Project Planning and Design – CCNA3
Final Study Guide – v4.0 – Dec. 2009 – form H-1a
- Commands
- Copy run tftp (with filenames given) will do what? (2.3.8)
- What command is used to disable the switch’s ability to remember commands? If you don’t give it a SIZE parameter, it will reset to the default, which means what for the switch? (2.3.3)
- What are the commands needed to set the password for the FIRST vty line? (2.4.1)
- What is the purpose of the switchport mode access command? (3.3.4)
- If you issue the switchport port-security violation protect command, what happens to the frame if port security is violated? (2.4.6)
- Look at the ip dhcp snooping commands and if they are applied to an interface, what does that mean to that interface and dhcp? (2.4.4) (We didn’t cover this…sorry)
- Spanning Tree Protocol
- What does the spanning tree diameter mean to the network admin? Why is it important to consider when choosing the root bridge? (5.2.5)
- What is the purpose of the spanning tree algorithm? (5.2.1)
- Know the spanning tree port roles (forwarding, listening, learning, etc.) and what happens in each? (5.2.5)
- Be able to look at a topology and pick out which switch will be the root bridge. (5.2.3)
- Be able to look at a topology and pick out designated and undesignated ports (like we did in class that day) (5.2.4)
- Be able to look at output and tell which spanning tree protocol is in effect (PVST, PVST+, RSTP) (5.4.3)
- What is the purpose of spanning tree? (5.2.1)
- Be able to look at output and determine which switch is the root for a particular vlan (check the priority for each vlan – lowest becomes the root) (5.4.2)
- Switch
- Shown the contents of the CAM (MAC address) table, be able to answer questions about forwarding frames. What will the switch do with a frame whose MAC address is NOT in the CAM table? (6.3.1)
- What are 2 ways to remove MAC address entries from a switch? (2.5.1)
- What are the default settings of a switch, right out of the box (i.e. VTP, Vlans, STP, etc.) (3.3.2)
- If a switch learns a MAC address DYNAMICally, what does that mean? (2.3.6)
- VLAN
- Given a scenario with vlans setup, you must troubleshoot various aspects such as
- If 2 hosts can’t ping one another, what is wrong? (check IP addresses, vlan assignments, trunking enabled on the trunk ports, same native vlans, etc.) (3.4.2) (3.5.3) (3.4.1)
- Use vlans to manage broadcast storms, without having a router involved. (3.1.1)
- Which vlans CANNNOT be deleted from a switch? (3.1.1)
- What is the purpose of VLAN trunking? (3.2.1)
- If the range of VLANs are set to the default value on a trunk, for which vlans does the switch trunk? (4.2.5)
- VTP
- What mode must the trunk ports be in to support DTP? (on, desirable, auto, etc.)(6.2.2)
- What are the responsibilities of each switch mode (server, client, transparent)? (4.2.4)
- Given output, be able to answer questions about vtp status’s, (check for domain names, passwords, etc.)(4.1.1)
- What event(s) will change the configuration revision # on a switch’s vtp service? (4.2.3)
- What happens when you add an already configured switch to a network? (4.3.2)
- Router-on-a-stick
- Look at a topology, given TRADITIONAL (not router-on-a-stick), and troubleshoot why pings won’t work (6.3.1) (check make sure things are in the same subnet, ports are in the correct vlan, trunking has been set up, sub-interfaces are configured correctly, etc.)
- When looking at subinterfaces, make sure that you know the ip addresses that are included for each vlan so you can track how the router will forward the packets. (6.1.2)
- What will the router do with the packet if the destination address doesn’t fit into any of the sub-interfaces? (6.1.2)
- Wireless
- What parameter uniquely identifies one wireless network from another? (7.1.4)
- What is mac-address filtering? Why shouldn’t you use it when securing your WLAN? (7.2.3)
- If wireless clients are getting intermittent connectivity problems, what can you do to solve them? (7.4.2)
- How do you INITIALLY configure a Linksys WRT300N wireless access device? (7.3.1)
- A wireless access point can function as a HUB as well. (7.1.3)
- What does a client use to discover an access point? (7.1.4)
- Misc
- If you were adding IP phones to a network, to which intermediary device would they connect? (1.1.1)
- If all PC’s are in listening mode, connected to a HUB, and 2 start to transmit simultaneously, what would the hub and the PCs do? (2.1.1)
- What mode on the switch must you be in to issue troubleshooting and management commands? (such as SHOW commands, etc.) (2.3.1)