The router maintains the same source and destination IP. &lt;br /&gt;
***The router changes the source physical address to the physical address of the exit interface. &lt;br /&gt;
The router changes the destination IP to the IP of the exit interface. &lt;br /&gt;
The router sends the packet out all other interfaces, besides the one it entered the router on. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;14. Which of the following are required when adding a network to the OSPF routing process configuration? (Choose three.) &lt;/strong&gt;&lt;br /&gt;
***network address &lt;br /&gt;
loopback address &lt;br /&gt;
autonomous system number &lt;br /&gt;
subnet mask &lt;br /&gt;
***wildcard mask &lt;br /&gt;
***area ID &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;15. Refer to the exhibit. The routers in the exhibit are running the EIGRP routing protocol. What statement is true regarding how packets will travel from the 172.16.1.0/16 network to the 192.168.200.0/24 network? &lt;/strong&gt;&lt;br /&gt;
The router chooses the first path that it learned and installs only that route in the routing table. &lt;br /&gt;
The router chooses the path with the lowest administrative distance and installs only that route in the routing table. &lt;br /&gt;
The router chooses the highest routing ID based on the advertised network &lt;span class="IL_AD" id="IL_AD3"&gt;IP addresses&lt;/span&gt; and installs only that route in the routing table.&lt;br /&gt;
The router installs all the equal cost paths in the routing table but sends packets out only one, &lt;span class="IL_AD" id="IL_AD6"&gt;holding&lt;/span&gt; the others in reserve in case the primary route goes down.&lt;br /&gt;
***The router installs all the equal cost paths in the routing table and performs equal cost load balancing to send packets out multiple exit interfaces. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;16. Which of the following could describe the devices labeled "?" in the graphic? (Choose three.) &lt;/strong&gt;&lt;br /&gt;
***DCE &lt;br /&gt;
***CSU/DSU &lt;br /&gt;
LAN switch &lt;br /&gt;
***Modem &lt;br /&gt;
hub &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;17. Which three statements describe the operation of routing with EIGRP? (Choose three.) &lt;/strong&gt;&lt;br /&gt;
***As new neighbors are discovered, entries are placed in a neighbor table. &lt;br /&gt;
If the feasible successor has a higher advertised cost than the current successor route, then it becomes the primary route. &lt;br /&gt;
***If hello packets are not received within the hold time, DUAL must recalculate the topology. &lt;br /&gt;
***The reported distance is &lt;span class="IL_AD" id="IL_AD9"&gt;the distance&lt;/span&gt; to a destination as advertised by a neighbor. &lt;br /&gt;
EIGRP maintains full knowledge of the &lt;span class="IL_AD" id="IL_AD4"&gt;network topology&lt;/span&gt; in the topology table and exchanges full routing information with neighboring routers in every update. &lt;br /&gt;
EIGRP builds one routing table that contains routes for all configured routed protocols. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;18. The network shown in the diagram is having problems  routing traffic. It is suspected that the problem is with the addressing  scheme. What is the problem with the addressing used in the topology? &lt;/strong&gt;&lt;br /&gt;
The address assigned to the Ethernet0 interface of Router1 is a broadcast address for that subnetwork. &lt;br /&gt;
***The subnetwork configured on the serial link between Router1 and  Router2 overlaps with the subnetwork assigned to Ethernet0 of Router3. &lt;br /&gt;
The subnetwork assigned to the Serial0 interface of Router1 is on a  different subnetwork from the address for Serial0 of Router2. &lt;br /&gt;
The subnetwork assigned to Ethernet0 of Router2 overlaps with the subnetwork assigned to Ethernet0 of Router3. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;19. Refer to the exhibit. Packets destined to which two  networks will require the router to perform a recursive lookup? (Choose  two.) &lt;/strong&gt;&lt;br /&gt;
***10.0.0.0/8 &lt;br /&gt;
64.100.0.0/16 &lt;br /&gt;
128.107.0.0/16 &lt;br /&gt;
172.16.40.0/24 &lt;br /&gt;
192.168.1.0/24 &lt;br /&gt;
***192.168.2.0/24 &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;20. Refer to exhibit. A company network engineer enters the  following commands in the routers:R1(config)# ip route 10.1.1.0  255.255.255.0 192.168.0.2R2(config)# ip route 10.1.2.0 255.255.255.0  192.168.0.1When the engineer enters the show ip route command on R1, the  routing table does not display the static route to the 10.1.1.0  network. All R1 and R2 interfaces are correctly addressed per the  graphic. What is a logical next step that the engineer could take in  order to make the static route display in the routing table in R1? &lt;/strong&gt;&lt;br /&gt;
Enter default routes in R1 and R2. &lt;br /&gt;
***Enable the R1 and R2 serial interfaces. &lt;br /&gt;
Configure the static route to use an exit interface instead of a nexthop address. &lt;br /&gt;
Enter the copy run start command to force the router to recognize the configuration. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;21. When the show cdp neighbors command is issued from Router C, which devices will be displayed in the output? &lt;/strong&gt;&lt;br /&gt;
D, SWH2 &lt;br /&gt;
A, B, D &lt;br /&gt;
SWH1, SWH2 &lt;br /&gt;
***B, D &lt;br /&gt;
SWH1, A, B &lt;br /&gt;
A, B, D, SWH1, SWH2 &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;22. Refer to the exhibit. R1 knows two routes, Path A and  Path B, to the Ethernet network attached to R3. R1 learned Path A to  network 10.2.0.0/16 from a static route and Path B to network  10.2.0.0/16 from EIGRP. Which route will R1 install in its routing  table? &lt;/strong&gt;&lt;br /&gt;
Both routes are installed and load balancing occurs across both paths. &lt;br /&gt;
The route via Path B is installed because the EIGRP route has the best metric to network 10.2.0.0/16. &lt;br /&gt;
The route via Path A is installed because the static route has the best metric to network 10.2.0.0/16. &lt;br /&gt;
The route via Path B is installed because the EIGRP route has the lowest administrative distance to network 10.2.0.0/16. &lt;br /&gt;
***The route via Path A is installed because the static route has the lowest administrative distance to network 10.2.0.0/16. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;23. A network administrator has enabled RIP on routers B and C  in the network diagram. Which of the following commands will prevent  RIP updates from being sent to Router A? &lt;/strong&gt;&lt;br /&gt;
A(config)# router rip    &lt;br /&gt;
A(configrouter)# passiveinterface S0/0 &lt;br /&gt;
B(config)# router rip    &lt;br /&gt;
B(configrouter)# network 192.168.25.48     &lt;br /&gt;
B(configrouter)# network 192.168.25.64 &lt;br /&gt;
A(config)# router rip    &lt;br /&gt;
A(configrouter)# no network 192.168.25.32 &lt;br /&gt;
***B(config)# router rip    &lt;br /&gt;
B(configrouter)# passiveinterface S0/0 &lt;br /&gt;
A(config)# no router rip &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;24. Refer to the exhibit. The network administrator is  testing network connectivity by issuing the tracert command from host A  to host B. Given the exhibited output on host A, what are two possible  routing table issues on the network? (Choose two.) &lt;/strong&gt;&lt;br /&gt;
Router1 is missing a route to the 172.16.0.0 network &lt;br /&gt;
Router1 is missing a route to the 192.168.1.0 network &lt;br /&gt;
Router2 is missing a route to the 10.0.0.0 network &lt;br /&gt;
***Router2 is missing a route to the 172.16.0.0 network &lt;br /&gt;
***Router3 is missing a route to the 10.0.0.0 network &lt;br /&gt;
Router3 is missing a route to the 192.168.0.0 network &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;25. Refer to the exhibit. What will happen if interface Serial0/0/1 goes down on Router1? &lt;/strong&gt;&lt;br /&gt;
The Dijkstra algorithm will calculate the feasible successor. &lt;br /&gt;
***DUAL will query neighbors for a route to network 192.168.1.0. &lt;br /&gt;
Neighbor 172.16.3.2 will be promoted to the feasible successor. &lt;br /&gt;
Traffic destined to the 192.168.1.0 network will be dropped immediately due to lack of a feasible successor. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;26. Refer to the exhibit. Pings are failing between HostA and  HostB. The network administrator discovers that Router1 does not have a  route to the 172.16.0.0 network. Assuming Router2 is configured  correctly, which two static routes could be configured on Router1 to  enable Host A to reach network 172.16.0.0? (Choose two.) &lt;/strong&gt;&lt;br /&gt;
***ip route 172.16.0.0 255.255.0.0 S0/0 &lt;br /&gt;
ip route 172.16.0.0 255.255.0.0 S0/1 &lt;br /&gt;
ip route 172.16.0.0 255.255.0.0 192.168.0.1 &lt;br /&gt;
***ip route 172.16.0.0 255.255.0.0 192.168.0.2 &lt;br /&gt;
ip route 192.168.0.1 172.16.0.0 255.255.0.0 S0/0 &lt;br /&gt;
ip route 192.168.0.1 172.16.0.0 255.255.0.0 S0/1 &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;27. Refer to the exhibit. The results of the show ip route  command are displayed in the graphic for Router R2. Which route will be  selected for a packet with a destination address of 10.1.4.1? &lt;/strong&gt;&lt;br /&gt;
static route to 10.1.0.0/22 &lt;br /&gt;
RIP route to 10.1.0.0/23 &lt;br /&gt;
RIP route to 10.1.0.0/24 &lt;br /&gt;
***0.0.0.0/0 via 192.168.0.1 &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;28. Refer to the exhibit. The network is running the RIP  routing protocol. Network 10.0.0.0 goes down. Which statement is true  regarding how the routers in this topology will respond to this event? &lt;/strong&gt;&lt;br /&gt;
Router4 will learn about the failed route 30 seconds later in the next periodic update. &lt;br /&gt;
Split horizon will prevent Router4 from fowarding packets to the 10.0.0.0 network until the holddown timer expires. &lt;br /&gt;
Router5 immediately flushes the unreachable route from its routing table. &lt;br /&gt;
***Router5 will send Router4 a triggered update with a metric of 16 for network 10.0.0.0. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;29. Refer to the exhibit. When troubleshooting a network, it  is important to interpret the output of various router commands. On the  basis of the exhibit, which three statements are true? (Choose three.) &lt;/strong&gt;&lt;br /&gt;
The missing information for Blank 1 is the command show ip route. &lt;br /&gt;
***The missing information for Blank 1 is the command debug ip route. &lt;br /&gt;
The missing information for Blank 2 is the number 100. &lt;br /&gt;
***The missing information for Blank 2 is the number 120. &lt;br /&gt;
The missing information for Blank 3 is the letter R. &lt;br /&gt;
***The missing information for Blank 3 is the letter C. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;30. A network administrator has configured a default route on  Router_A but it is not being shared with adjacent Router_B and the  other routers in the OSPF area. Which command will save the  administrator the time and trouble of configuring this default route on  Router_B and all of the other routers in the OSPF area? &lt;/strong&gt;&lt;br /&gt;
Router_A(configrouter)# ospf redistribute defaultroute &lt;br /&gt;
Router_B(configrouter)# ospf redistribute defaultroute &lt;br /&gt;
***Router_A(configrouter)# defaultinformation originate &lt;br /&gt;
Router_B(configrouter)# defaultinformation originate &lt;br /&gt;
Router_A(configrouter)# ip ospf updatedefault &lt;br /&gt;
Router_B(configrouter)# ip ospf updatedefault &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;31. Refer to the exhibit. The network administrator issues  the command no ip classless on Router1. What forwarding action will take  place on a packet that is received by Router1 and is destined for host  192.168.0.26? &lt;/strong&gt;&lt;br /&gt;
***The packet will be dropped. &lt;br /&gt;
The packet will be forwarded to the gateway of last resort. &lt;br /&gt;
The packet will match the 192.168.0.0 network and be forwarded out Serial 0/0. &lt;br /&gt;
The packet will most closely match the 192.168.0.8 subnet and be forwarded out Serial 0/1. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;32. Refer to the exhibit. A packet enters Router1 with a  destination IP of 172.16.28.121. Which routing table entry will be used  to forward this packet to the destination address? &lt;/strong&gt;&lt;br /&gt;
172.16.0.0/16 [1/0] via 192.168.0.1 &lt;br /&gt;
172.16.0.0/20 [1/0] via 192.168.0.9 &lt;br /&gt;
***172.16.16.0/20 [1/0] via 192.168.0.17 &lt;br /&gt;
0.0.0.0/0 is directly connected, Serial0/0/1 &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;33. The network administrator configures the router with the  ip route 172.16.1.0 255.255.255.0 172.16.2.2 command. How will this  route appear in the routing table? &lt;/strong&gt;&lt;br /&gt;
C 172.16.1.0 is directly connected, Serial0/0 &lt;br /&gt;
S 172.16.1.0 is directly connected, Serial0/0 &lt;br /&gt;
C 172.16.1.0 [1/0] via 172.16.2.2 &lt;br /&gt;
***S 172.16.1.0 [1/0] via 172.16.2.2 &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;34. Using default settings, what is the next step in the router boot sequence after the IOS loads from flash? &lt;/strong&gt;&lt;br /&gt;
Perform the POST routine. &lt;br /&gt;
Search for a backup IOS in ROM. &lt;br /&gt;
Load the bootstrap program from ROM. &lt;br /&gt;
Load the runningconfig file from RAM. &lt;br /&gt;
***Locate and load the startupconfig file from NVRAM. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;35. What does RIP use to reduce convergence time in a larger network? &lt;/strong&gt;&lt;br /&gt;
It reduces the update timer to 15 seconds if there are more then 10 routes. &lt;br /&gt;
***It uses triggered updates to announce network changes if they happen in between the periodic updates. &lt;br /&gt;
It uses random pings to detect if a pathway is down and therefore is preemptive on finding networks that are down. &lt;br /&gt;
It uses multicast instead of broadcast to send routing updates. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;36. Refer to the exhibit. What are the effects of the exhibited commands on the router? &lt;/strong&gt;&lt;br /&gt;
All passwords are encrypted. &lt;br /&gt;
Only Telnet sessions are encrypted. &lt;br /&gt;
***Only the enable password is encrypted. &lt;br /&gt;
Only the enable password and Telnet session are encrypted. &lt;br /&gt;
Enable and console passwords are encrypted. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;37. Refer to the exhibit. What is the most efficient summarization of the routes attached to router R1? &lt;/strong&gt;&lt;br /&gt;
198.18.0.0/16 &lt;br /&gt;
***198.18.48.0/21 &lt;br /&gt;
198.18.32.0/22 &lt;br /&gt;
198.18.48.0/23 &lt;br /&gt;
198.18.49.0/23 &lt;br /&gt;
198.18.52.0/22 &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;38. Refer to the exhibit. All router interfaces are  configured with an IP address and are operational. If no routing  protocols or static routes are configured, what information will be  included in the show ip route command output for router A? &lt;/strong&gt;&lt;br /&gt;
All of the 192.168.x.0 networks will be in the routing table. &lt;br /&gt;
***Routes to networks 192.168.1.0/24, 192.168.2.0/24, and 192.168.3.0/24 will be in the routing table. &lt;br /&gt;
The routing table will be empty because routes and dynamic routes have not been configured. &lt;br /&gt;
A default route is automatically installed in the routing table to allow connectivity between the networks. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;39. Refer to the exhibit. How many routes are both level 1 and qualify for use as an ultimate route? &lt;/strong&gt;&lt;br /&gt;
1 &lt;br /&gt;
***2 &lt;br /&gt;
3 &lt;br /&gt;
4 &lt;br /&gt;
5 &lt;br /&gt;
6 &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;40. When presented with multiple valid routes to a  destination, what criteria does a router use to determine which routes  to add to the routing table? &lt;/strong&gt;&lt;br /&gt;
The router selects the routes with the best metric. All routes that have the same best metric are added to the routing table. &lt;br /&gt;
***The router first selects routes with the lowest administrative  distance. The resulting routes are then prioritized by metric and the  routes with the best metric are added to the routing table. &lt;br /&gt;
The router selects the routes with the lowest administrative  distance. All routes with the same lowest administrative distance are  added to the routing table. &lt;br /&gt;
The router installs all routes in the routing table but uses the route with the best metric most when load balancing. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;41. Refer to the exhibit. What summary address can Router2  advertise to Router1 to reach the three networks on Routers 3, 4, and 5  without advertising any public address space or overlapping the networks  on Router1? &lt;/strong&gt;&lt;br /&gt;
172.16.0.0/8 &lt;br /&gt;
172.16.0.0/10 &lt;br /&gt;
***172.16.0.0/13 &lt;br /&gt;
172.16.0.0/20 &lt;br /&gt;
172.16.0.0/24 &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;42. What is the purpose of the TTL field within an IP packet header? &lt;/strong&gt;&lt;br /&gt;
clears an unreachable route from the routing table after the invalid timer expires. &lt;br /&gt;
prevents regular update messages from inappropriately reinstating a route that may have gone bad. &lt;br /&gt;
removes an unreachable route from the routing table after the flush timer expires&lt;br /&gt;
***limits the period of time or number of hops a packet can traverse through the network before it should be discarded. &lt;br /&gt;
used to mark the route as unreachable in a routing update that is sent to other routers&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;43. Refer to the exhibit. Hosts on the BOS Fa0/0 LAN are able  to ping the Fa0/1 interface on the JAX router and all interfaces on the  BOS and ORL routers. Why would hosts from the 10.0.0.0/24 network not  be able to ping hosts on the Fa0/0 LAN of the JAX router? &lt;/strong&gt;&lt;br /&gt;
The JAX router has the wrong process ID. &lt;br /&gt;
The JAX router needs the network 10.0.0.0 0.0.0.255 area 0 command. &lt;br /&gt;
***The JAX router needs the network 192.168.3.0 0.0.0.255 area 0 command. &lt;br /&gt;
The BOS router needs the network 192.168.3.0 0.0.0.255 area 0 command. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;44. What command would the network administrator apply to a  router that is running OSPF to advertise the entire range of addresses  included in 172.16.0.0/19 in area 0? &lt;/strong&gt;&lt;br /&gt;
R1(config-router)# network 172.16.0.0 0.0.0.255 area 0 &lt;br /&gt;
R1(config-router)# network 172.16.0.0 0.0.3.255 area 0 &lt;br /&gt;
R1(config-router)# network 172.16.0.0 0.0.15.255 area 0 &lt;br /&gt;
***R1(config-router)# network 172.16.0.0 0.0.31.255 area 0 &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;45. What are two tasks that must be completed before two routers can use OSPF to form a neighbor adjacency? (Choose two.) &lt;/strong&gt;&lt;br /&gt;
The routers must elect a designated router. &lt;br /&gt;
***The routers must agree on the network type. &lt;br /&gt;
***The routers must use the same dead interval. &lt;br /&gt;
The routers must exchange link state requests. &lt;br /&gt;
The routers must exchange database description packets. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;46. Refer to the exhibit. Which statement is true concerning the routing configuration? &lt;/strong&gt;&lt;br /&gt;
Using dynamic routing instead of static routing would have required fewer configuration steps. &lt;br /&gt;
The 10.1.1.0/24 and 10.1.2.0/24 routes have adjacent boudaries and should be summarized. &lt;br /&gt;
The static route will not work correctly. &lt;br /&gt;
***Packets routed to the R2 ethernet interface require two routing table lookups. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;47. What can be determined from the output shown in the exhibit? (Choose two.) &lt;/strong&gt;&lt;br /&gt;
Annapolis is a 2611 router that is connected to the S0/0 interface of the Montgomery router. &lt;br /&gt;
All of the routers are connected to Montgomery through an Ethernet switch. &lt;br /&gt;
***Montgomery has Layer 2 connectivity with Cumberland. &lt;br /&gt;
Layer 3 connectivity is operational for all of the devices listed in the Device ID column. &lt;br /&gt;
An administrator consoled into the Waldorf router can ping the Brant router. &lt;br /&gt;
***Brant, Fisherman, and Potomac are directly connected to Montgomery. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;48. What is the function of the OSPF LSU packet? &lt;/strong&gt;&lt;br /&gt;
used to confirm receipt of certain types of OSPF packets &lt;br /&gt;
used to establish and maintain adjacency with other OSPF routers &lt;br /&gt;
used to request more information about any entry in the BDR &lt;br /&gt;
***used to announce new OSPF information and to reply to certain types of requests &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;49. What is the first step OSPF and ISIS routers take in building a shortest path first database? &lt;/strong&gt;&lt;br /&gt;
***learn about directly connected networks &lt;br /&gt;
send hello to discover neighbors and form adjacencies &lt;br /&gt;
choose successors and feasible successors to populate the topology table &lt;br /&gt;
flood LSPs to all neighbors informing them of all known networks and their link states &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;50. Refer to the exhibit. All routers in the network are  running RIPv2 and EIGRP with default routing protocol settings and have  interfaces configured with the bandwidths that are shown in the exhibit.  Which protocol will be used and how will traffic between the Router1  LAN and Router5 LAN be routed through the network? &lt;/strong&gt;&lt;br /&gt;
RIPv2 will load balance across both paths between Router1 and Router5. &lt;br /&gt;
EIGRP will load balance across both paths between Router1 and Router5. &lt;br /&gt;
RIPv2 traffic will use the path Router1, Router2, Router5 because it has the least hops. &lt;br /&gt;
***EIGRP traffic will use the path Router1, Router3, Router4, Router5 because it has the best metric. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;51. Refer to the exhibit. A network administrator is trying  to figure out why BOS does not have the 10.0.0.0/24 network in its  routing table. All routers are configured for OSPF in area 0. The links  between the routers are operational and the administrator is able to  ping between all router interfaces. What is a logical next step that the  network administrator should take to troubleshoot the problem? &lt;/strong&gt;&lt;br /&gt;
Reboot the routers. &lt;br /&gt;
Change the OSPF process ID on all of the routers to 0. &lt;br /&gt;
Check to see if the cable is loose between BOS and JAX. &lt;br /&gt;
Check to see if CDP packets are passing between the routers. &lt;br /&gt;
***Use show and debug commands to determine if hellos are propagating. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;52. Refer to the exhibit. The network is using the RIPv2  routing protocol. If network 10.0.0.0 goes down, what mechanism will  prevent Router1 from advertising false routing information back to  Router2? &lt;/strong&gt;&lt;br /&gt;
triggered updates &lt;br /&gt;
poison reverse &lt;br /&gt;
hold-down timers &lt;br /&gt;
***split horizon &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;53. Which two router component and operation pair are correctly described? (Choose two.) &lt;/strong&gt;&lt;br /&gt;
DRAM loads the bootstrap &lt;br /&gt;
RAM stores the operating system &lt;br /&gt;
Flash executes diagnostics at boot-up &lt;br /&gt;
***NVRAM stores the configuration file &lt;br /&gt;
ROM stores the backup configuration file &lt;br /&gt;
***POST runs diagnostics on hardware modules &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;54. Which of the following are primary functions of a router? (Choose two.) &lt;/strong&gt;&lt;br /&gt;
***packet switching &lt;br /&gt;
microsegmentation &lt;br /&gt;
domain name resolution &lt;br /&gt;
***path selection &lt;br /&gt;
flow control &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;55. Refer to the exhibit. Which path will traffic from the 172.16.1.0/24 network take to get to the 10.0.0.0/24 network? &lt;/strong&gt;&lt;br /&gt;
ADC &lt;br /&gt;
ABC &lt;br /&gt;
***It will load balance the traffic between ADC and ABC &lt;br /&gt;
It will send the traffic via ABC, and will use ADC as a backup path only when ABC fails. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;56. Refer to the exhibit. Routers 1 and 2 are directly  connected over a serial link. Pings are failing between the two routers.  What change by the administrator will correct the problem? &lt;/strong&gt;&lt;br /&gt;
Set the encapsulation on both routers to PPP. &lt;br /&gt;
Decrease the bandwidth on Serial 0/1/0 on router 2 to 1544. &lt;br /&gt;
Change the cable that connects the routers to a crossover cable. &lt;br /&gt;
***Change the IP address on Serial 0/1/0 on router 2 to 192.168.0.1/30. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;57. Which two statements are true regarding link-state routing protocols? (Choose two.) &lt;/strong&gt;&lt;br /&gt;
They do not work well in networks that require special heirarchical designs. &lt;br /&gt;
***They are aware of the complete network topology. &lt;br /&gt;
They pass their entire routing tables to their directly connected neighbors only. &lt;br /&gt;
***They offer rapid convergence times in large networks. &lt;br /&gt;
They rely on decreasing hop counts to determine the best path. &lt;br /&gt;
They do not include subnet masks in their routing updates. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;58. Which three statements about routing protocols are true? (Choose three.) &lt;/strong&gt;&lt;br /&gt;
***OSPF elects designated routers on multiaccess links. &lt;br /&gt;
RIP does not support classless routing. &lt;br /&gt;
***EIGRP supports unequal cost load balancing. &lt;br /&gt;
EIGRP uses broadcast traffic to establish adjacencies with its neighbors. &lt;br /&gt;
***RIP does not advertise a route beyond a hop count of 15. &lt;br /&gt;
OSPF can convergence more quickly because it can find a feasible  successor in its topology table when a successor route goes down.&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>CCNA 2 Final Exam Answers (2)</title><link>http://testccnastudy.blogspot.com/2012/03/ccna-2-final-exam-answers-2.html</link><category>CCNA 2 Final Exam Answers (2)</category><pubDate>Fri, 23 Mar 2012 15:10:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-5791637986318688006</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;strong&gt;1. Refer to the exhibit. The output of the show ip route &lt;span class="IL_AD" id="IL_AD4"&gt;command&lt;/span&gt; for three routers on &lt;span class="IL_AD" id="IL_AD8"&gt;a network&lt;/span&gt; is &lt;span class="IL_AD" id="IL_AD5"&gt;displayed&lt;/span&gt;.  All routers are operational, pings are not blocked on this network, and  no default routes are installed. Which two pings will fail? (Choose  two.)&lt;/strong&gt;&lt;br /&gt;
from R1 to 172.16.1.1&lt;br /&gt;
** from R1 to 192.168.3.1&lt;br /&gt;
from R2 to 192.168.1.1&lt;br /&gt;
from R2 to 192.168.3.1&lt;br /&gt;
** from R3 to 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;2. A router that uses the RIP &lt;span class="IL_AD" id="IL_AD9"&gt;routing protocol&lt;/span&gt; has an entry for a network  in the routing table. It then receives an update with another entry for  the same destination network but with a lower hop count. What action  will the router take for this new update?&lt;/strong&gt;&lt;br /&gt;
** It will append the update information to the routing table.&lt;br /&gt;
It will invalidate the entry for that network in the routing table.&lt;br /&gt;
It will replace the existing &lt;span class="IL_AD" id="IL_AD1"&gt;routing table entry&lt;/span&gt; with the new information.&lt;br /&gt;
It will ignore the new update.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;3. Which two statements are true for OSPF Hello packets? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
They negotiate correct parameters among neighboring interfaces.&lt;br /&gt;
They are used for dynamic neighbor discovery.&lt;br /&gt;
They use timers to elect the designated router with the fastest link.&lt;br /&gt;
** They are received from all routers on the network and used to determine the complete &lt;span class="IL_AD" id="IL_AD6"&gt;network topology&lt;/span&gt;.&lt;br /&gt;
** They are used to maintain neighbor relationships.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;4. A network administrator needs to &lt;span class="IL_AD" id="IL_AD12"&gt;configure&lt;/span&gt; a single router to loadbalance the traffic over unequal cost paths. Which routing protocol should the administrator use?&lt;/strong&gt;&lt;br /&gt;
EIGRP&lt;br /&gt;
OSPF&lt;br /&gt;
RIPv1&lt;br /&gt;
** RIPv2&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;5. Which two statements are correct about the split horizon with poison reverse method of routing loop prevention? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
It is enabled by default on all Cisco IOS implementations.&lt;br /&gt;
** It assigns a value that represents an infinite metric to the poisoned route.&lt;br /&gt;
** It sends back the poisoned route update to the same interface from where it was received.&lt;br /&gt;
It instructs routers to hold all changes that might affect routes, for a specified period of time.&lt;br /&gt;
It limits the number of hops a packet can traverse through the network before it is discarded.&lt;br /&gt;
&lt;span id="more-14"&gt;&lt;/span&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;6. Refer to the exhibit. The show cdp neighbors command was run on one of the devices as shown. Based on this information, which two facts can be determined? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
** The command was &lt;span class="IL_AD" id="IL_AD11"&gt;run on the&lt;/span&gt; router.&lt;br /&gt;
ABCD is a non CISCO device.&lt;br /&gt;
Layer 3 connectivity between two devices exists.&lt;br /&gt;
ABCD supports routing capability.&lt;br /&gt;
** ABCD is connected to the Fa0/0 interface of the neighboring device.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;7. Refer to the exhibit. The network has three connected routers: R1, R2 and R3. The routes of all three routers are displayed. What can be verified from the output?&lt;/strong&gt;&lt;br /&gt;
R1 and R3 are connected to each other via the S0/0/0 interface.&lt;br /&gt;
The &lt;span class="IL_AD" id="IL_AD7"&gt;IP address&lt;/span&gt; of the S0/0/0 interface of R1 is 10.1.1.2.&lt;br /&gt;
The IP address of the S0/0/1 interface of R2 is 10.3.3.2.&lt;br /&gt;
** R2 is connected to the S0/0/1 interface of R3.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;8. Refer to the exhibit. Which three statements are true of the routing table for Router1? (Choose three.)&lt;/strong&gt;&lt;br /&gt;
The route to network 172.16.0.0 has an AD of 156160.&lt;br /&gt;
Network 192.168.0.16 can best be reached using FastEthernet0/0.&lt;br /&gt;
**The AD of EIGRP routes has been manually changed to a value other than the default value.&lt;br /&gt;
** Router1 is running both the EIGRP and OSPF routing process.&lt;br /&gt;
Network 172.17.0.0 can only be reached using a default route.&lt;br /&gt;
** No default route has been configured.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;9. Refer to the exhibit. All the routers are properly configured to use the RIP routing protocol  with default settings, and the network is fully converged. Router A is  forwarding data to router E. Which statement is true about the routing  path?&lt;/strong&gt;&lt;br /&gt;
Router A will send the data via the ADE path that is listed in the routing table.&lt;br /&gt;
Router A will loadbalance the traffic between ABE and ACE.&lt;br /&gt;
** Router A will determine that all paths have equal metric cost.&lt;br /&gt;
Router A will send the data through ADE and keep ABE and ACE as the backup paths.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;10. Refer to the exhibit. The network administrator has run the following command on R1.&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;R1# ip route 192.168.2.0 255.255.255.0 172.16.1.2&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;What is the result of running this command?&lt;/strong&gt;&lt;br /&gt;
** Traffic for network 192.168.2.0 is forwarded to 172.16.1.2.&lt;br /&gt;
This route is automatically propagated throughout the entire network.&lt;br /&gt;
Traffic for all networks is forwarded to 172.16.1.2.&lt;br /&gt;
