CCNA 3 Chapter 4: EtherChannel and HSRP (v5.0.3 + v6.0) Exam Answers – 100% Result

Certification Answers

Q1. Question

Explanation:  No answer description available for this question

Q2. Question

Explanation:  No answer description available for this question

Q3. What is the purpose of HSRP?

  • It provides a continuous network connection when a router fails.
  • It prevents a rogue switch from becoming the STP root.
  • It prevents malicious hosts from connecting to trunk ports.
  • It enables an access port to immediately transition to the forwarding state.
Explanation:  HSRP is a first hop redundancy protocol and allows hosts to use multiple gateways through the use of a single virtual router.

Q4. Question

Explanation:  No answer description available for this question

Q5. What is an advantage of using LACP?

  • increases redundancy to Layer 3 devicesdecreases the amount of configuration that is needed on a switch for EtherChannel
  • allows automatic formation of EtherChannel links
  • provides a simulated environment for testing link aggregation
  • decreases the chance of a spanning-tree loop
Explanation:  No answer description available for this question

Q6. What is a requirement to configure a trunking EtherChannel between two switches?

  • The participating interfaces must be assigned the same VLAN number on both switches.
  • The participating interfaces must be on the same module on a switch.
  • The participating interfaces must be physically contiguous on a switch.
  • The allowed range of VLANs must be the same on both switches.
Explanation:  To enable a trunking EtherChannel successfully, the range of VLANs allowed on all the interfaces must match; otherwise, the EtherChannel cannot be formed. The interfaces involved in an EtherChannel do not have to be physically contiguous, or on the same module. Because the EtherChannel is a trunking one, participating interfaces are configured as trunk mode, not access mode.

Q7. A network administrator would like to ensure that router R1 is always elected the active router for an HSRP group. Which set of commands would ensure the required results?

  • R1(config-if)# ip address 192.168.1.250 255.255.255.0 R1(config-if)# standby 1 ip 192.168.1.1 R1(config-if)# no shutdown
  • R1(config-if)# ip address 192.168.1.100 255.255.255.0 R1(config-if)# standby 1 ip 192.168.1.1 R1(config-if)# standby 1 priority 255 R1(config-if)# standby 1 preempt R1(config-if)# no shutdown
  • R1(config-if)# ip address 192.168.1.100 255.255.255.0 R1(config-if)# standby 1 ip 192.168.1.1 R1(config-if)# standby 1 priority 1 R1(config-if)# no shutdown
  • R1(config-if)# ip address 192.168.1.100 255.255.255.0 R1(config-if)# standby 1 ip 192.168.1.1 R1(config-if)# standby 1 priority 150 R1(config-if)# no shutdown
Explanation:  In order to configure HSRP, the standby command is used. The IP address given with the standby command is the virtual IP address used by hosts as a default gateway. A priority number of 255 is the highest that can be assigned and should be configured on the router that is to be the active router.

Q8. Question

Explanation:  No answer description available for this question

Q9. Fill in the blank. 

In FHRP operation, two or more routers are represented as a single virtual router.
Explanation:  In a First Hop Redundancy Protocol like HSRP, multiple routers share a virtual MAC and virtual IP address which are presented to hosts as a single “virtual” router to use as a gateway.

Q10. What is a best practice to use before beginning an EtherChannel implementation?

  • Enable each of the affected interfaces.
  • Assign affected interfaces to the management VLAN.
  • Shut down each of the affected interfaces.
  • Assign affected interfaces to VLAN 1.
  • Assign affected interfaces to an unused VLAN.
Explanation:  Before configuring EtherChannel, the interfaces used should be shut down so that any incomplete configuration will not cause activity on the link.

Q11. Which statement describes an EtherChannel implementation?

  • EtherChannel operates only at Layer 2.
  • A trunked port can be part of an EtherChannel bundle.
  • EtherChannel can support up to a maximum of ten separate links.
  • PAgP cannot be used in conjunction with EtherChannel.
Explanation:  Up to 16 links can be grouped in an EtherChannel by using the the PAgP or LACP protocol. EtherChannel can be configured as a Layer 2 bundle or a Layer 3 bundle. Configuring a Layer 3 bundle is beyond the scope of this course. If a trunked port is a part of the EtherChannel bundle, all ports in the bundle need to be trunk ports and the native VLAN must be the same on all of these ports. A best practice is to apply the configuration to the port channel interface. The configuration is then automatically applied to the individual ports.

Q12. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. What are two reasons why the ping messages that are issued from Laptop0 towards Laptop1 are failing? (Choose two.)

