search for ccna answer

Wednesday, May 20, 2009

MAY 2009 CCNA Exploration 4.0 ESwitching Chapter 7 - LAN Switching and Wireless

updated: MAY 2009 by bluefiz 100%
1    
What will a wireless client transmit to discover the available WLAN networks?
       beacon
       password
       probe request
       association request

2    
In a WLAN network, why should wireless access points be implemented with each access point using a different channel?
       to keep users segregated on separate subnets
       to control the amount of bandwidth that is utilized
       to keep signals from interfering with each other
       to keep traffic secure

3    
Which wireless technology standard provides the most compatibility with older wireless standards, but has greater performance?
       802.11a
       802.11b
       802.11g
       802.11n

4    
What wireless security feature allows a network administrator to configure an access point with wireless NIC unique identifiers so that only these NICs can connect to the wireless network?
       authentication
       SSID broadcasting
       MAC address filtering
       EAP (Extensible Authentication Protocol)
       Radius (Remote Authentication Dial-In User Service)

5    
Which function is provided by a wireless access point?
       dynamically assigns an IP address to the host
       provides local DHCP services
       converts data from 802.11 to 802.3 frame encapsulation
       provides a gateway for connecting to other networks

6    
Wireless users on a network complain about poor performance within a small area of a room. Moving away from this area in any direction improves performance dramatically. What is the first step in designing a solution to this problem?
       This might be RF channel overlap, so the technician should verify the channels in use on each wireless access point and change to non-overlapping channels.
       The RF power settings might be set too low on the wireless access points servicing the room. Increase the RF output power on all wireless access points.
       Install a new wireless access point in this center area to provide coverage.
       Verify that the wireless access points have sufficient in-line power and connectivity to the wired network.

7    
Which two conditions have favored adoption of 802.11g over 802.11a? (Choose two.)
       802.11a suffers from a shorter range than 802.11g.
       The 2.4 GHz frequency band is not as crowded as the 5 GHz band.
       802.11a is more susceptible to RF interference from common commercial items.
       802.11a uses a more expensive modulation technique than 802.11g.
       802.11g is backward compatible with 802.11b, but 802.11a is not.

8    
What procedure can prevent man-in-the-middle attacks?
       Force all devices on a WLAN to authenticate and monitor for any unknown devices.
       Enable access points to send an SSID to each device wanting to use the network.
       Configure MAC filtering on all authorized access points.
       Disable SSID broadcasts.

9    
Which access method does a wireless access point use to allow for multiple user connectivity and distributed access?
       CSMA/CD
       token passing
       CSMA/CA
       polling

10   
Which two statements are true regarding wireless security? (Choose two.)
       MAC address filtering prevents the contents of wireless frames from being viewable.
       Providing a wireless client with the network key allows an available network to be visible.
       Disabling an access point from broadcasting the SSID prevents the access point from being discovered.
       Default SSIDs on specific manufacturer APs are generally known and may permit hostile wireless connections.
       Manually adding a network and setting the known SSID on a wireless client makes the network visible even if the SSID is not being broadcast

11   
Which three devices do many wireless routers incorporate? (Choose three.)
       gateway for connecting to other network infrastructures
       built-in Ethernet switch
       network management station
       VTP server
       wireless access point
       VPN concentrator

12   
What does a wireless access point use to allow WLAN clients to learn which networks are available in a given area?
       association response
       beacon
       key
       probe request

13   
Which two statements concerning network security are accurate? (Choose two.)
       802.11i uses 3DES for encryption.
       Open authentication uses no client or AP verification.
       The 802.11i protocol is functionally identical to WPA.
       802.11i incorporates a RADIUS server for enterprise authentication.
       A wireless client first associates with an AP and then authenticates for network access.

14   
Which two statements characterize wireless network security? (Choose two.)
       A rogue access point represents a security risk for the local network.
       Wireless networks offer the same security features as wired networks.
       Using encryption prevents unauthorized clients from associating with an access point.
       An attacker needs physical access to at least one network device to launch an attack.
       With SSID broadcast disabled, an attacker must sniff the SSID before being able to connect.

