Partial CCNA3
Partial CCNA3
Which layer of the hierarchical network design model is refered to as the high-speed backbone of the
internetwork, where high availability and redundancy are critical?
access layer
core layer
data-link layer
distribution layer
network layer
physical layer
2-C1. Which hierarchical design model layer controls the flow of network traffic using policies and delineates
broadcast domains by performing routing functions between virtual LANs (VLANs)?
application
access
distribution
network
core
3-C1. Which layer of the hierarchical design model provides a means of connecting devices to the network and
controlling which devices are allowed to communicate on the network?
application
access
distribution
network
core
4-C2. A network administrator uses the CLI to enter a command that requires several parameters. The switch
responds with "% Incomplete command". The administrator cannot remember the missing parameters. What
can the administrator do to get the parameter information?
5-C2. When a switch receives a frame and the source MAC address is not found in the switching table, what
action will be taken by the switch to process the incoming frame?
The switch will request that the sending node resend the frame.
The switch will issue an ARP request to confirm that the source exists.
The switch will map the source MAC address to the port on which it was received.
The switch ends an acknowledgement frame to the source MAC of this incoming frame.
6-C2. Which two statements about Layer 2 Ethernet switches are true? (Choose two.)
Layer 2 switches can send traffic based on the destination MAC address.
7-C2. Which two statements are true about EXEC mode passwords? (Choose two.)
The enable secret password command stores the configured password in plain text.
The enable secret password command provides better security than the enable password.
The enable password and enable secret password protect access to privileged EXEC mode.
The service password-encryption command is required to encrypt the enable secret password.
Best practices require both the enable password and enable secret password to be configured and used
simultaneously.
8-C2. Which two statements are true regarding switch port security? (Choose two.)
The three configurable violation modes all log violations via SNMP.
Dynamically learned secure MAC addresses are lost when the switch reboots.
The three configurable violation modes all require user intervention to re-enable ports.
After entering the sticky parameter, only MAC addresses subsequently learned are converted to secure MAC
addresses.
If fewer than the maximum number of MAC addresses for a port are configured statically, dynamically learned
addresses are added to CAM until the maximum number is reached.
DRAM
NVRAM
ROM
startup-config.text
10-C2.
Refer to the exhibit. What happens when Host 1 attempts to send data?
Frames from Host 1 will remove all MAC address entries in the address table.
Hosts on different VLANs examine VLAN ID in the frame tagging to determine if the frame for their network.
12-C3. Which two statements describe the benefits of VLANs? (Choose two.)
VLANs improve network performance by regulating flow control and window size.
VLANs enable switches to route packets to remote networks via VLAN ID filtering.
VLANs reduce network cost by reducing the number of physical ports required on switches.
VLANs improve network security by isolating users that have access to sensitive data and applications.
VLANs divide a network into smaller logical networks, resulting in lower susceptibility to broadcast storms.
13-C4. What does a client mode switch in a VTP management domain do when it receives a summary
advertisement with a revision number higher than its current revision number?
14-C4.
Refer to the exhibit. Switches SW1 and SW2 are interconnected via a trunk link but failed to exchange VLAN
information. The network administrator issued the show vtp status command to troubleshoot the problem. On
the basis of the provided command output, what could be done to correct the problem?
The switches must be configured with the same VTP domain name.
Both switches must be configured with the same VTP revision number.
15-C4. Which two statements describe VTP transparent mode operation? (Choose two.)
Transparent mode switches pass any VLAN management information that they receive to other switches.
Transparent mode switches can adopt VLAN management changes that are received from other switches.
Transparent mode switches originate updates about the status of their VLANS and inform other switches about
that status.
16-C4.
Refer to the exhibit. The switches in the exhibit are connected with trunks within the same VTP management
domain. Each switch is labeled with its VTP mode. A new VLAN is added to Switch3. This VLAN does not
show up on the other switches. What is the reason for this?
VLANs created on transparent mode switches are not included in VTP advertisements.
Server mode switches neither listen to nor forward VTP messages from transparent mode switches.
17-C4. Which three VTP parameters must be identical on all switches to participate in the same VTP domain?
(Choose three.)
revision number
domain name
pruning
mode
domain password
version number