  • The two interfaces on each of the switches belong to different VLANs.
  • The interface VLAN 1 is shut down on both switches.
  • The channel group mode is not set correctly on the switches.
  • The wrong cable types are connecting the two switches.
  • The channel group should be configured as a trunk on each switch.
Explanation:  Port-channel 1 needs to be configured as a trunk in order to carry data about two different VLANs. The channel group is set as auto and desirable. The SVI has not been configured on the switches, but this does not affect the creation of an EtherChannel. The use of straight-through cables between switches is not an issue when using a Cisco Catalyst 2960 switch.

Q13. Question

Explanation:  No answer description available for this question

Q14. Which PAgP mode combination will establish an EtherChannel?

  • switch 1 set to desirable; switch 2 set to desirable.
  • switch 1 set to auto; switch 2 set to auto.
  • switch 1 set to on; switch 2 set to desirable.
  • switch 1 set to auto; switch 2 set to on.
Explanation:  No answer description available for this question

Q15. Question

Explanation:  No answer description available for this question

Q16. Which three options must match in order to establish an EtherChannel between two directly connected switches? (Choose three.)

  • duplex settings of the interfaces that are used for EtherChannel
  • port security settings on the interfaces that used for EtherChannel
  • VLAN memberships of the interfaces that are used for EtherChannel
  • speed of the interfaces that are used for EtherChannel
  • domain names on the switches
  • port numbers that are used for the EtherChannel
Explanation:  Speed and duplex settings must match for all interfaces in an EtherChannel. All interfaces in the EtherChannel must be in the same VLAN if the ports are not configured as trunks. Any ports may be used to establish an EtherChannel. Domain names and port security settings are not relevant to EtherChannel.

Q17. Which two protocols are used to implement EtherChannel? (Choose two.)

  • Link Aggregation Control Protocol
  • Spanning Tree Protocol
  • Port Aggregation Protocol
  • Cisco Discovery Protocol
  • Rapid Spanning Tree Protocol
Explanation:  Port Aggregation Protocol and Link Aggregation Control Protocol are used to implement EtherChannel. Spanning Tree and Rapid Spanning Tree Protocol are used to prevent switching loops. Cisco Discovery Protocol is Cisco-proprietary and is used to discovery information about adjacent Cisco devices such as model number and IP address.

Q18. In FHRP terminology, what represents a set of routers that present the illusion of a single router to hosts?

  • virtual router
  • forwarding router
  • standby router
  • default gateway
Explanation:  In FHRP multiple routers are configured to work together to present to hosts a single gateway router. This single gateway router is a virtual router which has a virtual IP address that is used by hosts as a default gateway.

Q19. Which command must be used on SW2 to enable this EtherChannel?

  • SW2(config-if-range)# channel-group 1 mode desirable
  • SW2(config-if-range)# channel-group 1 mode auto
  • SW2(config-if-range)# channel-group 1 mode passive
  • SW2(config-if-range)# channel-group 1 mode active
Explanation:  No answer description available for this question

Q20. An EtherChannel link using LACP was formed between two switches, S1 and S2. While verifying the configuration, which mode combination could be utilized on both switches?

  • S1-on and S2-active
  • S1-passive and S2-passive
  • S1-on and S2-passive
  • S1-passive and S2-active
Explanation:  An EtherChannel link will be formed using LACP when both switches are in on mode or in active mode, or when one of them is in passive mode and the other is in active mode.

Q21. Which statement describes a characteristic of EtherChannel?

  • It can bundle mixed types of 100 Mb/s and 1Gb/s Ethernet links.
  • It consists of multiple parallel links between a switch and a router.
  • It can combine up to a maximum of 4 physical links.
  • It is made by combining multiple physical links that are seen as one link between two switches.
Explanation:  An EtherChannel is formed by combining multiple (same type) Ethernet physical links so they are seen and configured as one logical link. It provides an aggregated link between two switches. Currently each EtherChannel can consist of up to eight compatibly configured Ethernet ports.

Q22. Question

Explanation:  No answer description available for this question

Q23. Which statement is true regarding the use of PAgP to create EtherChannels?

  • It requires more physical links than LACP does.
  • It mandates that an even number of ports (2, 4, 6, etc.) be used for aggregation.
  • It is Cisco proprietary.
  • It increases the number of ports that are participating in spanning tree.
  • It requires full duplex.
Explanation:  PAgP is used to automatically aggregate multiple ports into an EtherChannel bundle, but it only works between Cisco devices. LACP can be used for the same purpose between Cisco and non-Cisco devices. PAgP must have the same duplex mode at both ends and can use two ports or more. The number of ports depends on the switch platform or module. An EtherChannel aggregated link is seen as one port by the spanning-tree algorithm.

Q24. Question

Explanation:  No answer description available for this question

Q25. Which nonproprietary protocol provides router redundancy for a group of routers which support IPv4 LANs?

