IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA 3 v4Refer to the exhibit. SW1 and SW2 are new switches being installed in the topology shown in the exhibit. Interface Fa0/1 on switch SW1 has been configured with trunk mode “on”. Which statement is true about forming a trunk link between the switches SW1 and SW2?ITExamAnswers asked 2 years ago • CCNA 3 v4Switch port fa0/1 was manually configured as a trunk, but now it will be used to connect a host to the network. How should the network administrator reconfigure switch port Fa0/1?ITExamAnswers asked 2 years ago • CCNA 3 v4What statements describe how hosts on VLANs communicate?ITExamAnswers asked 2 years ago • CCNA 3 v4Refer to the exhibit. Which two conclusions can be drawn regarding the switch that produced the output shown? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 3 v4Refer to the exhibit. The exhibited configurations do not allow the switches to form a trunk. What is the most likely cause of this problem?ITExamAnswers asked 2 years ago • CCNA 3 v4Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2 and assigned hosts on the IP addresses of the VLAN in the 10.1.50.0/24 subnet range. Computer A can communicate with computer B, but not with computer C or computer D. What is the most likely cause of this problem?ITExamAnswers asked 2 years ago • CCNA 3 v4If a network administrator enters these commands on a switch, what will be the result?ITExamAnswers asked 2 years ago • CCNA 3 v4Refer to the exhibit. The switch and the hub have default configurations, and the switch has built its CAM table. Which of the hosts will capture a copy of the frame when workstation A sends a unicast packet to workstation C?ITExamAnswers asked 2 years ago • CCNA 3 v4Where is the startup configuration stored?ITExamAnswers asked 2 years ago • CCNA 3 v4Refer to the exhibit. The network administrator has decided to allow only Secure Shell connections to Switch1. After the commands are applied, the administrator is able to connect to Switch1 using both Secure Shell and Telnet. What is most likely the problem?ITExamAnswers asked 2 years ago • CCNA 3 v4What are two ways to make a switch less vulnerable to attacks like MAC address flooding, CDP attacks, and Telnet attacks? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 3 v4Refer to the exhibit. How many collision domains are depicted in the network?ITExamAnswers asked 2 years ago • CCNA 3 v4When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respond after the backoff period has expired?ITExamAnswers asked 2 years ago • CCNA 3 v4, Network FundamentalsWhich two statements are true about EXEC mode passwords? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 3 v4Which statement is true about the command banner login “Authorized personnel Only” issued on a switch?ITExamAnswers asked 2 years ago • CCNA 3 v4