15   
Refer to the exhibit. When configuring the wireless access point, which setting does the network administrator use to configure the unique identifier that client devices use to distinguish this wireless network from others?
       Network Mode
       Network Name (SSID)
       Radio Band
       Wide Channel
       Standard Channel

16   
What purpose does authentication serve in a WLAN?
       converts clear text data before transmission
       indicates which channel the data should flow on
       determines that the correct host is utilizing the network
       allows the host to choose which channel to use

17   
Why is security so important in wireless networks?
       Wireless networks are typically slower than wired networks.
       Televisions and other devices can interfere with wireless signals.
       Wireless networks broadcast data over a medium that allows easy access.
       Environmental factors such as thunderstorms can affect wireless networks.

18   
Which major problem does CSMA/CA overcome in wireless networks?
       bandwidth saturation
       privacy concerns
       media contention
       device interoperability

19   
What occurs when a rogue access point is added to a WLAN?
       Authorized access points can transmit excess traffic to rogue access points to help alleviate congestion.
       Unauthorized users can gain access to internal servers, thus causing a security hole.
       All traffic that uses the same channel as the rogue access point will be encrypted.
       All traffic that uses the same channel as the rogue access point will be required to authenticate.

20   
Which network design process identifies where to place access points?
       site survey
       risk assessment
       scalability design
       network protocol analysis

21   
Which installation method will allow connectivity for a new wireless network?
       set up WEP on the access point only
       set up open access on both the access point and each device connected to it
       set up full encryption on the access point while leaving each device connected to the network open
       set up full encryption on each device of the WLAN while leaving the access point settings open
updated: MAY 2009 by bluefiz 100%
For image version, please send your request to lovestoryhouse@gmail.com. thx.
Disclaimer: This questionnaires are just for revision purpose!

MAY 2009 CCNA Exploration 4.0 ESwitching Chapter 6 - LAN Switching and Wireless


 updated: MAY 2009 by bluefiz 100%
1    
Refer to the exhibit. PC1 has attempted to ping PC2 but has been unsuccessful. What could account for this failure?
       PC1 and R1 interface F0/0.1 are on different subnets.
       The encapsulation is missing on the R1 interface F0/0.
       An IP address has not been assigned to the R1 physical interface.
       The encapsulation command on the R1 F0/0.3 interface is incorrect.

2    
Which three elements must be used when configuring a router interface for VLAN trunking? (Choose three.)
       one subinterface per VLAN
       one physical interface for each subinterface
       one IP network or subnetwork for each subinterface
       one trunked link per VLAN
       a management domain for each subinterface
       a compatible trunking protocol encapsulation for each subinterface

3    
Which two statements are true about the interface fa0/0.10 command? (Choose two.)
       The command applies VLAN 10 to router interface fa0/0.
       The command is used in the configuration of router-on-a-stick inter-VLAN routing.
       The command configures a subinterface.
       The command configures interface fa0/0 as a trunk link.
       Because the IP address is applied to the physical interface, the command does not include an IP address.

4    
Refer to the exhibit. The commands for a router to connect to a trunked uplink are shown in the exhibit. A packet is received from IP address 192.168.1.54. The packet destination address is 192.168.1.120. What will the router do with this packet?
       The router will forward the packet out interface FastEthernet 0/1.1 tagged for VLAN 10.
       The router will forward the packet out interface FastEthernet 0/1.2 tagged for VLAN 60.
       The router will forward the packet out interface FastEthernet 0/1.3 tagged for VLAN 120.
       The router will not process the packet since the source and destination are on the same subnet.
       The router will drop the packet since no network that includes the source address is attached to the router.

5    
Refer to the exhibit. Which three statements describe the network design shown in the exhibit? (Choose three.)
       This design will not scale easily.
       The router merges the VLANs into a single broadcast domain.
       This design uses more switch and router ports than are necessary.
       This design exceeds the maximum number of VLANs that can be attached to a switch.
       This design requires the use of the ISL or 802.1q protocol on the links between the switch and the router.
       If the physical interfaces between the switch and router are operational, the devices on the different VLANs can communicate through the router.

6    
Refer to the exhibit. Which two statements are true about the operation of the subinterfaces? (Choose two.)
       Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.
       Incoming traffic with VLAN ID 0 is processed by interface fa0/0.
       Subinterfaces use unique MAC addresses by adding the 802.1Q VLAN ID to the hardware address.
       Traffic inbound on this router is processed by different subinterfaces, depending on the VLAN from which the traffic originated.
       Reliability of both subinterfaces is poor because ARP is timing out.
       Both subinterfaces remain up with line protocol up, even if fa0/0 line protocol is down.