  • GLBP
  • SLB
  • VRRPv2
  • HSRP
Explanation:  The only nonproprietary FHRP used for router redundancy listed in the options is VRRPv2. HSRP and GLBP are both Cisco proprietary FHRPs. IOS SLB is a Cisco-based solution used to load balance traffic across multiple servers.

Q26. A network administrator is configuring an EtherChannel link between switches SW1 and SW2 by using the command SW1(config-if-range)# channel-group 1 mode passive. Which command must be used on SW2 to enable this EtherChannel?

  • SW2(config-if-range)# channel-group 1 mode desirable
  • SW2(config-if-range)# channel-group 1 mode auto
  • SW2(config-if-range)# channel-group 1 mode passive
  • SW2(config-if-range)# channel-group 1 mode active
Explanation:  The possible combinations to establish an EtherChannel between SW1 and SW2 using LACP or

PAgP are as follows:
PAgP
on on
auto desirable
desirable desirable

LACP
on on
active active
passive active

The EtherChannel mode chosen on each side of the EtherChannel must be compatible in order to enable it.

Q27. Question

Explanation:  No answer description available for this question

Q28. Which IEEE wireless standard is known as WiGig and operates using a tri-band solution in the 2.4, 5, and 60 GHz ranges?

  • 802.11g
  • 802.11n
  • 802.11ac
  • 802.11ad
Explanation:  No answer description available for this question

Q29. Which two roles are typically performed by a wireless router that is used in a home or small business? (Choose two.)

  • repeater
  • access point
  • WLAN controller
  • Ethernet switch
  • RADIUS authentication server
Explanation:  In addition to its roles as router, a typical SOHO wireless router acts as both a wireless access point and an Ethernet switch. RADIUS authentication is provided by an external server. A WLAN controller is used in enterprise deployments to manage groups of lightweight access points. A repeater is a device that enhances an incoming signal and retransmits it.

Q30. A supervisor needs wireless access in the construction office during the construction of a new building. The construction office is in the new building and directly across the road from headquarters. What could be used to satisfy this requirement of needing a narrow area of coverage?

  • multiple MIMO antennas
  • omnidirectional
  • rubber duck
  • Yagi
Explanation:  No answer description available for this question

Q31. A student uses a laptop to upload an assignment to a file server. Which wireless frame type did the laptop send to locate and associate with the campus access point?

  • beacon frame
  • control frame
  • data frame
  • management frame
Explanation:  No answer description available for this question

Q32. During which stage of establishing connectivity between a WLAN client and an AP does the client learn the MAC address of the AP?

  • discovery
  • probing
  • association
  • encryption
  • authentication
Explanation:  No answer description available for this question

Q33. For which discovery mode will an AP generate the most traffic on a WLAN?

  • passive mode
  • open mode
  • mixed mode
  • active mode
Explanation:  No answer description available for this question

Q34. What is the purpose of the Distributed Coordination Function in an IEEE 802.11 WLAN environment?

  • It allows a client to detect whether or not a channel is clear prior to transmission.
  • It is used in a full-duplex environment to detect collisions.
  • It is used to send data over a half-duplex connection.
  • It allows the client to change transmission channels.
Explanation:  No answer description available for this question

Q35. What is an advantage of SSID cloaking?

  • It provides free Internet access in public locations where knowing the SSID is of no concern.
  • Clients will have to manually identify the SSID to connect to the network.​
  • SSIDs are very difficult to discover because APs do not broadcast them.​
  • It is the best way to secure a wireless network.
Explanation:  No answer description available for this question

Q36. If three 802.11b access points need to be deployed in close proximity, which three frequency channels should be used? (Choose three.)

  • 1
  • 3
  • 5
  • 6
  • 8
  • 11
Explanation:  In order to minimize interference, one of the three non-overlapping channels should be used in 2.4GHz Wi-Fi networks: 1, 6, or 11.

Q37. Which three Wi-Fi standards operate in the 2.4GHz range of frequencies? (Choose three.)

  • 802.11a
  • 802.11b
  • 802.11g
  • 802.11n
  • 802.11ac
Explanation:  No answer description available for this question

Q38. An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation?

  • cracking
  • denial of service
  • rogue access point
  • spoofing
Explanation:  No answer description available for this question

Q39. Which security mode is the least secure choice when a home wireless router is configured?

  • WPA
  • WPA2
  • WEP
  • WPA2-Personal
Explanation:  No answer description available for this question

Q40. Which parameter is commonly used to identify a wireless network name when a home wireless AP is being configured?

  • ad hoc
  • BESS
  • ESS
  • SSID
Explanation:  No answer description available for this question

Q41. A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network?