The command invokes a dynamic routing protocol for 192.168.2.0.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;11. Refer to the exhibit. The network administrator is planning &lt;span class="IL_AD" id="IL_AD3"&gt;IP addressing&lt;/span&gt; of a new network. What part of this addressing scheme must be changed to allow communication between host A and the server?&lt;/strong&gt;&lt;br /&gt;
** the IP address of the server&lt;br /&gt;
the default gateway of host A&lt;br /&gt;
the IP address of host A&lt;br /&gt;
the default gateway of the server&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;12. Refer to the exhibit. A network administrator has configured OSPF using the following command:      &lt;br /&gt;
network 192.168.1.32 0.0.0.31 area 0       &lt;br /&gt;
Which router interface will participate in OSPF?&lt;/strong&gt;&lt;br /&gt;
FastEthernet 0/0&lt;br /&gt;
FastEthernet 0/1&lt;br /&gt;
** Serial 0/0/0&lt;br /&gt;
Serial 0/0/1&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;13. Refer to the exhibit. All routers are configured to run  RIPv1 and are fully converged. Which routing updates will be received by  R3?&lt;/strong&gt;&lt;br /&gt;
updates for 192.168.1.0/24 and 192.168.2.0/24&lt;br /&gt;
updates for 172.16.2.0/24 and 172.16.3.0/24&lt;br /&gt;
** updates for 172.16.1.0/24, 172.16.2.0/24 and 172.16.3.0/24&lt;br /&gt;
updates for 172.16.0.0/16&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;14. Refer to the exhibit. Both routers are using the RIP  protocol. Devices on the 192.168.1.1 network can ping the S0/0/0  interface on R2 but cannot ping devices on the 192.168.2.1 network. What  is a possible cause of this problem?&lt;/strong&gt;&lt;br /&gt;
** The routers are configured with different versions of RIP.&lt;br /&gt;
R2 is not forwarding the routing updates.&lt;br /&gt;
The R1 configuration should include the no autosummary command.&lt;br /&gt;
The maximum path number has been exceeded.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;15. When a router boots, what is the default order to locate the Cisco IOS if there is no boot system command?&lt;/strong&gt;&lt;br /&gt;
ROM, TFTP server, &lt;span class="IL_AD" id="IL_AD10"&gt;flash&lt;/span&gt;&lt;br /&gt;
flash, TFTP server, RAM&lt;br /&gt;
** flash, NVRAM, TFTP server&lt;br /&gt;
ROM, flash, TFTP server&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;16. Refer to the exhibit. Which router is advertising subnet 172.16.1.32/28?&lt;/strong&gt;&lt;br /&gt;
Router1&lt;br /&gt;
Router2&lt;br /&gt;
Router3&lt;br /&gt;
** Router4&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;17. Which mechanism helps to avoid routing loops by advertising a metric of infinity?&lt;/strong&gt;&lt;br /&gt;
** route poisoning&lt;br /&gt;
split horizon&lt;br /&gt;
holddown timer&lt;br /&gt;
triggered updates&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;18. Refer to the exhibit. What is the meaning of the highlighted value 120?&lt;/strong&gt;&lt;br /&gt;
It is the metric that is calculated by the routing protocol.&lt;br /&gt;
It is the value that is used by the DUAL algorithm to determine the bandwidth for the link.&lt;br /&gt;
** It is the administrative distance of the routing protocol.&lt;br /&gt;
It is the holddown time, measured in seconds, before the next update.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;19. Refer to the exhibit. A network administrator successfully pings R1 from R3. Next, the administrator runs the show cdp neighbors command on R3. The output of this command is displayed.What are two reasons for the absence of R1 in the output? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
There is a Layer 2 connectivity problem between R1 and R3.&lt;br /&gt;
The Fa0/0 interface of R1 is configured with an incorrect IP address.&lt;br /&gt;
**The no cdp run command has been run at R1.&lt;br /&gt;
**The no cdp enable command has been run at Fa0/1 interface of R3.R1 is powered off.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;20. Refer to the exhibit. A device is required to complete  the connection between router R1 and the WAN. Which two devices can be  used for this? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
** a CSU/DSU device&lt;br /&gt;
** a modem&lt;br /&gt;
an Ethernet switch&lt;br /&gt;
a hub&lt;br /&gt;
a bridge&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;21. In a complex &lt;span class="IL_AD" id="IL_AD2"&gt;lab test&lt;/span&gt;  environment, a router has discovered four paths to 192.168.1.0/24 via  the use of the RIP routing process. Which route will be installed in the  routing table after the discovery of all four paths?&lt;/strong&gt;&lt;br /&gt;
R 192.168.1.0/24 [120/3] via 192.168.110.1, 00:00:17, Serial 0/1/0&lt;br /&gt;
R 192.168.1.0/24 [120/2] via 192.168.200.1, 00:00:17, Serial 0/0/0&lt;br /&gt;
** R 192.168.1.0/24 [120/1] via 192.168.100.1, 00:00:17, Serial 0/0/1&lt;br /&gt;
R 192.168.1.0/24 [120/4] via 192.168.101.1, 00:00:17, Serial 0/1/1&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;22. Refer to the exhibit. A network administrator accesses router R1 from the console port to configure  a newly connected interface. What passwords will the network  administrator need to enter to make the connection and the necessary  configuration changes?&lt;/strong&gt;&lt;br /&gt;
the Cisco123 password only&lt;br /&gt;
the Cisco789 password only&lt;br /&gt;
the Cisco001 password only&lt;br /&gt;
** the Cisco001 password and the Cisco789 passwords&lt;br /&gt;
the Cisco001 password and the Cisco123 passwords&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;23. Refer to the exhibit. A network administrator adds this  command to router R1: ip route 192.168.2.0 255.255.255.0 S0/0/0. What is  the result of adding this command?&lt;/strong&gt;&lt;br /&gt;
This route is automatically propagated throughout the network.&lt;br /&gt;
The traffic for network 172.16.1.0 is forwarded to network 192.168.2.0.&lt;br /&gt;
** A static route is established.&lt;br /&gt;
The traffic for all Class C networks is forwarded to 172.16.1.2.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;24. Refer to the exhibit. The router receives a packet that  is destined for 192.168.5.79. How will the router handle this packet?&lt;/strong&gt;&lt;br /&gt;
It will forward the packet via the Serial0/0/1 interface.&lt;br /&gt;
It will forward the packet via the FastEthernet0/0 interface.&lt;br /&gt;
It will forward the packet via the Serial0/0/0 interface.&lt;br /&gt;
** It will drop the packet.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;25. Which two statements are true about classless routing protocols? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
** They can be used for discontiguous subnets.&lt;br /&gt;
** They can forward supernet routes in routing updates.&lt;br /&gt;
They cannot implement classful routes in routing tables.&lt;br /&gt;
They use only a hop count metric.&lt;br /&gt;
They do not include the subnet mask in routing updates.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;26. Refer to the exhibit. How many routes are child routes?&lt;/strong&gt;&lt;br /&gt;
1&lt;br /&gt;
3&lt;br /&gt;
** 4&lt;br /&gt;
6&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;27. A router has EIGRP configured as the only routing  protocol. In what two ways does EIGRP respond if there is no feasible  successor route to a destination network and the successor route fails?  (Choose two.)&lt;/strong&gt;&lt;br /&gt;
It broadcasts hello packets to all routers in the network to reestablish neighbor adjacencies.&lt;br /&gt;
** It sends queries to adjacent neighbors until a new successor route is found.&lt;br /&gt;
It immediately sends its entire routing table to its neighbors.&lt;br /&gt;
It sends queries to adjacent neighbors until the lost route is unknown to the neighbors.&lt;br /&gt;
** It automatically forwards traffic to a fallback default route until a successor route is found.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;28. Refer to the exhibit. Packets destined to which two  networks will require the router to perform a recursive lookup? (Choose  two.)&lt;/strong&gt;&lt;br /&gt;
** 10.0.0.0/8&lt;br /&gt;
64.100.0.0/16&lt;br /&gt;
128.107.0.0/16&lt;br /&gt;
172.16.40.0/24&lt;br /&gt;
192.168.1.0/24&lt;br /&gt;
** 192.168.2.0/24&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;29. Refer to the exhibit. Which two statements are true based on the exhibited output? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
The administrative distance of EIGRP has been set to 50.&lt;br /&gt;
** All routes are stable.&lt;br /&gt;
** The show ip eigrp topology command has been run on R1.&lt;br /&gt;
The serial interface between the two routers is down.&lt;br /&gt;
Each route has one feasible successor.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;30. Refer to the exhibit. All routers are properly configured  with default configurations and are running the OSPF routing protocol.  The network is fully converged. A host on the 192.168.3.0/24 network is  communicating with a host on the 192.168.2.0/24 network. Which path will  be used to transmit the data?&lt;/strong&gt;&lt;br /&gt;
The data will be transmitted via R3-R2.&lt;br /&gt;
** The data will be transmitted via R3-R1-R2.&lt;br /&gt;
The traffic will be loadbalanced between two paths — one via R3-R2, and the other via R3-R1-R2.&lt;br /&gt;
The data will be transmitted via R3-R2, and the other path via R3-R1-R2 will be retained as the backup path.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;31. A network administrator has enabled RIP on routers B and C  in the network diagram. Which of the following commands will prevent  RIP updates from being sent to Router A?&lt;/strong&gt;&lt;br /&gt;
A(config)# router rip    &lt;br /&gt;
A(configrouter)# passiveinterface S0/0&lt;br /&gt;
B(config)# router rip    &lt;br /&gt;
B(configrouter)# network 192.168.25.48     &lt;br /&gt;
B(configrouter)# network 192.168.25.64&lt;br /&gt;
A(config)# router rip    &lt;br /&gt;
A(configrouter)# no network 192.168.25.32&lt;br /&gt;
** B(config)# router rip    &lt;br /&gt;
B(configrouter)# passiveinterface S0/0&lt;br /&gt;
A(config)# no router rip&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;32. Refer to the exhibit. The hosts on the R1 LAN are unable to access the Internet. What is incorrectly configured?&lt;/strong&gt;&lt;br /&gt;
the IP address of the Fa 0/0 interface at R1&lt;br /&gt;
the IP address of the S 0/0/1 interface at R2&lt;br /&gt;
** the IP address of the S 0/0/0 interface at R1&lt;br /&gt;
the subnet mask of the S 0/0/1 interface at R2&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;33. Refer to the exhibit. A ping from R1 to 10.1.1.2 is  successful, but a ping from R1 to 192.168.2.0 fails. What is the cause  of this problem?&lt;/strong&gt;&lt;br /&gt;
There is no gateway of last resort at R1.&lt;br /&gt;
The serial interface between the two routers is down.&lt;br /&gt;
** A default route is not configured on R1.&lt;br /&gt;
The static route for 192.168.2.0 is incorrectly configured.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;34. Refer to the exhibit. The network administrator has run  the show ip protocol command on R1. What can be determined from the  exhibited output?&lt;/strong&gt;&lt;br /&gt;
The router is using RIPv2.&lt;br /&gt;
The router is not forwarding routing updates.&lt;br /&gt;
The router is receiving updates for both versions of RIP.&lt;br /&gt;
** The FastEthernet0/0 interface is down.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;35. Refer to the exhibit. All routers are configured to use  the EIGRP routing protocol with default settings, all routes are  advertised on all routers, and the network is fully converged. Which  path will the data take to travel between 172.16.1.0/24 and  192.168.100.0/24?&lt;/strong&gt;&lt;br /&gt;
It will travel via A, B, and C.&lt;br /&gt;
** It will travel via A, F, E, D, and C.&lt;br /&gt;
It will travel via A, G, H, and C.&lt;br /&gt;
The traffic will be loadbalanced on all paths.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;36. Refer to the exhibit. All routers are configured for OSPF  area 0. The network administrator requires that R2 always be the DR and  maintain adjacency.Which two configurations can achieve this? (Choose  two.)&lt;/strong&gt;&lt;br /&gt;
Change the OSPF area of R2 to a higher value.&lt;br /&gt;
Change the router ID for R2 by assigning the IP address 172.16.30.5/24 to the Fa0/0 interface.&lt;br /&gt;
** Change the priority values of the Fa0/0 interfaces of R1 and R3 to 0.&lt;br /&gt;
** Configure a loopback interface on R2, with an IP address higher than any IPaddress on the other routers.&lt;br /&gt;
Configure R1 and R3 with an IP address whose value is higher than that of R2.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;37. Refer to the exhibit. Host A is unable to access the  Internet, and troubleshooting has revealed that this is due to an  addressing problem. What is incorrectly configured in this network?&lt;/strong&gt;&lt;br /&gt;
the IP address of the Fa 0/0 interface of R1&lt;br /&gt;
the subnet mask of the S 0/0/0 interface of R1&lt;br /&gt;
** the IP address of the S 0/0/0 interface of R1&lt;br /&gt;
the subnet mask of the S0/0/0 interface of R2&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;38. Refer to the exhibit. All routes are advertised and fully  operational on all routers. Which statement is true about the path that  the data will take from router A to router B?&lt;/strong&gt;&lt;br /&gt;
** If EIGRP is used with default configurations, the data will be equally distributed between two paths — A, D, B and A, C, D.&lt;br /&gt;
If RIPv1 is used with default configurations, the data will be loadbalanced on all paths.&lt;br /&gt;
If EIGRP and OSPF are both used with default configurations, the data will be sent through paths learned by the OSPF protocol.&lt;br /&gt;
If RIPv2 is used with default configurations, the data will be equally distributed between two paths — A, D, B and A, C, D.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;39. Refer to the exhibit. The interfaces of all routers are  configured for OSPF area 0. R3 can ping R1, but the two routers are  unable to establish a neighbor adjacency. What should the network  administrator do to troubleshoot this problem?&lt;/strong&gt;&lt;br /&gt;
Check if the interfaces of the routers are enabled.&lt;br /&gt;
** Check the hello and dead intervals between the routers.&lt;br /&gt;
Check the process ID of both routers.&lt;br /&gt;
Check if CDP is enabled on all the routers.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;40. Refer to the exhibit. What information can be determined from the highlighted output?      &lt;br /&gt;
R1 is originating the route 172.30.200.32/28.&lt;/strong&gt;&lt;br /&gt;
** Automatic summarization is disabled.&lt;br /&gt;
The 172.30.200.16/28 network is one hop away from R1.&lt;br /&gt;
A classful routing protocol is being used.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;41. Which two router component and operation pair are correctly described? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
DRAM loads the bootstrap&lt;br /&gt;
RAM stores the operating system&lt;br /&gt;
Flash executes diagnostics at bootup&lt;br /&gt;
** NVRAM stores the configuration file&lt;br /&gt;
ROM stores the backup configuration file&lt;br /&gt;
** POST runs diagnostics on hardware modules&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;42. Which routing protocol by default uses bandwidth and delay to calculate the metric of a route?&lt;/strong&gt;&lt;br /&gt;
RIPv1&lt;br /&gt;
RIPv2&lt;br /&gt;
OSPF&lt;br /&gt;
** EIGRP&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;43. Two routers need to be configured within a single OSPF  area. Which two components need to be configured on both routers to  achieve this? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
the same process ID&lt;br /&gt;
** the same area ID&lt;br /&gt;
** network addresses and wildcard masks&lt;br /&gt;
the same router ID&lt;br /&gt;
the same loop back address&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;44. Refer to the exhibit. The networks that are connected to  R1 have been summarized for R2 as 192.168.136.0/21. Which packet  destination address will R2 forward to R1?&lt;/strong&gt;&lt;br /&gt;
192.168.135.1&lt;br /&gt;
**192.168.142.1&lt;br /&gt;
192.168.144.1&lt;br /&gt;
192.168.128.1&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;45. Refer to the exhibit. R1 is running RIP with default  parameters. R1 has learned four different paths with the same metrics to  network 192.168.6.0. Which path or paths will R1 use to forward a  packet that is destined to 192.168.6.10?&lt;/strong&gt;&lt;br /&gt;
** the first path that the router learned.&lt;br /&gt;
only the first two of the four paths that the router learned.&lt;br /&gt;
the last path that the router learned.&lt;br /&gt;
all four paths.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;46. What are two functions of a router? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
** It connects multiple IP networks.&lt;br /&gt;
It controls the flow of data via the use of Layer 2 addresses.&lt;br /&gt;
** It determines the best path to send packets.&lt;br /&gt;
It manages the VLAN database.&lt;br /&gt;
It increases the size of the broadcast domain.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;47. Refer to the exhibit. Which statement is true about the routing process for this network?&lt;/strong&gt;&lt;br /&gt;
A packet leaves interface Fa0/0 of R1 with the source MAC address as 000C.3010.9260.&lt;br /&gt;
** The packet leaves interface Fa0/0 of R1 with the source MAC address as 000C.3010.9260.&lt;br /&gt;
The no shutdown command needs to run on the Fa0/0 interface of R1.&lt;br /&gt;
The Fa0/0 interface of R2 could be configured with the IP address 172.16.4.1/24.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;48. Refer to the exhibit. A network administrator has run the  show interface command. The output of this command is displayed. What  is the first step that is required to make this interface operational?&lt;/strong&gt;&lt;br /&gt;
Switch the cable with a known working cable.&lt;br /&gt;
** Issue the no shutdown command on the interface.&lt;br /&gt;
Configure the interface as a loopback interface.&lt;br /&gt;
Set the encapsulation for the interface.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;49. Refer to the exhibit. R1 is configured properly for a  single area OSPF, and R2 has been recently installed in the network.  Which set of commands is required to configure a single area OSPF for  the networks that are connected to R2?&lt;/strong&gt;&lt;br /&gt;
** R2(config)# router ospf 1    &lt;br /&gt;
R2(configrouter)# network 192.168.2.0 0.0.0.255 area 0     &lt;br /&gt;
R2(configrouter)# network 10.1.1.0 0.0.0.3 area 0&lt;br /&gt;
R2(config)# router ospf 1    &lt;br /&gt;
R2(configrouter)# network 192.168.2.0 0.0.0.255 area 0     &lt;br /&gt;
R2(config)# router ospf 2     &lt;br /&gt;
R2(configrouter)# network 10.1.1.0 0.0.0.3 area 0&lt;br /&gt;
R2(config)# router ospf 1    &lt;br /&gt;
R2(configrouter)# network 192.168.2.0 0.0.0.255 area 0     &lt;br /&gt;
R2(configrouter)# network 10.1.1.0 0.0.0.3 area 1&lt;br /&gt;
R2(config)# router ospf 1    &lt;br /&gt;
R2(configrouter)# network 192.168.2.0 0.0.0.255 area 0     &lt;br /&gt;
R2(configrouter)# network 10.0.0.0 0.0.0.3 area 1&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;50. Refer to the exhibit. The command ip route 0.0.0.0  0.0.0.0 S0/0/0 is run on router R2. What are the two results of this  command? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
** A static route will be updated in the routing table.&lt;br /&gt;
The traffic from the Internet will be directed to R2.&lt;br /&gt;
The traffic from the source network 172.16.0.0/22 will be blocked.&lt;br /&gt;
** The route will be specified as the default route for all networks not defined in the routing table.&lt;br /&gt;
All the broadcasts will be forwarded via the S0/0/0 interface of R2.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;51. Which three statements are true regarding the  encapsulation and deencapsulation of packets when traveling through a  router? (Choose three.)&lt;/strong&gt;&lt;br /&gt;
** The router modifies the TTL field, decrementing it by one.&lt;br /&gt;
The router changes the source IP to the IP of the exit interface.&lt;br /&gt;
** The router maintains the same source and destination IP.&lt;br /&gt;
** The router changes the source physical address to the physical address of the exit interface.&lt;br /&gt;
The router changes the destination IP to the IP of the exit interface.&lt;br /&gt;
The router sends the packet out all other interfaces, besides the one it entered the router on.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;52. What are two tasks that must be completed before two routers can use OSPF to form a neighbor adjacency? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
The routers must elect a designated router.&lt;br /&gt;
** The routers must agree on the network type.&lt;br /&gt;
** The routers must use the same dead interval.&lt;br /&gt;
The routers must exchange link state requests.&lt;br /&gt;
The routers must exchange database description packets.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;53. Refer to the exhibit. Although both the routers can ping  the serial interface of their neighbors, they are unable to ping the  Ethernet interfaces of other routers. Which two statements are true for  this network? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
The administrative distance has been set to 50 on both routers.&lt;br /&gt;
** R2 is learning about network 192.168.1.0.&lt;br /&gt;
R1 is learning about network 192.168.2.0.&lt;br /&gt;
The network 10.1.1.0 command has not been run on both routers.&lt;br /&gt;
** Autosummarization is enabled on both routers.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;54. Which two situations require the use of a linkstate protocol? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
** Fast convergence of the network is critical.&lt;br /&gt;
** The network is very large.&lt;br /&gt;
The network administrator has limited knowledge to configure and troubleshoot routing protocols.The network is a flat network.&lt;br /&gt;
The capacity of the router is low.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;55. Refer to the exhibit. What information can be determined from the displayed output?&lt;/strong&gt;&lt;br /&gt;
EIGRP packets are waiting to be sent to the neighbors.&lt;br /&gt;
The adjacencies between the routers are yet to be established.&lt;br /&gt;
The IP address 192.168.10.10 is configured at serial interface S0/0/1 of router R2.&lt;br /&gt;
** Router R2 is receiving hello packets from a neighbor with the IP address 192.168.10.10 via the R2 S0/0/1 interface.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;56. Refer to the exhibit. PC1 is unable to access the Internet. What is the cause of the problem?&lt;/strong&gt;&lt;br /&gt;
An incorrect IP address is configured between the two routers.&lt;br /&gt;
No static route is configured on Router2.&lt;br /&gt;
** A routing loop has occurred.&lt;br /&gt;
No routing protocol is configured on either of the two routers.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;57. Refer to the exhibit. What summarization should R2 use to advertise its LAN networks to R1?&lt;/strong&gt;&lt;br /&gt;
172.16.0.0/24&lt;br /&gt;
** 172.16.4.0/22&lt;br /&gt;
172.16.4.0/23&lt;br /&gt;
172.16.4.0/24&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>CCNA 3 Final Exam Answers 1</title><link>http://testccnastudy.blogspot.com/2012/03/ccna-3-final-exam-answers-1.html</link><category>CCNA 3 Final Exam Answers 1</category><pubDate>Fri, 23 Mar 2012 14:38:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-794221621514693535</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;strong&gt;1. Refer to the exhibit. The Fast Ethernet port Fa0/1 on &lt;span class="IL_AD" id="IL_AD7"&gt;the switch&lt;/span&gt; is configured for auto-negotiate speed/duplex &lt;span class="IL_AD" id="IL_AD3"&gt;settings&lt;/span&gt;,  and the NIC on the machine is set to 100 Mbps, full-duplex. The log  error message shown has been received. What two solutions could fix the  problem? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
Configure the switch &lt;span class="IL_AD" id="IL_AD9"&gt;manually&lt;/span&gt; for auto-negotiate speed/duplex and the NIC on the machine for 100 Mbps, half-duplex.&lt;br /&gt;
**Configure both sides of &lt;span class="IL_AD" id="IL_AD11"&gt;the link&lt;/span&gt; for auto-negotiate speed/duplex settings.&lt;br /&gt;
**Manually configure both sides of the link for 100 Mbps, full-duplex.&lt;br /&gt;
Manually configure the switch for 100 Mbps, full-duplex, and the NIC on the machine for auto-negotiate.&lt;br /&gt;
Manually configure the switch for 1000 Mbps, full-duplex, and the NIC on the machine for auto-negotiate.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;2. Refer to the exhibit. Both switches are interconnected via  a trunk link. Host A and Host B are on the default VLAN but are not  able to exchange traffic. What should be done to fix the problem?&lt;/strong&gt;&lt;br /&gt;
Allow all VLANs on the trunk link.&lt;br /&gt;
**Configure the same native VLAN on both ends of the trunk.&lt;br /&gt;
Include a router or switch with Layer 3 capabilities.&lt;br /&gt;
Remove the native VLAN from the trunk.&lt;br /&gt;
Configure ISL encapsulation on both ends of the trunk.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;3. What are two benefits of the IEEE 802.11n standard? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
single-input, single-output&lt;br /&gt;
**improved range&lt;br /&gt;
requires less equipment&lt;br /&gt;
hardware upgrade for compatibility&lt;br /&gt;
**increased data rates&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;4. Refer to the exhibit. Switch SW2 has been newly purchased  and added to the network. What configuration should be applied to SW2 so  that it participates in the same VTP domain as switch SW1, receives  VLAN information from SW1, and synchronizes VLAN information?&lt;/strong&gt;&lt;br /&gt;
Configure SW2 as a VTP server with a higher &lt;span class="IL_AD" id="IL_AD6"&gt;revision&lt;/span&gt; number.&lt;br /&gt;
**Configure SW2 as a VTP client.&lt;br /&gt;
Configure SW2 in VTP transparent mode.&lt;br /&gt;
Configure SW2 with no VTP domain password.&lt;br /&gt;
Disable VTP pruning on SW2.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;5. Refer to the exhibit. All hosts are in listen mode. Host 1  and Host 4 both transmit data at the same time. How do the hosts  respond on the network? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
Hosts 1 and 4 may be operating full duplex so no collision will exist.&lt;br /&gt;
The hub will block the port connected to Host 4 to prevent a collision.&lt;br /&gt;
**After the end of the jam signal, a backoff algorithm is invoked.&lt;br /&gt;
Hosts 1 and 4 are assigned shorter backoff values to provide them priority to access the media.&lt;br /&gt;
**If a host has data to transmit after the backoff period of that  host, the host checks to determine if the line is idle, before  transmitting.&lt;br /&gt;
&lt;span id="more-15"&gt;&lt;/span&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;6. Refer to the exhibit. Which statement is true regarding the information shown?&lt;/strong&gt;&lt;br /&gt;
Only one VLAN is currently configured to use the trunk links.&lt;br /&gt;
Inter-VLAN routing is not functioning because the switch is still in the process of negotiating the trunk link.&lt;br /&gt;
**Interfaces gi0/1 and fa0/1 are carrying data from multiple VLANs.&lt;br /&gt;
The interfaces shown are shut down.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;7. Refer to the exhibit. After the listed commands are  entered into router R1 and switch S1, the administrator enters the show  interface fa0/1 trunk and gets the results shown. What is the likely  problem?&lt;/strong&gt;&lt;br /&gt;
The trunk is established, but no VLANs have been configured to use it.&lt;br /&gt;
**The trunk has not been established because the router does not support dynamic trunking protocol.&lt;br /&gt;
The router, the switch, or both must be configured with the dynamic desirable option for dynamic trunking protocol to establish a trunk.&lt;br /&gt;
The router is missing the dynamic trunking protocol statements necessary to form a trunk.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;8. Refer to the exhibit. Which device is the authenticator?&lt;/strong&gt;&lt;br /&gt;
**access point&lt;br /&gt;
data server&lt;br /&gt;
client&lt;br /&gt;
RADIUS server&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;9. What three &lt;span class="IL_AD" id="IL_AD5"&gt;radio frequency&lt;/span&gt;  bands are designated by the ITU-R as unlicensed for industrial,  scientific, and medical (ISM) communities and are therefore supported by  IEEE 802.11? (Choose three.)&lt;/strong&gt;&lt;br /&gt;
**900 MHz&lt;br /&gt;
9 MHz&lt;br /&gt;
**2.4 GHz&lt;br /&gt;
5.7 GHz&lt;br /&gt;
**5 GHz&lt;br /&gt;
900 GHz&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;10. What three tasks should be performed before moving a Catalyst switch to a new VTP management domain? (Choose three.)&lt;/strong&gt;&lt;br /&gt;
**Verify that the new switch has a lower configuration revision number than the other switches in the domain.&lt;br /&gt;
Reset the VTP counters to allow the switch to synchronize with the other switches in the domain.&lt;br /&gt;
Download the VTP database from the VTP server in the new domain.&lt;br /&gt;
Configure the VTP server in the domain to recognize the BID of the new switch.&lt;br /&gt;
**Select the correct VTP mode and version.&lt;br /&gt;
**Configure the switch with the name of the new management domain.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;11. Which three configurations are required to allow &lt;span class="IL_AD" id="IL_AD4"&gt;remote access&lt;/span&gt; to a switch using the telnet &lt;span class="IL_AD" id="IL_AD8"&gt;command&lt;/span&gt;? (Choose three.)&lt;/strong&gt;&lt;br /&gt;
**default gateway&lt;br /&gt;
**vty line password&lt;br /&gt;
console line password&lt;br /&gt;
HTTP server interface authentication&lt;br /&gt;
**IP address of the switch on the management VLAN&lt;br /&gt;
duplex and speed on the Ethernet port used for the connection&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;12. What are three benefits of a hiearchical &lt;span class="IL_AD" id="IL_AD1"&gt;network design&lt;/span&gt; model? (Choose three.)&lt;/strong&gt;&lt;br /&gt;
**scalability&lt;br /&gt;
higher speed&lt;br /&gt;
mobility&lt;br /&gt;
**security&lt;br /&gt;
**manageability&lt;br /&gt;
cost&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;13. Refer to the exhibit. The network administrator has added  VoIP telephones and a VoIP gateway computer to the existing switch  infrastructure, and then created the VLANs. What must be done to  converge the network?&lt;/strong&gt;&lt;br /&gt;
Combine all traffic except management traffic to a single VLAN.&lt;br /&gt;
Combine all traffic including management traffic to a single VLAN.&lt;br /&gt;
Use Layer 3 switching to combine the voice and data traffic at S1.&lt;br /&gt;
**The network is already converged.&lt;br /&gt;
Implement a common IP addressing scheme for both &lt;span class="IL_AD" id="IL_AD2"&gt;VoIP phones&lt;/span&gt; and PCs.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;14. Refer to the exhibit. R1 is configured for traditional  inter-VLAN routing. R1 can ping Pc3 but cannot ping Pc1. What is a  possible cause for this failure?&lt;/strong&gt;&lt;br /&gt;
**S1 port fa0/11 is in the wrong VLAN.&lt;br /&gt;
Pc1 IP address is incorrect.&lt;br /&gt;
R1 does not have an active routing protocol.&lt;br /&gt;
Router interface fa0/0 has the wrong trunk encapsulation type configured.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;15. Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP addresses should be assigned to this new host?&lt;/strong&gt;&lt;br /&gt;
192.168.1.1 /26&lt;br /&gt;
192.168.1.11 /28&lt;br /&gt;
**192.168.1.22 /28&lt;br /&gt;
192.168.1.33 /28&lt;br /&gt;
192.168.1.44 /28&lt;br /&gt;
192.168.1.55 /28&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;16. Refer to the exhibit. Each switch is shown with its &lt;span class="IL_AD" id="IL_AD10"&gt;MAC&lt;/span&gt;  address. Which switch will be elected as the spanning-tree root bridge  if the switches are configured with their default priority values?&lt;/strong&gt;&lt;br /&gt;
switch A&lt;br /&gt;
switch B&lt;br /&gt;
switch C&lt;br /&gt;
switch D&lt;br /&gt;
switch E&lt;br /&gt;
