No Marshmallows, Just Term Papers
CCNA 3 Final Exam => latest version
1 . Which security protocol or measure would provide the greatest protection for a wireless LAN?
shared WEP key
MAC address filtering
Refer to the exhibit. All trunk links are operational and all VLANs are allowed on all trunk links. An ARP request is sent by computer 5. Which device or devices will receive this message?
only computer 4
computer 3 and RTR-A
computer 4 and RTR-A
computer 1, computer 2, computer 4, and RTR-A
computer 1, computer 2, computer 3, computer 4, and RTR-A
all of the computers and the router
Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?
only hosts A and B
only hosts A, B, and C
only hosts A, B, C, and D
only hosts A, B, C, and E
Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161. What will the router do with this packet?
The router will drop the packet.
The router will forward the packet out interface FastEthernet 0/1.1.
The router will forward the packet out interface FastEthernet 0/1.2.
The router will forward the packet out interface FastEthernet 0/1.3.
The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.
Refer to the exhibit. Which two settings show the default value of VTP configuration on a Cisco 2960 switch? (Choose two.)
6 . Which value determines if a switch becomes the central point of reference in the spanning tree topology?
lowest bridge ID
highest revision number
lowest numeric IP address
highest numeric MAC address
7 . What is the purpose of the Spanning Tree algorithm?
It propagates VLAN configurations to other switches.
It restricts broadcast packets to...