Thursday, 9 February 2012

My CCNA Questions 36 out of 48

I didnt add any answers. THe dumps i was using had a lot incorrectanswers. But you can get correct answers from dumps and just want to share my questions before i sleep. I have to do at least this for you guyz.. . Please make sure do all simulations and questions in before you do exams and i will keep post all new questions soon.

In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched
A. after broken links are re-established
B. in an improperly implemented redundant topology
C. when upper-layer protocols require high reliability
D. during high traffic periods
E. when a dual ring topology is in use

Which layer in the OSI reference model is responsible for determining the availability of the receiving
program and checking to see if enough resources exist for that communication?
A. transport
B. network
C. presentation
D. session
E. application

Refer to the diagram.

 All hosts have connectivity with one another. Which statements describe the
addressing scheme that is in use in the network? (Choose three.)
A. The subnet mask in use is
B. The subnet mask in use is
C. The IP address can be assigned to hosts in VLAN1
D. The IP address can be assigned to hosts in VLAN1
E. The LAN interface of the router is configured with one IP address.
F. The LAN interface of the router is configured with multiple IP addresses

Refer to the exhibit.

 Why has this switch not been elected the root bridge for VLAN1?
A. It has more than one interface that is connected to the root network segment.
B. It is running RSTP while the elected root bridge is running 802.1d spanning tree.
C. It has a higher MAC address than the elected root bridge.
D. It has a higher bridge ID than the elected root bridge.

Which two devices can interfere with the operation of a wireless network because they operate on similar
frequencies? (Choose two.)
A. copier
B. microwave oven
C. toaster
D. cordless phone
E. IP phone
F. AM radio

In an Ethernet network, under what two scenarios can devices transmit? (Choose two.)
A. when they receive a special token
B. when there is a carrier
C. when they detect no other devices are sending
D. when the medium is idle
E. when the server grants access

Which spread spectrum technology does the 802.11b standard define for operation?

Which statement is correct about the internetwork shown in the diagram?

A. Switch2 is the root bridge.
B. Spanning Tree is not running.
C. HostD and Server1 are in the same subnet.
D. No collision can occur in traffic between Host B and Host C.
E. If Fa0/0 is down on Router1, HostA cannot access Server1.
F. If Fa0/1 is down on Switch3, HostC cannot access Server 2.

Which type of cable is used to connect the COM port of a host to the COM port of a router or switch?
A. crossover
B. straight-through
C. rolled
D. shielded twisted-pair

A Catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased?
(Choose three.)
A. Erase flash.
B. Restart the switch.
C. Delete the VLAN database.
D. Erase the running configuration.
E. Erase the startup configuration.
F. Modify the configuration register.

The network security policy requires that only one host be permitted to attach dynamically to each switch
interface. If that policy is violated, the interface should shut down. Which two commands must the network
administrator configure on the 2950 Catalyst switch to meet this policy? (Choose two.)
A. Switch1(config-if)# switchport port-security maximum 1
B. Switch1(config)# mac-address-table secure
C. Switch1(config)# access-list 10 permit ip host
D. Switch1(config-if)# switchport port-security violation shutdown
E. Switch1(config-if)# ip access-group 10

What are the possible trunking modes for a switch port? (Choose three.)
A. transparent
B. auto
C. on
D. desirable
E. client
F. forwarding

What is the effect of using the service password-encryption command?
A. nly passwords configured after the command has been entered will be encrypted.
B. Only the enable password will be encrypted.
C. Only the enable secret password will be encrypted
D. It will encrypt the secret password and remove the enable secret password from the configuration.
E. It will encrypt all current and future passwords.

Which of the following describes the roles of devices in a WAN? (Choose three.)
A. A CSU/DSU terminates a digital local loop.
B. A modem terminates a digital local loop.
C. A CSU/DSU terminates an analog local loop.
D. A modem terminates an analog local loop.
E. A router is commonly considered a DTE device.
F. A router is commonly considered a DCE device.

Match the items on the left with appropriate OSI layer on the right. (Not all options are used.)


Assuming default setting,how can you erase the VTP database of VLANs on a CISCO IOS switch running
in VTP server mode?
A. Enable VTP pruning
B. From privileged mode, erase the startup configuration file, then reload.
C. From privileged mode, erase the vlan date file, then reload.
D. Cycle the switch power.

Which statement describes the process of dynamically assigning IP addresses by the DHCP server?
A. Addresses are allocated after a negotiation between the server and the host to determine the length of
the agreement.
B. Addresses are permanently assigned so that the hosts uses the same address at all times.
C. Addresses are assigned for a fixed period of time, at the end of the period, a new request for an
address must be made.
D. Addresses are leased to hosts, which periodically contact the DHCP server to renew the lease.

Refer to the exhibit.
 If number 2 is selected from the setup script, what happens when the user runs setup
from a privileged prompt?

A. Setup is additive and any changes will be added to the config script.
B. Setup effectively starts the configuration over as if the router was booted for the first time.
C. Setup will not run if an enable secret password exists on the router.
D. Setup will not run, because it is only viable when no configuration exists on the router.
Answer: A

Refer to the exhibit.