**switch F&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;17. Refer to the exhibit. All switches are configured with  rapid PVST+. Port Gi0/2 on S2 is the root port. A network administrator  issues the spanning-tree link-type point-to-point command on port Gi0/1 for switch S2. What is the result of this command?&lt;/strong&gt;&lt;br /&gt;
**If the link between D1 and C1 fails, port Gi0/2 on S2 rapidly transitions to the forwarding state.&lt;br /&gt;
PortFast is enabled on Gi0/2 on S2.&lt;br /&gt;
Port Gi0/2 on S2 becomes a designated port.&lt;br /&gt;
Broadcast packets are restricted on the link between S2 and D1.&lt;br /&gt;
Port Gi0/2 on S2 becomes an edge port.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;18. Refer to the exhibit. The switches are configured for VTP  as shown. Which two statements correctly describe the operation of  these switches? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
A new VLAN can be added to Switch1 and that information will be added only to Switch2.&lt;br /&gt;
An existing VLAN can be deleted from Switch2 and that VLAN will be deleted from Switch1 and Switch4.&lt;br /&gt;
A new VLAN can be added to Switch4 and that information will be added to Switch1, Switch2, and Switch3.&lt;br /&gt;
**A new VLAN can be added to Switch1 and that information will be added to Switch2 and Switch4.&lt;br /&gt;
A new VLAN can be added to Switch3 and that information will be added to Switch1, Switch2, and Switch4.&lt;br /&gt;
**An existing VLAN can be deleted from Switch4 and that VLAN will be deleted from Switch1 and Switch2.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;19. Refer to the exhibit. A host &lt;span class="IL_AD" id="IL_AD12"&gt;attached&lt;/span&gt; to port Fa0/3 of the switch  can communicate with the host connected to port Fa0/16, but cannot  communicate with the host connected to port Fa0/2. What could account  for this failure?&lt;/strong&gt;&lt;br /&gt;
Fa0/3 is down.&lt;br /&gt;
The trunk link to the router is down.&lt;br /&gt;
**The VLAN0010 network address is missing from the routing table.&lt;br /&gt;
Fa0/2 has been assigned to the administrative VLAN.&lt;br /&gt;
The router does not have a functional routing protocol installed.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;20. A network administrator wants to add a new switch to the  existing VTP domain. The new switch will have a VLAN that the  administrator does not want visible to any other switches. All other  VLANs should be visible on all switches, and all VLANs should be visible  to the new switch. Which solution meets the requirements with the least  administrative effort?&lt;/strong&gt;&lt;br /&gt;
Add the switch in server mode. After all VLANs have propagated to the  new switch, change the trunked link to access mode. Add the private  VLAN to the new switch.&lt;br /&gt;
Add the switch in server mode. Add an extended range VLAN to the new switch as the private VLAN.&lt;br /&gt;
Add the switch in server mode. Add the private VLAN to the new  switch. Enable VTP pruning and ensure that no ports are placed in the  private VLAN on any other switches.&lt;br /&gt;
**Add the switch in client mode. After the existing VLANs have  propagated, change the switch to transparent mode. Add the private VLAN.&lt;br /&gt;
Add the switch in VTP transparent mode. Manually add all VLANs to the switch.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;21. Refer to the exhibit. Host A sends a broadcast message. Which devices will see the broadcast?&lt;/strong&gt;&lt;br /&gt;
all hosts&lt;br /&gt;
Host B and the router&lt;br /&gt;
**Host C and the router&lt;br /&gt;
the router, Host C, and all the hosts connected to Hub1&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;22. Refer to the exhibit. Which three options correctly  identify information that could be associated with this output?(Choose  three.)&lt;/strong&gt;&lt;br /&gt;
An IP address should be applied to FastEthernet3/0/0 for correct data routing.&lt;br /&gt;
**Standardized trunking protocol is used.&lt;br /&gt;
A shutdown command has been applied to interface FastEthernet3/0/0.&lt;br /&gt;
**The configuration is appropriate for a router-on-a-stick network design.&lt;br /&gt;
**Interface FastEthernet3/0/0 is subinterfaced.&lt;br /&gt;
Interface FastEthernet3/0/0.3 is mapped to the default administrative VLAN.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;23. Refer to the exhibit. Spanning-tree port priorities are  listed beneath each interface. The network administrator enters the  spanning-tree vlan 1 root primary command on S4. Which three port  results are correct? (Choose three.)&lt;/strong&gt;&lt;br /&gt;
**S1 Gi0/1 becomes a root port.&lt;br /&gt;
S3 Gi0/1 becomes a non-designated port.&lt;br /&gt;
S4 Gi0/1 becomes a root port.&lt;br /&gt;
**S4 Gi0/2 becomes a designated port.&lt;br /&gt;
S2 Gi0/2 becomes a non-designated port.&lt;br /&gt;
**S1 Gi0/2 becomes a non-designated port.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;24. Refer to the exhibit. Switches C1, D1, D2, and S2 have  all been configured with RSTP. S1 and S3 are not capable of rapid PVST+  and are in the default configuration. What three implications does this  have for the Layer 2 network? (Choose three.)&lt;/strong&gt;&lt;br /&gt;
Because S1 and S3 are not trunking, they have no spanning-tree instance.&lt;br /&gt;
A topology change BPDU from C1 forces the uplinks on S1 and S3 to stop forwarding traffic for twice the forward delay time.&lt;br /&gt;
**Port Gi0/1 on D1 and port Gi0/1 on D2 become designated ports.&lt;br /&gt;
**Loss of the root port link on S2 causes a rapid transition to non-designated port on S2.&lt;br /&gt;
**PortFast can be enabled on all ports on S1 and S3.&lt;br /&gt;
Gi0/1 on S1 and Gi0/1 on S3 become designated ports.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;25. Refer to the exhibit. The network administrator enters  the configuration shown to allow both SSH and Telnet connections to the  switch. The Telnet connections fail. What is the most likely cause of  this problem?&lt;/strong&gt;&lt;br /&gt;
The SSH version number is wrong.&lt;br /&gt;
**SSH has been configured on the wrong line.&lt;br /&gt;
The transport input command is configured incorrectly.&lt;br /&gt;
Telnet and SSH cannot be configured simultaneously.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;26. Refer to the exhibit. On the basis of the configuration  shown, how will an Ethernet frame on port GigabitEthernet0/1 be  modified?&lt;/strong&gt;&lt;br /&gt;
802.1Q encapsulation prepends a 4-byte tag field in front of the  original Ethernet frame and recomputes the frame check sequence (FCS) on  the modified frame.&lt;br /&gt;
**802.1Q encapsulation inserts a 4-byte tag field into the original  Ethernet frame between the source address and type or length fields.&lt;br /&gt;
802.1Q encapsulation prepends an 802.1p field in front of the  original Ethernet frame and recomputes the frame check sequence (FCS) on  the modified frame.&lt;br /&gt;
802.1Q encapsulation inserts an 802.1p field into the original  Ethernet frame between the source address and type or length fields.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;27. Refer to the exhibit. Which two statements are true  regarding what the cost value of 23 represents for Switch4? (Choose  two.)&lt;/strong&gt;&lt;br /&gt;
**This cost represents the lowest cost path for Switch4 to the root switch.&lt;br /&gt;
A cost of 23 is the value being advertised out port 16 on the switch upstream (closer) to the root switch.&lt;br /&gt;
Switch4 adds the cost of a Fast Ethernet link to 23 to determine its total cost to reach the root switch.&lt;br /&gt;
**Switch4 is connected via a Fast Ethernet link to an upstream switch  that in turn is directly connected to the root switch via a Gigabit  Ethernet link.&lt;br /&gt;
The root switch is advertising a cost of 23, which is lower than any other switch in the VLAN0001 spanning-tree domain.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;28. Which two statements describe Spanning Tree Protocol? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
**It eliminates Layer 2 loops in network topologies.&lt;br /&gt;
It eliminates the need for redundant physical paths in network topologies.&lt;br /&gt;
**It can only be used in networks in which Layer 2 switching is in use.&lt;br /&gt;
It can only be used in networks where both routers and switches are used together.&lt;br /&gt;
It can only be used in networks where routers are installed.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;29. Refer to the exhibit. What three statements describe why Host1 and Host2 are unable to communicate? (Choose three.)&lt;/strong&gt;&lt;br /&gt;
**A router is required to forward traffic between the hosts.&lt;br /&gt;
**The switch ports are on different VLANs.&lt;br /&gt;
The VLAN port assignments must be contiguous for each VLAN.&lt;br /&gt;
The host default gateway addresses must be on the same logical network.&lt;br /&gt;
The switch IP address is on the wrong subnet.&lt;br /&gt;
**The hosts are configured on different logical networks.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;30. What happens when the crypto key zeroize rsa command is  entered on a switch configured with the transport input ssh command on  the vty lines?&lt;/strong&gt;&lt;br /&gt;
A new RSA key pair is created.&lt;br /&gt;
The switch defaults to allowing Telnet connections only.&lt;br /&gt;
The switch is no longer able to make SSH connections as an SSH client.&lt;br /&gt;
**The switch allows remote connections only after a new RSA key pair is generated.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;31. How can the SSID for a wireless network connection be verified?&lt;/strong&gt;&lt;br /&gt;
From the Network Connections menu, choose Add Wireless Network.&lt;br /&gt;
From the Network Connections menu, choose Properties.&lt;br /&gt;
**From the Network Connections menu, choose View Wireless Network.&lt;br /&gt;
From the Network Connections menu, choose Support.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;32. In which mode is a VTP switch operating if it has been configured to only forward VTP advertisements?&lt;/strong&gt;&lt;br /&gt;
client&lt;br /&gt;
root&lt;br /&gt;
server&lt;br /&gt;
**transparent&lt;br /&gt;
nontransparent&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;33. Refer to the exhibit. Two Catalyst switches are  connected, and both switches have ports configured for VLANs 40 and 50  as shown. What will allow hosts on the same VLAN to communicate with one  another across the different switches?&lt;/strong&gt;&lt;br /&gt;
**trunking&lt;br /&gt;
STP&lt;br /&gt;
VTP&lt;br /&gt;
routing&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;34. Which statement regarding the service password-encryption command is true?&lt;/strong&gt;&lt;br /&gt;
It is configured in privileged EXEC mode.&lt;br /&gt;
It encrypts only line mode passwords.&lt;br /&gt;
**As soon as the service password-encryption command is entered, all  currently set passwords formerly displayed in plain text are encrypted.&lt;br /&gt;
To see the passwords encrypted by the service password-encryption  command in plain text, issue the no service password-encryption command.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;35. Refer to the exhibit. What does "FORWARDING" mean in the command output shown?&lt;/strong&gt;&lt;br /&gt;
The switch is receiving BPDUs, but not sending data frames.&lt;br /&gt;
The switch is participating in an election process by forwarding the BPDUs it receives.&lt;br /&gt;
**The switch is sending and receiving data frames.&lt;br /&gt;
The switch is receiving BPDUs and populating the MAC address table, but not sending data.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;36. Why is it important that the network administrator  consider the spanning-tree network diameter when choosing the root  bridge?&lt;/strong&gt;&lt;br /&gt;
The cabling distance between the switches is 100 meters.&lt;br /&gt;
The network diameter limitation is 9.&lt;br /&gt;
Convergence is slower as the BPDU travels away from the root.&lt;br /&gt;
**BPDUs may be discarded because of expiring timers.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;37. Refer to the exhibit. Hosts PC_A and PC_B send traffic  simultaneously, and the frames from the transmitting stations collide.  How far is the collision propagated?&lt;/strong&gt;&lt;br /&gt;
hub HB1&lt;br /&gt;
**switch SW1&lt;br /&gt;
switch SW2&lt;br /&gt;
router R1&lt;br /&gt;
router R2&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;38. Which method establishes an administrative connection to the wireless access point?&lt;/strong&gt;&lt;br /&gt;
Associate with the access point and then open a HyperTerminal session with the access point.&lt;br /&gt;
Physically connect to the access point and then reboot the computer to launch the configuration software.&lt;br /&gt;
**From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.&lt;br /&gt;
Modify the TCP/IP properties of the computer connected to the access  point so that it exists on the same network, and then reboot your  computer to establish a connection.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;39. Refer to the exhibit. All the VLANs configured on S2 are  present on S1 but not S3. All switches are set to VTP server mode and  have identical VTP domain names configured. What is the likely problem?&lt;/strong&gt;&lt;br /&gt;
**The connection from S1 to S3 is not trunking.&lt;br /&gt;
S3 does not have a management VLAN configured.&lt;br /&gt;
The VLAN 99 interface on S3 is in a different subnet than S1 and S2.&lt;br /&gt;
S3 was joined to the network with a lower revision number than S1.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;40. Refer to the exhibit. All devices in the network are  interconnected via trunk links with VTP pruning enabled on all three  switches. Which VLANs will be pruned from switch SW3?&lt;/strong&gt;&lt;br /&gt;
**VLAN 10 and VLAN 20&lt;br /&gt;
VLAN 1, VLAN 10, and VLAN 20&lt;br /&gt;
VLAN 1, VLAN 1002 through 1005&lt;br /&gt;
VLAN 1, VLAN 10, VLAN 20, VLAN 1002 through 1005&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;41. Refer to the exhibit. A packet is received on the  FastEthernet 0/1 physical interface from VLAN 1. The packet destination  address is 192.168.1.85. What will the router do with this packet?&lt;/strong&gt;&lt;br /&gt;
The router will ignore the packet because the source and destination are on the same broadcast domain.&lt;br /&gt;
The router will forward the packet out interface FastEthernet 0/1.1.&lt;br /&gt;
**The router will forward the packet out interface FastEthernet 0/1.2.&lt;br /&gt;
The router will forward the packet out interface FastEthernet 0/1.3.&lt;br /&gt;
The router will drop the packet since no network that includes the source address is attached to the router.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;42. Refer to the exhibit. Switch SW2 was tested in a lab  environment and then inserted into a production network without  reloading its configuration. After the trunk link between SW1 and SW2  was brought up, all users lost connectivity to the network. What could  be the source of the problem?&lt;/strong&gt;&lt;br /&gt;
**The newly inserted switch has a higher VTP server revision number,  which caused the VLAN information in the VTP domain to be deleted.&lt;br /&gt;
The newly inserted switch has pruning enabled, which causes pruning of all VLANs from the trunk port.&lt;br /&gt;
The newly inserted switch received more VLANs from a connected switch than the switch can support.&lt;br /&gt;
Switches can exchange VTP information only through an access link.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;43. Refer to the exhibit. What is the consequence if SW1 port F0/0 is configured as an edge port?&lt;/strong&gt;&lt;br /&gt;
SW1 port F0/0 transitions to the learning state.&lt;br /&gt;
**SW1 port F0/0 can generate a temporary loop while in the sync state.&lt;br /&gt;
SW1 port F0/0 becomes a non-designated port.&lt;br /&gt;
SW1 port F0/2 no longer passes BPDUs to SW4.&lt;br /&gt;
SW4 port F0/10 is forced into the blocking state.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;44. Refer to the exhibit. An Ethernet switch has developed  the CAM table shown. What action will the switch take when it receives  the frame shown at the bottom of the exhibit?&lt;/strong&gt;&lt;br /&gt;
**forward the frame out all interfaces except Interface3&lt;br /&gt;
add station 00-00-3D-1F-11-05 to Interface2 in the forwarding table&lt;br /&gt;
forward the frame out Interface3&lt;br /&gt;
discard the frame&lt;br /&gt;
forward the frame out all interfaces&lt;br /&gt;
forward the frame out Interface2&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;45. Power over Ethernet (PoE) allows the switch to provide power to which two types of devices? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
printer&lt;br /&gt;
**wireless access points&lt;br /&gt;
desktop PC&lt;br /&gt;
**IP phones&lt;br /&gt;
Scanners&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;46. Refer to the exhibit. Three new VLANs have been  configured to improve the performance of the network. Host A would like  to send a frame destined to Host B. Which statement is true about the  process of sending the frame?&lt;/strong&gt;&lt;br /&gt;
Host A sends an ARP request to the default gateway configured for  VLAN10 to resolve destination MAC to IP address mapping. Then the frame  is sent to switch SW1 only to switch the traffic to Host B.&lt;br /&gt;
**Host A sends an ARP request to the default gateway for VLAN10 to  resolve destination MAC to IP address mapping. Then the frame is sent to  router R1 to route the traffic to the appropriate VLAN.&lt;br /&gt;
Host A broadcasts an ARP request to the members of all VLANs. If none  of the hosts replies with a corresponding IP address, the frame is  dropped.&lt;br /&gt;
Because Host A and Host B are connected to the same switch SW1, Host A forwards the frame to Host B directly.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;47. Which command finds the next available parameter for the SwitchX# clock command with the fewest keystrokes?&lt;/strong&gt;&lt;br /&gt;
SwitchX# clock?&lt;br /&gt;
SwitchX# clock then Tab&lt;br /&gt;
SwitchX# clock then Ctrl-P&lt;br /&gt;
**SwitchX# clock ?&lt;br /&gt;
SwitchX# clock then "help"&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;48. Which three statements are true regarding router-on-a-stick inter-VLAN routing? (Choose three.)&lt;/strong&gt;&lt;br /&gt;
makes troubleshooting the inter-VLAN routing configuration much less complex than when using multiple physical interface&lt;br /&gt;
**requires the use of subinterfaces on the router&lt;br /&gt;
requires each subinterface to be configured with the no shut command&lt;br /&gt;
**can impact performance if many VLANs compete for bandwidth on a single router interface&lt;br /&gt;
requires an access link between the router and Layer 2 switch&lt;br /&gt;
**more cost-efficient and scalable than using multiple physical interfaces&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;49. Refer to the exhibit. Two switches, SW1 and SW2, are  interconnected via a trunk link. Host A is on the native VLAN. How does  untagged traffic coming from Host A traverse the trunk link?&lt;/strong&gt;&lt;br /&gt;
SW1 tags the traffic with the lowest VLAN ID value and forwards it over the trunk link.&lt;br /&gt;
SW1 tags the traffic with the highest VLAN ID value and forwards it over the trunk link.&lt;br /&gt;
**The untagged traffic is forwarded as part of the native VLAN.&lt;br /&gt;
The untagged traffic is dropped because the trunk forwards only tagged frames.&lt;br /&gt;
SW1 encapsulates the traffic with 802.1p encapsulation and forwards it over the trunk link.&lt;br /&gt;
SW1 encapsulates the traffic with 802.1Q encapsulation and forwards it over the trunk link.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;50. Refer to the exhibit. What encryption algorithm does the 802.11i standard employ for data encryption?&lt;/strong&gt;&lt;br /&gt;
PSK&lt;br /&gt;
TKIP&lt;br /&gt;
WEP&lt;br /&gt;
**AES&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;51. A network administrator is tasked to select hardware to  support a large enterprise, switched network. The system requires  redundant backplane interconnections between eight high port density  switches. Which hardware solution would be appropriate for this  enterprise?&lt;/strong&gt;&lt;br /&gt;
modular switches&lt;br /&gt;
fixed configuration switches&lt;br /&gt;
**stackable switches&lt;br /&gt;
uplink capable switches&lt;br /&gt;
link aggregated switches&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;52. Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?&lt;/strong&gt;&lt;br /&gt;
**Cat-A&lt;br /&gt;
Cat-B&lt;br /&gt;
Cat-C&lt;br /&gt;
Cat-D&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;53. What two methods can be used to remove MAC address table entries from a switch? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
**Power cycle the switch to clear all dynamically learned addresses.&lt;br /&gt;
The clear switching-tables command will remove statically configured entries.&lt;br /&gt;
**The clear mac-address-table command will remove statically and dynamically configured table entries.&lt;br /&gt;
The erase flash command will clear all statically configured table entries.&lt;br /&gt;
Statically configured MAC addresses will automatically be removed  from the address table 300 minutes after the last activity on a switch  port.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;54. Which three statements are correct concerning the default configuration of a new switch? (Choose three.)&lt;/strong&gt;&lt;br /&gt;
VLAN1 is configured with a management IP address.&lt;br /&gt;
**All switch ports are assigned to VLAN1.&lt;br /&gt;
Spanning Tree Protocol is disabled.&lt;br /&gt;
**All interfaces are set to auto.&lt;br /&gt;
Enable password is configured as cisco.&lt;br /&gt;
**The flash directory contains the IOS image.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;55. An access point supports both the 802.11g and 802.11b  standards. A device that supports only 802.11b attempts to connect to  the access point. What happens to the connection?&lt;/strong&gt;&lt;br /&gt;
The network does not connect unless the user is within line of sight of the access point.&lt;br /&gt;
**The access point and all other connected users defer to the 802.11b standard.&lt;br /&gt;
The access point always maintains the higher standard and automatically upgrades the 802.11b device to the 802.11g speed.&lt;br /&gt;
Each user gets the speed supported by the wireless NIC on their mobile device.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;56. Refer to the exhibit. The hosts connected to switch SW1  are not able to communicate with the hosts in the same VLANs connected  to switch SW2. What should be done to fix the problem?&lt;/strong&gt;&lt;br /&gt;
Introduce a Layer 3 device or a switch with Layer 3 capability in the topology.&lt;br /&gt;
**Reconfigure the trunk port on switch SW2 with static trunk configuration.&lt;br /&gt;
Configure VLANs with different VLAN IDs on switch SW2.&lt;br /&gt;
Trunk mode can be configured on Gigabit Ethernet interfaces only.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;57. What two tasks must be performed when deleting an entire VLAN? (Choose two.)&lt;/strong&gt;&lt;br /&gt;
Delete the vlan.dat file from flash.&lt;br /&gt;
Reboot the switch in order for the changes to take effect.&lt;br /&gt;
**Use the negative form of the command that was used to create the VLAN.&lt;br /&gt;
**Reassign the switch ports from the deleted VLAN to other VLANs if they are to be used.&lt;br /&gt;
Use the erase vlan command in global configuration mode.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;58. How does an Ethernet switch handle traffic if the shared memory buffers and the port memory buffers are full?&lt;/strong&gt;&lt;br /&gt;
The switch allocates additional buffers in NVRAM.&lt;br /&gt;
The switch defragments the frame and stores it in NVRAM.&lt;br /&gt;
The switch routes the packet to the destination port.&lt;br /&gt;
**The switch drops the traffic.&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>CCNA 3 Final Exam Answers 2</title><link>http://testccnastudy.blogspot.com/2012/03/ccna-3-final-exam-answers.html</link><category>CCNA 3 Final Exam Answers 2</category><pubDate>Fri, 23 Mar 2012 14:29:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-7192107751848308825</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;b&gt;1. Refer to the exhibit. The network administrator needs to setup Switch1 for &lt;span class="IL_AD" id="IL_AD1"&gt;remote access&lt;/span&gt; from HostA. The show ip interface brief is issued on Router1 and the show interfaces trunk &lt;span class="IL_AD" id="IL_AD2"&gt;command&lt;/span&gt;  is issued on the Switch1 to verify the current status. The  administrator applies the additional configuration shown in the exhibit  to Switch1. However, the telnet from HostA fails. What additional  commands need to be applied      &lt;br /&gt;
to &lt;span class="IL_AD" id="IL_AD4"&gt;the switch&lt;/span&gt;?&lt;/b&gt;&lt;br /&gt;
Switch(config)# interface vlan 1    &lt;br /&gt;
Switch(config-if)# ip address 10.1.1.250 255.255.255.0     &lt;br /&gt;
Switch(config-if)# no shutdown     &lt;br /&gt;
Switch(config-if)# ip default-gateway 10.1.10.254&lt;br /&gt;
Switch(config)# interface vlan 1    &lt;br /&gt;
Switch(config-if)# ip address 10.1.50.250 255.255.255.0     &lt;br /&gt;
Switch(config-if)# no shutdown     &lt;br /&gt;
Switch(config-if)# ip default-gateway 10.1.50.254&lt;br /&gt;
Switch(config)# interface vlan 10    &lt;br /&gt;
Switch(config-if)# ip address 10.1.10.250 255.255.255.0     &lt;br /&gt;
Switch(config-if)# no shutdown     &lt;br /&gt;
Switch(config-if)# ip default-gateway 10.1.10.254&lt;br /&gt;
**Switch(config)# interface vlan 10    &lt;br /&gt;
Switch(config-if)# ip address 10.1.1.250 255.255.255.0     &lt;br /&gt;
Switch(config-if)# no shutdown     &lt;br /&gt;
Switch(config-if)# ip default-gateway 10.1.10.254&lt;br /&gt;
Switch(config)# interface vlan 50    &lt;br /&gt;
Switch(config-if)# ip address 10.1.10.250 255.255.255.0     &lt;br /&gt;
Switch(config-if)# no shutdown     &lt;br /&gt;
Switch(config-if)# ip default-gateway 10.1.10.254&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2. Refer to the exhibit. On the basis of the configuration shown, how will an Ethernet frame on &lt;span class="IL_AD" id="IL_AD12"&gt;port&lt;/span&gt; GigabitEthernet0/1 be modified?&lt;/b&gt;&lt;br /&gt;
802.1Q encapsulation prepends a 4-byte tag field in front of the  original Ethernet frame and recomputes the frame check sequence (FCS) on  the modified frame.&lt;br /&gt;
**802.1Q encapsulation inserts a 4-byte tag field into the original  Ethernet frame between the source address and type/length fields and  recomputes the frame check sequence (FCS) on the modified frame.&lt;br /&gt;
802.1Q encapsulation prepends an 802.1p field in front of the  original Ethernet frame and recomputes the frame check sequence (FCS) on  the modified frame.&lt;br /&gt;
802.1Q encapsulation inserts an 802.1p field into the original  Ethernet frame between the source address and type/length fields and  recomputes the frame check sequence (FCS) on the modified frame.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3. What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?&lt;/b&gt;&lt;br /&gt;
**All VLANs will &lt;span class="IL_AD" id="IL_AD10"&gt;be allowed&lt;/span&gt; across the trunk. &lt;br /&gt;
Only VLAN 1 will be allowed across the trunk.&lt;br /&gt;
Only the native VLAN will be allowed across the trunk.&lt;br /&gt;
The switches will negotiate via VTP which VLANs to allow across the trunk.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;4. Which parameter is used to uniquely identify one &lt;span class="IL_AD" id="IL_AD5"&gt;wireless network&lt;/span&gt; from another?&lt;/b&gt;&lt;br /&gt;
**SSID &lt;br /&gt;
OFDM&lt;br /&gt;
WEP&lt;br /&gt;
DSSS&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;5. Refer to the exhibit. What is the consequence if SW1 port F0/1 is configured as an edge port?&lt;/b&gt;&lt;br /&gt;
SW1 port F0/1 transitions to the learning state.&lt;br /&gt;
**SW1 port F0/1 can generate a temporary loop. &lt;br /&gt;
SW1 port F0/1 becomes a non-designated port.&lt;br /&gt;
SW1 port F0/2 no longer passes BPDUs to SW4.&lt;br /&gt;
&lt;span id="more-16"&gt;&lt;/span&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;6. Refer to the exhibit. What will allow a host on VLAN 40 on switch X to communicate with a host in VLAN 40 on switch Y?&lt;/b&gt;&lt;br /&gt;
QoS&lt;br /&gt;
routing&lt;br /&gt;
**trunking &lt;br /&gt;
VPN&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;7. Refer to the exhibit. Spanning-tree port priorities are 128 for all interfaces. The network administrator enters the spanning-tree vlan 1 root primary command on S4. Which two port results are correct? (Choose two.)&lt;/b&gt;&lt;br /&gt;
**S1 Gi0/1 becomes a root port. &lt;br /&gt;
S2 Gi0/2 becomes a non-designated port.&lt;br /&gt;
S3 Gi0/1 becomes a non-designated port.&lt;br /&gt;
S4 Gi0/1 becomes a root port.&lt;br /&gt;
**S4 Gi0/2 becomes a designated port. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;8. Refer to the exhibit. Which two facts can be confirmed by this output? (Choose two.)&lt;/b&gt;&lt;br /&gt;
This switch shows no configuration &lt;span class="IL_AD" id="IL_AD3"&gt;revision&lt;/span&gt; errors.&lt;br /&gt;
This switch has established two-way communication with the neighboring devices.&lt;br /&gt;
**This switch is configured to advertise its VLAN configuration to other VTP-enabled switches in the same VTP domain.&lt;br /&gt;
This switch will drop all VTP advertisements that come from the switches that are configured in the same VTP domain.&lt;br /&gt;
**This switch will cause no disruption in the VTP domain operations  if the rest of the switches in the same VTP domain have a higher  configuration revision number. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;9. Refer to the exhibit. R1 is configured for traditional  inter-VLAN routing. R1 can ping computer 3 but cannot ping computer 1.  What is a possible cause for this failure?&lt;/b&gt;&lt;br /&gt;
**S1 port Fa0/11 is in the wrong VLAN. &lt;br /&gt;
R1 does not have an active routing protocol.&lt;br /&gt;
The IP address of computer 1 is in the wrong logical network.&lt;br /&gt;
Router interface Fa0/0 has the wrong trunk encapsulation type configured.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;10. Refer to the exhibit. Both switches are interconnected  via a trunk link. Host A and host B are on the default VLAN but are not  able to exchange traffic. What should be done to fix the problem?&lt;/b&gt;&lt;br /&gt;
Allow all VLANs on the trunk link.&lt;br /&gt;
Remove the native VLAN from the trunk.&lt;br /&gt;
Include a router or switch with Layer 3 capabilities.&lt;br /&gt;
**Configure the same native VLAN on both ends of the trunk. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;11. Refer to the exhibit. The hosts connected to switch SW1  are not able to communicate with the hosts in the same VLANs connected  to switch SW2. What should be done to fix the problem?&lt;/b&gt;&lt;br /&gt;
Configure VLANs with different VLAN IDs on switch SW2.&lt;br /&gt;
**Reconfigure the trunk port on switch SW2 with static trunk configuration. &lt;br /&gt;
Introduce a Layer 3 device or a switch with Layer 3 capability in the topology.&lt;br /&gt;
Apply &lt;span class="IL_AD" id="IL_AD8"&gt;IP addresses&lt;/span&gt; that are in the same subnet to the interfaces used to connect SW1 and SW2.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;12. What happens when the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines? &lt;/b&gt;&lt;br /&gt;
A new RSA key pair is created. &lt;br /&gt;
The switch &lt;span class="IL_AD" id="IL_AD9"&gt;defaults&lt;/span&gt; to allowing Telnet connections only. &lt;br /&gt;
The switch is no longer able to make SSH connections as an SSH client. &lt;br /&gt;
**The switch allows remote connections only after a new RSA key pair is generated. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;13. Refer to the exhibit. An Ethernet switch has developed the CAM table shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit? &lt;/b&gt;&lt;br /&gt;
**forward the frame out all interfaces except Interface3 &lt;br /&gt;
add &lt;span class="IL_AD" id="IL_AD11"&gt;station&lt;/span&gt; 00-00-3D-1F-11-05 to Interface2 in the forwarding table &lt;br /&gt;
forward the frame out Interface3 &lt;br /&gt;
discard the frame &lt;br /&gt;
forward the frame out all interfaces &lt;br /&gt;
forward the frame out Interface2 &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;14. Which two statements describe Spanning Tree Protocol? (Choose two.) &lt;/b&gt;&lt;br /&gt;
**It eliminates Layer 2 loops in network topologies. &lt;br /&gt;
It eliminates the need for redundant physical paths in network topologies. &lt;br /&gt;
