Your SlideShare is downloading. ×
Ccna online exam
Ccna online exam
Ccna online exam
Ccna online exam
Ccna online exam
Ccna online exam
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Ccna online exam


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. CCNA 3 Chapter 4 V4.0 Answers 1. Which statement is true when VTP is configured on a switched network that incorporates VLANs? VTP is only compatible with the 802.1Q standard. VTP adds to the complexity of managing a switched network. VTP allows a switch to be configured to belong to more than one VTP domain. VTP dynamically communicates VLAN changes to all switches in the same VTP domain. 2. Refer to the exhibit. What information can be learned from the output provided? It verifies the configured VTP password. It verifies the VTP domain is configured to use VTP version 2. It verifies VTP advertisements are being exchanged. It verifies the VTP domain name is V1. Read more…
  • 2. CCNA 3 Chapter 3 V4.0 Answers 1. Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2 and assigned hosts on the IP addresses of the VLAN in the subnet range. Computer A can communicate with computer B, but not with computer C or computer D. What is the most likely cause of this problem? There is a native VLAN mismatch. The link between Switch1 and Switch2 is up but not trunked. The router is not properly configured for inter-VLAN routing. VLAN 50 is not allowed to entering the trunk between Switch1 and Switch2. 2.
  • 3. Refer to the exhibit. The exhibited configurations do not allow the switches to form a trunk. What is the most likely cause of this problem? Cisco switches only support the ISL trunking protocol. The trunk cannot be negotiated with both ends set to auto. By default, Switch1 will only allow VLAN 5 across the link. A common native VLAN should have been configured on the switches. Read more… CCNA 3 Chapter 2 V4.0 Answers
  • 4. 1. If a network administrator enters these commands on a switch, what will be the result? Switch1(config-line)# line console 0 Switch1(config-line)# password cisco Switch1(config-line)# login to secure the console port with the password "cisco" to deny access to the console port by specifying 0 lines are available to gain access to line configuration mode by supplying the required password to configure the privilege exec password that will be used for remote access 2. Which command line interface (CLI) mode allows users to configure switch parameters, such as the hostname and password? user EXEC mode privileged EXEC mode global configuration mode interface configuration mode Read more… CCNA 3 Chapter 1 V4.0 Answers 1. Which layer of the hierarchical network design model is refered to as the high-speed backbone of the internetwork, where high availability and redundancy are critical? access layer core layer data-link layer distribution layer network layer physical layer
  • 5. 2. Which two characteristics are associated with enterprise level switches? (Choose two.) low port density high forwarding rate high latency level support link aggregation predefined number of ports Read more… CCNA 2 Chapter 10 V4.0 Answers 1. What action does a link-state router take immediately upon receipt of an LSP from a neighboring router? floods the LSP to neighbors calculates the SPF algorithm runs the Bellman-Ford algorithm computes the best path to the destination network 2. Why is it difficult for routing loops to occur in networks that use link-state routing? Each router builds a simple view of the network based on hop count. Routers flood the network with LSAs to discover routing loops. Each router builds a complete and synchronized view of the network. Routers use hold-down timers to prevent routing loops. Read more… CCNA 2 Chapter 9 V4.0 Answers
  • 6. 1. What two actions will the EIGRP DUAL FSM take if a link to a network goes down? (Choose two.) put the route into passive mode query neighbors for a new route search routing table for a feasible successor run the SPF algorithm to find a new successor search topology table for a feasible successor 2. Host in the network illustrated is unable to ping host How must EIGRP be configured to enable connectivity between the two hosts? (Choose two.) R1(config-router)# network R1(config-router)# auto-summary R1(config-router)# no auto-summary R2(config-router)# no auto-summary R2(config-router)# auto-summary R2(config-router)# network Read more…