Project Planning and Design – CCNA3

Final Study Guide – v4.0 – Dec. 2009 – form H-1a

  1. Commands
  2. Copy run tftp (with filenames given) will do what? (2.3.8)
  3. What command is used to disable the switch’s ability to remember commands? If you don’t give it a SIZE parameter, it will reset to the default, which means what for the switch? (2.3.3)
  4. What are the commands needed to set the password for the FIRST vty line? (2.4.1)
  5. What is the purpose of the switchport mode access command? (3.3.4)
  6. If you issue the switchport port-security violation protect command, what happens to the frame if port security is violated? (2.4.6)
  7. Look at the ip dhcp snooping commands and if they are applied to an interface, what does that mean to that interface and dhcp? (2.4.4) (We didn’t cover this…sorry)
  8. Spanning Tree Protocol
  9. What does the spanning tree diameter mean to the network admin? Why is it important to consider when choosing the root bridge? (5.2.5)
  10. What is the purpose of the spanning tree algorithm? (5.2.1)
  11. Know the spanning tree port roles (forwarding, listening, learning, etc.) and what happens in each? (5.2.5)
  12. Be able to look at a topology and pick out which switch will be the root bridge. (5.2.3)
  13. Be able to look at a topology and pick out designated and undesignated ports (like we did in class that day) (5.2.4)
  14. Be able to look at output and tell which spanning tree protocol is in effect (PVST, PVST+, RSTP) (5.4.3)
  15. What is the purpose of spanning tree? (5.2.1)
  16. Be able to look at output and determine which switch is the root for a particular vlan (check the priority for each vlan – lowest becomes the root) (5.4.2)
  17. Switch
  18. Shown the contents of the CAM (MAC address) table, be able to answer questions about forwarding frames. What will the switch do with a frame whose MAC address is NOT in the CAM table? (6.3.1)
  19. What are 2 ways to remove MAC address entries from a switch? (2.5.1)
  20. What are the default settings of a switch, right out of the box (i.e. VTP, Vlans, STP, etc.) (3.3.2)
  21. If a switch learns a MAC address DYNAMICally, what does that mean? (2.3.6)
  22. VLAN
  23. Given a scenario with vlans setup, you must troubleshoot various aspects such as
  24. If 2 hosts can’t ping one another, what is wrong? (check IP addresses, vlan assignments, trunking enabled on the trunk ports, same native vlans, etc.) (3.4.2) (3.5.3) (3.4.1)
  25. Use vlans to manage broadcast storms, without having a router involved. (3.1.1)
  26. Which vlans CANNNOT be deleted from a switch? (3.1.1)
  27. What is the purpose of VLAN trunking? (3.2.1)
  28. If the range of VLANs are set to the default value on a trunk, for which vlans does the switch trunk? (4.2.5)
  29. VTP
  30. What mode must the trunk ports be in to support DTP? (on, desirable, auto, etc.)(6.2.2)
  31. What are the responsibilities of each switch mode (server, client, transparent)? (4.2.4)
  32. Given output, be able to answer questions about vtp status’s, (check for domain names, passwords, etc.)(4.1.1)
  33. What event(s) will change the configuration revision # on a switch’s vtp service? (4.2.3)
  34. What happens when you add an already configured switch to a network? (4.3.2)
  35. Router-on-a-stick
  36. Look at a topology, given TRADITIONAL (not router-on-a-stick), and troubleshoot why pings won’t work (6.3.1) (check make sure things are in the same subnet, ports are in the correct vlan, trunking has been set up, sub-interfaces are configured correctly, etc.)
  37. When looking at subinterfaces, make sure that you know the ip addresses that are included for each vlan so you can track how the router will forward the packets. (6.1.2)
  38. What will the router do with the packet if the destination address doesn’t fit into any of the sub-interfaces? (6.1.2)
  39. Wireless
  40. What parameter uniquely identifies one wireless network from another? (7.1.4)
  41. What is mac-address filtering? Why shouldn’t you use it when securing your WLAN? (7.2.3)
  42. If wireless clients are getting intermittent connectivity problems, what can you do to solve them? (7.4.2)
  43. How do you INITIALLY configure a Linksys WRT300N wireless access device? (7.3.1)
  44. A wireless access point can function as a HUB as well. (7.1.3)
  45. What does a client use to discover an access point? (7.1.4)
  46. Misc
  47. If you were adding IP phones to a network, to which intermediary device would they connect? (1.1.1)
  48. If all PC’s are in listening mode, connected to a HUB, and 2 start to transmit simultaneously, what would the hub and the PCs do? (2.1.1)
  49. What mode on the switch must you be in to issue troubleshooting and management commands? (such as SHOW commands, etc.) (2.3.1)