**It can only be used in networks in which Layer 2 switching is in use. &lt;br /&gt;
It can only be used in networks where both routers and switches are used together. &lt;br /&gt;
It can only be used in networks where routers are installed. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;15. Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP addresses should be assigned to this new host? &lt;/b&gt;&lt;br /&gt;
192.168.1.11 /28 &lt;br /&gt;
**192.168.1.22 /28 &lt;br /&gt;
192.168.1.33 /28 &lt;br /&gt;
192.168.1.44 /28 &lt;br /&gt;
192.168.1.55 /28 &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;16. Refer to the exhibit. How does SW1 manage traffic coming from Host A? &lt;/b&gt;&lt;br /&gt;
SW1 drops the traffic because it is untagged. &lt;br /&gt;
**SW1 leaves the traffic untagged and forwards it over the trunk. &lt;br /&gt;
SW1 tags the traffic with the &lt;span class="IL_AD" id="IL_AD6"&gt;lowest&lt;/span&gt; VLAN ID value and forwards it over the trunk link. &lt;br /&gt;
SW1 encapsulates the traffic with 802.1Q encapsulation and forwards it over the trunk link. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;17. Refer to the exhibit. The switches are configured for VTP  as shown. Which two statements correctly describe the operation of  these switches? (Choose two.) &lt;/b&gt;&lt;br /&gt;
A new VLAN can be added to Switch1 and that information will be added only to Switch2. &lt;br /&gt;
**A new VLAN can be added to Switch1 and that information will be added to Switch2 and Switch4 &lt;br /&gt;
**An existing VLAN can be deleted from Switch4 and that VLAN will be deleted from Switch1 and Switch2 &lt;br /&gt;
An existing VLAN can be deleted from Switch2 and that VLAN will be deleted from Switch1 and Switch4. &lt;br /&gt;
A new VLAN can be added to Switch4 and that information will be added to Switch1, Switch2, and Switch3. &lt;br /&gt;
A new VLAN can be added to Switch3 and that information will be added to Switch1, Switch2, and Switch4. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;18. Refer to the exhibit. Computer A sends a &lt;span class="IL_AD" id="IL_AD7"&gt;broadcast message&lt;/span&gt;. Which devices will see the broadcast?&lt;/b&gt;&lt;br /&gt;
computer B &lt;br /&gt;
computer B and Router1 &lt;br /&gt;
*computer C and Router1 &lt;br /&gt;
computer B, computer D, computer E and Router1 &lt;br /&gt;
computer B, computer C, computer D, computer E and Router1 &lt;br /&gt;
computer A, computer B, computer C, computer D, computer E and Router1 &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;19. Refer to the exhibit. The network administrator enters  the configuration shown to allow both SSH and Telnet connections to the  switch. The Telnet connections fail. What is the most likely cause of  this problem? &lt;/b&gt;&lt;br /&gt;
The SSH version number is wrong. &lt;br /&gt;
SSH has been configured on the wrong line. &lt;br /&gt;
Telnet and SSH cannot be configured simultaneously. &lt;br /&gt;
**The transport input command is configured incorrectly. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;20. Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology? &lt;/b&gt;&lt;br /&gt;
Cat-A &lt;br /&gt;
Cat-B &lt;br /&gt;
**Cat-C &lt;br /&gt;
Cat-D &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;21. Refer to the exhibit. The switches in the exhibit have VTP pruning enabled. Which VLANs will be pruned from switch SW3? &lt;/b&gt;&lt;br /&gt;
**VLAN 10 and VLAN 20 &lt;br /&gt;
VLAN 1, VLAN 10, and VLAN 20 &lt;br /&gt;
VLAN 1, VLAN 1002 through 1005 &lt;br /&gt;
VLAN 1, VLAN 10, VLAN 20, VLAN 1002 through 1005 &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;22. Refer to the exhibit. What does STATIC indicate in the output that is shown? &lt;/b&gt;&lt;br /&gt;
The switch will not allow any other device to connect to port Fa0/15. &lt;br /&gt;
**Traffic destined for MAC address 0000.c123.5432 will be forwarded to Fa0/15. &lt;br /&gt;
This entry will be removed and refreshed every 300 seconds to keep it in the table. &lt;br /&gt;
The switch learned this MAC address from the source address in a frame received on Fa0/15. &lt;br /&gt;
When processing a frame, the switch does not have to perform a lookup to determine the final destination port. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;23. Which three statements are true regarding router-on-a-stick inter-VLAN routing? (Choose three.) &lt;/b&gt;&lt;br /&gt;
**requires the use of subinterfaces on the router &lt;br /&gt;
requires an access link between the router and Layer 2 switch &lt;br /&gt;
**more cost-efficient and scalable than using multiple physical interfaces &lt;br /&gt;
requires each subinterface to be configured with the no shutdown command &lt;br /&gt;
**can impact performance if many VLANs compete for bandwidth on a single router interface &lt;br /&gt;
makes troubleshooting the inter-VLAN routing configuration much less complex than when using multiple physical interfaces &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;24. Refer to the exhibit. Router RA receives a packet with a  source address of 192.168.1.35 and a destination address of  192.168.1.85. What will the router do with this packet? &lt;/b&gt;&lt;br /&gt;
The router will forward the packet out interface FastEthernet 0/1.1. &lt;br /&gt;
The router will forward the packet out interface FastEthernet 0/1.2. &lt;br /&gt;
The router will forward the packet out interface FastEthernet 0/1.3. &lt;br /&gt;
The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3. &lt;br /&gt;
**The router will ignore the packet because the source and destination are on the same broadcast domain. &lt;br /&gt;
The router will drop the packet since no network that includes the source address is attached to the router. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;25. Refer to the exhibit. The network administrator needs to  remove the east-hosts VLAN and use the switch port from that VLAN in one  of the existing VLANs. What two commands should be used when completely  removing VLAN 2 from S1-Central while leaving the switch and all its  interfaces operational? (Choose two.) &lt;/b&gt;&lt;br /&gt;
S1-Central# reload &lt;br /&gt;
S1-Central# erase flash: &lt;br /&gt;
**S1-Central(config)# no vlan 2 &lt;br /&gt;
S1-Central# delete flash:vlan.dat &lt;br /&gt;
**S1-Central(config-if)# switchport access vlan 3 &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;26. Refer to the exhibit. What does "FORWARDING" mean in the command output shown? &lt;/b&gt;&lt;br /&gt;
**The switch is sending and receiving data frames &lt;br /&gt;
The switch is receiving BPDUs, but not sending data frames. &lt;br /&gt;
The switch is participating in an election process by forwarding the BPDUs it receives. &lt;br /&gt;
The switch is receiving BPDUs and populating the MAC address table, but not sending data. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;27. Refer to the exhibit. Switch SW2 has been newly purchased  and added to the network. What configuration should be applied to SW2  so that it participates in the same VTP domain as switch SW1, receives  VLAN information from SW1, and synchronizes VLAN information? &lt;/b&gt;&lt;br /&gt;
Disable VTP pruning on SW2. &lt;br /&gt;
Configure SW2 in VTP transparent mode. &lt;br /&gt;
**Configure SW2 with the VTP domain password. &lt;br /&gt;
Configure SW2 as a VTP server with a higher revision number. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;28. What are three benefits of a hierarchical network model? (Choose three.) &lt;/b&gt;&lt;br /&gt;
**reduced contention for bandwidth &lt;br /&gt;
reduced size of the physical layout &lt;br /&gt;
**increased fault tolerance of the network &lt;br /&gt;
elimination of the need for wiring closets &lt;br /&gt;
elimination of the need for layer three functionality &lt;br /&gt;
**simplification of management and troubleshooting &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;29. Refer to the exhibit. Which three options correctly  identify information that could be associated with this output?(Choose  three.) &lt;/b&gt;&lt;br /&gt;
**Interface FastEthernet3/0/0 is subinterfaced. &lt;br /&gt;
**A non-proprietary trunking protocol is in use. &lt;br /&gt;
**The configuration is appropriate for a router-on-a-stick network design. &lt;br /&gt;
A shutdown command has been applied to interface FastEthernet3/0/0. &lt;br /&gt;
Interface FastEthernet3/0/0.3 is mapped to the default management VLAN. &lt;br /&gt;
An IP address should be applied to FastEthernet3/0/0 for correct data routing. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;30. Refer to the exhibit. Switch SW2 was tested in a lab  environment and then inserted into a production network without  reloading its configuration. After the trunk link between SW1 and SW2  was brought up, all users lost connectivity to the network. What could  be the source of the problem? &lt;/b&gt;&lt;br /&gt;
All the VLANs were pruned from the trunk port between SW1 and SW2. &lt;br /&gt;
SW1 and SW2 cannot be both set as VTP servers in the same VTP domain. &lt;br /&gt;
**VTP configuration revision number of SW2 was higher than the configuration revision number of SW1. &lt;br /&gt;
The additional VLANs from SW2 created more VLANs than the VLAN database of SW1 could contain. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;31. Refer to the exhibit. A network administrator needs to  implement inter-VLAN routing on a hierarchical network. On which devices  should the inter-VLAN routing be configured? &lt;/b&gt;&lt;br /&gt;
AS1 and AS2 &lt;br /&gt;
DS1 and DS2 &lt;br /&gt;
**Gateway and CS1 &lt;br /&gt;
Gateway, CS1, DS1, and DS2 &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;32. Which three statements are correct concerning the default configuration of a new switch? (Choose three.) &lt;/b&gt;&lt;br /&gt;
Spanning Tree Protocol is disabled. &lt;br /&gt;
Enable password is configured as cisco. &lt;br /&gt;
**All switch ports are assigned to VLAN1. &lt;br /&gt;
**The flash directory contains the IOS image. &lt;br /&gt;
VLAN1 is configured with a management IP address. &lt;br /&gt;
**All interfaces are set to auto-negotiation of speed and duplex. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;33. Refer to the exhibit. All hosts are in listen mode. Host 1  and Host 4 both transmit data at the same time. How do the hosts  respond on the network? (Choose two.) &lt;/b&gt;&lt;br /&gt;
**After the end of the jam signal, a backoff algorithm is invoked. &lt;br /&gt;
Hosts 1 and 4 are operating full duplex so no collision will exist. &lt;br /&gt;
The hub will block the port connected to Host 4 to prevent a collision. &lt;br /&gt;
Hosts 1 and 4 are assigned shorter backoff values to provide them priority to access the media. &lt;br /&gt;
**If a host has data to transmit after the backoff period of that  host, the host checks to determine if the line is idle before  transmitting. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;34. Refer to the exhibit. After the listed commands are  entered into router R1 and switch S1, the administrator enters the show  interface fa0/1 trunk and gets the results shown. What is the likely  problem? &lt;/b&gt;&lt;br /&gt;
The trunk is established, but no VLANs have been configured to use it. &lt;br /&gt;
**The trunk has not been established because the router does not support dynamic trunking protocol. &lt;br /&gt;
The router, the switch, or both must be configured with the dynamic  desirable option for dynamic trunking protocol to establish a trunk. &lt;br /&gt;
The router is missing the dynamic trunking protocol statements necessary to form a trunk. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;35. Refer to the exhibit. Which two statements are true about the operation of the interfaces? (Choose two.) &lt;/b&gt;&lt;br /&gt;
Incoming traffic with VLAN ID 0 is processed by interface fa0/0. &lt;br /&gt;
**Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2. &lt;br /&gt;
Both subinterfaces remain up with line protocol up, even if fa0/0 line protocol is down. &lt;br /&gt;
Subinterfaces use unique MAC addresses by adding the 802.1Q VLAN ID to the hardware address. &lt;br /&gt;
**Traffic inbound on this router is processed by different  subinterfaces, depending on the VLAN from which the traffic originated. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;36. What three tasks should be performed before moving a Catalyst switch to another VTP management domain? (Choose three.) &lt;/b&gt;&lt;br /&gt;
**Select the correct VTP mode and version. &lt;br /&gt;
**Configure the switch with the name of the new management domain &lt;br /&gt;
Download the VTP database from the VTP server in the new domain. &lt;br /&gt;
Configure the VTP server in the new domain to recognize the BID of the switch. &lt;br /&gt;
Reset the VTP counters to allow the switch to synchronize with the other switches in the new domain. &lt;br /&gt;
**Verify that the switch has a lower configuration revision number than the other switches in the new domain &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;37. Refer to the exhibit. Hosts A and B, connected to hub  HB1, attempt to transmit a frame at the same time but a collision  occurs. Which hosts will receive the collision jamming signal? &lt;/b&gt;&lt;br /&gt;
only hosts A and B &lt;br /&gt;
**only hosts A, B, and C &lt;br /&gt;
only hosts A, B, C, and D &lt;br /&gt;
only hosts A, B, C, and E &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;38. Which statement regarding the service password-encryption command is true? &lt;/b&gt;&lt;br /&gt;
The service password-encryption command is entered at the privileged EXEC mode prompt. &lt;br /&gt;
The service password-encryption command encrypts only passwords for the console and VTY ports. &lt;br /&gt;
**The service password-encryption command encrypts all previously unencrypted passwords in the running configuration. &lt;br /&gt;
To see the passwords encrypted by the service password-encryption command, enter the no service password-encryption command. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;39. Refer to the exhibit. Which two statements are true  regarding what the cost value of 23 represents for Switch4? (Choose  two.) &lt;/b&gt;&lt;br /&gt;
**This cost represents the lowest cost path for Switch4 to the root switch. &lt;br /&gt;
A cost of 23 is the value being advertised out port 16 on the switch upstream (closer) to the root switch. &lt;br /&gt;
**Switch4 adds the cost of a Fast Ethernet link to 23 to determine its total cost to reach the root switch &lt;br /&gt;
Switch4 is connected via a Fast Ethernet link to an upstream switch  that in turn is directly connected to the root switch via a Gigabit  Ethernet link. &lt;br /&gt;
The root switch is advertising a cost of 23, which is lower than any other switch in the VLAN0001 spanning-tree domain. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;40. Refer to the exhibit. What three statements describe why Host1 and Host2 are unable to communicate? (Choose three.) &lt;/b&gt;&lt;br /&gt;
**The switch ports are on different VLANs. &lt;br /&gt;
The switch IP address is on the wrong subnet. &lt;br /&gt;
**The hosts are configured on different logical networks. &lt;br /&gt;
**A router is required to forward traffic between Host1 and Host2. &lt;br /&gt;
The VLAN port assignments must be contiguous for each VLAN. &lt;br /&gt;
The host default gateway addresses must be on the same logical network. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;41. Refer to the exhibit. Each switch is shown with its MAC  address. Which switch will be elected as the spanning-tree root bridge  if the switches are configured with their default priority values? &lt;/b&gt;&lt;br /&gt;
switch A &lt;br /&gt;
switch B &lt;br /&gt;
switch C &lt;br /&gt;
switch D &lt;br /&gt;
switch E &lt;br /&gt;
**switch F &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;42. Refer to the exhibit. Hosts PC_A and PC_B send traffic  simultaneously, and the frames from the transmitting stations collide.  What is the last device to receive the collision? &lt;/b&gt;&lt;br /&gt;
hub HB1 &lt;br /&gt;
**switch SW1 &lt;br /&gt;
router R1 &lt;br /&gt;
switch SW2 &lt;br /&gt;
router R2 &lt;br /&gt;
switch SW4 &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;43. Why is it important that the network administrator  consider the spanning-tree network diameter when choosing the root  bridge? &lt;/b&gt;&lt;br /&gt;
The network diameter limitation is 9. &lt;br /&gt;
**BPDUs may be discarded because of expiring timers. &lt;br /&gt;
The cabling distance between the switches is 100 meters. &lt;br /&gt;
The network diameter must be set to the number of meters of the cable  between the root bridge and its farthest connected switch. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;44. Refer to the exhibit. A network administrator has  segmented the network into two VLANs and configured Router1 for  inter-VLAN routing. A test of the network, however, shows that hosts on  each VLAN can only access local resources and not resources on the other  VLAN. What is the most likely cause of this problem? &lt;/b&gt;&lt;br /&gt;
**Switch port Fa0/1 is not trunking. &lt;br /&gt;
Router interface Fa0/0 is possibly down. &lt;br /&gt;
No routing protocol is configured on Router1. &lt;br /&gt;
One of the router subinterfaces is possibly down. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;45. What is the purpose of issuing the command switchport mode access on a switch interface? &lt;/b&gt;&lt;br /&gt;
disable port security &lt;br /&gt;
make the port operational &lt;br /&gt;
override the default port behavior &lt;br /&gt;
**force the port to be a part of a single vlan &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;46. Refer to the exhibit. Which statement is true regarding the information shown? &lt;/b&gt;&lt;br /&gt;
Only one VLAN is currently configured to use the trunk links. &lt;br /&gt;
The switch negotiated trunk links for interfaces Fa0/1 and Gi0/1. &lt;br /&gt;
A Cisco proprietary protocol is in use for interfaces Fa0/1 and Gi0/1. &lt;br /&gt;
**Interfaces Gi0/1 and Fa0/1 are allowed to carry data from multiple VLANs &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;47. Which identifier is used to keep track of frames that are destined for a particular wireless client? &lt;/b&gt;&lt;br /&gt;
AID &lt;br /&gt;
SSID &lt;br /&gt;
**BSSID &lt;br /&gt;
ESSID &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;48. Refer to the exhibit. What will happen when frames that contain an unknown source address reach interface fa0/24? &lt;/b&gt;&lt;br /&gt;
A syslog message will be logged. &lt;br /&gt;
Fa0/24 will become error-disabled. &lt;br /&gt;
**The incoming frames will be dropped &lt;br /&gt;
The security violation count will be incremented. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;49. In which mode is a VTP switch operating if it has been configured to only forward VTP advertisements? &lt;/b&gt;&lt;br /&gt;
client &lt;br /&gt;
root &lt;br /&gt;
server &lt;br /&gt;
**transparent &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;50. Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point? &lt;/b&gt;&lt;br /&gt;
Associate with the access point and then open a HyperTerminal session with the access point. &lt;br /&gt;
Physically connect to the access point and then reboot the computer to launch the configuration software. &lt;br /&gt;
**From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser. &lt;br /&gt;
Modify the TCP/IP properties of the computer connected to the access  point so that it exists on the same network, and then reboot your  computer to establish a connection. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;51. What two methods can be used to remove MAC address table entries from a switch? (Choose two.) &lt;/b&gt;&lt;br /&gt;
The clear switching-tables command will remove statically configured entries. &lt;br /&gt;
**The clear mac-address-table command will remove statically and dynamically configured table entries. &lt;br /&gt;
The erase flash command will clear all statically configured table entries. &lt;br /&gt;
Statically configured MAC addresses will automatically be removed  from the address table 300 minutes after the last activity on a switch  port. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;52. What are two benefits of the IEEE 802.11n standard over the IEEE 802.11G? (Choose two.) &lt;/b&gt;&lt;br /&gt;
requires less equipment &lt;br /&gt;
**provides improved range &lt;br /&gt;
**permits increased data rates &lt;br /&gt;
has a single-input and a single-output &lt;br /&gt;
needs no hardware upgrade for compatibility &lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>CCNA 3 Final Exam Answers 2011</title><link>http://testccnastudy.blogspot.com/2012/03/ccna-3-final-exam-answers-2011.html</link><category>CCNA 3 Final Exam Answers 2011</category><pubDate>Fri, 23 Mar 2012 14:28:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-2802142739211342438</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;strong style="font-weight: 400;"&gt;1&lt;/strong&gt;. Which &lt;span class="IL_AD" id="IL_AD10"&gt;parameter&lt;/span&gt; is used to uniquely identify one &lt;span class="IL_AD" id="IL_AD3"&gt;wireless network&lt;/span&gt; from another?&lt;br /&gt;
&lt;span style="color: red;"&gt;SSID&lt;/span&gt;&lt;br /&gt;
OFDM&lt;br /&gt;
WEP&lt;br /&gt;
DSSS&lt;br /&gt;
&lt;br /&gt;
2. Refer to the exhibit. &lt;span class="IL_AD" id="IL_AD4"&gt;How does&lt;/span&gt; SW1 manage traffic coming from Host A?&lt;br /&gt;
SW1 drops the traffic because it is untagged.&lt;br /&gt;
&lt;span style="color: red;"&gt;SW1 leaves the traffic untagged and forwards it over the trunk.&lt;/span&gt;&lt;br /&gt;
SW1 tags the traffic with the lowest VLAN ID value and forwards it over the trunk link.&lt;br /&gt;
SW1 encapsulates the traffic with 802.1Q encapsulation and forwards it over the trunk link.&lt;br /&gt;
&lt;br /&gt;
&lt;strong style="font-weight: 400;"&gt;3&lt;/strong&gt;. What is a possible impact of setting too short an aging time in the MAC address table of a switch?&lt;br /&gt;
overly large address table&lt;br /&gt;
&lt;span style="color: red;"&gt;unnecessary flooding of packets&lt;/span&gt;&lt;br /&gt;
excessive timeouts of static addresses&lt;br /&gt;
impaired ability to dynamically learn new addresses&lt;br /&gt;
&lt;span id="more-86"&gt;&lt;/span&gt; &lt;br /&gt;
4. Refer to the exhibit. The network administrator has just added  VLAN 50 to Switch1 and Switch2. Hosts A, B, C, and D are correctly  configured with IP addresses in the subnet range for VLAN 50. Host A can  communicate with host B, but cannot communicate with host C or host D.  What is the cause of this problem?&lt;br /&gt;
There is a native VLAN mismatch.&lt;br /&gt;
The Fa0/11 interface of Switch1 is not configured as a trunk.&lt;br /&gt;
The link between Switch1 and Switch2 is up but not trunked.&lt;br /&gt;
&lt;span style="color: red;"&gt;VLAN 50 is not allowed on the trunk link between Switch1 and Switch2.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong style="font-weight: 400;"&gt;5&lt;/strong&gt;. Using the command &lt;b&gt;copy tftp:backup.cfg startup-config&lt;/b&gt;,  an administrator downloaded a saved configuration from a TFTP server to  a switch. Why does the administrator not detect any changes in &lt;span class="IL_AD" id="IL_AD7"&gt;the switch&lt;/span&gt; configuration after the &lt;span class="IL_AD" id="IL_AD5"&gt;download&lt;/span&gt; completes?&lt;br /&gt;
The command should have been &lt;b&gt;copy startup-config tftp:backup.cfg&lt;/b&gt;.&lt;br /&gt;
A backup configuration from a TFTP server cannot be copied directly into the startup-config.&lt;br /&gt;
The command &lt;b&gt;copy running-config startup-config&lt;/b&gt; should be used to save the changes on the switch.&lt;br /&gt;
&lt;span style="color: red;"&gt;&lt;span class="IL_AD" id="IL_AD1"&gt;Downloading&lt;/span&gt; to the startup-config requires the switch to be reloaded in order for the configuration to take effect.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
6. Refer to the exhibit. The teacher host is connected to port Fa0/7 on switch STW. A student has decided to share &lt;span class="IL_AD" id="IL_AD8"&gt;access to the Internet&lt;/span&gt; by attaching a hub and laptop to STW as shown. What will be the result of the student making this connection?&lt;br /&gt;
The Fa0/7 port of STW will be shutdown.&lt;br /&gt;
The student will gain full access to the Internet.&lt;br /&gt;
Both the teacher and student will be able to receive data but only the teacher will be able to send.&lt;br /&gt;
&lt;span style="color: red;"&gt;The frames from the laptop will be dropped, but the teacher host will maintain connectivity with the network.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong style="font-weight: 400;"&gt;7&lt;/strong&gt;. Which value determines if a switch becomes the central point of reference in the spanning tree topology?&lt;br /&gt;
&lt;span style="color: red;"&gt;lowest &lt;span class="IL_AD" id="IL_AD11"&gt;bridge&lt;/span&gt; ID&lt;/span&gt;&lt;br /&gt;
highest revision number&lt;br /&gt;
lowest numeric IP address&lt;br /&gt;
highest numeric MAC address&lt;br /&gt;
&lt;br /&gt;
8. Refer to the exhibit. How is port Gi1/1 on SWT-A functioning in the spanning-tree topology?&lt;br /&gt;
It is sending and receiving data frames.&lt;br /&gt;
&lt;span style="color: red;"&gt;It is receiving BPDUs, but not sending data frames.&lt;/span&gt;&lt;br /&gt;
It is participating in the election process by forwarding the BPDUs it receives.&lt;br /&gt;
It is receiving BPDUs and populating the MAC address table, but not sending data.&lt;br /&gt;
&lt;br /&gt;
&lt;strong style="font-weight: 400;"&gt;9&lt;/strong&gt;. In a three-layer hierarchical network design, which distribution layer function delineates broadcast &lt;span class="IL_AD" id="IL_AD12"&gt;domains&lt;/span&gt;?&lt;br /&gt;
&lt;span style="color: red;"&gt;routing between VLANs&lt;/span&gt;&lt;br /&gt;
aggregating traffic flows&lt;br /&gt;
providing redundant links&lt;br /&gt;
reducing the network diameter&lt;br /&gt;
&lt;br /&gt;
10. Refer to the exhibit. The devices in the network are operational  and configured as indicated in the exhibit. However, hosts B and D  cannot ping each other. What is the most likely cause of this problem?&lt;br /&gt;
The link between the switches is up but not trunked.&lt;br /&gt;
The Fa0/11 interface of Switch1 is not configured as a trunk.&lt;br /&gt;
&lt;span style="color: red;"&gt;Hosts B and D are configured with IP addresses from different subnets.&lt;/span&gt;&lt;br /&gt;
VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.&lt;br /&gt;
&lt;br /&gt;
11. Refer to the exhibit. If switch SW1 is configured with the four  VLANs as shown in the exhibit, how many physical interfaces are needed  on router R1 to configure inter-VLAN routing using subinterfaces?&lt;br /&gt;
zero&lt;br /&gt;
&lt;span style="color: red;"&gt;one&lt;/span&gt;&lt;br /&gt;
two&lt;br /&gt;
four&lt;br /&gt;
&lt;br /&gt;
&lt;strong style="font-weight: 400;"&gt;12&lt;/strong&gt;. What two methods can be used to remove MAC address &lt;span class="IL_AD" id="IL_AD6"&gt;table entries&lt;/span&gt; from a switch? (Choose two.)&lt;br /&gt;
&lt;span style="color: red;"&gt;Power cycle the switch to clear all dynamically learned addresses.&lt;/span&gt;&lt;br /&gt;
The &lt;b&gt;clear switching-tables&lt;/b&gt; command will remove statically configured entries.&lt;br /&gt;
The &lt;b&gt;clear mac-address-table&lt;/b&gt; command will remove statically and dynamically configured table entries.&lt;br /&gt;
&lt;span style="color: red;"&gt;The &lt;b&gt;erase flash&lt;/b&gt; command will clear all statically configured table entries.&lt;/span&gt;&lt;br /&gt;
Statically configured MAC addresses will automatically be removed  from the address table 300 minutes after the last activity on a switch  port.&lt;br /&gt;
&lt;br /&gt;
13. Refer to the exhibit. All edge ports are configured with the &lt;b&gt;spanning-tree portfast&lt;/b&gt; command. Host1 is recently connected to port Fa0/1 on switch SW1 . Which statement is true about the status of port Fa0/1?&lt;br /&gt;
The port will transition into blocking state.&lt;br /&gt;
&lt;span style="color: red;"&gt;The port will transition immediately into forwarding state.&lt;/span&gt;&lt;br /&gt;
The port will transition into blocking state and then immediately into forwarding state.&lt;br /&gt;
The port will transition into blocking state and immediately transition through the listening and learning states.&lt;br /&gt;
&lt;br /&gt;
14. Refer to the exhibit. The configuration steps that are listed in  the exhibit have been entered in switch S1 via the console. Subsequent  attempts to telnet to the switch are not successful. What is causing the problem?&lt;br /&gt;
The switch must be configured with SSH version 1.&lt;br /&gt;
&lt;span style="color: red;"&gt;The &lt;b&gt;transport input&lt;/b&gt; command must specify Telnet access.&lt;/span&gt;&lt;br /&gt;
The RSA keys must be returned to zero before SSH will permit Telnet access.&lt;br /&gt;
The &lt;b&gt;ip domain-name&lt;/b&gt; command must also be entered in line configuration mode for the vty lines.&lt;br /&gt;
&lt;br /&gt;
&lt;strong style="font-weight: 400;"&gt;15&lt;/strong&gt;. A network administrator configures a switch port with the command &lt;b&gt;switchport mode dynamic auto&lt;/b&gt;. What is the resulting behavior of the switch port?&lt;br /&gt;
The switch port is able to trunk if the remote switch port is set to auto.&lt;br /&gt;
&lt;span style="color: red;"&gt;The switch port is able to trunk if the remote switch port is set to desirable.&lt;/span&gt;&lt;br /&gt;
The switch port will be disabled if it is unable to successfully negotiate trunking.&lt;br /&gt;
A successful trunk will be established if the remote switch is non-Cisco but the port is configured for trunking.&lt;br /&gt;
&lt;br /&gt;
16. Which security protocol or measure would provide the greatest protection for a &lt;span class="IL_AD" id="IL_AD9"&gt;wireless LAN&lt;/span&gt;?&lt;br /&gt;
WPA2&lt;br /&gt;
cloaking SSIDs&lt;br /&gt;
shared WEP key&lt;br /&gt;
&lt;span style="color: red;"&gt;MAC address filtering&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
17. Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP address should be assigned to this new host?&lt;br /&gt;
192.168.1.11 /28&lt;br /&gt;
&lt;span style="color: red;"&gt;192.168.1.22 /28&lt;/span&gt;&lt;br /&gt;
192.168.1.33 /28&lt;br /&gt;
192.168.1.44 /28&lt;br /&gt;
192.168.1.55 /28&lt;br /&gt;
&lt;br /&gt;
&lt;strong style="font-weight: 400;"&gt;18&lt;/strong&gt;. What is one disadvantage that 802.11a wireless has compared to 802.11g?&lt;br /&gt;
Use of the 5GHz band requires much larger &lt;span class="IL_AD" id="IL_AD2"&gt;antennas&lt;/span&gt;.&lt;br /&gt;
The OFDM modulation technique results in a slower data rate.&lt;br /&gt;
There are fewer non-overlapping channels available to help reduce RF interference.&lt;br /&gt;
The use of higher frequencies means that signals are more likely to be obstructed.&lt;br /&gt;
&lt;br /&gt;
19. Refer to the exhibit. Users A and B are reporting intermittent  connectivity problems. Pre-installation surveys showed strong signal  strength from the AP locations to the client locations. Outside  electrical interference has been eliminated. What will fix the problem?&lt;br /&gt;
Relocate the APs closer to each other.&lt;br /&gt;
Increase the distance between the clients.&lt;br /&gt;
&lt;span style="color: red;"&gt;Change the channel on AP-B to 6 or 11.&lt;/span&gt;&lt;br /&gt;
Place AP-A and AP-B on the same wireless channel.&lt;br /&gt;
&lt;br /&gt;
20. Refer to the exhibit. All trunk links are operational and all  VLANs are allowed on all trunk links. An ARP request is sent by computer  5. Which device or devices will receive this message?&lt;br /&gt;
only computer 4&lt;br /&gt;
&lt;span style="color: red;"&gt;computer 3 and RTR-A&lt;/span&gt;&lt;br /&gt;
computer 4 and RTR-A&lt;br /&gt;
computer 1, computer 2, computer 4, and RTR-A&lt;br /&gt;
computer 1, computer 2, computer 3, computer 4, and RTR-A&lt;br /&gt;
all of the computers and the router&lt;br /&gt;
&lt;br /&gt;
21. Refer to the exhibit. Router RA receives a packet with a source  address of 192.168.1.65 and a destination address of 192.168.1.161. What  will the router do with this packet?&lt;br /&gt;
&lt;span style="color: red;"&gt;The router will drop the packet.&lt;/span&gt;&lt;br /&gt;
The router will forward the packet out interface FastEthernet 0/1.1.&lt;br /&gt;
The router will forward the packet out interface FastEthernet 0/1.2.&lt;br /&gt;
The router will forward the packet out interface FastEthernet 0/1.3.&lt;br /&gt;
The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.&lt;br /&gt;
&lt;br /&gt;