What is the effect of the configuration that is shown?
A. It tells the router or switch to try establish an SSH connection first and if that fail to use telnet.
B. It configures a cisco network device to use the SSH protocol on incoming communications via the
virtual terminal ports.
C. It allows seven failed login attempts before the VTY lines are temporarily shutdown.
D. It configures the virtual terminal lines with the password 030752180500.
E. It configures SSH globally for all logins.
Answer: B

Refer to the exhibit.

 The network manager is evaluating the efficiency of the current network design.

RIPv2 is enabled on all Layer 3 devices in the network. What network devices participate in passing traffic
from the PC at to File Server at in the older that they will forward traffic from source to
A. Switch1, Switch2
B. Switch1, Switch2, Switch2, Switch2
C. Switch1, Router1, Switch1, Switch2
D. Switch1, Router1, Router2, Switch2

Answer: D(possible)

What are three basic parameters to configure on a wireless access point? (Choose three.)
E. RF channel
F. authentication method
Answer: AEF

All WAN links inside the ABC University network use PPP with CHAP for authentication security. Which
command will display the CHAP authentication process as it occur between two routers in the network?
A. show chap authentication
B. show interface serial0
C. debug ppp authentication
D. debug chap authentication
E. show ppp authentication chap
Answer: C

Refer to the exhibit.

The network administrator must establish a route by which London workstations can
forward traffic to the Manchester workstations. What is the simplest way to accomplish this?
A. Configure a dynamic routing protocol on London to advertise all routes to Manchester.
B. Configure a dynamic routing protocol on London to advertise summarized routes to Manchester.
C. Configure a dynamic routing protocol on Manchester to advertise a default route to the London router.
D. Configure a static default route on London with a next hop of
E. Configure a static route on London to direct all traffic destined for to
F. Configure Manchester to advertise a static default route to London.
Answer: E

Refer to the exhibit. After HostA pings HostB, which entry will be in the ARP cache of HostA to support this transmission?

Which three statements about RSTP are true?
A. RSTP significantly reduces topology reconverging time after link failure.
B. RSTP expands the STP port roles by adding the alternate and backup roles.
C. RSTP port states are blocking, discarding, learning and forwarding.
D. RSTP also uses the STP proposal-agreement sequence.
E. RSTP use the same timer-based process as STP on point-to-point links.
F. RSTP provides a faster transition to the forwarding state on point-to-point links than STP does

Which statement about RIPng is true?
A. RIPng allows for routes with up to 30 hops.
B. RIPng is enabled on each interface separately.
C. RIPng uses broadcasts to exchange routes.
D. There can be only one RIPng process per router

The internetwork infrastructure of company XYZ consists of a single OSPF area as shown in the graphic.

There is concern that a lack of router resources is impeding internetwork performance. As part of
examining the router resources, the OSPF DRs need to be known. All the router OSPF priorities are at the
default and the router IDs are shown with each router. Which routers are likely to have been elected as
DR? (Choose two.)
A. Corp-1
B. Corp-2
C. Corp-3
D. Corp-4
E. Branch-1
F. Branch-2
Answer: DF

Refer to the exhibit.

 A junior network administrator was given the task of configuring port security on
SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is
detected, the port is to drop frames from this device. The administrator configured the interface and testedit with successful pings from PC_A to RouterA, and then observes the output from these two show commands.

Which two of these changes are necessary for SwitchA to meet the requirements? (Choose two.)
A. Port security needs to be globally enabled.
B. Port security needs to be enabled on the interface.
C. Port security needs to be configured to shut down the interface in the event of a violation.
D. Port security needs to be configured to allow only one learned MAC address.
E. Port security interface counters need to be cleared before using the show command.
F. The port security configuration needs to be saved to NVRAM before it can become active.

What does the frame-relay interface-dlci command configure?
A. remote DLCI on the main interface
B. local DLCI on the main interface
C. local DLCI on the subinterface
D. remote DLCI on the subinterface

A network administrator needs to allow only one Telnet connection to a router. For anyone viewing the
confguration and issuing the show run command, the password for Telnet access should be encrypted.
Which set of commands will accomplish this task?
A. service password-encryption
access-list 1 permit
line vty 0 4
password cisco
access-class 1
B. enable password secret
line vty 0
password cisco
C. service password-encryption
line vty 1
password cisco
D. service password-encryption
line vty 0 4
password cisco
Answer: C

Which command shows your active Telnet connections?
A. show sessions
B. show cdp neighbors
C. show users
D. show queue

Which command enhances the 802.1D convergence time on ports that are connected to hosts?
A. spanning-tree backbonefast
B. spanning-tree uplinkfast
C. spanning-tree portfast
D. spanning-tree cost512
Answer: C


This task requires you to use the CLI of Sw-AC3 to answer five multiple-choice questions. This does not require any configuration.
To answer the multiple-choice questions, click on the numbered boxes in the right panel.

There are five multiple-choice questions with this task. Be sure to answer all five questions before leaving this item.
Click here to get  9tut Tutorial for this simulation

After adding R3 router, no routing updates are being exchanged between R3 and the new location. All other inter connectivity and Internet access for the existing locations of the company are working properly.
The task is to identify the fault(s) and correct the router configuration to provide full connectivity between the routers.
Access to the router CLI can be gained by clicking on the appropriate host. All passwords on all routers are cisco.
IP addresses are listed in the chart below.