Sponsor

Advertisment

CCNA 3 – Chapter 1 – Exam Answer 2016 100%

Thursday, March 10, 2016

CCNA 3 – Chapter 1 – Introduction to Scaling Networks Exam Answer 2016 100%

1.Which design feature will limit the size of a failure domain in an enterprise network?

  • the use of the building switch block approach
  • the purchase of enterprise equipment that is designed for large traffic
  • volume
  • the use of a collapsed core design
  • the installation of redundant power supplies

2.Which two features of enterprise class equipment assists an enterprise network in maintaining 99.999 percent up-time? (Choose two.)

  • collapsed core
  • failure domains
  • services module
  • failover capabilities
  • redundant power supplies

3.Why would a network administrator issue the show cdp neigbors command on a router?

  • to display router ID and other information about OSPF neighbors
  • to display routing table and other information about directly connected Cisco devices
  • to display device ID and other information about directly connected Cisco devices
  • to display line status and other information about directly connected Cisco devices

4.

CCNA-3-Chapter-1-Exam-Answer
CCNA 3 – Chapter 1 – Introduction Networks Exam Answer 2016 100%

Refer to the exhibit. Which devices exist in the failure domain when switch S3 loses power?

  • PC_3 and AP_2
  • PC_3 and PC_2
  • S1 and S4
  • S4 and PC_2
  • AP_2 and AP_1

5.How can an enterprise network be designed to optimize bandwidth?

  • by limiting the size of failure domains
  • by organizing the network to control traffic patterns
  • by installing devices with failover capabilities
  • by deploying a collapsed core model

6.A network administrator is planning redundant devices and cabling in a switched network to support high availability. Which benefit will implementing the Spanning Tree Protocol provide to this design?

  • Redundant paths can be available without causing logical Layer 2 loops.
  • Faster convergence is available for advanced routing protocols.
  • Multiple physical interfaces can be combined into a single EtherChannel interface.
  • Network access can be expanded to support both wired and wireless devices.

7.As the network administrator you have been asked to implement EtherChannel on the corporate network. What does this configuration consist of?

  • grouping multiple physical ports to increase bandwidth between two switches
  • providing redundant devices to allow traffic to flow in the event of device failure
  • providing redundant links that dynamically block or forward traffic
  • grouping two devices to share a virtual IP address

8.Which statement describes a characteristic of Cisco Meraki switches?

  • They are cloud-managed access switches that enable virtual stacking of switches.
  • They are service provider switches that aggregate traffic at the edge of the network.
  • They promote infrastructure scalability, operational continuity, and transport flexibility.
  • They are campus LAN switches that perform the same functions as Cisco 2960 switches.

9.In which situation would a network administrator install a Cisco Nexus Series or Cisco Catalyst 6500 Series switch to promote infrastructure scalability?

  • on a service provider network to promote integrated security, and simplified management
  • on a campus LAN network as access layer switches
  • to enable virtual stacking of switches to provide cloud-managed access
  • on a data center network to provide expansion and transport flexibility

10.Which statement describes a characteristic of Cisco Catalyst 2960 switches?

  • They are best used as distribution layer switches.
  • New Cisco Catalyst 2960-C switches support PoE pass-through.
  • They do not support an active switched virtual interface (SVI) with IOS versions prior to 15.x.
  • They are modular switches.

11.What are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.)

  • decreased number of critical points of failure
  • reduced costs
  • increased network management options
  • increased flexibility
  • increased bandwidth availability

12.A network engineer is reviewing a network design that uses a fixed configuration enterprise router that supports both LAN and WAN connections. However, the engineer realizes that the router does not have enough interfaces to support growth and network expansion. Which type of device should be used as replacement?

  • a modular router
  • another fixed configuration router
  • a Layer 3 switch
  • a PoE device

13.What are two functions of a router? (Choose two.)

  • It controls the flow of data via the use of Layer 2 addresses.
  • It manages the VLAN database.
  • It increases the size of the broadcast domain.
  • It connects multiple IP networks.
  • It determines the best path to send packets.

14.Immediately after a router completes its boot sequence, the network administrator wants to check the routers configuration. From privileged EXEC mode, which of the following commands can the administrator use for this purpose? (Choose two.)

  • show NVRAM
  • show running-config
  • show version
  • show flash
  • show startup-config

15.What is a characteristic of in-band device management?

  • It is used for initial configuration or when a network connection is unavailable.
  • It is used to monitor and make configuration changes to a network device over a network connection.
  • It uses a terminal emulation client.
  • It uses a direct connection to a console or AUX port.

16.Mach the purpose to the related configuration item. (Not all options are used.)

CCNA-3-Chapter-1-Exam-Answer
CCNA 3 – Chapter 1 – Introduction to Scaling Networks Exam Answer 2016 100%

17.Which technology is required when switched networks are designed to include redundant links?

  • Spanning Tree Protocol
  • virtual LANs
  • link aggregation
  • virtual private networks

18.Which two requirements must always be met to use in-band management to configure a network device? (Choose two.)

  • a direct connection to the auxiliary port
  • at least one network interface that is connected and operational
  • Telnet, SSH, or HTTP access to the device
  • a direct connection to the console port
  • a terminal emulation client

19. What is the function of ASICs in a multilayer switch?

  • They aggregate multiple physical switch ports into a single logical port.
  • They provide power to devices such as IP phones and wireless access points through Ethernet ports.
  • They streamline forwarding of IP packets in a multilayer switch by bypassing the CPU.
  • They prevent Layer 2 loops by disabling redundant links between switches.

20. What term is used to express the thickness or height of a switch?

  • rack unit
  • module size
  • domain size
  • port density

21. In the Cisco Enterprise Architecture, which two functional parts of the network are combined to form a collapsed core design? (Choose two.)

  • enterprise edge
  • core layer
  • access layer
  • distribution layer
  • provider edge

22. What network design would contain the scope of disruptions on a network should a failure occur?

  • the installation of only enterprise class equipment throughout the network
  • the reduction in the number of redundant devices and connections in the network core
  • the configuration of all access layer devices to share a single gateway
  • the deployment of distribution layer switches in pairs and the division of access layer switch connections between them

23. What are two ways to access a Cisco switch for out-of-band management? (Choose two.)

  • a connection that uses HTTP
  • a connection that uses Telnet
  • a connection that uses SSH
  • a connection that uses the AUX port
  • a connection that uses the console port

24. What is the function of PoE pass-through?

  • allows multiple physical switch ports to be aggregated together and act as a single logical link to increase bandwidth on trunk links
  • allows a multilayer switch to forward IP packets at a rate close to that of Layer 2 switching by bypassing the CPU
  • allows switches, phones, and wireless access points to receive power over existing Ethernet cables from an upstream switch
  • allows a switch to disable redundant Layer 2 paths in the topology to prevent Layer 2 loops

No comments:

Post a Comment