&lt;strong style="font-weight: 400;"&gt;22&lt;/strong&gt;. An administrator is  troubleshooting a PC on the network which is suffering from slow and  intermittent connectivity. The PC has a ping success rate to the default  gateway of less than half the ping attempts. Other PCs on the switch can consistently ping the default gateway. The switch port is configured for auto duplex and the PC is configured for full duplex. What will commonly cause this problem?&lt;br /&gt;
&lt;span style="color: red;"&gt;The PC is set to full duplex. The switch port  fails to autonegotiate the duplex setting and defaults to half duplex,  which causes a duplex mismatch.&lt;/span&gt;&lt;br /&gt;
The switch traffic is exceeding available frame buffers. The result is that frames are being dropped.&lt;br /&gt;
The PC and the default gateway have different bandwidth Ethernet ports.&lt;br /&gt;
The default gateway is not on the same switch that the PC is.&lt;br /&gt;
&lt;br /&gt;
&lt;strong style="font-weight: 400;"&gt;23&lt;/strong&gt;. Why is it advisable that a network administrator use SSH instead of Telnet when managing switches?&lt;br /&gt;
SSH uses TCP whereas Telnet does not.&lt;br /&gt;
SSH encrypts only the username and password when logging in.&lt;br /&gt;
&lt;span style="color: red;"&gt;SSH encrypts all remote management communications whereas Telnet does not.&lt;/span&gt;&lt;br /&gt;
SSH sends a clear text message steam which reduces the bandwidth use for management.&lt;br /&gt;
&lt;br /&gt;
24. Refer to the exhibit. What would happen if the network  administrator moved the network cable of Host A from interface Fa0/1 to  Fa0/3 on switch SW1?&lt;br /&gt;
Host A remains a member of VLAN 10, because the router is routing traffic between VLANs.&lt;br /&gt;
&lt;span style="color: red;"&gt;Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30.&lt;/span&gt;&lt;br /&gt;
Host A remains a member of VLAN 10, because the switch provides dynamic VLAN assignment for the port.&lt;br /&gt;
Host A maintains connectivity to all members of VLAN 10, because it is connected to the same physical network.&lt;br /&gt;
Host A is no longer a member of VLAN 10, but because port Fa0/3 was unused, it is now a member of VLAN 1.&lt;br /&gt;
&lt;br /&gt;
25. Refer to the exhibit. The VTP domain has been configured as shown  in the exhibit. The network technician accidentally configured the VTP  server as a VTP client. After the technician reloaded the switches, all  users in the VTP domain started to complain that they lost connectivity  to the users on the same VLANs that are connected to other switches.  What should be done in the future to prevent losing all VLAN  configurations in a VTP domain?&lt;br /&gt;
Configure all switches in VTP transparent mode and copy the VLAN configuration into flash.&lt;br /&gt;
Configure all switches in the network as VTP clients and copy the VLAN configuration into NVRAM.&lt;br /&gt;
&lt;span style="color: red;"&gt;Create a new domain and configure a second switch as a VTP server to take over in case of a primary VTP server failure.&lt;/span&gt;&lt;br /&gt;
In the same domain, configure a second switch as a VTP server to take over in case of a primary VTP server failure.&lt;br /&gt;
&lt;br /&gt;
26. Refer to the exhibit. What is true of the configuration of switch S1?&lt;br /&gt;
A Cisco proprietary protocol is in use for ports Fa0/1 and Fa0/3.&lt;br /&gt;
Switch ports Fa0/1 and Fa0/3 have been configured with the &lt;b&gt;switchport mode access&lt;/b&gt; command.&lt;br /&gt;
Untagged frames received on ports Fa0/1 and Fa0/3 will be placed on VLAN 1.&lt;br /&gt;
&lt;span style="color: red;"&gt;Switch ports Fa0/1 and Fa0/3 are configured to carry data from multiple VLANs.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
27. Refer to the exhibit. VLAN 10 has been configured on the VTP  server. Users who are assigned to VLAN 10 are connected as shown in the  exhibit. On the basis of the outputs that are provided, which group of  users will be able to communicate with the users on VLAN 10 on SW1?&lt;br /&gt;
all the users who are connected only to SW2&lt;br /&gt;
&lt;span style="color: red;"&gt;users on VLAN 10 who are connected only to SW3&lt;/span&gt;&lt;br /&gt;
users on VLAN 10 who are connected only to SW4&lt;br /&gt;
users on VLAN 10 who are connected to both SW3 and SW4&lt;br /&gt;
&lt;br /&gt;
&lt;strong style="font-weight: 400;"&gt;28&lt;/strong&gt;. Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?&lt;br /&gt;
Associate with the access point and then open a HyperTerminal session with the access point.&lt;br /&gt;
Physically connect to the access point and then reboot the computer to launch the configuration software.&lt;br /&gt;
&lt;span style="color: red;"&gt;From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.&lt;/span&gt;&lt;br /&gt;
Modify the TCP/IP properties of the computer connected to the access  point so that it exists on the same network, and then reboot your  computer to establish a connection.&lt;br /&gt;
&lt;br /&gt;
&lt;strong style="font-weight: 400;"&gt;29&lt;/strong&gt;. What is the purpose of the Spanning Tree algorithm?&lt;br /&gt;
It propagates VLAN configurations to other switches.&lt;br /&gt;
It restricts broadcast packets to a single VLAN.&lt;br /&gt;
It segments a network into multiple broadcast domains.&lt;br /&gt;
&lt;span style="color: red;"&gt;It prevents loops in a switched network with redundant paths.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
30. Refer to the exhibit. Which two settings show the default value of VTP configuration on a Cisco 2960 switch? (Choose two.)&lt;br /&gt;
&lt;span style="color: red;"&gt;revision number&lt;/span&gt;&lt;br /&gt;
existing VLANs&lt;br /&gt;
operating mode&lt;br /&gt;
domain name&lt;br /&gt;
&lt;span style="color: red;"&gt;pruning mode&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong style="font-weight: 400;"&gt;31&lt;/strong&gt;. What are two benefits of the IEEE 802.11n standard over the IEEE 802.11G? (Choose two.)&lt;br /&gt;
requires less equipment&lt;br /&gt;
&lt;span style="color: red;"&gt;provides improved range&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: red;"&gt;permits increased data rates&lt;/span&gt;&lt;br /&gt;
has a single-input and a single-output&lt;br /&gt;
needs no hardware upgrade for compatibility&lt;br /&gt;
&lt;br /&gt;
&lt;strong style="font-weight: 400;"&gt;32&lt;/strong&gt;. Which three statements are correct concerning the default configuration of a new switch? (Choose three.)&lt;br /&gt;
&lt;span style="color: red;"&gt;It is configured in VTP server mode.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: red;"&gt;STP is automatically enabled.&lt;/span&gt;&lt;br /&gt;
The first VTY line is automatically configured to allow remote connections.&lt;br /&gt;
VLAN1 is configured with a management IP address.&lt;br /&gt;
&lt;span style="color: red;"&gt;All switch ports are assigned to VLAN1.&lt;/span&gt;&lt;br /&gt;
The enable password is configured as cisco.&lt;br /&gt;
&lt;br /&gt;
&lt;strong style="font-weight: 400;"&gt;33&lt;/strong&gt;.&lt;strong&gt; &lt;/strong&gt;What impact does the use of the &lt;b&gt;mdix auto&lt;/b&gt; configuration command have on an Ethernet interface on a switch?&lt;br /&gt;
automatically detects duplex settings&lt;br /&gt;
automatically detects interface speed&lt;br /&gt;
&lt;span style="color: red;"&gt;automatically detects copper cable type&lt;/span&gt;&lt;br /&gt;
automatically assigns the first detected MAC address to an interface&lt;br /&gt;
&lt;br /&gt;
34. Refer to the exhibit. A network administrator has segmented the  network into two VLANs and configured Router1 for inter-VLAN routing. A  test of the network, however, shows that hosts on each VLAN can only  access local resources and not resources on the other VLAN. What is the  most likely cause of this problem?&lt;br /&gt;
&lt;span style="color: red;"&gt;Switch port Fa0/1 is not trunking.&lt;/span&gt;&lt;br /&gt;
Router interface Fa0/0 is possibly down.&lt;br /&gt;
No routing protocol is configured on Router1.&lt;br /&gt;
One of the router subinterfaces is possibly down.&lt;br /&gt;
&lt;br /&gt;
35. Refer to the exhibit. Which two statements are true about the operation of the interfaces? (Choose two.)&lt;br /&gt;
Incoming traffic with VLAN ID 0 is processed by interface fa0/0.&lt;br /&gt;
&lt;span style="color: red;"&gt;Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.&lt;/span&gt;&lt;br /&gt;
Both subinterfaces remain up with line protocol up, even if fa0/0 line protocol is down.&lt;br /&gt;
Subinterfaces use unique MAC addresses by adding the 802.1Q VLAN ID to the hardware address.&lt;br /&gt;
Traffic inbound on this router is processed by different subinterfaces, depending on the VLAN from which the traffic originated.&lt;br /&gt;
&lt;br /&gt;
&lt;strong style="font-weight: 400;"&gt;36&lt;/strong&gt;. The network  administrator wants to configure a switch to pass VLAN update  information to other switches in the domain but not update its own local  VLAN database. Which two steps should the administrator perform to  achieve this? (Choose two.)&lt;br /&gt;
Reset the VTP counters.&lt;br /&gt;
Configure VTP version 1 on the switch.&lt;br /&gt;
&lt;span style="color: red;"&gt;Configure the VTP mode of the switch to transparent.&lt;/span&gt;&lt;br /&gt;
Verify that the switch has a higher configuration revision number.&lt;br /&gt;
&lt;span style="color: red;"&gt;Configure the switch with the same VTP domain name as other switches in the network.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
37. Refer to the exhibit. The Layer 2 switching design that is shown  has been implemented in a campus environment that is using Spanning Tree  Protocol. All inter-switch links that are shown are trunks. Whenever an  inter-switch link fails, the network takes nearly a minute to  completely converge. How can the convergence time be reduced?&lt;br /&gt;
Increase the capacity of the distribution and core trunk links to 10 Gb/s.&lt;br /&gt;
Add a trunk link that directly connects D1 and D2.&lt;br /&gt;
Use Layer 3 switching on the core switch.&lt;br /&gt;
&lt;span style="color: red;"&gt;Implement Rapid Spanning Tree Protocol.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong style="font-weight: 400;"&gt;38&lt;/strong&gt;.&lt;strong&gt; &lt;/strong&gt;Which configuration changes will increment the configuration revision number on the VTP server?&lt;br /&gt;
configuring trunk links on the VTP server&lt;br /&gt;
configuring or changing the VTP password&lt;br /&gt;
configuring or changing the VTP domain name&lt;br /&gt;
configuring or changing the VTP version number&lt;br /&gt;
&lt;span style="color: red;"&gt;configuring or deleting a VLAN or creating a VLAN name&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
39. Refer to the exhibit. Users complain that they do not have  connectivity to the web server that is connected to SW1. What should be  done to remedy the problem?&lt;br /&gt;
Allow all VLANs on the trunk link.&lt;br /&gt;
&lt;span style="color: red;"&gt;Configure VLAN 100 as the native VLAN for SW1.&lt;/span&gt;&lt;br /&gt;
Configure the trunk port in trunk mode on SW1.&lt;br /&gt;
Attach the web server to a router and configure inter-VLAN routing.&lt;br /&gt;
&lt;br /&gt;
&lt;strong style="font-weight: 400;"&gt;40&lt;/strong&gt;. What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?&lt;br /&gt;
only the management VLAN&lt;br /&gt;
all VLANs except the extended range VLANs&lt;br /&gt;
all VLANs except 1 and 1002-1005&lt;br /&gt;
&lt;span style="color: red;"&gt;all VLANs&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
41. Refer to the exhibit. Which three options correctly identify  information that could be associated with this output?(Choose three.)&lt;br /&gt;
&lt;span style="color: red;"&gt;Interface FastEthernet3/0/0 is subinterfaced.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: red;"&gt;A non-proprietary trunking protocol is in use.&lt;/span&gt;&lt;br /&gt;
The configuration is appropriate for a router-on-a-stick network design.&lt;br /&gt;
&lt;span style="color: red;"&gt;A &lt;b&gt;shutdown&lt;/b&gt; command has been applied to interface FastEthernet3/0/0.&lt;/span&gt;&lt;br /&gt;
Interface FastEthernet3/0/0.3 is mapped to the default management VLAN.&lt;br /&gt;
An IP address should be applied to FastEthernet3/0/0 for correct data routing.&lt;br /&gt;
&lt;br /&gt;
42. Refer to the exhibit. Hosts A and B, connected to hub HB1,  attempt to transmit a frame at the same time but a collision occurs.  Which hosts will receive the collision jamming signal?&lt;br /&gt;
only hosts A and B&lt;br /&gt;
&lt;span style="color: red;"&gt;only hosts A, B, and C&lt;/span&gt;&lt;br /&gt;
only hosts A, B, C, and D&lt;br /&gt;
only hosts A, B, C, and E&lt;br /&gt;
&lt;br /&gt;
43. Refer to the exhibit. Each switch is configured to participate in  STP for VLANs 1, 10, 20, and 30. Which switch will become the root for  VLAN 20?&lt;br /&gt;
A&lt;br /&gt;
B&lt;br /&gt;
C&lt;br /&gt;
&lt;span style="color: red;"&gt;D&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
44. Refer to the exhibit. Switches S2 and S3 are properly connected  using an ethernet cable. A network administrator has configured both  switches with VTP, but S3 is unable to propagate VLANs to S2. What could  be the reason for this?&lt;br /&gt;
The VTP configuration revision is different on both switches.&lt;br /&gt;
&lt;span style="color: red;"&gt;The VTP domains are different on both switches.&lt;/span&gt;&lt;br /&gt;
VTP pruning is disabled.&lt;br /&gt;
VTP v2 is disabled.&lt;br /&gt;
&lt;br /&gt;
45. Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?&lt;br /&gt;
This entry can only be removed from the MAC address table by a network administrator.&lt;br /&gt;
When forwarding a frame to the device with address 0060.5c5b.cd23,  the switch does not have to perform a lookup to determine the final  destination port.&lt;br /&gt;
Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18.&lt;br /&gt;
&lt;span style="color: red;"&gt;The switch learned this MAC address from the source address in a frame received on Fa0/18.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
46. Refer to the exhibit. A company has acquired a new office in a  campus environment. Switches in the existing office and the new office  are directly connected by a trunk link. The VLANs and IP addressing are  setup as shown in the exhibit. The computers in each office are not able  to ping each other. What will fix the problem?&lt;br /&gt;
Use an access link between S2 and S3.&lt;br /&gt;
&lt;span style="color: red;"&gt;Connect S2 and S3 to a common router.&lt;/span&gt;&lt;br /&gt;
Set the subnet mask in the new office to /24.&lt;br /&gt;
Configure the new office default gateway to 172.17.10.1&lt;br /&gt;
Change the port assignments in the new office to a different VLAN.&lt;br /&gt;
&lt;br /&gt;
&lt;strong style="font-weight: 400;"&gt;47&lt;/strong&gt;. Which type of traffic can still be received on a switch interface that is in STP blocking mode?&lt;br /&gt;
&lt;span style="color: red;"&gt;BPDU frames&lt;/span&gt;&lt;br /&gt;
multicast frames&lt;br /&gt;
broadcast frames&lt;br /&gt;
Layer 3 packets&lt;br /&gt;
&lt;br /&gt;
&lt;strong style="font-weight: 400;"&gt;48&lt;/strong&gt;. While configuring a new  switch, a network administrator configures the switch as an HTTP  server. What benefits does this configuration provide?&lt;br /&gt;
This allows the switch to host web pages for the network.&lt;br /&gt;
This allows remote VPN connections to the switch over the Internet.&lt;br /&gt;
This is required if a web server or web farm is attached to the switch.&lt;br /&gt;
&lt;span style="color: red;"&gt;This allows web-based configuration tools to be used with the switch.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong style="font-weight: 400;"&gt;49&lt;/strong&gt;. Which STP port type can only appear once on a segment, and must be present in order for traffic to flow on that segment?&lt;br /&gt;
non-root port&lt;br /&gt;
disabled port&lt;br /&gt;
&lt;span style="color: red;"&gt;designated port&lt;/span&gt;&lt;br /&gt;
non-designated port&lt;br /&gt;
&lt;br /&gt;
50. Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?&lt;br /&gt;
Cat-A&lt;br /&gt;
Cat-B&lt;br /&gt;
&lt;span style="color: red;"&gt;Cat-C&lt;/span&gt;&lt;br /&gt;
Cat-D&lt;br /&gt;
&lt;br /&gt;
51. Refer to the exhibit. VTP has been configured with VTP pruning  enabled on all switches. If HostA sends a broadcast frame to SW1, which  devices will receive the frame?&lt;br /&gt;
&lt;span style="color: red;"&gt;SW1, SW3, HostF&lt;/span&gt;&lt;br /&gt;
SW1, HostB, HostC&lt;br /&gt;
SW1, SW2, SW3, SW4, HostF&lt;br /&gt;
SW1, SW2, SW3, SW4, all hosts&lt;br /&gt;
&lt;br /&gt;
&lt;strong style="font-weight: 400;"&gt;52&lt;/strong&gt;. Which statement describes the use of voice VLANs in Cisco IP telephony?&lt;br /&gt;
The voice VLAN carries both tagged and untagged traffic.&lt;br /&gt;
The voice VLAN carries untagged traffic having special QoS markings.&lt;br /&gt;
&lt;span style="color: red;"&gt;The voice VLAN must be configured on the switch port to which the IP phone attaches.&lt;/span&gt;&lt;br /&gt;
Data and voice frames are tagged with same VLAN ID between the IP phone and the switch when a voice VLAN is configured.&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>CCNA 4 Final Exam Answers 2012</title><link>http://testccnastudy.blogspot.com/2012/03/ccna-4-final-exam-answers-2012.html</link><category>CCNA 4 Final Exam Answers 2012</category><pubDate>Tue, 20 Mar 2012 21:37:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-6319942256335104088</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;1. Which Frame Relay flow control mechanism is used to signal routers that they should reduce the flow rate of frames?&lt;br /&gt;
DE&lt;br /&gt;
BE&lt;br /&gt;
CIR&lt;br /&gt;
&lt;span style="color: red;"&gt;FECN&lt;/span&gt;&lt;br /&gt;
CBIR&lt;br /&gt;
&lt;br /&gt;
2. An administrator is configuring a dual stack &lt;a href="http://ccnaanswers.com/" title="router"&gt;router&lt;/a&gt;  with IPv6 and IPv4 using RIPng. The administrator receives an error  message when trying to enter the IPv4 routes into RIPng. What is the  cause of the problem?&lt;br /&gt;
When IPv4 and IPv6 are configured on the same interface, all IPv4 addresses are over-written in favor of the newer technology.&lt;br /&gt;
&lt;span class="IL_AD" id="IL_AD6"&gt;Incorrect&lt;/span&gt; IPv4 addresses are &lt;span class="IL_AD" id="IL_AD3"&gt;entered&lt;/span&gt; on the router interfaces.&lt;br /&gt;
RIPng is incompatible with dual-stack technology.&lt;br /&gt;
&lt;span style="color: red;"&gt;IPv4 is incompatible with RIPng.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3. Which data link layer encapsulation protocol is used by default for serial connections between two Cisco routers? &lt;br /&gt;
ATM&lt;br /&gt;
Frame Relay&lt;br /&gt;
&lt;span style="color: red;"&gt;HDLC&lt;/span&gt;&lt;br /&gt;
PPP&lt;br /&gt;
SDLC&lt;br /&gt;
&lt;br /&gt;
4. An administrator issues the command confreg 0×2142 at the rommon  1&amp;gt; prompt. What is the effect when this router is rebooted? &lt;br /&gt;
Contents in RAM will be erased.&lt;br /&gt;
Contents in RAM will be ignored.&lt;br /&gt;
Contents in NVRAM will be erased.&lt;br /&gt;
&lt;span style="color: red;"&gt;Contents in NVRAM will be ignored.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
5. Which type of network attack exploits vulnerabilities in the  compromised system with the intent of propagating itself across a  network? &lt;br /&gt;
virus&lt;br /&gt;
&lt;span style="color: red;"&gt;worm&lt;/span&gt;&lt;br /&gt;
&lt;span class="IL_AD" id="IL_AD8"&gt;Trojan horse&lt;/span&gt;&lt;br /&gt;
man-in-the-middle&lt;br /&gt;
&lt;br /&gt;
6. Which important piece of troubleshooting information can be  discovered about a serial interface using the show controllers command? &lt;br /&gt;
queuing strategy&lt;br /&gt;
&lt;span style="color: red;"&gt;&lt;span class="IL_AD" id="IL_AD5"&gt;serial cable&lt;/span&gt; type&lt;/span&gt;&lt;br /&gt;
interface IP address&lt;br /&gt;
encapsulation method&lt;br /&gt;
&lt;br /&gt;
7.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA-4.jpg"&gt;&lt;img alt="CCNA 4 thumb CCNA 4 Final Exam Answers 2011" border="0" height="295" src="http://ccnaanswers.com/wp-content/uploads/CCNA-4_thumb.jpg" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="CCNA 4" width="661" /&gt;&lt;/a&gt;&lt;br /&gt;
Refer to the exhibit. Which statement is true about the Frame Relay connection?&lt;br /&gt;
The Frame Relay connection is in the process of negotiation.&lt;br /&gt;
A congestion control mechanism is enabled on the Frame Relay connection.&lt;br /&gt;
The “ACTIVE” status of the Frame Relay connection indicates that the network is experiencing congestion.&lt;br /&gt;
&lt;span style="color: red;"&gt;Only control FECN and BECN bits are sent over the Frame Relay connection. No data traffic traverses the link.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
8.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA-4-Final.jpg"&gt;&lt;img alt="CCNA 4 Final thumb CCNA 4 Final Exam Answers 2011" border="0" height="219" src="http://ccnaanswers.com/wp-content/uploads/CCNA-4-Final_thumb.jpg" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="CCNA 4 Final" width="517" /&gt;&lt;/a&gt;&lt;br /&gt;
Refer to the exhibit. Computers on the internal network need access  to all servers in the external network. The only traffic that is  permitted from the external network must be responses to requests that  are initiated on the internal network. Which security measure would  satisfy this requirement?&lt;br /&gt;
a numbered extended ACL&lt;br /&gt;
a named standard ACL&lt;br /&gt;
&lt;span style="color: red;"&gt;a reflexive ACL&lt;/span&gt;&lt;br /&gt;
a dynamic ACL&lt;br /&gt;
&lt;br /&gt;
9. A network administrator has moved the company intranet web server  from a switch port to a dedicated router interface. How can the  administrator determine how this change has affected performance and  availability on the company intranet? &lt;br /&gt;
&lt;span style="color: red;"&gt;Conduct a performance test and compare with the baseline that was established previously.&lt;/span&gt;&lt;br /&gt;
Determine performance on the intranet by monitoring load times of company web pages from remote sites.&lt;br /&gt;
&lt;span class="IL_AD" id="IL_AD10"&gt;Interview&lt;/span&gt; departmental &lt;span class="IL_AD" id="IL_AD7"&gt;administrative&lt;/span&gt; assistants and determine if they think load time for web pages has improved.&lt;br /&gt;
Compare the hit counts on the company web server for the current week to the values that were recorded in previous weeks.&lt;br /&gt;
&lt;br /&gt;
10. Which option correctly defines the capacity through the local loop guaranteed to a customer by the service provider? &lt;br /&gt;
BE&lt;br /&gt;
DE&lt;br /&gt;
&lt;span style="color: red;"&gt;CIR&lt;/span&gt;&lt;br /&gt;
CBIR&lt;br /&gt;
&lt;br /&gt;
11.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA-4-Final-Exam-V4.0-Answers-2011.jpg"&gt;&lt;img alt="CCNA 4 Final Exam V4.0 Answers 2011 thumb CCNA 4 Final Exam Answers 2011" border="0" height="366" src="http://ccnaanswers.com/wp-content/uploads/CCNA-4-Final-Exam-V4.0-Answers-2011_thumb.jpg" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="CCNA 4 Final Exam V4.0 Answers 2011" width="450" /&gt;&lt;/a&gt;&lt;br /&gt;
Refer to the exhibit. A network administrator is attempting to  configure a Frame Relay network. The administrator enters the commands  as shown in the exhibit on R2, but the Frame Relay PVCs are inactive.  What is the problem?&lt;br /&gt;
&lt;span style="color: red;"&gt;The incorrect DLCI numbers are being configured on R2.&lt;/span&gt;&lt;br /&gt;
The S0/0/0 interface on R2 needs to be point-to-point.&lt;br /&gt;
The frame-relay map commands are missing the cisco keyword at the end.&lt;br /&gt;
A single router interface cannot connect to more than one Frame Relay peer at a time.&lt;br /&gt;
&lt;br /&gt;
12. A DHCP server is configured with a block of excluded addresses.  What two devices would be assigned static addresses from the excluded  address range? (Choose two.) &lt;br /&gt;
a protocol analyzer&lt;br /&gt;
&lt;span style="color: red;"&gt;DNS server for the network&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: red;"&gt;network printer that is used by many different users&lt;/span&gt;&lt;br /&gt;
a laptop that will get a different address each time it boots up&lt;br /&gt;
&lt;br /&gt;
13.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA-4-Practice-Final-Exam-Answers.jpg"&gt;&lt;img alt="CCNA 4 Practice Final Exam Answers thumb CCNA 4 Final Exam Answers 2011" border="0" height="380" src="http://ccnaanswers.com/wp-content/uploads/CCNA-4-Practice-Final-Exam-Answers_thumb.jpg" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="CCNA 4 Practice Final Exam Answers" width="577" /&gt;&lt;/a&gt;&lt;br /&gt;
Refer to the exhibit. WestSW is supposed to send VLAN information to  EastSW, but that did not occur. What will force WestSW to send a VLAN  update to EastSW?&lt;br /&gt;
Change EastSW to be a VTP server.&lt;br /&gt;
Reload both WestSW and EastSW at the same time.&lt;br /&gt;
Erase the VLAN database on EastSW and reload the switch.&lt;br /&gt;
&lt;span style="color: red;"&gt;Reset the &lt;span class="IL_AD" id="IL_AD4"&gt;configuration&lt;/span&gt; revision number on EastSW to zero.&lt;/span&gt;&lt;br /&gt;
Reload EastSW.&lt;br /&gt;
&lt;br /&gt;
14.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA-2011.jpg"&gt;&lt;img alt="CCNA 2011 thumb CCNA 4 Final Exam Answers 2011" border="0" height="273" src="http://ccnaanswers.com/wp-content/uploads/CCNA-2011_thumb.jpg" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="CCNA 2011" width="696" /&gt;&lt;/a&gt;&lt;br /&gt;
Refer to the exhibit. The corporate network that is shown has been  assigned network 172.16.128.0/19 for use at branch office LANs. If VLSM  is used, what mask should be used for addressing hosts at Branch4 with  minimal waste from unused addresses?&lt;br /&gt;
/19&lt;br /&gt;
/20&lt;br /&gt;
/21&lt;br /&gt;
&lt;span style="color: red;"&gt;/22&lt;/span&gt;&lt;br /&gt;
/23&lt;br /&gt;
/24&lt;br /&gt;
&lt;br /&gt;
15. Which configuration on the vty lines provides the best security  measure for network administrators to remotely access the core routers  at headquarters?&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA-Answers-2011.png"&gt;&lt;img alt="CCNA Answers 2011 thumb CCNA 4 Final Exam Answers 2011" border="0" height="126" src="http://ccnaanswers.com/wp-content/uploads/CCNA-Answers-2011_thumb.png" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="CCNA Answers 2011" width="322" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA-Exam-2011.png"&gt;&lt;img alt="CCNA Exam 2011 thumb CCNA 4 Final Exam Answers 2011" border="0" height="146" src="http://ccnaanswers.com/wp-content/uploads/CCNA-Exam-2011_thumb.png" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="CCNA Exam 2011" width="322" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA-Final.png"&gt;&lt;img alt="CCNA Final thumb CCNA 4 Final Exam Answers 2011" border="0" height="152" src="http://ccnaanswers.com/wp-content/uploads/CCNA-Final_thumb.png" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="CCNA Final" width="328" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA-Final-2011.png"&gt;&lt;img alt="CCNA Final 2011 thumb CCNA 4 Final Exam Answers 2011" border="0" height="143" src="http://ccnaanswers.com/wp-content/uploads/CCNA-Final-2011_thumb.png" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="CCNA Final 2011" width="322" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
16.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/Cisco-CCNA-4-Final-Exam-Answers.jpg"&gt;&lt;img alt="Cisco CCNA 4 Final Exam Answers thumb CCNA 4 Final Exam Answers 2011" border="0" height="354" src="http://ccnaanswers.com/wp-content/uploads/Cisco-CCNA-4-Final-Exam-Answers_thumb.jpg" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="Cisco CCNA 4 Final Exam Answers" width="321" /&gt;&lt;/a&gt;&lt;br /&gt;
Refer to the exhibit. In the partial router configuration that is shown, what is the purpose of access list BLOCK_XYZ?&lt;br /&gt;
&lt;span style="color: red;"&gt;to prevent source IP address spoofing by hosts on the Fa0/0 LAN&lt;/span&gt;&lt;br /&gt;
to block access by Fa0/0 LAN hosts to all network services beyond the router&lt;br /&gt;
to prevent users on the Fa0/0 LAN from opening Telnet sessions on the router&lt;br /&gt;
to secure Fa0/0 hosts by allowing only locally sourced traffic into the Fa0/0 LAN&lt;br /&gt;
&lt;br /&gt;
17.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/Exam-2011.jpg"&gt;&lt;img alt="Exam 2011 thumb CCNA 4 Final Exam Answers 2011" border="0" height="402" src="http://ccnaanswers.com/wp-content/uploads/Exam-2011_thumb.jpg" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="Exam 2011" width="662" /&gt;&lt;/a&gt;&lt;br /&gt;
Refer to the exhibit. A network administrator notices that three  VLANs created on SW1 do not show in SW3. Based on output from the show  vtp status and show running-config commands, what is the cause of the  problem in the SW3 configuration?&lt;br /&gt;
VTP version 2 is disabled.&lt;br /&gt;
The VTP mode is misconfigured.&lt;br /&gt;
The configure revision number for VTP does not match.&lt;br /&gt;
&lt;span style="color: red;"&gt;Trunk mode is not configured on FastEthernet 0/1 and 0/2.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
18.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/Final-Exam.jpg"&gt;&lt;img alt="Final Exam thumb CCNA 4 Final Exam Answers 2011" border="0" height="244" src="http://ccnaanswers.com/wp-content/uploads/Final-Exam_thumb.jpg" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="Final Exam" width="529" /&gt;&lt;/a&gt;&lt;br /&gt;
Refer to the exhibit. What statement is true about the core router devices?&lt;br /&gt;
They use multiport internetworking devices to switch traffic such as Frame Relay, ATM, or X.25 over the WAN.&lt;br /&gt;
They provide internetworking and WAN access interface ports that are used to connect to the service provider network.&lt;br /&gt;
They provide termination for the digital signal and ensure connection integrity through error correction and line monitoring.&lt;br /&gt;
&lt;span style="color: red;"&gt;They support multiple telecommunications  interfaces of the highest speed and are able to forward IP packets at  full speed on all of those interfaces.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
19. When would the multipoint keyword be used in Frame Relay PVCs configuration? &lt;br /&gt;
when global DLCIs are in use&lt;br /&gt;
when using physical interfaces&lt;br /&gt;
when multicasts must be supported&lt;br /&gt;
&lt;span style="color: red;"&gt;when participating routers are in the same subnet&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
20. A light manufacturing company wishes to replace its &lt;span class="IL_AD" id="IL_AD2"&gt;DSL service&lt;/span&gt; with a non-line-of-sight broadband wireless solution that offers comparable speeds. Which solution should the customer choose? &lt;br /&gt;
Wi-Fi&lt;br /&gt;
satellite&lt;br /&gt;
&lt;span style="color: red;"&gt;WiMAX&lt;/span&gt;&lt;br /&gt;
Metro Ethernet&lt;br /&gt;
&lt;br /&gt;
21.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/Network-Fundamentals-Final-Exam-Answers.jpg"&gt;&lt;img alt="Network Fundamentals Final Exam Answers thumb CCNA 4 Final Exam Answers 2011" border="0" height="285" src="http://ccnaanswers.com/wp-content/uploads/Network-Fundamentals-Final-Exam-Answers_thumb.jpg" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="Network Fundamentals Final Exam Answers" width="655" /&gt;&lt;/a&gt;&lt;br /&gt;
Refer to the exhibit. Which configuration command would result in the output in the exhibit?&lt;br /&gt;
ip nat inside source static 10.1.200.254 172.16.76.3&lt;br /&gt;
ip nat inside source static 10.1.200.254 192.168.0.10&lt;br /&gt;
ip nat inside source static 172.16.76.3 10.1.200.254&lt;br /&gt;
ip nat inside source static 172.16.76.3 192.168.0.10&lt;br /&gt;
&lt;span style="color: red;"&gt;ip nat inside source static 192.168.0.10 172.16.76.3&lt;/span&gt;&lt;br /&gt;
ip nat inside source static 192.168.0.10 10.1.200.254&lt;br /&gt;
&lt;br /&gt;
22. A recently patched application server is experiencing response time &lt;span class="IL_AD" id="IL_AD12"&gt;problems&lt;/span&gt;.  The network on which the application server is located has been  experiencing occasional outages that the network team believes may be  related to recent routing changes. Network and application teams have  been notified to work on their respective issues. Which statement  applies to this situation? &lt;br /&gt;
Only results from the software package should be tested as the  network is designed to accommodate the proposed software platform.&lt;br /&gt;
Scheduling will be easy if the network and software teams work independently.&lt;br /&gt;