  • Replace the wireless NICs on the computers that are experiencing slow connections.
  • Split the traffic between the 2.4 GHz and 5 GHz frequency bands.
  • Disable DHCP on the access point and assign static addresses to the wireless clients.
  • Upgrade the firmware on the wireless access point.
Explanation:  No answer description available for this question

Q42. Fill in the blank. Do not use abbreviations.

Ad hoc wireless topologies sometimes can use a feature called tetheringto enable a smartphone to create a personal hotspot.
Explanation:  No answer description available for this question

Q43. Fill in the blank.

A network administrator discovers a rogue AP in the network. The rogue AP is capturing traffic and then forwarding it on to the legitimate AP. This type of attack is known as a man-in -the -middle attack.
Explanation:  No answer description available for this question

Q44. Fill in the blank. Use the acronym.

Which encryption protocol is used by the WPA2 shared key authentication technique?​ AES
Explanation:  No answer description available for this question

Q45. Which organization certifies vendors for adherence to the 802.11 standards to improve interoperability of 802.11 products?

  • FCC
  • IEEE
  • ITU-R
  • Wi-Fi Alliance
Explanation:  No answer description available for this question

Q46. What type of wireless antenna is best suited for providing coverage in large open spaces, such as hallways or large conference rooms?

  • omnidirectional
  • directional
  • Yagi
  • dish
Explanation:  No answer description available for this question

Q47. Which feature of 802.11n wireless access points allows them to transmit data at faster speeds than previous versions of 802.11 Wi-Fi standards did?

  • SPS
  • WPS
  • MIMO
  • MITM
Explanation:  Multiple-input multiple-output (MIMO) technology allows 802.11n devices to use multiple antennas in order to increase the available bandwidth for the wireless network. Single Point Setup (SPS) is a Cisco technology that makes AP deployment easier by supporting clustering from a single management interface. Wi-Fi Protected Setup (WPS) is used to simplify connecting clients to secure wireless networks. Man-in-the-middle (MITM) is a type of security attack where the attacker attempts to insert themselves into the middle of a data stream.

Q48. What is a difference between Cisco APs that operate in a home environment and Cisco APs that operate in a corporate environment?

  • Autonomous APs are used only in the home environment, and they incorporate the functions of a router, switch, and AP into one device.
  • Controller-based APs are used in the corporate environment, and they are server-dependent devices that require an initial configuration to operate.
  • Cisco corporate APs do not support PoE.
  • Some corporate AP models can operate in either autonomous mode or controller-based mode.
Explanation:  No answer description available for this question

Q49. Which type of wireless topology is created when two or more Basic Service Sets are interconnected by Ethernet?

  • IBISS
  • BSS
  • WiFi Direct
  • ESS
  • ad hoc WLAN
Explanation:  Wireless devices operate in either ad hoc or infrastructure modes. An ad hoc WLAN, also referred to as an independent basic service set (IBISS), operates on a peer-to-peer basis without a network. Infrastructure modes can consist of a single Basic Service Set (BSS) with an AP interconnecting associated stations, or an Extended Service Set (ESS), with two or more BSSes interconnected over a wire distribution system such as Ethernet. WiFi Direct is a compatibility certification unrelated to WLAN topologies.

Q50. Which type of management frame may regularly be broadcast by an AP?

  • beacon
  • probe request
  • authentication
  • probe response
Explanation:  No answer description available for this question

Q51. Which statement defines the control frame operation between two stations?

  • A station sends an RTS frame as the first step in a three-way handshake that is required before sending data frames.
  • A station responds to an RTS frame with an ACK frame, thus providing permission for the requesting station to send a data frame.
  • If the sending station does not receive an ACK frame within a predetermined period of time, the sending station will drop the connection.
  • After receiving a data frame, the receiving station will send an ACK frame to the sending station if no errors are found.
Explanation:  No answer description available for this question

Q52. A administrator wishes to extend the range of the existing IEEE 802.11n network without changing the AP. What can the administrator do to accomplish this?

  • Upgrade the firmware on the AP.
  • Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.
  • Deploy a Wi-Fi Range Extender.
  • Change to WPA2 authentication.
Explanation:  No answer description available for this question

Q53. Question

Explanation:  No answer description available for this question

Q54. Question

Explanation:  No answer description available for this question

Q55. Question

Explanation:  No answer description available for this question

Q56. A WLAN user wants to allocate an optimal amount of bandwidth to a specific online game. What is a Linksys Smart Wi-Fi tool that will allow the user to do this?

  • Widgets
  • Speed Test
  • Media Prioritization
  • Bandwidth Prioritization
Explanation:  No answer description available for this question