But if you find the same answers for all the Module anywhere in the internet.
And if you have an Answers are correct 100% or if you find an answer, What is wrong in this blog. please send me. (Post in blog or Send Email )
Because,I will update the blog…

Sunday, December 14, 2008

CCNA 3 - Module 6 Exam Answers Version 3.1

Take Assessment - Module 6 Exam - CCNA 3 Switching Basics and Intermediate Routing (Version 3.1)

1 A new policy for disaster recovery requires copying all critical network configurations and operating systems to a backup server that will be stored offsite. Which command will create a backup of the switch IOS image on the server?
• Switch# copy tftp NVRAM
• Switch# copy running-config tftp
• Switch# copy flash tftp
• Switch# copy IOS tftp
• Switch# copy tftp flash
• Switch# copy NVRAM tftp

2 Which commands can be used to change from Global Configuration mode to Privileged EXEC mode? (Choose three.)
• Ctrl+z

• disable
• end
• exit

• logout

3 An administrator is using the switch help facility to find the command elements available to the configure command. What would the user type at the command prompt to display the next set of arguments available in the syntax for this command
• Switch# c?
• Switch# c ?
• Switch# configure?
• Switch# configure ?

4 Which switch command mode should always be password protected?
• User Command
• User Config
• User EXEC
• User Privileged
• Privileged EXEC

5 What must be done in order to initiate the password recovery procedure on a Catalyst 2900 series switch?
• Rename the Flash file.
• Enter the setup program by deleting the switch configuration file and rebooting the switch.
• Hold down the MODE button during switch startup.
• Wait for the STAT LED to turn green while holding down the Break key.
• Hold down the Ctrl-Break keys during switch startup.

6 Which protocol is used to copy a new IOS image to a Catalyst switch during the upgrade procedure?
• HTTP
• Telnet
• TFTP
• TTY
• IOS

7 A group of hosts has been connected to a new Fast Ethernet switch. Which of the following statements describe this newly created LAN, if the new switch has not yet been configured? (Choose three.)
• The hosts will negotiate 10 Mbps or 100 Mbps bandwidth with the switch, as required by their NICs.
• The hosts will be in separate broadcast domains.
• All of the hosts will be in the same VLAN.
• Hosts with 10 Mbps NICs will be unable to communicate with the network.
• All of the hosts should be able to send and receive ARP messages from each other.
• All of the hosts connected by Ethernet can manage the switch over Telnet or HTTP.

8 A workstation on a switched Ethernet LAN is to be upgraded with a new Fast Ethernet NIC. What should be done to ensure that the workstation will be able to gain access to the network?
• delete the configuration file from the switch and reload IOS
• deactivate port security on the port until the new host has connected to the network
• remove the host from the the management VLAN until the new MAC address has been learned by the switch
• delete the VLAN.dat file from flash and reboot the switch
• configure the attached switch port for full-duplex mode

9 Although the backup configuration file on a Catalyst 2950 switch has been erased, it is found that VLANs are still configured in the switch. What must be done to clear the configured VLANs?
• The vlan.dat file must be erased and the switch reloaded.
• The switch flash memory must be purged and the switch rebooted.
• The vlan.cfg file must be renamed and IOS restarted.
• Each VLAN needs to be deleted individually and the configuration saved.
• The switch needs to be restarted, because the old running configuration is still in memory.

10 Which type of cable is used to connect to the console port on a switch?
• a crossover cable
• a patch cable
• a rollover cable
• a straight-thru cable

11 From which switch command mode can the configure command be used?
• config
• user EXEC
• privileged EXEC
• command EXEC
• flash

12 An old workstation has been replaced with a new one. The workgroup switch, a Catalyst 2950, is not learning the MAC address of the new workstation. A network technician has verified that a static MAC address is not configured on the attached switch port. Which two commands can the technician issue at the switch CLI to further troubleshoot the problem? (Choose two.)
• Switch# show port security
• Switch# show version
• Switch# show startup-config
• Switch# clear mac-address-table dynamic
• Switch# reload
• Switch# delete flash:vlan.dat

13 Which methods can be used to perform the initial configuration of a new switch? (Choose two.)
• copy a configuration from a FTP server
• type commands manually after entering the Privileged EXEC mode
• enter the System Configuration dialog

• Telnet to a local server to copy a configuration file
• connect to the switch using a web browser

14 How long will a host MAC address remain in the address table of a switch after the host has been turned off or moved to another device?
• 30 seconds
• 180 seconds
• 300 seconds
• 30 minutes

15 What is the name of the series of tests that execute every time a switch is powered on?
• RPS
• bootstrap
• power-on self test
• system STAT
• pre-boot

16 After powering up a switch, the network technician notices that the system LED is amber. What can the technician assume? (Choose two.)
• The switch is negotiating full or half-duplex mode.
• The switch has completed negotiating 10 or 100 Mbps speed.
• The POST has failed.
• The boot sequence is in process.
• A fatal error has occurred.
• The switch is operating properly and is ready for service.

17 When the copy tftp flash command is used to upgrade the IOS on a switch, which symbol indicates that the image was copied successfully?
• e
• *
• !
• s
• #

18 What color is the System LED if the switch fails the POST?
• amber
• green
• red
• white
• off

19 How can a switch be configured to prevent unauthorized hosts from access to a network? (Choose three.)
• Host MAC addresses can be statically assigned to each switch port.
• Layer 2 access control lists can be used to prevent unauthorized network access.
• Unused ports can be shutdown.
• Passwords and usernames can be set for each Ethernet switch port.
• Unused switch ports can be assigned to the management VLAN.
• Port security can be activated to allow only the host with the first MAC address learned on a port to access the network.

20 Which files must be deleted in order to completely remove an existing configuration from a Cisco 2950 switch? (Choose two.)
• flash:c2950-c3h2s-mz.120-5-3.WC.1.bin
• running-config
• VLAN.bin
• startup-config
• c2950-c3h2s-mz.120-5-3.WC.1.dat
• VLAN.dat

No comments :