&lt;span style="color: red;"&gt;It will be difficult to isolate the problem if two teams are implementing changes independently.&lt;/span&gt;&lt;br /&gt;
Results from changes will be easier to reconcile and document if each team works in isolation.&lt;br /&gt;
&lt;br /&gt;
23. A network technician wants to implement SSH as the means by which  a router may be managed remotely. What are two procedures that the  technician should use to successfully complete this task? (Choose two.) &lt;br /&gt;
Configure the login banner.&lt;br /&gt;
Configure authentication.&lt;br /&gt;
&lt;span style="color: red;"&gt;Define the asymmetrical keys.&lt;/span&gt;&lt;br /&gt;
Configure the console password.&lt;br /&gt;
&lt;span style="color: red;"&gt;Enter the service password-encryption command.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
24. What are the symptoms when the s0/0/0 interface on a router is  attached to an operational CSU/DSU that is generating a clock signal,  but the far end router on the point-to-point link has not been  activated? &lt;br /&gt;
show controllers indicates cable type DCE V.35. show interfaces s0/0/0 indicates serial down, line protocol down.&lt;br /&gt;
show controllers indicates cable type DCE V.35. show interfaces s0/0/0 indicates serial up, line protocol down.&lt;br /&gt;
&lt;span style="color: red;"&gt;show controllers indicates cable type DTE V.35. show interfaces s0/0/0 indicates serial up, line protocol down.&lt;/span&gt;&lt;br /&gt;
show controllers indicates cable type DTE V.35. show interfaces s0/0/0 indicates serial down, line protocol down.&lt;br /&gt;
&lt;br /&gt;
25. Which statement is true about PAP in the authentication of a PPP session? &lt;br /&gt;
&lt;span style="color: red;"&gt;PAP uses a two-way handshake.&lt;/span&gt;&lt;br /&gt;
The password is unique and random.&lt;br /&gt;
PAP conducts periodic password challenges.&lt;br /&gt;
PAP uses MD5 hashing to keep the password secure.&lt;br /&gt;
&lt;br /&gt;
26. Which characteristic of VPN technology prevents the contents of  data communications from being read by unauthorized parties? &lt;br /&gt;
QoS&lt;br /&gt;
latency&lt;br /&gt;
reliability&lt;br /&gt;
&lt;span style="color: red;"&gt;confidentiality&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
27. Which address provides an example of an IPv6 link-local address? &lt;br /&gt;
&lt;span style="color: red;"&gt;FE80::1324:ABCD&lt;/span&gt;&lt;br /&gt;
2001:2345:AB12:1935::FEFF&lt;br /&gt;
2001:1234:0000:9CA::0876/64&lt;br /&gt;
1234:ABCD:5678:EF00:9234:AA22:5527:FC35&lt;br /&gt;
&lt;br /&gt;
28. What major benefit does Cisco HDLC provide that ISO standard HDLC lacks? &lt;br /&gt;
flow control&lt;br /&gt;
error control&lt;br /&gt;
&lt;span style="color: red;"&gt;multiprotocol support&lt;/span&gt;&lt;br /&gt;
cyclic redundancy checks&lt;br /&gt;
&lt;br /&gt;
29. What will be the result of adding the command ip dhcp  excluded-address 192.168.24.1 192.168.24.5 to the configuration of a  local router that has been configured as a DHCP server? &lt;br /&gt;
Traffic that is destined for 192.168.24.1 and 192.168.24.5 will be dropped by the router.&lt;br /&gt;
Traffic will not be routed from clients with addresses between 192.168.24.1 and 192.168.24.5.&lt;br /&gt;
&lt;span style="color: red;"&gt;The DHCP server will not issue the addresses ranging from 192.168.24.1 to 192.168.24.5.&lt;/span&gt;&lt;br /&gt;
The router will ignore all traffic that comes from the DHCP servers with addresses 192.168.24.1 and 192.168.24.5.&lt;br /&gt;
&lt;br /&gt;
30. What is the result when the command permit tcp 10.25.132.0  0.0.0.255 any eq smtp is added to a named access control list and  applied on the inbound interface of a router? &lt;br /&gt;
TCP traffic with a destination to the 10.25.132.0/24 is permitted.&lt;br /&gt;
Only Telnet traffic is permitted to the 10.24.132.0/24 network&lt;br /&gt;
Ttraffic from 10.25.132.0/24 is permitted to anywhere on using any port.&lt;br /&gt;
&lt;span style="color: red;"&gt;Traffic using port 25 from the 10.25.132.0/24 is permitted to all destinations.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
31.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA-4-Final-Exam-V4.0-Answers-2012.jpg"&gt;&lt;img alt="CCNA 4 Final Exam V4.0 Answers 2012 thumb CCNA 4 Final Exam Answers 2011" border="0" height="304" src="http://ccnaanswers.com/wp-content/uploads/CCNA-4-Final-Exam-V4.0-Answers-2012_thumb.jpg" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="CCNA 4 Final Exam V4.0 Answers 2012" width="551" /&gt;&lt;/a&gt;&lt;br /&gt;
Refer to the exhibit. A network administrator has issued the commands  that are shown on Router1 and Router2. A later review of the routing  tables reveals that neither router is learning the LAN network of the  neighbor router. What is most likely the problem with the RIPng  configuration?&lt;br /&gt;
The serial interfaces are in different subnets.&lt;br /&gt;
&lt;span style="color: red;"&gt;The RIPng process is not enabled on interfaces.&lt;/span&gt;&lt;br /&gt;
The RIPng network command is not configured.&lt;br /&gt;
The RIPng processes do not match between Router1 and Router2.&lt;br /&gt;
&lt;br /&gt;
32.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA-2012.jpg"&gt;&lt;img alt="CCNA 2012 thumb CCNA 4 Final Exam Answers 2011" border="0" height="432" src="http://ccnaanswers.com/wp-content/uploads/CCNA-2012_thumb.jpg" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="CCNA 2012" width="698" /&gt;&lt;/a&gt;&lt;br /&gt;
Refer to the exhibit. Results of the show vlan and show vtp status  commands for switches S1 and S2 are displayed in the exhibit. VLAN 11  was created on S1. Why is VLAN 11 missing from S2?&lt;br /&gt;
There is a Layer 2 loop.&lt;br /&gt;
&lt;span style="color: red;"&gt;The VTP domain names do not match.&lt;/span&gt;&lt;br /&gt;
Only one switch can be in server mode.&lt;br /&gt;
S2 has a higher spanning-tree priority for VLAN 11 than S1 does.&lt;br /&gt;
&lt;br /&gt;
33. At what physical location does the responsibilty for a WAN connection change from the user to the service provider? &lt;br /&gt;
demilitarized zone (DMZ)&lt;br /&gt;
&lt;span style="color: red;"&gt;demarcation point&lt;/span&gt;&lt;br /&gt;
local loop&lt;br /&gt;
cloud&lt;br /&gt;
&lt;br /&gt;
34. Which IP address and wildcard mask would be used in an ACL to  block traffic from all hosts on the same subnet as host  192.168.16.43/28? &lt;br /&gt;
access-list 10 deny 192.168.16.0 0.0.0.31&lt;br /&gt;
access-list 10 deny 192.168.16.16 0.0.0.31&lt;br /&gt;
access-list 10 deny 192.168.16.32 0.0.0.16&lt;br /&gt;
access-list 10 deny 192.168.16.32 0.0.0.15&lt;br /&gt;
&lt;span style="color: red;"&gt;access-list 10 deny 192.168.16.43 0.0.0.16&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
35. Which statement is true about wildcard masks? &lt;br /&gt;
Inverting the subnet mask will always create the wildcard mask.&lt;br /&gt;
The wildcard mask performs the same function as a subnet mask.&lt;br /&gt;
A network or subnet bit is identified by a "1" in the wildcard mask.&lt;br /&gt;
IP address bits that must be checked are identified by a "0" in the wildcard mask.&lt;br /&gt;
&lt;br /&gt;
36. A company has its headquarters office in Dallas and five branch  offices located in New York, Chicago, Los Angeles, Seattle, and Atlanta.  WAN links are used for communications among offices in six sites. In  planning the WAN links, the network designer is given two requirements:  (1) minimize cost and (2) provide a certain level of WAN link  reliability with redundant links. Which topology should the network  designer recommend? &lt;br /&gt;
star&lt;br /&gt;
full mesh&lt;br /&gt;
hierarchical&lt;br /&gt;
&lt;span style="color: red;"&gt;partial mesh&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
37.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA-Answers-2012.jpg"&gt;&lt;img alt="CCNA Answers 2012 thumb CCNA 4 Final Exam Answers 2011" border="0" height="361" src="http://ccnaanswers.com/wp-content/uploads/CCNA-Answers-2012_thumb.jpg" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="CCNA Answers 2012" width="701" /&gt;&lt;/a&gt;&lt;br /&gt;
Refer to the exhibit. Partial results of the show access-lists and  show ip interface FastEthernet 0/1 commands for router Router1 are  shown. There are no other ACLs in effect. Host A is unable to telnet to  host B. Which action will correct the problem but still restrict other  traffic between the two networks?&lt;br /&gt;
Apply the ACL in the inbound direction.&lt;br /&gt;
Apply the ACL on the FastEthernet 0/0 interface.&lt;br /&gt;
&lt;span style="color: red;"&gt;Reverse the order of the TCP protocol statements in the ACL.&lt;/span&gt;&lt;br /&gt;
Modify the second entry in the list to permit tcp host 172.16.10.10 any eq telnet.&lt;br /&gt;
&lt;br /&gt;
38. A company is looking for a WAN solution to connect its  headquarters site to four remote sites. What are two advantages that  dedicated leased lines provide compared to a shared Frame Relay  solution? (Choose two.) &lt;br /&gt;
&lt;span style="color: red;"&gt;reduced jitter&lt;/span&gt;&lt;br /&gt;
reduced costs&lt;br /&gt;
&lt;span style="color: red;"&gt;reduced latency&lt;/span&gt;&lt;br /&gt;
the ability to burst above guaranteed bandwidth&lt;br /&gt;
the ability to borrow unused bandwidth from the leased lines of other customers&lt;br /&gt;
&lt;br /&gt;
39. Which combination of Layer 2 protocol and authentication should  be used to establish a link without sending authentication information  in plain text between a Cisco and a non-Cisco router? &lt;br /&gt;
PPP with PAP&lt;br /&gt;
&lt;span style="color: red;"&gt;PPP with CHAP&lt;/span&gt;&lt;br /&gt;
HDLC with PAP&lt;br /&gt;
HDLC with CHAP&lt;br /&gt;
&lt;br /&gt;
40. An administrator is unable to receive e-mail. While  troubleshooting the problem, the administrator is able to ping the local  mail server IP address successfully from a remote network and can  successfully resolve the mail server name to an IP address via the use  of the nslookup command. At what OSI layer is the problem most likely to  be found? &lt;br /&gt;
physical layer&lt;br /&gt;
data link layer&lt;br /&gt;
network layer&lt;br /&gt;
&lt;span style="color: red;"&gt;application layer&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
41. What are two main components of data confidentiality? (Choose two.) &lt;br /&gt;
checksum&lt;br /&gt;
digital certificates&lt;br /&gt;
&lt;span style="color: red;"&gt;encapsulation&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: red;"&gt;encryption&lt;/span&gt;&lt;br /&gt;
hashing&lt;br /&gt;
&lt;br /&gt;
42.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA-Exam-2012.jpg"&gt;&lt;img alt="CCNA Exam 2012 thumb CCNA 4 Final Exam Answers 2011" border="0" height="331" src="http://ccnaanswers.com/wp-content/uploads/CCNA-Exam-2012_thumb.jpg" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="CCNA Exam 2012" width="572" /&gt;&lt;/a&gt;&lt;br /&gt;
Refer to the exhibit. A network administrator is trying to backup the  IOS software on R1 to the TFTP server. He receives the error message  that is shown in the exhibit, and cannot ping the TFTP server from R1.  What is an action that can help to isolate this problem?&lt;br /&gt;
Use correct source file name in the command.&lt;br /&gt;
Verify that the TFTP server software is running.&lt;br /&gt;
Make sure that there is enough room on the TFTP server for the backup.&lt;br /&gt;
&lt;span style="color: red;"&gt;Check that R1 has a route to the network where the TFTP server resides.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
43. When NAT is in use, what is used to determine the addresses that can be translated on a Cisco router? &lt;br /&gt;
&lt;span style="color: red;"&gt;access control list&lt;/span&gt;&lt;br /&gt;
routing protocol&lt;br /&gt;
inbound interface&lt;br /&gt;
ARP cache&lt;br /&gt;
&lt;br /&gt;
44.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA-Final-2012.jpg"&gt;&lt;img alt="CCNA Final 2012 thumb CCNA 4 Final Exam Answers 2011" border="0" height="346" src="http://ccnaanswers.com/wp-content/uploads/CCNA-Final-2012_thumb.jpg" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="CCNA Final 2012" width="551" /&gt;&lt;/a&gt;&lt;br /&gt;
Refer to the exhibit. All devices are configured as shown in the  exhibit. PC1 is unable to ping the default gateway. What is the cause of  the problem?&lt;br /&gt;
The default gateway is in the wrong subnet.&lt;br /&gt;
STP has blocked the port that PC1 is connected to.&lt;br /&gt;
&lt;span style="color: red;"&gt;Port Fa0/2 on S2 is assigned to the wrong VLAN.&lt;/span&gt;&lt;br /&gt;
S2 has the wrong IP address assigned to the VLAN30 interface.&lt;br /&gt;
&lt;br /&gt;
45. Which option represents a best practice for applying ACLs? &lt;br /&gt;
Named ACLs are less efficient than numbered ACLs.&lt;br /&gt;
Standard ACLs should be applied inside the core layer.&lt;br /&gt;
ACLs applied to outbound interfaces use fewer router resources.&lt;br /&gt;
&lt;span style="color: red;"&gt;Extended ACLs should be applied closest to the source that is specified by the ACL.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
46.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/Exam-2012.jpg"&gt;&lt;img alt="Exam 2012 thumb CCNA 4 Final Exam Answers 2011" border="0" height="403" src="http://ccnaanswers.com/wp-content/uploads/Exam-2012_thumb.jpg" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="Exam 2012" width="562" /&gt;&lt;/a&gt;&lt;br /&gt;
Refer to the exhibit. A network administrator is tasked with  completing the Frame Relay topology that interconnects two remote sites.  How should the point-to-point subinterfaces be configured on HQ to  complete the topology?&lt;br /&gt;
frame-relay interface-dlci 103 on Serial 0/0/0.1    &lt;br /&gt;
frame-relay interface-dlci 203 on Serial 0/0/0.2&lt;br /&gt;
&lt;span style="color: red;"&gt;frame-relay interface-dlci 301 on Serial 0/0/0.1      &lt;br /&gt;
frame-relay interface-dlci 302 on Serial 0/0/0.2&lt;/span&gt;&lt;br /&gt;
frame-relay map ip 192.168.1.1 103 broadcast on Serial 0/0/0.1    &lt;br /&gt;
frame-relay map ip 192.168.2.2 203 broadcast on Serial 0/0/0.2&lt;br /&gt;
frame-relay map ip 192.168.1.1 301 broadcast on Serial 0/0/0.1    &lt;br /&gt;
frame-relay map ip 192.168.2.2 302 broadcast on Serial 0/0/0.2&lt;br /&gt;
&lt;br /&gt;
47.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA-Exam-Answers-2012.jpg"&gt;&lt;img alt="CCNA Exam Answers 2012 thumb CCNA 4 Final Exam Answers 2011" border="0" height="241" src="http://ccnaanswers.com/wp-content/uploads/CCNA-Exam-Answers-2012_thumb.jpg" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="CCNA Exam Answers 2012" width="500" /&gt;&lt;/a&gt;&lt;br /&gt;
Refer to the exhibit. How is the TCP/IP configuration information  specified by the default-router and dns-server commands made available?&lt;br /&gt;
The TCP/IP information is forwarded to a 10.0.1.3 to be supplied to DHCP clients.&lt;br /&gt;
The TCP/IP information is used by DNS clients to forward all data to the default gateway on R1 of 10.0.1.3.&lt;br /&gt;
&lt;span style="color: red;"&gt;The TCP/IP information is supplied to any DHCP client on the network connected to the FastEthernet 0/0 interface of R1.&lt;/span&gt;&lt;br /&gt;
The TCP/IP information is applied to each packet that enters R1  through the FastEthernet 0/0 interface that are hosts on the 10.0.1.0  /24 network except packets from addresses 10.0.1.2, 10.0.1.16, and  10.0.1.254.&lt;br /&gt;
&lt;br /&gt;
48.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/Exam-for-CCNA.jpg"&gt;&lt;img alt="Exam for CCNA thumb CCNA 4 Final Exam Answers 2011" border="0" height="235" src="http://ccnaanswers.com/wp-content/uploads/Exam-for-CCNA_thumb.jpg" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="Exam for CCNA" width="306" /&gt;&lt;/a&gt;&lt;br /&gt;
Refer to the exhibit. Based on the output as shown, which two  statements correctly define how the router will treat Telnet traffic  that comes into interface FastEthernet 0/1? (Choose two).&lt;br /&gt;
Telnet to 172.16.10.0/24 is denied.&lt;br /&gt;
&lt;span style="color: red;"&gt;Telnet to 172.16.20.0/24 is denied.&lt;/span&gt;&lt;br /&gt;
Telnet to 172.16.0.0/24 is permitted.&lt;br /&gt;
&lt;span style="color: red;"&gt;Telnet to 172.16.10.0/24 is permitted.&lt;/span&gt;&lt;br /&gt;
Telnet to 172.16.20.0/24 is permitted.&lt;br /&gt;
&lt;br /&gt;
49. While troubleshooting a PPP link that uses PAP authentication, a  network administrator notices an incorrectly configured password in the  running configuration. The administrator corrects the error by entering  the command ppp pap sent-username ROUTER_NAME password NEW_PASSWORD, but  the link still does not come up.    &lt;br /&gt;
Assuming that the rest of the  configuration is correct and that the link has no physical layer  problems, what should the administrator do? &lt;br /&gt;
Save the configuration to NVRAM.&lt;br /&gt;
&lt;span style="color: red;"&gt;Shut down the interface then re-enable it.&lt;/span&gt;&lt;br /&gt;
Generate traffic by pinging the remote router.&lt;br /&gt;
Use CHAP to ensure compatibility with the remote router.&lt;br /&gt;
&lt;br /&gt;
50. A network administrator determines that falsified routing  information is propagating through the network. What action can be used  to address this threat? &lt;br /&gt;
Update the IOS images.&lt;br /&gt;
Change console passwords.&lt;br /&gt;
Employ end-user authentication.&lt;br /&gt;
&lt;span style="color: red;"&gt;Configure routing protocol authentication.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
51. What is tunneling? &lt;br /&gt;
using digital certificates to ensure that data endpoints are authentic&lt;br /&gt;
creating a hash to ensure the integrity of data as it traverses a network&lt;br /&gt;
using alternate paths to avoid access control lists and bypass security measures&lt;br /&gt;
&lt;span style="color: red;"&gt;encapsulating an entire packet within another packet for transmission over a network&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
52.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/Cisco-Exam.jpg"&gt;&lt;img alt="Cisco Exam thumb CCNA 4 Final Exam Answers 2011" border="0" height="260" src="http://ccnaanswers.com/wp-content/uploads/Cisco-Exam_thumb.jpg" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="Cisco Exam" width="580" /&gt;&lt;/a&gt;&lt;br /&gt;
Refer to the exhibit. A network administrator has been asked to  configure PPP with CHAP authentication over the serial link between  routers R1 and R2. What additional configuration should be included on  both routers to complete the task?&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/Cisco-Exam-2011.png"&gt;&lt;img alt="Cisco Exam 2011 thumb CCNA 4 Final Exam Answers 2011" border="0" height="57" src="http://ccnaanswers.com/wp-content/uploads/Cisco-Exam-2011_thumb.png" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="Cisco Exam 2011" width="347" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/Cisco-Exam-2012.png"&gt;&lt;img alt="Cisco Exam 2012 thumb CCNA 4 Final Exam Answers 2011" border="0" height="63" src="http://ccnaanswers.com/wp-content/uploads/Cisco-Exam-2012_thumb.png" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="Cisco Exam 2012" width="347" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/Cisco-Exam-Answers.png"&gt;&lt;img alt="Cisco Exam Answers thumb CCNA 4 Final Exam Answers 2011" border="0" height="57" src="http://ccnaanswers.com/wp-content/uploads/Cisco-Exam-Answers_thumb.png" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="Cisco Exam Answers" width="341" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA-Exam-October.png"&gt;&lt;img alt="CCNA Exam October thumb CCNA 4 Final Exam Answers 2011" border="0" height="57" src="http://ccnaanswers.com/wp-content/uploads/CCNA-Exam-October_thumb.png" style="background-image: none; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;" title="CCNA Exam October" width="342" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>CCNA 4 Final Exam V4.0 Answers</title><link>http://testccnastudy.blogspot.com/2012/03/ccna-4-final-exam-v40-answers.html</link><category>CCNA 4 Final Exam V4.0 Answers</category><pubDate>Tue, 20 Mar 2012 21:30:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-8564182420268131031</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;strong&gt;1&lt;/strong&gt;. What functionality do &lt;span class="IL_AD" id="IL_AD4"&gt;access control&lt;/span&gt; lists provide in the implementation of dynamic NAT on a Cisco &lt;a href="http://ccnaanswers.com/" title="router"&gt;router&lt;/a&gt;?&lt;br /&gt;
&lt;span style="color: red;"&gt;define which addresses can be translated&lt;/span&gt;&lt;br /&gt;
define which addresses are assigned to a NAT pool&lt;br /&gt;
define which addresses are allowed out the router&lt;br /&gt;
define which addresses can be accessed from the inside network&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;2&lt;/strong&gt;. Which three guidelines would help contribute to creating a strong password policy? (Choose three.)&lt;br /&gt;
Once a good password is created, do not change it.&lt;br /&gt;
&lt;span style="color: red;"&gt;Deliberately misspell words when creating passwords.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: red;"&gt;Create passwords that are at least 8 characters in length.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: red;"&gt;Use combinations of upper case, lower case, and special characters.&lt;/span&gt;&lt;br /&gt;
Write passwords in locations that can be easily retrieved to avoid being locked out.&lt;br /&gt;
Use long words found in the dictionary to make passwords that are easy to remember.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;3&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA41.jpg"&gt;&lt;img alt="CCNA4 thumb1 CCNA 4 Final Exam V4.0 Answers" border="0" height="377" src="http://ccnaanswers.com/wp-content/uploads/CCNA4_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 4" width="697" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. Every time the administrator reboots this router, the  boot process ends in setup mode. What is a possible problem?&lt;br /&gt;
There is insufficient RAM for the IOS to load on this router.&lt;br /&gt;
A &lt;span class="IL_AD" id="IL_AD3"&gt;password recovery&lt;/span&gt; process should be done on this router.&lt;br /&gt;
The bootstrap version and the version of the IOS are different.&lt;br /&gt;
The IOS image is damaged and must be reloaded using &lt;b&gt;tftpdnld&lt;/b&gt;.&lt;br /&gt;
&lt;span style="color: red;"&gt;The &lt;span class="IL_AD" id="IL_AD2"&gt;configuration&lt;/span&gt; register is set to ignore the startup configuration.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;4&lt;/strong&gt;. Which option correctly defines the capacity through the local loop guaranteed to a customer by the service provider?&lt;br /&gt;
BE&lt;br /&gt;
DE&lt;br /&gt;
&lt;span style="color: red;"&gt;CIR&lt;/span&gt;&lt;br /&gt;
CBIR&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;5&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA4FinalExamV4.0Answers2010.jpg"&gt;&lt;img alt="CCNA4FinalExamV4.0Answers2010 thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="238" src="http://ccnaanswers.com/wp-content/uploads/CCNA4FinalExamV4.0Answers2010_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 4 Final Exam V4.0 Answers 2010" width="339" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer to the exhibit. A host connected to Fa0/0 is unable to acquire an IP address from the DHCP server. The output of the &lt;b&gt;debug ip dhcp server&lt;/b&gt; command shows "DHCPD: there is no address pool for 10.1.1.1". What is the problem?&lt;br /&gt;
The 10.1.1.1 address is already configured on Fa0/0.&lt;br /&gt;
The default router for the 10Network pool is &lt;span class="IL_AD" id="IL_AD8"&gt;incorrect&lt;/span&gt;.&lt;br /&gt;
The &lt;b&gt;ip helper-address&lt;/b&gt; must be added to Fa0/0 interface.&lt;br /&gt;
&lt;span style="color: red;"&gt;The pool of addresses for the 10Network pool is incorrect.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;6&lt;/strong&gt;. Which data link layer encapsulation protocol is used by default for serial connections between two Cisco routers?&lt;br /&gt;
ATM&lt;br /&gt;
Frame Relay&lt;br /&gt;
&lt;span style="color: red;"&gt;HDLC&lt;/span&gt;&lt;br /&gt;
PPP&lt;br /&gt;
SDLC&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;7&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA4PracticeFinalExamAnswers.jpg"&gt;&lt;img alt="CCNA4PracticeFinalExamAnswers thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="369" src="http://ccnaanswers.com/wp-content/uploads/CCNA4PracticeFinalExamAnswers_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 4 Practice Final Exam Answers" width="521" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer to the exhibit. Which &lt;span class="IL_AD" id="IL_AD9"&gt;statement&lt;/span&gt;  correctly describes how Router1 processes an FTP request that enters  interface s0/0/0 and is destined for an FTP server at IP address  192.168.1.5?&lt;br /&gt;
The router matches the incoming packet to the statement that was created by the &lt;b&gt;access-list 201 deny icmp 192.168.1.0 0.0.0.255 any &lt;/b&gt;command,  continues comparing the packet to the remaining statements in ACL 201  to ensure that no subsequent statements allow FTP, and then the router  drops the packet.&lt;br /&gt;
The router reaches the end of ACL 101 without &lt;span class="IL_AD" id="IL_AD6"&gt;matching&lt;/span&gt; a condition and drops the packet because there is no statement that was created by the &lt;b&gt;access-list 101 permit ip any any&lt;/b&gt; command.&lt;br /&gt;
&lt;span style="color: red;"&gt;The router matches the incoming packet to the statement that was created by the &lt;b&gt;access-list 101 permit ip any 192.168.1.0 0.0.0.255 &lt;/b&gt;command and allows the packet into the router.&lt;/span&gt;&lt;br /&gt;
It matches the incoming packet to the statement that was created by the &lt;b&gt;access-list 201 permit ip any any &lt;/b&gt;command and allows the packet into the router.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;8&lt;/strong&gt;. Compared with IDS systems, what can IPS systems do to provide further protection of computer systems?&lt;br /&gt;
detect potential attacks&lt;br /&gt;
&lt;span style="color: red;"&gt;stop the detected attack from executing&lt;/span&gt;&lt;br /&gt;
update OS patches for computer systems&lt;br /&gt;
scan computer systems for viruses and spyware&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;9&lt;/strong&gt;. Which IEEE 802.16 broadband wireless technology allows users to connect to the ISP at speeds comparable to DSL and cable?&lt;br /&gt;
Wi-Fi&lt;br /&gt;
satellite&lt;br /&gt;
&lt;span style="color: red;"&gt;WiMAX&lt;/span&gt;&lt;br /&gt;
Metro Ethernet&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;10&lt;/strong&gt;. A network administrator has changed the VLAN  configurations on his network switches over the past weekend. How can  the administrator determine if the additions and changes improved  performance and availability on the company intranet?&lt;br /&gt;
&lt;span style="color: red;"&gt;Conduct a performance test and compare with the baseline that was established previously.&lt;/span&gt;&lt;br /&gt;
Interview departmental secretaries and determine if they think load time for web pages has improved.&lt;br /&gt;
Determine performance on the intranet by monitoring load times of company web pages from remote sites.&lt;br /&gt;
Compare the hit counts on the company web server for the current week to the values that were recorded in previous weeks.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;11&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNAFinal.jpg"&gt;&lt;img alt="CCNAFinal thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="88" src="http://ccnaanswers.com/wp-content/uploads/CCNAFinal_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA Final" width="707" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer to the exhibit. What is the meaning of the term &lt;b&gt;dynamic&lt;/b&gt; in the output of the command?&lt;br /&gt;
The bandwidth capability of the interface increases and decreases automatically based on BECNs.&lt;br /&gt;
&lt;span style="color: red;"&gt;The Serial0/0/1 interface acquired 172.16.3.1 from a DHCP server.&lt;/span&gt;&lt;br /&gt;
The mapping between DLCI 100 and 172.16.3.1 was learned through Inverse ARP.&lt;br /&gt;
DLCI 100 will automatically adapt to changes in the Frame Relay cloud.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;12&lt;/strong&gt;. Which type of ACL will permit traffic inbound into a private network only if an outbound &lt;span class="IL_AD" id="IL_AD11"&gt;session&lt;/span&gt; has already been established between the source and destination?&lt;br /&gt;
&lt;span class="IL_AD" id="IL_AD10"&gt;extended&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: red;"&gt;reflexive&lt;/span&gt;&lt;br /&gt;
standard&lt;br /&gt;
time-based&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;13&lt;/strong&gt;. Which two statements are true about IPv6 link local addresses? (Choose two.)&lt;br /&gt;
&lt;span style="color: red;"&gt;They begin with the 2000::/3 prefix.&lt;/span&gt;&lt;br /&gt;
They begin with the FE80::/10 prefix.&lt;br /&gt;
&lt;span style="color: red;"&gt;They are assigned by IANA to an organization.&lt;/span&gt;&lt;br /&gt;
They must be manually configured by the administrator.&lt;br /&gt;
They are assigned to a host by a stateless autoconfiguration process.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;14&lt;/strong&gt;. A company is looking for a WAN solution to  connect its headquarters site to four remote sites. What are two  advantages that dedicated leased lines provide compared to a shared  Frame Relay solution? (Choose two.)&lt;br /&gt;
&lt;span style="color: red;"&gt;reduced jitter&lt;/span&gt;&lt;br /&gt;
reduced costs&lt;br /&gt;
&lt;span style="color: red;"&gt;reduced latency&lt;/span&gt;&lt;br /&gt;
the ability to burst above guaranteed bandwidth&lt;br /&gt;
the ability to borrow unused bandwidth from the leased lines of other customers&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;15&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CiscoCCNA4FinalExamAnswers.jpg"&gt;&lt;img alt="CiscoCCNA4FinalExamAnswers thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="354" src="http://ccnaanswers.com/wp-content/uploads/CiscoCCNA4FinalExamAnswers_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="Cisco CCNA 4 Final Exam Answers" width="263" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer to the exhibit. A network administrator is trying to connect R1 remotely to make configuration changes. Based on the exhibited command output, what will be the result when attempting to connect to R1?&lt;br /&gt;
failure to connect due to Telnet not being enabled&lt;br /&gt;
failure to connect due to incomplete configuration for Telnet&lt;br /&gt;
&lt;span style="color: red;"&gt;a &lt;span class="IL_AD" id="IL_AD5"&gt;successful&lt;/span&gt; connection and ability to make configuration changes&lt;/span&gt;&lt;br /&gt;
a successful connection but inability to make configuration changes because of the absence of an enable secret password&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;16&lt;/strong&gt;. What are two effective measures for securing routers? (Choose two.)&lt;br /&gt;
&lt;span style="color: red;"&gt;Protect all active router interfaces by configuring them as passive interfaces.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: red;"&gt;Configure remote administration through VTY lines for Telnet access.&lt;/span&gt;&lt;br /&gt;
Use quotes or phrases to create pass phrases.&lt;br /&gt;
Disable the HTTP server service.&lt;br /&gt;
Enable SNMP traps.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;17&lt;/strong&gt;. An issue of response time has recently arisen on an application server. The new release of a &lt;span class="IL_AD" id="IL_AD12"&gt;software package&lt;/span&gt; has also been installed on the server. The configuration  of the network has changed recently. To identify the problem,  individuals from both teams responsible for the recent changes begin to  investigate the source of the problem. Which statement applies to this situation?&lt;br /&gt;
Scheduling will be easy if the network and software teams work independently.&lt;br /&gt;
&lt;span style="color: red;"&gt;It will be difficult to isolate the problem if two teams are implementing changes independently.&lt;/span&gt;&lt;br /&gt;
Results from changes will be easier to reconcile and document if each team works in isolation.&lt;br /&gt;
