Vous êtes sur la page 1sur 6

CCNA 3 - Module 2

1. When a switch receives a frame and the source MAC address is not found in the
switching table, what action will be taken by the switch to process the incoming
frame?
!he switch will re"uest that the sending node resend the frame.
!he switch will issue an A#$ re"uest to confirm that the source e%ists.
!he switch will map the source MAC address to the port on which it was received.
!he switch ends an acknowledgement frame to the source MAC of this incoming
frame.
&. #efer to the e%hibit. 'ow many collision domains are depicted in the network?
1
&
(
)
*
+
,. #efer to the e%hibit. What action does -W1 take on a frame sent from $C.A to
$C.C if the MAC address table of -W1 is empty?
-W1 drops the frame.
-W1 floods the frame on all ports on -W1, e%cept port /a011.
-W1 floods the frame on all ports on the switch, e%cept /a01&, and /a011.
-W1 uses the C2$ protocol to synchroni3e the MAC tables on both switches and
then forwards the frame to all ports on -W&.
(. 4f a network administrator enters these commands in global configuration mode
on a switch, what will be the result?
-witch15configline67 line console 0
-witch15configline67 password cisco
-witch15configline67 login
to secure the console port with the password 8cisco8
to deny access to the console port by specifying 0 lines are available
to gain access to line configuration mode by supplying the re"uired password
to configure the privilege e%ec password that will be used for remote access
9. A network administrator uses the C:4 to enter a command that re"uires several
parameters. !he switch responds with 8; 4ncomplete command8. !he
administrator cannot remember the missing parameters. What can the
administrator do to get the parameter information?
append ? to the last parameter
append a space and then ? to the last parameter
use Ctrl$ to show a parameter list
use the !ab key to show which options are available
). #efer to the e%hibit. !he switch and the hub have default configurations, and the
switch has built its CAM table. Which of the hosts will capture a copy of the frame
when workstation A sends a unicast packet to workstation C?
workstation C
workstations < and C
workstations A, <, C, and the interfaces of the routerwork
stations <, C, 2, =, /, and interfaces of the router
*. Which two statements are true regarding switch port security? 5Choose two.6
!he three configurable violation modes all log violations via ->M$.
2ynamically learned secure MAC addresses are lost when the switch reboots.
!he three configurable violation modes all re"uire user intervention to reenable
ports.
After entering the sticky parameter, only MAC addresses subse"uently learned are
converted to secure MAC addresses.
4f fewer than the ma%imum number of MAC addresses for a port are configured
statically, dynamically learned addresses are added to CAM until the ma%imum
number is reached.
+. #efer to the e%hibit. !he e%hibit shows partial output of the show runningconfig
command. !he enable password on this switch is 8cisco.8 What can be determined
from the output shown?
!he enable password is encrypted by default.
An M29 hashing algorithm was used on all encrypted passwords.
Any configured line mode passwords will be encrypted in this configuration.
!his line represents most secure privileged =?=C mode password possible.
@. What are two ways to make a switch less vulnerable to attacks like MAC address
flooding, C2$ attacks, and !elnet attacks? 5Choose two.6
=nable C2$ on the switch.
Change passwords regularly.
!urn off unnecessary services.
=nable the '!!$ server on the switch.
Ase the enable password rather than the enable secret password.
10. #efer to the e%hibit. !he switch and workstation are administratively
configured for fullduple% operation. Which statement accurately reflects the
operation of this link?
>o collisions will occur on this link.
Bnly one of the devices can transmit at a time.
!he switch will have priority for transmitting data.
!he devices will default back to half duple% if e%cessive collisions occur.
11. Where is the startup configuration stored?
2#AM
>C#AM
#BM
startupconfig.te%t
1&. #efer to the e%hibit. What happens when 'ost 1 attempts to send data?
/rames from 'ost 1 cause the interface to shut down.
/rames from 'ost 1 are dropped and no log message is sent.
/rames from 'ost 1 create a MAC address entry in the runningconfig.
/rames from 'ost 1 will remove all MAC address entries in the address table.
1,. Which statement is true about the command banner login 8Authori3ed
personnel Bnly8 issued on a switch?
!he command is entered in privileged =?=C mode.
!he command will cause the message Authori3ed personnel Bnly to display before
a user logs in.
!he command will generate the error message ; Ambiguous commandD 8banner
motd8 E to be displayed.
!he command will cause the message =nd with the character F;E to be displayed
after the command is entered into the switch.
1(. #efer to the e%hibit. !he network administratorGs attempts to connect to -witch1
via -ecure -hell are failing. What is most likely the problem?
incorrect vty lines configured
incompatible -ecure -hell version
incorrect default gateway address
vty lines that are configured to allow only !elnet
19. What happens when the transport input ssh command is entered on the switch
vty lines?
!he --' client on the switch is enabled.
Communication between the switch and remote users is encrypted.
A username1password combination is no longer needed to establish a secure
remote connection to the switch.
!he switch re"uires remote connections via proprietary client software.
1). Which two statements about :ayer & =thernet switches are true? 5Choose two.6
:ayer & switches prevent broadcasts.
:ayer & switches have multiple collision domains.
:ayer & switches route traffic between different networks.
:ayer & switches decrease the number of broadcast domains.
:ayer & switches can send traffic based on the destination MAC address.
1*. #efer to the e%hibit. Which hosts will receive a broadcast frame sent from 'ost
A?
hosts A and <
hosts < and C
hosts 2 and =
hosts A, <, and C
hosts <, C, 2, and =
hosts A, <, C, 2, =, and /
1+. Which command line interface 5C:46 mode allows users to configure switch
parameters, such as the hostname and password?
user =?=C mode
privileged =?=C mode
global configuration mode
interface configuration mode
1@. Which two statements are true about =?=C mode passwords? 5Choose two.6
!he enable secret password command stores the configured password in plain
te%t.
!he enable secret password command provides better security than the enable
password.
!he enable password and enable secret password protect access to privileged
=?=C mode.
!he service passwordencryption command is re"uired to encrypt the enable
secret password.
<est practices re"uire both the enable password and enable secret password to be
configured and used simultaneously.
&0. When a collision occurs in a network using C-MA1C2, how do hosts with data
to transmit respond after the backoff period has e%pired?
!he hosts return to a listenbeforetransmit mode.
!he hosts creating the collision have priority to send data.
!he hosts creating the collision retransmit the last 1) frames.
!he hosts e%tend their delay period to allow for rapid transmission.

Vous aimerez peut-être aussi