7    
What is important to consider while configuring the subinterfaces of a router when implementing inter-VLAN routing?
       The physical interface must have an IP address configured.
       The subinterface numbers must match the VLAN ID number.
       The no shutdown command must be given on each subinterface.
       The IP address of each subinterface must be the default gateway address for each VLAN subnet.

8    
Which statement is true about ARP when inter-VLAN routing is being used on the network?
       When router-on-a-stick inter-VLAN routing is in use, each subinterface has a separate MAC address to send in response to ARP requests.
       When VLANs are in use, the switch responds to ARP requests with the MAC address of the port to which the PC is connected.
       When router-on-a-stick inter-VLAN routing is in use, the router returns the MAC address of the physical interface in response to ARP requests.
       When traditional inter-VLAN routing is in use, devices on all VLANs use the same physical router interface as their source of proxy ARP responses.

9    
What distinguishes traditional routing from router-on-a-stick?
       Traditional routing is only able to use a single switch interface. Router-on-a-stick can use multiple switch interfaces.
       Traditional routing requires a routing protocol. Router-on-a-stick only needs to route directly connected networks.
       Traditional routing uses one port per logical network. Router-on-a-stick uses subinterfaces to connect multiple logical networks to a single router port.
       Traditional routing uses multiple paths to the router and therefore requires STP. Router-on-a-stick does not provide multiple connections and therefore eliminates the need for STP.

10   
What two statements are true regarding the use of subinterfaces for inter-VLAN routing? (Choose two.)
       subinterfaces have no contention for bandwidth
       more switch ports required than in traditional inter-VLAN routing
       fewer router ports required than in traditional inter-VLAN routing
       simpler Layer 3 troubleshooting than with traditional inter-VLAN routing
       less complex physical connection than in traditional inter-VLAN routing

11   
A router has two FastEthernet interfaces and needs to connect to four VLANs in the local network. How can this be accomplished using the fewest number of physical interfaces without unnecessarily decreasing network performance?
       Implement a router-on-a-stick configuration.
       Add a second router to handle the inter-VLAN traffic.
       Use a hub to connect the four VLANS with a FastEthernet interface on the router.
       Interconnect the VLANs via the two additional FastEthernet interfaces.

12   
Refer to the exhibit. R1 is routing between networks 192.168.10.0/28 and 192.168.30.0/28. PC1 can ping R1 interface F0/1, but cannot ping PC3. What is causing this failure?
       PC1 and PC3 are not in the same VLAN.
       The PC3 network address configuration is incorrect.
       The S1 interface F0/11 should be assigned to VLAN30.
       The F0/0 and F0/1 interfaces on R1 must be configured as trunks.

13   
In which situation could individual router physical interfaces be used for InterVLAN routing, instead of a router-on-a-stick configuration?
       a network with more than 100 subnetworks
       a network with a limited number of VLANs
       a network with experienced support personnel
       a network using a router with one LAN interface

14   
Devices on the network are connected to a 24-port Layer 2 switch that is configured with VLANs. Switch ports 0/2 to 0/4 are assigned to VLAN 10. Ports 0/5 to 0/8 are assigned to VLAN 20, and ports 0/9 to 0/12 are assigned to VLAN 30. All other ports are assigned to the default VLAN. Which solution allows all VLANs to communicate between each other while minimizing the number of ports necessary to connect the VLANs?
       Configure ports 0/13 to 0/16 with the appropriate IP addresses to perform routing between VLANs.
       Add a router to the topology and configure one FastEthernet interface on the router with multiple subinterfaces for VLANs 1, 10, 20, and 30.
       Obtain a router with multiple LAN interfaces and configure each interface for a separate subnet, thereby allowing communication between VLANs.
       Obtain a Layer 3 switch and configure a trunk link between the switch and router, and configure the router physical interface with an IP address on the native VLAN.

15   
Refer to the exhibit. What two conclusions can be drawn from the output that is shown? (Choose two.)
       The no shutdown command has not been issued on the FastEthernet 0/0 interface.
       Both of the directly connected routes that are shown will share the same physical interface of the router.
       A routing protocol must be configured on the network in order for the inter-VLAN routing to be successful.
       Inter-VLAN routing between hosts on the 172.17.10.0/24 and 172.17.30.0/24 networks is successful on this network.
       Hosts in this network must be configured with the IP address that is assigned to the router physical interface as their default gateway.