Only results from the software package should be tested as the network is designed to accommodate the proposed software platform.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;18&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/LANSwitchingandWirelessFinalExamAnswers.jpg"&gt;&lt;img alt="LANSwitchingandWirelessFinalExamAnswers thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="393" src="http://ccnaanswers.com/wp-content/uploads/LANSwitchingandWirelessFinalExamAnswers_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="LAN Switching and Wireless Final Exam Answers" width="498" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer to the exhibit. From the output of the &lt;b&gt;show interfaces&lt;/b&gt; and &lt;b&gt;ping&lt;/b&gt; commands, at which layer of the OSI model is a fault indicated?&lt;br /&gt;
application&lt;br /&gt;
transport&lt;br /&gt;
&lt;span style="color: red;"&gt;network&lt;/span&gt;&lt;br /&gt;
data link&lt;br /&gt;
physical&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;19&lt;/strong&gt;. Which technology is used to dynamically map next hop, network layer addresses to virtual circuits in a Frame Relay network?&lt;br /&gt;
&lt;span style="color: red;"&gt;Inverse ARP&lt;/span&gt;&lt;br /&gt;
LMI&lt;br /&gt;
DLCI&lt;br /&gt;
FECN&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;20&lt;/strong&gt;. An administrator learns of an e-mail that has  been received by a number of users in the company. This e-mail appears  to come from the office of the administrator. The e-mail asks the users  to confirm their account and password information. Which type of  security threat does this e-mail represent?&lt;br /&gt;
cracking&lt;br /&gt;
&lt;span style="color: red;"&gt;phishing&lt;/span&gt;&lt;br /&gt;
phreaking&lt;br /&gt;
spamming&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;21&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA4ExamFinal.jpg"&gt;&lt;img alt="CCNA4ExamFinal thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="254" src="http://ccnaanswers.com/wp-content/uploads/CCNA4ExamFinal_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 4 Exam Final" width="481" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer to the exhibit. Which data transmission technology is being represented?&lt;br /&gt;
&lt;span style="color: red;"&gt;TDM&lt;/span&gt;&lt;br /&gt;
PPP&lt;br /&gt;
HDLC&lt;br /&gt;
SLIP&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;22&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA4FinalExamAnswers.jpg"&gt;&lt;img alt="CCNA4FinalExamAnswers thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="436" src="http://ccnaanswers.com/wp-content/uploads/CCNA4FinalExamAnswers_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 4 Final Exam Answers" width="702" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer to the exhibit. Results of the &lt;b&gt;show vlan&lt;/b&gt; and &lt;b&gt;show vtp status&lt;/b&gt; commands for switches S1 and S2 are displayed in the exhibit. VLAN 11 was created on S1. Why is VLAN 11 missing from S2?&lt;br /&gt;
There is a Layer 2 loop.&lt;br /&gt;
&lt;span style="color: red;"&gt;The VTP domain names do not match.&lt;/span&gt;&lt;br /&gt;
Only one switch can be in server mode.&lt;br /&gt;
S2 has a higher spanning-tree priority for VLAN 11 than S1 does.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;23&lt;/strong&gt;. What is the result of adding the global command &lt;b&gt;service password-encryption&lt;/b&gt; to the configuration of a router?&lt;br /&gt;
Line passwords are encrypted with type 7 encryption.&lt;br /&gt;
Enable passwords are encrypted with type 5 encryption.&lt;br /&gt;
&lt;span style="color: red;"&gt;All services must provide an encrypted password to function.&lt;/span&gt;&lt;br /&gt;
Only encrypted messages are allowed for router communication.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;24&lt;/strong&gt;. While troubleshooting a problem with an e-mail  server, an administrator observes that the switch port used by the  server shows "up, line protocol up". The administrator cannot ping the  server. At which layer of the OSI model is the problem most likely to be  found?&lt;br /&gt;
application layer&lt;br /&gt;
&lt;span style="color: red;"&gt;network layer&lt;/span&gt;&lt;br /&gt;
data link layer&lt;br /&gt;
physical layer&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;25&lt;/strong&gt;. Where does a service provider assume responsibility from a customer for a WAN connection?&lt;br /&gt;
local loop&lt;br /&gt;
DTE cable on router&lt;br /&gt;
&lt;span style="color: red;"&gt;demarcation point&lt;/span&gt;&lt;br /&gt;
demilitarized zone&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;26&lt;/strong&gt;. What will be the result of adding the command &lt;b&gt;ip dhcp excluded-address 192.168.24.1 192.168.24.5&lt;/b&gt; to the configuration of a local router that has been configured as a DHCP server?&lt;br /&gt;
Traffic that is destined for 192.168.24.1 and 192.168.24.5 will be dropped by the router.&lt;br /&gt;
Traffic will not be routed from clients with addresses between 192.168.24.1 and 192.168.24.5.&lt;br /&gt;
&lt;span style="color: red;"&gt;The DHCP server will not issue the addresses ranging from 192.168.24.1 to 192.168.24.5.&lt;/span&gt;&lt;br /&gt;
The router will ignore all traffic that comes from the DHCP servers with addresses 192.168.24.1 and 192.168.24.5.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;27&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA4FinalExams.jpg"&gt;&lt;img alt="CCNA4FinalExams thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="365" src="http://ccnaanswers.com/wp-content/uploads/CCNA4FinalExams_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 4 Final Exams" width="705" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer to the exhibit. Partial results of the &lt;b&gt;show access-lists&lt;/b&gt; and &lt;b&gt;show ip interface FastEthernet 0/1 &lt;/b&gt;commands  for router Router1 are shown. There are no other ACLs in effect. Host A  is unable to telnet to host B. Which action will correct the problem  but still restrict other traffic between the two networks?&lt;br /&gt;
Apply the ACL in the inbound direction.&lt;br /&gt;
Apply the ACL on the FastEthernet 0/0 interface.&lt;br /&gt;
&lt;span style="color: red;"&gt;Reverse the order of the TCP protocol statements in the ACL.&lt;/span&gt;&lt;br /&gt;
Modify the second entry in the list to &lt;b&gt;permit tcp host 172.16.10.10 any eq telnet&lt;/b&gt; .&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;28&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA4FinalTest.jpg"&gt;&lt;img alt="CCNA4FinalTest thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="277" src="http://ccnaanswers.com/wp-content/uploads/CCNA4FinalTest_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 4 Final Test" width="700" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. The corporate network that is shown has been assigned  network 172.16.128.0/19 for use at branch office LANs. If VLSM is used,  what mask should be used for addressing hosts at Branch4 with minimal  waste from unused addresses?&lt;br /&gt;
/19&lt;br /&gt;
/20&lt;br /&gt;
/21&lt;br /&gt;
&lt;span style="color: red;"&gt;/22&lt;/span&gt;&lt;br /&gt;
/23&lt;br /&gt;
/24&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;29&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNAAccessingTheWANFinalExamAnswersV4.0.jpg"&gt;&lt;img alt="CCNAAccessingTheWANFinalExamAnswersV4.0 thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="324" src="http://ccnaanswers.com/wp-content/uploads/CCNAAccessingTheWANFinalExamAnswersV4.0_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA Accessing The WAN Final Exam Answers V4.0" width="699" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. RIPv2 has been configured on all routers in the  network. Routers R1 and R3 have not received any RIP routing updates.  What will fix the issue?&lt;br /&gt;
&lt;span style="color: red;"&gt;Enable RIP authentication on R2.&lt;/span&gt;&lt;br /&gt;
Issue the &lt;b&gt;ip directed-broadcast&lt;/b&gt; command on R2.&lt;br /&gt;
Change the subnet masks to 10.11.12.0/8 and 172.16.40.0/16 on R2.&lt;br /&gt;
Enable CDP on R2 so that the other routers will receive routing updates.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;30&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNAExploration4FinalExamAnswers.jpg"&gt;&lt;img alt="CCNAExploration4FinalExamAnswers thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="288" src="http://ccnaanswers.com/wp-content/uploads/CCNAExploration4FinalExamAnswers_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA Exploration 4 Final Exam Answers" width="428" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. This serial interface is not functioning correctly.  Based on the output shown, what is the most likely cause?&lt;br /&gt;
improper LMI type&lt;br /&gt;
interface reset&lt;br /&gt;
&lt;span style="color: red;"&gt;PPP negotiation failure&lt;/span&gt;&lt;br /&gt;
unplugged cable&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;31&lt;/strong&gt;. Which statement is true about PAP in the authentication of a PPP session?&lt;br /&gt;
&lt;span style="color: red;"&gt;PAP uses a two-way handshake.&lt;/span&gt;&lt;br /&gt;
The password is unique and random.&lt;br /&gt;
PAP conducts periodic password challenges.&lt;br /&gt;
PAP uses MD5 hashing to keep the password secure.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;32&lt;/strong&gt;. An administrator is configuring a dual stack  router with IPv6 and IPv4 using RIPng. The administrator receives an  error message when trying to enter the IPv4 routes into RIPng. What is  the cause of the problem?&lt;br /&gt;
When IPv4 and IPv6 are configured on the same interface, all IPv4 addresses are over-written in favor of the newer technology.&lt;br /&gt;
Incorrect IPv4 addresses are entered on the router interfaces.&lt;br /&gt;
RIPng is incompatible with dual-stack technology.&lt;br /&gt;
&lt;span style="color: red;"&gt;IPv4 is incompatible with RIPng.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;33&lt;/strong&gt;. What is tunneling?&lt;br /&gt;
using digital certificates to ensure that data endpoints are authentic&lt;br /&gt;
creating a hash to ensure the integrity of data as it traverses a network&lt;br /&gt;
using alternate paths to avoid access control lists and bypass security measures&lt;br /&gt;
&lt;span style="color: red;"&gt;encapsulating an entire packet within another packet for transmission over a network&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;34&lt;/strong&gt;. Which statement is true about NCP?&lt;br /&gt;
Link termination is the responsibility of NCP.&lt;br /&gt;
&lt;span style="color: red;"&gt;Each network protocol has a corresponding NCP.&lt;/span&gt;&lt;br /&gt;
NCP establishes the initial link between PPP devices.&lt;br /&gt;
NCP tests the link to ensure that the link quality is sufficient.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;35&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNAFinal4.jpg"&gt;&lt;img alt="CCNAFinal4 thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="335" src="http://ccnaanswers.com/wp-content/uploads/CCNAFinal4_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA Final 4" width="697" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. A network administrator is creating a prototype to  verify the new WAN design. However, the communication between the two  routers cannot be established. Based on the output of the commands, what  can be done to solve the problem?&lt;br /&gt;
Replace the serial cable .&lt;br /&gt;
Replace the WIC on RA.&lt;br /&gt;
&lt;span style="color: red;"&gt;Configure RA with a &lt;b&gt;clock rate&lt;/b&gt; command.&lt;/span&gt;&lt;br /&gt;
Issue a &lt;b&gt;no shutdown&lt;/b&gt; interface command on RB.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;36&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNAFinalExam4.jpg"&gt;&lt;img alt="CCNAFinalExam4 thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="239" src="http://ccnaanswers.com/wp-content/uploads/CCNAFinalExam4_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA Final Exam 4" width="310" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. Based on the output as shown, which two statements  correctly define how the router will treat Telnet traffic that comes  into interface FastEthernet 0/1? (Choose two).&lt;br /&gt;
Telnet to 172.16.10.0/24 is denied.&lt;br /&gt;
Telnet to 172.16.20.0/24 is denied.&lt;br /&gt;
Telnet to 172.16.0.0/24 is permitted.&lt;br /&gt;
&lt;span style="color: red;"&gt;Telnet to 172.16.10.0/24 is permitted.&lt;/span&gt;&lt;br /&gt;
Telnet to 172.16.20.0/24 is permitted.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;37&lt;/strong&gt;. Which Frame Relay flow control mechanism is used to signal routers that they should reduce the flow rate of frames?&lt;br /&gt;
DE&lt;br /&gt;
BE&lt;br /&gt;
CIR&lt;br /&gt;
&lt;span style="color: red;"&gt;FECN&lt;/span&gt;&lt;br /&gt;
CBIR&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;38&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNASemester4FinalExam.jpg"&gt;&lt;img alt="CCNASemester4FinalExam thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="354" src="http://ccnaanswers.com/wp-content/uploads/CCNASemester4FinalExam_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA Semester 4 Final Exam" width="432" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. A network administrator configures a standard access  control list on Router1 to prohibit traffic from the 192.168.0.0/24  network from reaching the Internet. The access control list also permits  traffic from the 192.168.0.0/24 network to reach the 192.168.1.0/24  network. On which interface and in which direction should the access  control list be applied?&lt;br /&gt;
interface Fa0/0, inbound&lt;br /&gt;
interface Fa0/0, outbound&lt;br /&gt;
interface S0/0/0, inbound&lt;br /&gt;
&lt;span style="color: red;"&gt;interface S0/0/0, outbound&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;39&lt;/strong&gt;. Which configuration on the vty lines provides  the best security measure for network administrators to remotely access  the core routers at headquarters?&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/RouterConfiguration1.jpg"&gt;&lt;img alt="RouterConfiguration1 thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="130" src="http://ccnaanswers.com/wp-content/uploads/RouterConfiguration1_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="Router Configuration 1" width="326" /&gt;&lt;/a&gt; &lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/RouterConfiguration2.jpg"&gt;&lt;img alt="RouterConfiguration2 thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="150" src="http://ccnaanswers.com/wp-content/uploads/RouterConfiguration2_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="Router Configuration 2" width="326" /&gt;&lt;/a&gt; &lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/RouterConfiguration3.jpg"&gt;&lt;img alt="RouterConfiguration3 thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="150" src="http://ccnaanswers.com/wp-content/uploads/RouterConfiguration3_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="Router Configuration 3" width="326" /&gt;&lt;/a&gt; &lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/RouterConfiguration4.jpg"&gt;&lt;img alt="RouterConfiguration4 thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="147" src="http://ccnaanswers.com/wp-content/uploads/RouterConfiguration4_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="Router Configuration 4" width="326" /&gt;&lt;/a&gt; &lt;br /&gt;
Answer: 3nd option&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;40&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/FinalCCNA4.jpg"&gt;&lt;img alt="FinalCCNA4 thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="289" src="http://ccnaanswers.com/wp-content/uploads/FinalCCNA4_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="Final CCNA 4" width="659" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer to the exhibit. What can be concluded from the exhibited output of the &lt;b&gt;debug ip nat&lt;/b&gt; command?&lt;br /&gt;
The 10.1.1.225 host is exchanging packets with the 192.168.0.10 host.&lt;br /&gt;
The native 10.1.200.254 address is being translated to 192.168.0.10.&lt;br /&gt;
&lt;span style="color: red;"&gt;The 192.168.0.0/24 network is the inside network.&lt;/span&gt;&lt;br /&gt;
Port address translation is in effect.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;41&lt;/strong&gt;. A network administrator is instructing a  technician on best practices for applying ACLs. Which suggestion should  the administrator provide?&lt;br /&gt;
Named ACLs are less efficient than numbered ACLs.&lt;br /&gt;
Standard ACLs should be applied closest to the core layer.&lt;br /&gt;
ACLs applied to outbound interfaces are the most efficient.&lt;br /&gt;
&lt;span style="color: red;"&gt;Extended ACLs should be applied closest to the source that is specified by the ACL.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;42&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA4FinalExamV4.0Answers.jpg"&gt;&lt;img alt="CCNA4FinalExamV4.0Answers thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="365" src="http://ccnaanswers.com/wp-content/uploads/CCNA4FinalExamV4.0Answers_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 4 Final Exam V4.0 Answers" width="621" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. Headquarters is connected through the Internet to  branch office A and branch office B. Which WAN technology would be best  suited to provide secure connectivity between headquarters and both  branch offices?&lt;br /&gt;
ATM&lt;br /&gt;
&lt;span style="color: red;"&gt;VPN&lt;/span&gt;&lt;br /&gt;
ISDN&lt;br /&gt;
Frame Relay&lt;br /&gt;
broadband DSL&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;43&lt;/strong&gt;. Which three physical network problems should be  checked when a bottom-up troubleshooting approach has been chosen to  troubleshoot network performance? (Choose three.)&lt;br /&gt;
&lt;span style="color: red;"&gt;cable connectivity&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: red;"&gt;high collision counts&lt;/span&gt;&lt;br /&gt;
STP failures and loops&lt;br /&gt;
address mapping errors&lt;br /&gt;
&lt;span style="color: red;"&gt;high CPU utilization rates&lt;/span&gt;&lt;br /&gt;
excess packets that are filtered by the firewall&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;44&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA4Final100.jpg"&gt;&lt;img alt="CCNA4Final100 thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="370" src="http://ccnaanswers.com/wp-content/uploads/CCNA4Final100_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 4 Final 100%" width="454" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. A network administrator is attempting to configure a  Frame Relay network. The administrator enters the commands as shown in  the exhibit on R2, but the Frame Relay PVCs are inactive. What is the  problem?&lt;br /&gt;
&lt;span style="color: red;"&gt;The incorrect DLCI numbers are being configured on R2.&lt;/span&gt;&lt;br /&gt;
The S0/0/0 interface on R2 needs to be point-to-point.&lt;br /&gt;
The &lt;b&gt;frame-relay map&lt;/b&gt; commands are missing the &lt;b&gt;cisco&lt;/b&gt; keyword at the end.&lt;br /&gt;
A single router interface cannot connect to more than one Frame Relay peer at a time.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;45&lt;/strong&gt;. Which IP address and wildcard mask would be used  in an ACL to block traffic from all hosts on the same subnet as host  192.168.16.43/28?&lt;br /&gt;
access-list 10 deny 192.168.16.0 0.0.0.31&lt;br /&gt;
access-list 10 deny 192.168.16.16 0.0.0.31&lt;br /&gt;
access-list 10 deny 192.168.16.32 0.0.0.16&lt;br /&gt;
access-list 10 deny 192.168.16.32 0.0.0.15&lt;br /&gt;
&lt;span style="color: red;"&gt;access-list 10 deny 192.168.16.43 0.0.0.16&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;46&lt;/strong&gt;. Which combination of Layer 2 protocol and  authentication should be used to establish a link without sending  authentication information in plain text between a Cisco and a non-Cisco  router?&lt;br /&gt;
PPP with PAP&lt;br /&gt;
&lt;span style="color: red;"&gt;PPP with CHAP&lt;/span&gt;&lt;br /&gt;
HDLC with PAP&lt;br /&gt;
HDLC with CHAP&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;47&lt;/strong&gt;. When would the &lt;b&gt;multipoint&lt;/b&gt; keyword be used in Frame Relay PVCs configuration?&lt;br /&gt;
when global DLCIs are in use&lt;br /&gt;
when using physical interfaces&lt;br /&gt;
when multicasts must be supported&lt;br /&gt;
&lt;span style="color: red;"&gt;when participating routers are in the same subnet&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;48&lt;/strong&gt;. A network technician analyzes the network and  notices late collisions. The collisions occur accompanied by jabber that  originates from the server. What is the likely cause of the problem?&lt;br /&gt;
faulty switch port&lt;br /&gt;
&lt;span style="color: red;"&gt;web server CPU overload&lt;/span&gt;&lt;br /&gt;
faulty NIC in the web server&lt;br /&gt;
misconfiguration of web server services&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;49&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA4v4Final.jpg"&gt;&lt;img alt="CCNA4v4Final thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="264" src="http://ccnaanswers.com/wp-content/uploads/CCNA4v4Final_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 4 v4 Final" width="447" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. R1 is performing NAT overload for the 10.1.1.0/24  inside network. Host A has sent a packet to the web server. What is the  destination IP address of the return packet from the web server?&lt;br /&gt;
10.1.1.2:1234&lt;br /&gt;
172.30.20.1:1234&lt;br /&gt;
&lt;span style="color: red;"&gt;172.30.20.1:3333&lt;/span&gt;&lt;br /&gt;
192.168.1.2:80&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;50&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA4FinalV4.0.jpg"&gt;&lt;img alt="CCNA4FinalV4.0 thumb CCNA 4 Final Exam V4.0 Answers" border="0" height="350" src="http://ccnaanswers.com/wp-content/uploads/CCNA4FinalV4.0_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 4 Final V4.0" width="555" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. All devices are configured as shown in the exhibit. PC1  is unable to ping the default gateway. What is the cause of the  problem?&lt;br /&gt;
The default gateway is in the wrong subnet.&lt;br /&gt;
STP has blocked the port that PC1 is connected to.&lt;br /&gt;
&lt;span style="color: red;"&gt;Port Fa0/2 on S2 is assigned to the wrong VLAN.&lt;/span&gt;&lt;br /&gt;
S2 has the wrong IP address assigned to the VLAN30 interface.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;51&lt;/strong&gt;. When Frame Relay encapsulation is used, what  feature provides flow control and exchanges information about the status  of virtual circuits?&lt;br /&gt;
LCP&lt;br /&gt;
&lt;span style="color: red;"&gt;LMI&lt;/span&gt;&lt;br /&gt;
DLCI&lt;br /&gt;
Inverse ARP&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;52&lt;/strong&gt;. A network administrator is tasked with  maintaining two remote locations in the same city. Both locations use  the same service provider and have the same service plan for DSL  service. When comparing download rates, it is noticed that the location  on the East side of town has a faster download rate than the location on  the West side of town. How can this be explained?&lt;br /&gt;
The West side has a high volume of POTS traffic.&lt;br /&gt;
The West side of town is downloading larger packets.&lt;br /&gt;
&lt;span style="color: red;"&gt;The service provider is closer to the location on the East side.&lt;/span&gt;&lt;br /&gt;
More clients share a connection to the DSLAM on the West side.&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>CCNA 3 Final Exam V4.0 AnswersCCNA 3 Final Exam V4.0 Answers</title><link>http://testccnastudy.blogspot.com/2012/03/ccna-3-final-exam-v40-answersccna-3.html</link><category>CCNA 3 Final Exam V4.0 Answers</category><pubDate>Tue, 20 Mar 2012 21:23:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-6775662794288564103</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;strong&gt;1&lt;/strong&gt;. Which security protocol or measure would provide the greatest protection for a &lt;span class="IL_AD" id="IL_AD8"&gt;wireless LAN&lt;/span&gt;?&lt;br /&gt;
WPA2&lt;br /&gt;
cloaking SSIDs&lt;br /&gt;
shared WEP key&lt;br /&gt;
&lt;span style="color: red;"&gt;MAC address filtering&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;2&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers thumb CCNA 3 Final Exam V4.0 Answers" border="0" height="333" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers" width="372" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. All trunk links are operational and all VLANs are  allowed on all trunk links. An ARP request is sent by computer 5. Which  device or devices will receive this message?&lt;br /&gt;
only computer 4&lt;br /&gt;
&lt;span style="color: red;"&gt;computer 3 and RTR-A&lt;/span&gt;&lt;br /&gt;
computer 4 and RTR-A&lt;br /&gt;
computer 1, computer 2, computer 4, and RTR-A&lt;br /&gt;
computer 1, computer 2, computer 3, computer 4, and RTR-A&lt;br /&gt;
all of the computers and the &lt;a href="http://ccnaanswers.com/" title="router"&gt;router&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;3&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers27.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers2 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="241" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers2_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 2" width="301" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. Hosts A and B, connected to hub HB1, attempt to  transmit a frame at the same time but a collision occurs. Which hosts  will receive the collision jamming signal?&lt;br /&gt;
only hosts A and B&lt;br /&gt;
&lt;span style="color: red;"&gt;only hosts A, B, and C&lt;/span&gt;&lt;br /&gt;
only hosts A, B, C, and D&lt;br /&gt;
only hosts A, B, C, and E&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;4&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers31.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers3 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="351" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers3_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 3" width="369" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. Router RA receives a packet with a source address of  192.168.1.65 and a destination address of 192.168.1.161. What will the  router do with this packet?&lt;br /&gt;
&lt;span style="color: red;"&gt;The router will drop the packet.&lt;/span&gt;&lt;br /&gt;
The router will &lt;span class="IL_AD" id="IL_AD6"&gt;forward&lt;/span&gt; the packet out interface FastEthernet 0/1.1.&lt;br /&gt;
The router will forward the packet out interface FastEthernet 0/1.2.&lt;br /&gt;
The router will forward the packet out interface FastEthernet 0/1.3.&lt;br /&gt;
The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;5&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers41.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers4 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="270" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers4_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 4" width="622" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer to the exhibit. Which two settings show the default value of VTP configuration on a Cisco 2960 switch? (Choose two.)&lt;br /&gt;
&lt;span style="color: red;"&gt;revision number&lt;/span&gt;&lt;br /&gt;
existing VLANs&lt;br /&gt;
operating mode&lt;br /&gt;
domain name&lt;br /&gt;
&lt;span style="color: red;"&gt;pruning mode&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;6&lt;/strong&gt;. Which value determines if a switch becomes the central point of reference in the spanning tree topology?&lt;br /&gt;
&lt;span style="color: red;"&gt;lowest bridge ID&lt;/span&gt;&lt;br /&gt;
highest revision number&lt;br /&gt;
lowest numeric IP address&lt;br /&gt;
highest numeric MAC address&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;7&lt;/strong&gt;. What is the purpose of the Spanning Tree algorithm?&lt;br /&gt;
It propagates VLAN configurations to other switches.&lt;br /&gt;
It restricts broadcast packets to a single VLAN.&lt;br /&gt;
It segments a network into multiple broadcast domains.&lt;br /&gt;
&lt;span style="color: red;"&gt;It prevents loops in a switched network with redundant paths.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;8&lt;/strong&gt;. What are two benefits of the IEEE 802.11n standard over the IEEE 802.11G? (Choose two.)&lt;br /&gt;
requires less equipment&lt;br /&gt;
&lt;span style="color: red;"&gt;provides improved range&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: red;"&gt;permits increased data rates&lt;/span&gt;&lt;br /&gt;
has a single-input and a single-output&lt;br /&gt;
needs no hardware upgrade for compatibility&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;9&lt;/strong&gt;.&lt;strong&gt; &lt;/strong&gt;Which configuration changes will increment the configuration revision &lt;span class="IL_AD" id="IL_AD12"&gt;number&lt;/span&gt; on the VTP server?&lt;br /&gt;
configuring trunk links on the VTP server&lt;br /&gt;
configuring or changing the VTP password&lt;br /&gt;
configuring or changing the VTP domain name&lt;br /&gt;
configuring or changing the VTP version number&lt;br /&gt;
&lt;span style="color: red;"&gt;configuring or deleting a VLAN or creating a VLAN name&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;10&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers51.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers5 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="398" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers5_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 5" width="435" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. A company has acquired a new office in a campus  environment. Switches in the existing office and the new office are  directly connected by a trunk link. The VLANs and IP addressing are  setup as shown in the exhibit. The computers in each office are not able  to ping each other. What will fix the problem?&lt;br /&gt;
Use an access link between S2 and S3.&lt;br /&gt;
&lt;span style="color: red;"&gt;Connect S2 and S3 to a common router.&lt;/span&gt;&lt;br /&gt;
Set the subnet mask in the new office to /24.&lt;br /&gt;
Configure the new office default gateway to 172.17.10.1&lt;br /&gt;
Change the port assignments in the new office to a different VLAN.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;11&lt;/strong&gt;. What is a possible impact of setting too short an aging time in the MAC address table of a switch?&lt;br /&gt;
overly large address table&lt;br /&gt;
&lt;span style="color: red;"&gt;unnecessary &lt;span class="IL_AD" id="IL_AD11"&gt;flooding&lt;/span&gt; of packets&lt;/span&gt;&lt;br /&gt;
excessive timeouts of static addresses&lt;br /&gt;
impaired ability to dynamically learn new addresses&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;12&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers61.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers6 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="437" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers6_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 6" width="522" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. The network administrator has just added VLAN 50 to  Switch1 and Switch2. Hosts A, B, C, and D are correctly configured with  IP addresses in the subnet range for VLAN 50. Host A can communicate  with host B, but cannot communicate with host C or host D. What is the  cause of this problem?&lt;br /&gt;
There is a native VLAN mismatch.&lt;br /&gt;
The Fa0/11 interface of Switch1 is not configured as a trunk.&lt;br /&gt;
The link between Switch1 and Switch2 is up but not trunked.&lt;br /&gt;
&lt;span style="color: red;"&gt;VLAN 50 is not allowed on the trunk link between Switch1 and Switch2.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;13&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers71.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers7 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="347" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers7_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 7" width="668" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer to the exhibit. Users complain that they do not have connectivity to &lt;span class="IL_AD" id="IL_AD5"&gt;the web&lt;/span&gt; server that is connected to SW1. What should be done to remedy the problem?&lt;br /&gt;
Allow all VLANs on the trunk link.&lt;br /&gt;
&lt;span style="color: red;"&gt;Configure VLAN 100 as the native VLAN for SW1.&lt;/span&gt;&lt;br /&gt;
Configure the trunk port in trunk mode on SW1.&lt;br /&gt;
