0% found this document useful (0 votes)
77 views6 pages

Partial CCNA3

The core layer is referred to as the high-speed backbone of the internetwork, where high availability and redundancy are critical. The distribution layer controls the flow of network traffic using policies and delineates broadcast domains by performing routing functions between VLANs. The access layer provides a means of connecting devices to the network and controlling which devices are allowed to communicate on the network.

Uploaded by

Caras Adina
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views6 pages

Partial CCNA3

The core layer is referred to as the high-speed backbone of the internetwork, where high availability and redundancy are critical. The distribution layer controls the flow of network traffic using policies and delineates broadcast domains by performing routing functions between VLANs. The access layer provides a means of connecting devices to the network and controlling which devices are allowed to communicate on the network.

Uploaded by

Caras Adina
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 6

1-C1.

Which layer of the hierarchical network design model is refered to as the high-speed backbone of the
internetwork, where high availability and redundancy are critical?

access layer

core layer

data-link layer

distribution layer

network layer

physical layer

2-C1. Which hierarchical design model layer controls the flow of network traffic using policies and delineates
broadcast domains by performing routing functions between virtual LANs (VLANs)?

application

access

distribution

network

core

3-C1. Which layer of the hierarchical design model provides a means of connecting devices to the network and
controlling which devices are allowed to communicate on the network?

application

access

distribution

network

core

4-C2. A network administrator uses the CLI to enter a command that requires several parameters. The switch
responds with "% Incomplete command". The administrator cannot remember the missing parameters. What
can the administrator do to get the parameter information?

append ? to the last parameter

append a space and then ? to the last parameter

use Ctrl-P to show a parameter list


use the Tab key to show which options are available

5-C2. When a switch receives a frame and the source MAC address is not found in the switching table, what
action will be taken by the switch to process the incoming frame?

The switch will request that the sending node resend the frame.

The switch will issue an ARP request to confirm that the source exists.

The switch will map the source MAC address to the port on which it was received.

The switch ends an acknowledgement frame to the source MAC of this incoming frame.

6-C2. Which two statements about Layer 2 Ethernet switches are true? (Choose two.)

Layer 2 switches prevent broadcasts.

Layer 2 switches have multiple collision domains.

Layer 2 switches route traffic between different networks.

Layer 2 switches decrease the number of broadcast domains.

Layer 2 switches can send traffic based on the destination MAC address.

7-C2. Which two statements are true about EXEC mode passwords? (Choose two.)

The enable secret password command stores the configured password in plain text.

The enable secret password command provides better security than the enable password.

The enable password and enable secret password protect access to privileged EXEC mode.

The service password-encryption command is required to encrypt the enable secret password.

Best practices require both the enable password and enable secret password to be configured and used
simultaneously.

8-C2. Which two statements are true regarding switch port security? (Choose two.)

The three configurable violation modes all log violations via SNMP.

Dynamically learned secure MAC addresses are lost when the switch reboots.
The three configurable violation modes all require user intervention to re-enable ports.

After entering the sticky parameter, only MAC addresses subsequently learned are converted to secure MAC
addresses.

If fewer than the maximum number of MAC addresses for a port are configured statically, dynamically learned
addresses are added to CAM until the maximum number is reached.

9-C2. Where is the startup configuration stored?

DRAM

NVRAM

ROM

startup-config.text

10-C2.

Refer to the exhibit. What happens when Host 1 attempts to send data?

Frames from Host 1 cause the interface to shut down.

Frames from Host 1 are dropped and no log message is sent.

Frames from Host 1 create a MAC address entry in the running-config.

Frames from Host 1 will remove all MAC address entries in the address table.

11-C3. What statements describe how hosts on VLANs communicate?

Hosts on different VLANs use VTP to negotiate a trunk.

Hosts on different VLANs communicate through routers.


Hosts on different VLANs should be in the same IP network.

Hosts on different VLANs examine VLAN ID in the frame tagging to determine if the frame for their network.

12-C3. Which two statements describe the benefits of VLANs? (Choose two.)

VLANs improve network performance by regulating flow control and window size.

VLANs enable switches to route packets to remote networks via VLAN ID filtering.

VLANs reduce network cost by reducing the number of physical ports required on switches.

VLANs improve network security by isolating users that have access to sensitive data and applications.

VLANs divide a network into smaller logical networks, resulting in lower susceptibility to broadcast storms.

13-C4. What does a client mode switch in a VTP management domain do when it receives a summary
advertisement with a revision number higher than its current revision number?

It suspends forwarding until a subset advertisement update arrives.

It issues an advertisement request for new VLAN information.

It increments the revision number and forwards it to other switches.

It deletes the VLANs not included in the summary advertisement.

It issues summary advertisements to advise other switches of status changes.

14-C4.

Refer to the exhibit. Switches SW1 and SW2 are interconnected via a trunk link but failed to exchange VLAN
information. The network administrator issued the show vtp status command to troubleshoot the problem. On
the basis of the provided command output, what could be done to correct the problem?

Switch SW2 must be configured as a VTP client.

The switches must be interconnected via an access link.

The switches must be configured with the same VTP domain name.

Both switches must be configured with the same VTP revision number.

15-C4. Which two statements describe VTP transparent mode operation? (Choose two.)

Transparent mode switches can create VLAN management information.

Transparent mode switches can add VLANs of local significance only.

Transparent mode switches pass any VLAN management information that they receive to other switches.

Transparent mode switches can adopt VLAN management changes that are received from other switches.

Transparent mode switches originate updates about the status of their VLANS and inform other switches about
that status.

16-C4.

Refer to the exhibit. The switches in the exhibit are connected with trunks within the same VTP management
domain. Each switch is labeled with its VTP mode. A new VLAN is added to Switch3. This VLAN does not
show up on the other switches. What is the reason for this?

VLANs cannot be created on transparent mode switches.

Transparent mode switches do not forward VTP advertisements.

VLANs created on transparent mode switches are not included in VTP advertisements.

Server mode switches neither listen to nor forward VTP messages from transparent mode switches.
17-C4. Which three VTP parameters must be identical on all switches to participate in the same VTP domain?
(Choose three.)

revision number

domain name

pruning

mode

domain password

version number

You might also like