16   
What are the steps which must be completed in order to enable inter-VLAN routing using router-on-a-stick?
       Configure the physical interfaces on the router and enable a routing protocol.
       Create the VLANs on the router and define the port membership assignments on the switch.
       Create the VLANs on the switch to include port membership assignment and enable a routing protocol on the router.
       Create the VLANs on the switch to include port membership assignment and configure subinterfaces on the router matching the VLANs.

17   
Refer to the exhibit. The network administrator correctly configures RTA to perform inter-VLAN routing. The administrator connects RTA to port 0/4 on SW2, but inter-VLAN routing does not work. What could be the possible cause of the problem with the SW2 configuration?
       Port 0/4 is not active.
       Port 0/4 is not a member of VLAN1.
       Port 0/4 is configured in access mode.
       Port 0/4 is using the wrong trunking protocol.

18   
Refer to the exhibit. All devices are configured as shown in the exhibit. PC2 can successfully ping the F0/0 interface on R1. PC2 cannot ping PC1. What might be the reason for this failure?
       R1 interface F0/1 has not been configured for subinterface operation.
       S1 interface F0/6 needs to be configured for operation in VLAN10.
       S1 interface F0/8 is in the wrong VLAN.
       S1 port F0/6 is not in VLAN10.

19   
Refer to the exhibit. Port Fa0/0 on router R1 is connected to port Fa0/1 on switch S1. After the commands shown are entered on both devices, the network administrator determines that the devices on VLAN 2 are unable to ping the devices on VLAN 1. What is the likely problem?
       R1 is configured for router-on-a-stick, but S1 is not configured for trunking.
       R1 does not have the VLANs entered in the VLAN database.
       Spanning Tree Protocol is blocking port Fa0/0 on R1.
       The subinterfaces on R1 have not been brought up with the no shutdown command yet.

20   
Refer to the exhibit. Switch1 is correctly configured for the VLANs that are displayed in the graphic. The configuration that is shown was applied to RTA to allow for interVLAN connectivity between hosts attached to Switch1. After testing the network, the administrator logged the following report:
Hosts within each VLAN can communicate with each other.
Hosts in VLAN5 and VLAN33 are able to communicate with each other.
Hosts connected to Fa0/1 through Fa0/5 do not have connectivity to host in other VLANs.
Why are hosts connected to Fa0/1 through Fa0/5 unable to communicate with hosts in different VLANs?
       The router interface is shut down.
       The VLAN IDs do not match the subinterface numbers.
       All of the subinterface addresses on the router are in the same subnet.
       The router was not configured to forward traffic for VLAN2.
       The physical interface, FastEthernet0/0, was not configured with an IP address.

updated: MAY 2009 by bluefiz 100%
 For image version, please send your request to lovestoryhouse@gmail.com. thx.
Disclaimer: This questionnaires are just for revision purpose!

Monday, May 18, 2009

MAY 2009 CCNA Exploration 4.0 ESwitching Chapter 5 - LAN Switching and Wireless

 updated: MAY 2009 by bluefiz 100%

1         
Which two items are true regarding the spanning-tree portfast command? (Choose two.)
            PortFast is Cisco proprietary.
            PortFast can negatively effect DHCP services.
            PortFast is used to more quickly prevent and eliminate bridging loops.
            Enabling PortFast on trunks that connect to other switches improves convergence.
            If an access port is configured with PortFast, it immediately transitions from a blocking to a forwarding state.

2         
How can a network administrator influence which STP switch becomes the root bridge?
            Configure all the interfaces on the switch as the static root ports.
            Change the BPDU to a lower value than that of the other switches in the network.
            Assign a lower IP address to the switch than that of the other switches in the network.
            Set the switch priority to a smaller value than that of the other switches in the network.

3         
Which two actions does an RSTP edge port take if it receives a BPDU? (Choose two.)
            immediately loses its edge status
            inhibits the generation of a TCN
            goes immediately to a learning state
            disables itself
            becomes a normal spanning-tree port

4         
What is the first step in the process of convergence in a spanning tree topology?
            election of the root bridge
            blocking of the non-designated ports
            selection of the designated trunk port
            determination of the designated port for each segment

5         
Refer to the exhibit. The spanning-tree port priority of each interface is at the default setting. The network administrator enters the spanning-tree vlan 1 root primary command on S4. What is the effect of the command?
            Spanning tree blocks Gi0/1 on S3.
            Gi0/2 on S3 transitions to a root port.
            Port priority makes Gi0/2 on S1 a root port.
            S4 is already the root bridge, so there are no port changes.