Attach the web server to a router and configure inter-VLAN routing.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;14&lt;/strong&gt;. What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?&lt;br /&gt;
only the management VLAN&lt;br /&gt;
all VLANs except the &lt;span class="IL_AD" id="IL_AD4"&gt;extended&lt;/span&gt; range VLANs&lt;br /&gt;
all VLANs except 1 and 1002-1005&lt;br /&gt;
&lt;span style="color: red;"&gt;all VLANs&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;15&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers81.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers8 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="198" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers8_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 8" width="486" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP address should be assigned to this new host?&lt;br /&gt;
192.168.1.11 /28&lt;br /&gt;
&lt;span style="color: red;"&gt;192.168.1.22 /28&lt;/span&gt;&lt;br /&gt;
192.168.1.33 /28&lt;br /&gt;
192.168.1.44 /28&lt;br /&gt;
192.168.1.55 /28&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;16&lt;/strong&gt;. Using the command &lt;b&gt;copy tftp:backup.cfg startup-config&lt;/b&gt;,  an administrator downloaded a saved configuration from a TFTP server to  a switch. Why does the administrator not detect any changes in the  switch configuration after the download completes?&lt;br /&gt;
The command should have been &lt;b&gt;copy startup-config tftp:backup.cfg&lt;/b&gt;.&lt;br /&gt;
A backup configuration from a TFTP server cannot be copied directly into the startup-config.&lt;br /&gt;
The command &lt;b&gt;copy running-config startup-config&lt;/b&gt; should be used to save the changes on the switch.&lt;br /&gt;
&lt;span style="color: red;"&gt;Downloading to the startup-config requires the switch to be reloaded in order for the configuration to take effect.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;17&lt;/strong&gt;. What two methods can be used to remove MAC address table entries from a switch? (Choose two.)&lt;br /&gt;
&lt;span style="color: red;"&gt;Power cycle the switch to clear all dynamically learned addresses.&lt;/span&gt;&lt;br /&gt;
The &lt;b&gt;clear switching-tables&lt;/b&gt; command will remove statically configured entries.&lt;br /&gt;
The &lt;b&gt;clear mac-address-table&lt;/b&gt; command will remove statically and dynamically configured table entries.&lt;br /&gt;
&lt;span style="color: red;"&gt;The &lt;b&gt;erase flash&lt;/b&gt; command will clear all statically configured table entries.&lt;/span&gt;&lt;br /&gt;
Statically configured MAC addresses will automatically be removed  from the address table 300 minutes after the last activity on a switch  port.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;18&lt;/strong&gt;. Which type of &lt;span class="IL_AD" id="IL_AD7"&gt;traffic&lt;/span&gt; can still be received on a switch interface that is in STP blocking mode?&lt;br /&gt;
&lt;span style="color: red;"&gt;BPDU frames&lt;/span&gt;&lt;br /&gt;
multicast frames&lt;br /&gt;
broadcast frames&lt;br /&gt;
Layer 3 packets&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;19&lt;/strong&gt;. Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?&lt;br /&gt;
Associate with the access point and then open a &lt;a href="http://ccnaanswers.com/hyperterminal/" title="HyperTerminal"&gt;HyperTerminal&lt;/a&gt; session with the access point.&lt;br /&gt;
Physically connect to the access point and then reboot the computer to launch the configuration software.&lt;br /&gt;
&lt;span style="color: red;"&gt;From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.&lt;/span&gt;&lt;br /&gt;
Modify the TCP/IP &lt;span class="IL_AD" id="IL_AD3"&gt;properties&lt;/span&gt;  of the computer connected to the access point so that it exists on the  same network, and then reboot your computer to establish a connection.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;20&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers91.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers9 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="196" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers9_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 9" width="390" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer to the exhibit. All edge ports are configured with the &lt;b&gt;spanning-tree portfast&lt;/b&gt; command. Host1 is recently connected to port Fa0/1 on switch SW1 . Which statement is true about the status of port Fa0/1?&lt;br /&gt;
The port will transition into blocking state.&lt;br /&gt;
&lt;span style="color: red;"&gt;The port will transition immediately into &lt;span class="IL_AD" id="IL_AD10"&gt;forwarding&lt;/span&gt; state.&lt;/span&gt;&lt;br /&gt;
The port will transition into blocking state and then immediately into forwarding state.&lt;br /&gt;
The port will transition into blocking state and immediately transition through the listening and learning states.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;21&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers101.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers10 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="248" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers10_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 10" width="576" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer to the exhibit. What is true of the configuration of switch S1?&lt;br /&gt;
A Cisco proprietary protocol is in use for ports Fa0/1 and Fa0/3.&lt;br /&gt;
Switch ports Fa0/1 and Fa0/3 have been configured with the &lt;b&gt;switchport mode access&lt;/b&gt; command.&lt;br /&gt;
Untagged frames received on ports Fa0/1 and Fa0/3 will be placed on VLAN 1.&lt;br /&gt;
&lt;span style="color: red;"&gt;Switch ports Fa0/1 and Fa0/3 are configured to carry data from multiple VLANs.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;22&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers111.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers11 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="123" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers11_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 11" width="367" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer to the exhibit. The configuration steps that are listed in the exhibit have been &lt;span class="IL_AD" id="IL_AD2"&gt;entered&lt;/span&gt; in switch S1 via the console. Subsequent attempts to telnet to the switch are not successful. What is causing the problem?&lt;br /&gt;
The switch must be configured with SSH version 1.&lt;br /&gt;
&lt;span style="color: red;"&gt;The &lt;b&gt;transport input&lt;/b&gt; command must specify Telnet access.&lt;/span&gt;&lt;br /&gt;
The RSA keys must be returned to zero before SSH will permit Telnet access.&lt;br /&gt;
The &lt;b&gt;ip domain-name&lt;/b&gt; command must also be entered in line configuration mode for the vty lines.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;23&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers121.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers12 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="218" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers12_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 12" width="501" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?&lt;br /&gt;
Cat-A&lt;br /&gt;
Cat-B&lt;br /&gt;
&lt;span style="color: red;"&gt;Cat-C&lt;/span&gt;&lt;br /&gt;
Cat-D&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;24&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers131.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers13 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="420" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers13_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 13" width="709" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. VTP has been configured with VTP pruning enabled on all  switches. If HostA sends a broadcast frame to SW1, which devices will  receive the frame?&lt;br /&gt;
&lt;span style="color: red;"&gt;SW1, SW3, HostF&lt;/span&gt;&lt;br /&gt;
SW1, HostB, HostC&lt;br /&gt;
SW1, SW2, SW3, SW4, HostF&lt;br /&gt;
SW1, SW2, SW3, SW4, all hosts&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;25&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers141.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers14 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="258" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers14_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 14" width="380" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer to the exhibit. Which two statements are true about the operation of the interfaces? (Choose two.)&lt;br /&gt;
Incoming traffic with VLAN ID 0 is processed by interface fa0/0.&lt;br /&gt;
&lt;span style="color: red;"&gt;Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.&lt;/span&gt;&lt;br /&gt;
Both subinterfaces remain up with line protocol up, even if fa0/0 line protocol is down.&lt;br /&gt;
Subinterfaces use unique MAC addresses by adding the 802.1Q VLAN ID to the hardware address.&lt;br /&gt;
Traffic inbound on this router is processed by different subinterfaces, depending on the VLAN from which the traffic originated.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;26&lt;/strong&gt;. The network administrator wants to configure a  switch to pass VLAN update information to other switches in the domain  but not update its own local VLAN database. Which two steps should the  administrator perform to achieve this? (Choose two.)&lt;br /&gt;
Reset the VTP counters.&lt;br /&gt;
Configure VTP version 1 on the switch.&lt;br /&gt;
&lt;span style="color: red;"&gt;Configure the VTP mode of the switch to transparent.&lt;/span&gt;&lt;br /&gt;
Verify that the switch has a higher configuration revision number.&lt;br /&gt;
&lt;span style="color: red;"&gt;Configure the switch with the same VTP domain name as other switches in the network.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;27&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers151.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers15 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="411" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers15_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 15" width="473" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. The devices in the network are operational and  configured as indicated in the exhibit. However, hosts B and D cannot  ping each other. What is the most likely cause of this problem?&lt;br /&gt;
The link between the switches is up but not trunked.&lt;br /&gt;
The Fa0/11 interface of Switch1 is not configured as a trunk.&lt;br /&gt;
&lt;span style="color: red;"&gt;Hosts B and D are configured with IP addresses from different subnets.&lt;/span&gt;&lt;br /&gt;
VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;28&lt;/strong&gt;.&lt;br /&gt;
&amp;nbsp;&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers161.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers16 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="189" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers16_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 16" width="536" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. Users A and B are reporting intermittent connectivity  problems. Pre-installation surveys showed strong signal strength from  the AP locations to the client locations. Outside electrical  interference has been eliminated. What will fix the problem?&lt;br /&gt;
Relocate the APs closer to each other.&lt;br /&gt;
Increase the distance between the clients.&lt;br /&gt;
&lt;span style="color: red;"&gt;Change the channel on AP-B to 6 or 11.&lt;/span&gt;&lt;br /&gt;
Place AP-A and AP-B on the same wireless channel.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;29&lt;/strong&gt;. Why is it advisable that a network administrator use SSH instead of Telnet when managing switches?&lt;br /&gt;
SSH uses TCP whereas Telnet does not.&lt;br /&gt;
SSH encrypts only the username and password when logging in.&lt;br /&gt;
&lt;span style="color: red;"&gt;SSH encrypts all remote management communications whereas Telnet does not.&lt;/span&gt;&lt;br /&gt;
SSH sends a clear text message steam which reduces the bandwidth use for management.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;30&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers171.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers17 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="265" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers17_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 17" width="479" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. The teacher host is connected to port Fa0/7 on switch  STW. A student has decided to share access to the Internet by attaching a  hub and laptop to STW as shown. What will be the result of the student  making this connection?&lt;br /&gt;
The Fa0/7 port of STW will be shutdown.&lt;br /&gt;
The student will gain full access to the Internet.&lt;br /&gt;
Both the teacher and student will be able to receive data but only the teacher will be able to send.&lt;br /&gt;
&lt;span style="color: red;"&gt;The frames from the laptop will be dropped, but the teacher host will maintain connectivity with the network.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;31&lt;/strong&gt;. A network administrator configures a switch port with the command &lt;b&gt;switchport mode dynamic auto&lt;/b&gt;. What is the resulting behavior of the switch port?&lt;br /&gt;
The switch port is able to trunk if the remote switch port is set to auto.&lt;br /&gt;
&lt;span style="color: red;"&gt;The switch port is able to trunk if the remote switch port is set to desirable.&lt;/span&gt;&lt;br /&gt;
The switch port will be disabled if it is unable to successfully negotiate trunking.&lt;br /&gt;
A successful trunk will be established if the remote switch is non-Cisco but the port is configured for trunking.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;32&lt;/strong&gt;. Which STP port type can only appear once on a segment, and must be present in order for traffic to flow on that segment?&lt;br /&gt;
non-root port&lt;br /&gt;
disabled port&lt;br /&gt;
&lt;span style="color: red;"&gt;designated port&lt;/span&gt;&lt;br /&gt;
non-designated port&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;33&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers181.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers18 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="414" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers18_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 18" width="361" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. What would happen if the network administrator moved  the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1?&lt;br /&gt;
Host A remains a member of VLAN 10, because the router is routing traffic between VLANs.&lt;br /&gt;
&lt;span style="color: red;"&gt;Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30.&lt;/span&gt;&lt;br /&gt;
Host A remains a member of VLAN 10, because the switch provides dynamic VLAN assignment for the port.&lt;br /&gt;
Host A maintains connectivity to all members of VLAN 10, because it is connected to the same physical network.&lt;br /&gt;
Host A is no longer a member of VLAN 10, but because port Fa0/3 was unused, it is now a member of VLAN 1.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;34&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers191.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers19 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="332" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers19_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 19" width="567" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. VLAN 10 has been configured on the VTP server. Users  who are assigned to VLAN 10 are connected as shown in the exhibit. On  the basis of the outputs that are provided, which group of users will be  able to communicate with the users on VLAN 10 on SW1?&lt;br /&gt;
all the users who are connected only to SW2&lt;br /&gt;
&lt;span style="color: red;"&gt;users on VLAN 10 who are connected only to SW3&lt;/span&gt;&lt;br /&gt;
users on VLAN 10 who are connected only to SW4&lt;br /&gt;
users on VLAN 10 who are connected to both SW3 and SW4&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;35&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers201.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers20 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="347" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers20_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 20" width="288" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. Which three options correctly identify information that  could be associated with this output?(Choose three.)&lt;br /&gt;
&lt;span style="color: red;"&gt;Interface FastEthernet3/0/0 is subinterfaced.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: red;"&gt;A non-proprietary trunking protocol is in use.&lt;/span&gt;&lt;br /&gt;
The configuration is appropriate for a router-on-a-stick network design.&lt;br /&gt;
&lt;span style="color: red;"&gt;A &lt;b&gt;shutdown&lt;/b&gt; command has been applied to interface FastEthernet3/0/0.&lt;/span&gt;&lt;br /&gt;
Interface FastEthernet3/0/0.3 is mapped to the default management VLAN.&lt;br /&gt;
An IP address should be applied to FastEthernet3/0/0 for correct data routing.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;36&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers211.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers21 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="361" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers21_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 21" width="501" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. The Layer 2 switching design that is shown has been  implemented in a campus environment that is using Spanning Tree  Protocol. All inter-switch links that are shown are trunks. Whenever an  inter-switch link fails, the network takes nearly a minute to completely  converge. How can the convergence time be reduced?&lt;br /&gt;
Increase the capacity of the distribution and core trunk links to 10 Gb/s.&lt;br /&gt;
Add a trunk link that directly connects D1 and D2.&lt;br /&gt;
Use Layer 3 switching on the core switch.&lt;br /&gt;
&lt;span style="color: red;"&gt;Implement Rapid Spanning Tree Protocol.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;37&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers221.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers22 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="527" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers22_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 22" width="430" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. Each switch is configured to participate in STP for  VLANs 1, 10, 20, and 30. Which switch will become the root for VLAN 20?&lt;br /&gt;
A&lt;br /&gt;
B&lt;br /&gt;
C&lt;br /&gt;
&lt;span style="color: red;"&gt;D&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;38&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers231.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers23 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="404" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers23_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 23" width="580" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. Switches S2 and S3 are properly connected using an  ethernet cable. A network administrator has configured both switches  with VTP, but S3 is unable to propagate VLANs to S2. What could be the  reason for this?&lt;br /&gt;
The VTP configuration revision is different on both switches.&lt;br /&gt;
&lt;span style="color: red;"&gt;The VTP domains are different on both switches.&lt;/span&gt;&lt;br /&gt;
VTP pruning is disabled.&lt;br /&gt;
VTP v2 is disabled.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;39&lt;/strong&gt;. In a three-layer hierarchical network design, which distribution layer function delineates broadcast domains?&lt;br /&gt;
&lt;span style="color: red;"&gt;routing between VLANs&lt;/span&gt;&lt;br /&gt;
aggregating traffic flows&lt;br /&gt;
providing redundant links&lt;br /&gt;
reducing the network diameter&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;40&lt;/strong&gt;. Which parameter is used to uniquely identify one wireless network from another?&lt;br /&gt;
&lt;span style="color: red;"&gt;SSID&lt;/span&gt;&lt;br /&gt;
OFDM&lt;br /&gt;
WEP&lt;br /&gt;
DSSS&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;41&lt;/strong&gt;. What is one disadvantage that 802.11a wireless has compared to 802.11g?&lt;br /&gt;
Use of the 5GHz band requires much larger antennas.&lt;br /&gt;
The OFDM modulation technique results in a slower data rate.&lt;br /&gt;
There are fewer non-overlapping channels available to help reduce RF interference.&lt;br /&gt;
The use of higher frequencies means that signals are more likely to be obstructed.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;42&lt;/strong&gt;. Which three statements are correct concerning the default configuration of a new switch? (Choose three.)&lt;br /&gt;
&lt;span style="color: red;"&gt;It is configured in VTP server mode.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: red;"&gt;STP is automatically enabled.&lt;/span&gt;&lt;br /&gt;
The first VTY line is automatically configured to allow remote connections.&lt;br /&gt;
VLAN1 is configured with a management IP address.&lt;br /&gt;
&lt;span style="color: red;"&gt;All switch ports are assigned to VLAN1.&lt;/span&gt;&lt;br /&gt;
The enable password is configured as cisco.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;43&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers241.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers24 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="312" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers24_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 24" width="437" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer to the exhibit. How is port Gi1/1 on SWT-A functioning in the spanning-tree topology?&lt;br /&gt;
It is sending and receiving data frames.&lt;br /&gt;
&lt;span style="color: red;"&gt;It is receiving BPDUs, but not sending data frames.&lt;/span&gt;&lt;br /&gt;
It is participating in the election process by forwarding the BPDUs it receives.&lt;br /&gt;
It is receiving BPDUs and populating the MAC address table, but not sending data.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;44&lt;/strong&gt;. While configuring a new switch, a network  administrator configures the switch as an HTTP server. What benefits  does this configuration provide?&lt;br /&gt;
This allows the switch to host web pages for the network.&lt;br /&gt;
This allows remote VPN connections to the switch over the Internet.&lt;br /&gt;
This is required if a web server or web farm is attached to the switch.&lt;br /&gt;
&lt;span style="color: red;"&gt;This allows web-based configuration tools to be used with the switch.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;45&lt;/strong&gt;. Which statement describes the use of voice VLANs in Cisco IP telephony?&lt;br /&gt;
The voice VLAN carries both tagged and untagged traffic.&lt;br /&gt;
The voice VLAN carries untagged traffic having special QoS markings.&lt;br /&gt;
&lt;span style="color: red;"&gt;The voice VLAN must be configured on the switch port to which the IP phone attaches.&lt;/span&gt;&lt;br /&gt;
Data and voice frames are tagged with same VLAN ID between the IP phone and the switch when a voice VLAN is configured.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;46&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers251.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers25 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="266" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers25_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 25" width="434" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. If switch SW1 is configured with the four VLANs as  shown in the exhibit, how many physical interfaces are needed on router  R1 to configure inter-VLAN routing using subinterfaces?&lt;br /&gt;
zero&lt;br /&gt;
&lt;span style="color: red;"&gt;one&lt;/span&gt;&lt;br /&gt;
two&lt;br /&gt;
four&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;47&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers261.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers26 thumb1 CCNA 3 Final Exam V4.0 Answers" border="0" height="206" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers26_thumb1.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 26" width="300" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?&lt;br /&gt;
This entry can only be removed from the MAC address table by a network administrator.&lt;br /&gt;
When forwarding a frame to the device with address 0060.5c5b.cd23,  the switch does not have to perform a lookup to determine the final  destination port.&lt;br /&gt;
Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18.&lt;br /&gt;
&lt;span style="color: red;"&gt;The switch learned this MAC address from the source address in a frame received on Fa0/18.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;48&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers271.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers27 thumb CCNA 3 Final Exam V4.0 Answers" border="0" height="157" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers27_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 27" width="544" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. The VTP domain has been configured as shown in the  exhibit. The network technician accidentally configured the VTP server  as a VTP client. After the technician reloaded the switches, all users  in the VTP domain started to complain that they lost connectivity to the  users on the same VLANs that are connected to other switches. What  should be done in the future to prevent losing all VLAN configurations  in a VTP domain?&lt;br /&gt;
Configure all switches in VTP transparent mode and copy the VLAN configuration into flash.&lt;br /&gt;
Configure all switches in the network as VTP clients and copy the VLAN configuration into NVRAM.&lt;br /&gt;
&lt;span style="color: red;"&gt;Create a new domain and configure a second switch as a VTP server to take over in case of a primary VTP server failure.&lt;/span&gt;&lt;br /&gt;
In the same domain, configure a second switch as a VTP server to take over in case of a primary VTP server failure.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;49&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers28.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers28 thumb CCNA 3 Final Exam V4.0 Answers" border="0" height="498" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers28_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 28" width="328" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer to the exhibit. How does SW1 manage traffic coming from Host A?&lt;br /&gt;
SW1 drops the traffic because it is untagged.&lt;br /&gt;
&lt;span style="color: red;"&gt;SW1 leaves the traffic untagged and forwards it over the trunk.&lt;/span&gt;&lt;br /&gt;
SW1 tags the traffic with the lowest VLAN ID value and forwards it over the trunk link.&lt;br /&gt;
SW1 encapsulates the traffic with 802.1Q encapsulation and forwards it over the trunk link.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;50&lt;/strong&gt;. An administrator is troubleshooting a PC on the  network which is suffering from slow and intermittent connectivity. The  PC has a ping success rate to the default gateway of less than half the  ping attempts. Other PCs on the switch can consistently ping the default  gateway. The switch port is configured for auto duplex and the PC is  configured for full duplex. What will commonly cause this problem?&lt;br /&gt;
&lt;span style="color: red;"&gt;The PC is set to full duplex. The switch port  fails to autonegotiate the duplex setting and defaults to half duplex,  which causes a duplex mismatch.&lt;/span&gt;&lt;br /&gt;
The switch traffic is exceeding available frame buffers. The result is that frames are being dropped.&lt;br /&gt;
The PC and the default gateway have different bandwidth Ethernet ports.&lt;br /&gt;
The default gateway is not on the same switch that the PC is.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;51&lt;/strong&gt;.&lt;br /&gt;
&lt;a href="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers29.jpg"&gt;&lt;img alt="CCNA1FinalExamV4.0Answers29 thumb CCNA 3 Final Exam V4.0 Answers" border="0" height="252" src="http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers29_thumb.jpg" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline;" title="CCNA 1 Final Exam V4.0 Answers 29" width="504" /&gt;&lt;/a&gt;     &lt;br /&gt;
Refer  to the exhibit. A network administrator has segmented the network into  two VLANs and configured Router1 for inter-VLAN routing. A test of the  network, however, shows that hosts on each VLAN can only access local  resources and not resources on the other VLAN. What is the most likely  cause of this problem?&lt;br /&gt;
&lt;span style="color: red;"&gt;Switch port Fa0/1 is not trunking.&lt;/span&gt;&lt;br /&gt;
Router interface Fa0/0 is possibly down.&lt;br /&gt;
No routing protocol is configured on Router1.&lt;br /&gt;
One of the router subinterfaces is possibly down.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;52&lt;/strong&gt;.&lt;strong&gt; &lt;/strong&gt;What impact does the use of the &lt;b&gt;mdix auto&lt;/b&gt; configuration command have on an Ethernet interface on a switch?&lt;br /&gt;
automatically detects duplex settings&lt;br /&gt;
automatically detects interface speed&lt;br /&gt;
&lt;span style="color: red;"&gt;automatically detects copper cable type&lt;/span&gt;&lt;br /&gt;
automatically assigns the first detected MAC address to an interface&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item><item><title>Tips to maximize your knowledge</title><link>http://testccnastudy.blogspot.com/2012/03/tips-to-maximize-your-knowledge.html</link><category>Tips to maximize your knowledge</category><pubDate>Tue, 20 Mar 2012 11:44:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6163424516472512946.post-7833718182304864703</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt; &lt;div class="post-header"&gt;  &lt;/div&gt;&lt;div class="post-body entry-content" id="post-body-315480792551130571"&gt; &lt;div dir="ltr" style="text-align: left;"&gt; &lt;div class="separator" style="clear: both; text-align: center;"&gt; &lt;/div&gt;&lt;ol&gt;&lt;a href="http://3.bp.blogspot.com/-SqbBDjMOQk8/TvmTGDvFf2I/AAAAAAAAAP0/BmqhmBscoLY/s1600/tips-2.JPG" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://3.bp.blogspot.com/-SqbBDjMOQk8/TvmTGDvFf2I/AAAAAAAAAP0/BmqhmBscoLY/s1600/tips-2.JPG" /&gt;&lt;/a&gt;
&lt;li&gt;Knowledge about customers&lt;/li&gt;
&lt;li&gt;Knowledge about effective processes &amp;amp; good/best practice&lt;/li&gt;
&lt;li&gt;Knowledge about the competency level &amp;amp; capabilities of the workforce&lt;/li&gt;
&lt;/ol&gt;&lt;a href="http://3.bp.blogspot.com/-fjpv7KkU5JE/TvmShWov7JI/AAAAAAAAAPs/Q-O9IAHpEaY/s1600/tips+to+maximize+your+knowled.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="200" src="http://3.bp.blogspot.com/-fjpv7KkU5JE/TvmShWov7JI/AAAAAAAAAPs/Q-O9IAHpEaY/s200/tips+to+maximize+your+knowled.jpg" width="170" /&gt;&lt;/a&gt;Hence systems are designed around utilizing knowledge in these ways, depending on how it is most effective to an organization.&lt;br /&gt;
The main types of knowledge management systems are-&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;Creating intranet- an online network within the organization&lt;/li&gt;
&lt;li&gt;Creating data warehouses and other ways of storing knowledge from various sources&lt;/li&gt;
&lt;li&gt;Creating communities to share knowledge- online or otherwise&lt;/li&gt;
&lt;li&gt;Creating&amp;nbsp;decision support systems that compile data analysis and have other different methodologies of&amp;nbsp; decision making&lt;/li&gt;
&lt;li&gt;Creating internal expertise mapping by having directories of communities, yellow pages by experts etc&lt;/li&gt;
&lt;li&gt;Creating Groupware, which is essentially creating notes using mostly email to share knowledge&lt;/li&gt;
&lt;/ol&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;http://testccnastudy.blogspot.com/&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://3.bp.blogspot.com/-SqbBDjMOQk8/TvmTGDvFf2I/AAAAAAAAAP0/BmqhmBscoLY/s72-c/tips-2.JPG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (2012)</author></item></channel></rss>