6         
Refer to the exhibit. Server sends an ARP request for the MAC address of its default gateway. If STP is not enabled, what will be the result of this ARP request?
            Router_1 will drop the broadcast and reply with the MAC address of the next hop router.
            Switch_A will reply with the MAC address of the Router_1 E0 interface.
            Switch_A and Switch_B will continuously flood the message onto the network.
            The message will cycle around the network until its TTL is exceeded.

7         
What Rapid Spanning Tree Protocol (RSTP) role is assigned to the forwarding port elected for every Ethernet LAN segment that links two switches?
            alternate
            backup
            designated
            edge

8         
What two features of the Spanning-Tree Protocol contribute to the time it takes for a switched network to converge after a topology change occurs? (Choose two.)
            the max-age timer
            the spanning-tree hold down timer
            the forward delay
            the spanning-tree path cost
            the blocking delay

9         
Which two statements are true about the default operation of STP in a Layer 2 switched environment that has redundant connections between switches? (Choose two.)
            The root switch is the switch with the highest speed ports.
            Decisions on which port to block when two ports have equal cost depend on the port priority and identity.
            All trunking ports are designated and not blocked.
            Root switches have all ports set as root ports.
            Non-root switches each have only one root port.

10       
When PVST+ was developed, the Bridge ID was modified to include which information?
            bridge priority
            MAC address
            protocol
            VLAN ID

11       
What three link types have been defined for Rapid Spanning-Tree Protocol? (Choose three.)
            shared
            end-to-end
            edge-type
            boundary-type
            point-to-many
            point-to-point

12       
What two elements will exist in a converged network with one spanning tree? (Choose two.)
            one root bridge per network
            all non-designated ports forwarding
            one root port per non-root bridge
            multiple designated ports per segment
            one designated port per network

13       
Refer to the exhibit. All switches in the network have empty MAC tables. STP has been disabled on the switches in the network. How will a broadcast frame that is sent by host PC1 be handled on the network?
            Switch SW1 will block the broadcast and drop the frame.
            Switch SW1 will forward the broadcast out all switch ports, except the originating port. This will generate an endless loop in the network.
            Switch SW1 will forward the broadcast out all switch ports, except the originating port. All hosts in the network will reply with a unicast frame sent to host PC1.
            Switch SW1 will forward the traffic out all switch ports except the originating port as a unicast frame. All hosts in the network will reply with a unicast frame sent to switch SW1.

14       
Which two criteria does a switch use to select the root bridge? (Choose two.)
            bridge priority
            switching speed
            number of ports
            base MAC address
            switch location
            memory size

15       
In which STP state does a port record MAC addresses but not forward user data?
            blocking
            learning
            disabling
            listening
            forwarding

16       
Refer to the exhibit. What can be determined from the output shown?
            Two hosts communicating between ports Fa0/2 and Fa0/4 have a cost of 38.
            The priority was statically configured to identify the root.
            STP is disabled on this switch.
            The timers have been altered to reduce convergence time.

17       
Which statement or set of paired statements correctly compares STP with RSTP?
            STP and RSTP have the same BPDU format and flag field information.
            STP specifies backup ports. RSTP has only root ports, alternate ports, and designated ports.
            STP port states are independent of port roles. RSTP ties together the port state and port role.
            STP waits for the network to converge before placing ports into forwarding state. RSTP places designated ports into forwarding state immediately.

18       
Which three statements are accurate regarding RSTP and STP? (Choose three.)
            RSTP uses a faster algorithm to determine root ports.
            RSTP introduced the extended system ID to allow for more than 4096 VLANs.
            Both RSTP and STP use the portfast command to allow ports to immediately transition to forwarding state.
            Like STP PortFast, an RSTP edge port that receives a BPDU loses its edge port status immediately and becomes a normal spanning-tree port.
            Configuration commands to establish primary and secondary root bridges are identical for STP and RSTP.
            Because of the format of the BPDU packet, RSTP is backward compatible with STP.

19       
Which two statements describe the BIDs used in a spanning tree topology? (Choose two.)
            They are sent out by the root bridge only after the inferior BPDUs are sent.
            They consist of a bridge priority and MAC address.
            Only the root bridge will send out a BID.
            They are used by the switches in a spanning tree topology to elect the root bridge.
            The switch with the fastest processor will have the lowest BID.

20       
In which two ways is the information that is contained in BPDUs used by switches? (Choose two.)
            to negotiate a trunk between switches
            to set the duplex mode of a redundant link
            to identify the shortest path to the root bridge
            to prevent loops by sharing bridging tables between connected switches
            to determine which ports will forward frames as part of the spanning tree
updated: MAY 2009 by bluefiz 100%
 For image version, please send your request to lovestoryhouse@gmail.com. thx.
Disclaimer: This questionnaires are just for revision purpose!

MAY 2009 CCNA Exploration 4.0 ESwitching Chapter 4 - LAN Switching and Wireless

 updated: MAY 2009 by bluefiz 100%
1         
Refer to the exhibit. Switches SW1 and SW2 are interconnected via a trunk link but failed to exchange VLAN information. The network administrator issued the show vtp status command to troubleshoot the problem. On the basis of the provided command output, what could be done to correct the problem?
            Switch SW2 must be configured as a VTP client.
            The switches must be interconnected via an access link.
            The switches must be configured with the same VTP domain name.
            Both switches must be configured with the same VTP revision number.

2         
Refer to the exhibit. Switch S1 is in VTP server mode. Switches S2 and S3 are in client mode. An administrator accidentally disconnects the cable from F0/1 on S2. What will the effect be on S2?
            S2 will retain the VLANs as of the latest known revision.
            S2 will automatically transition to VTP transparent mode.
            S2 will remove all VLANs from the VLAN database until the cable is reconnected.
            S2 will automatically send a VTP request advertisement to 172.17.99.11 when the cable is reconnected.


3         
What does a client mode switch in a VTP management domain do when it receives a summary advertisement with a revision number higher than its current revision number?
            It suspends forwarding until a subset advertisement update arrives.
            It issues an advertisement request for new VLAN information.
            It increments the revision number and forwards it to other switches.
            It deletes the VLANs not included in the summary advertisement.
            It issues summary advertisements to advise other switches of status changes.

4         
Which statement is true when VTP is configured on a switched network that incorporates VLANs?
            VTP is only compatible with the 802.1Q standard.
            VTP adds to the complexity of managing a switched network.
            VTP allows a switch to be configured to belong to more than one VTP domain.
            VTP dynamically communicates VLAN changes to all switches in the same VTP domain.

5         
Which two statements describe VTP transparent mode operation? (Choose two.)
            Transparent mode switches can create VLAN management information.
            Transparent mode switches can add VLANs of local significance only.
            Transparent mode switches pass any VLAN management information that they receive to other switches.
            Transparent mode switches can adopt VLAN management changes that are received from other switches.
            Transparent mode switches originate updates about the status of their VLANS and inform other switches about that status.

6         
Refer to the exhibit. S2 was previously used in a lab environment and has been added to the production network in server mode. The lab and production networks use the same VTP domain name, so the network administrator made no configuration changes to S2 before adding it to the production network. The lab domain has a higher revision number. After S2 was added to the production network, many computers lost network connectivity. What will solve the problem?
            Reset the revision number on S2 with either the delete VTP command or by changing the domain name and then changing it back.
            Re-enter all appropriate VLANs, except VLAN 1, manually on Switch1 so that they propagate throughout the network.
            Change S1 to transparent VTP mode to reclaim all VLANs in vlan.dat and change back to server mode.
            Change S2 to client mode so the VLANs will automatically propagate.

7         
Refer to the exhibit. All switches in the network participate in the same VTP domain. What happens when the new switch SW2 with a default configuration and revision number of 0 is inserted in the existing VTP domain Lab_Network?
            The switch operates as a VTP client.
            The switch operates in VTP transparent mode.
            The switch operates as a VTP server and deletes the existing VLAN configuration in the domain.
            The switch operates as a VTP server, but does not impact the existing VLAN configuration in the domain.
            The switch operates as a VTP server in the default VTP domain and does not affect the configuration in the existing VTP domain.

8         
What causes a VTP configured switch to issue a summary advertisement?
            A five-minute update timer has elapsed.
            A port on the switch has been shutdown.
            The switch is changed to the transparent mode.
            A new host has been attached to a switch in the management domain.

9         
Which two statements are true about VTP pruning? (Choose two.)
            Pruning is enabled by default.
            Pruning can only be configured on VTP servers.
            Pruning must be configured on all VTP servers in the domain.
            VLANs on VTP client-mode switches will not be pruned.
            Pruning will prevent unnecessary flooding of broadcasts across trunks.

10       
How are VTP messages sent between switches in a domain?
            Layer 2 broadcast
            Layer 2 multicast
            Layer 2 unicast
            Layer 3 broadcast
            Layer 3 multicast
            Layer 3 unicast

11       
What are two features of VTP client mode operation? (Choose two.)
            unable to add VLANs
            can add VLANs of local significance
            forward broadcasts out all ports with no respect to VLAN information
            can only pass VLAN management information without adopting changes
            can forward VLAN information to other switches in the same VTP domain

12       
Refer to the exhibit. All switches in the VTP domain are new. Switch SW1 is configured as a VTP server, switches SW2 and SW4 are configured as VTP clients, and switch SW3 is configured in VTP transparent mode. Which switch or switches receive VTP updates and synchronize their VLAN configuration based on those updates?
            All switches receive updates and synchronize VLAN information.
            Only switch SW2 receives updates and synchronizes VLAN information.
            Only switches SW3 and SW4 receive updates and synchronize VLAN information.
            SW3 and SW4 receive updates, but only switch SW4 synchronizes VLAN information.

13       
Refer to the exhibit. The switches in the exhibit are connected with trunks within the same VTP management domain. Each switch is labeled with its VTP mode. A new VLAN is added to Switch3. This VLAN does not show up on the other switches. What is the reason for this?
            VLANs cannot be created on transparent mode switches.
            Transparent mode switches do not forward VTP advertisements.
            VLANs created on transparent mode switches are not included in VTP advertisements.
            Server mode switches neither listen to nor forward VTP messages from transparent mode switches.

14       
Refer to the exhibit. Which two facts can be confirmed by this output? (Choose two.)
            If this switch is added to an established network, the other VTP-enabled switches in the same VTP domain will consider their own VLAN information to be more recent than the VLAN information advertised by this switch.
            This switch shows no configuration revision errors.
            This switch has established two-way communication with the neighboring devices.
            This switch is configured to advertise its VLAN configuration to other VTP-enabled switches in the same VTP domain.
            This switch is configured to allows the network manager to maximize bandwidth by restricting traffic to specific network devices.

15       
Refer to the exhibit. What information can be learned from the output provided?
            It verifies the configured VTP password.
            It verifies the VTP domain is configured to use VTP version 2.
            It verifies VTP advertisements are being exchanged.
            It verifies the VTP domain name is V1.

16       
Refer to the exhibit. Switch1 is not participating in the VTP management process with the other switches that are shown in the exhibit. What are two possible explanations for this? (Choose two.)
            Switch1 is in client mode.
            Switch2 is in server mode.
            Switch2 is in transparent mode.
            Switch1 is in a different management domain.
            Switch1 has end devices that are connected to the ports.
            Switch1 is using VTP version 1, and Switch2 is using VTP version 2.

17       
Which two statements are true about the implementation of VTP? (Choose two.)
            Switches must be connected via trunks.
            The VTP domain name is case sensitive.
            Transparent mode switches cannot be configured with new VLANs.
            The VTP password is mandatory and case sensitive.
            Switches that use VTP must have the same switch name.

18       
A network administrator is replacing a failed switch with a switch that was previously on the network. What precautionary step should the administrator take on the replacement switch to avoid incorrect VLAN information from propagating through the network?
            Enable VTP pruning.
            Change the VTP domain name.
            Change the VTP mode to client.
            Change all the interfaces on the switch to access ports.

19       
What statement describes the default propagation of VLANs on a trunked link?
            only VLAN 1
            all VLANs
            no VLANs
            the native VLAN

20       
Which three VTP parameters must be identical on all switches to participate in the same VTP domain? (Choose three.)
            revision number
            domain name
            pruning
            mode
            domain password
            version number
 updated: MAY 2009 by bluefiz 100%
 For image version, please send your request to lovestoryhouse@gmail.com. thx.
Disclaimer: This questionnaires are just for revision purpose!