Chapter 4-6 CCna 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

Refer to the exhibit. A network administrator needs to configure router-on-a-stick for the networks that are shown. How many subinterfaces will have to be created on the router if each VLAN that is shown is to be routed and each VLAN has its own subinterface?

4

Refer to the exhibit. How many broadcast domains are displayed?

8

Refer to the exhibit. A network technician is troubleshooting connectivity issues in an Ethernet network with the command show interfaces fastEthernet 0/0. What conclusion can be drawn based on the partial output in the exhibit?

A malfunctioning NIC can cause frames to be transmitted that are longer than the allowed maximum length.

A small college uses VLAN 10 for the classroom network and VLAN 20 for the office network. What is needed to enable communication between these two VLANs while using legacy inter-VLAN routing?

A router with at least two LAN interfaces should be used.

A high school uses VLAN15 for the laboratory network and VLAN30 for the faculty network. What is required to enable communication between these two VLANs while using the router-on-a-stick approach?

A switch with a port that is configured as a trunk is needed when connecting to the router.

A network administrator is determining the best placement of VLAN trunk links. Which two types of point-to-point connections utilize VLAN trunking?​

Between two switches that utilize multiple VLANs. Between a switch and a server that has an 802.1Q NIC.

Which four steps are needed to configure a voice VLAN on a switch port?

Configure the switch port in access mode. Add a voice VLAN. Assign the voice VLAN to the switch port. Ensure that voice traffic is trusted and tagged with a CoS priority value.

What is a definition of a two-tier LAN network design?

Distribution and core layers collapsed into one tier, and the access layer on a separate tier.

Which two statements are true regarding switch port security?

Dynamically learned secure MAC addresses are lost when the switch reboots. If fewer than the maximum number of MAC addresses for a port are configured statically, dynamically learned addresses are added to CAM until the maximum number is reached.

A network designer must provide a rationale to a customer for a design which will move an enterprise from a flat network topology to a hierarchical network topology. Which two features of the hierarchical design make it the better choice?

Easier to provide redundant links to ensure higher availability. Simpler deployment for additional switch equipment.

What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3?

Enter the switchport access vlan 3 command in interface configuration mode.

What is the destination address in the header of a broadcast frame?

FF-FF-FF-FF-FF-FF

Which statement describes the port speed LED on the Cisco Catalyst 2960 switch?

If the LED is green, the port is operating at 100 Mb/s.

Which action will bring an error-disabled switch port back to an operational state?

Issue the shutdown and then no shutdown interface commands.

A Cisco switch currently allows traffic tagged with VLANs 10 and 20 across trunk port Fa0/5. What is the effect of issuing a switchport trunk allowed vlan 30 command on Fa0/5?

It allows only VLAN 30 on Fa0/5.

Refer to the exhibit. The network administrator wants to configure Switch1 to allow SSH connections and prohibit Telnet connections. How should the network administrator change the displayed configuration to satisfy the requirement?

Modify the transport input command.

Which type of VLAN is used to designate which traffic is untagged when crossing a trunk port?

Native

Which PCs will receive the broadcast sent by PC-C?

PC-D, PC-E

A production switch is reloaded and finishes with a Switch> prompt. What two facts can be determined?

POST occurred normally. A full version of the Cisco IOS was located and loaded.

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.Which event will take place if there is a port security violation on switch S1 interface Fa0/1?

Packets with unknown source addresses will be dropped.

Refer to the exhibit. Which event will take place if there is a port security violation on switch S1 interface Fa0/1?

Packets with unknown source addresses will be dropped.

Which two statements are true about using full-duplex Fast Ethernet?

Performance is improved with bidirectional data flow. Full-duplex Fast Ethernet offers 100 percent efficiency in both directions.

Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport access vlan 30 is entered on the Fa0/11 interface, what will happen?

Port Fa0/11 will be returned to VLAN 1.

Where are dynamically learned MAC addresses stored when sticky learning is enabled with the switchport port-security mac-address sticky command?

RAM

A network administrator configures the port security feature on a switch. The security policy specifies that each access port should allow up to two MAC addresses. When the maximum number of MAC addresses is reached, a frame with the unknown source MAC address is dropped and a notification is sent to the syslog server. Which security violation mode should be configured for each access port?

Restrict

Refer to the exhibit. How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty?

SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch.

Refer to the exhibit. Port Fa0/2 has already been configured appropriately. The IP phone and PC work properly. Which switch configuration would be most appropriate for port Fa0/2 if the network administrator has the following goals?

SWA(config-if)# switchport port-securitySWA(config-if)# switchport port-security maximum 2SWA(config-if)# switchport port-security mac-address sticky

What are three primary benefits of using VLANs?

Security Cost Reduction Improved IT staff efficiency

A small publishing company has a network design such that when a broadcast is sent on the LAN, 200 devices receive the transmitted broadcast. How can the network administrator reduce the number of devices that receive broadcast traffic?

Segment the LAN into smaller LANs and route between them.

The _____ command displays the VLAN assignment for all ports as well as the existing VLANs on the switch.

Show vlan

What is one difference between using Telnet or SSH to connect to a network device for management purposes?

Telnet sends a username and password in plain text, whereas SSH encrypts the username and password.

Refer to the exhibit. PC-A and PC-B are both in VLAN 60. PC-A is unable to communicate with PC-B. What is the problem?

The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk.

Which statement describes a result after multiple Cisco LAN switches are interconnected?

The broadcast domain expands to all switches.

What happens to a port that is associated with VLAN 10 when the administrator deletes VLAN 10 from the switch?

The port becomes inactive.

Refer to the exhibit. What can be determined about port security from the information that is shown?

The port violation mode is the default for any port that has port security enabled.

What is a characteristic of legacy inter-VLAN routing?

The router requires one Ethernet link for each VLAN.

Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.35 and a destination address of 192.168.1.85. What will the router do with this packet?

The router will forward the packet out interface FastEthernet 0/1.2.

Refer to the exhibit. What media issue might exist on the link connected to Fa0/1 based on the show interface command?

There could be too much electrical interference and noise on the link.

Refer to the exhibit. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the show running-config command output. PCs on VLAN 45 that are using the 172.16.45.0 /24 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem?​

There is an incorrect IP address configured on GigabitEthernet 0/0.30.

What is a function of the switch boot loader?

To provide an environment to operate in when the switch operating system cannot be found.

Which interface is the default location that would contain the IP address used to manage a 24-port Ethernet switch?

VLAN 1

Which two characteristics match extended range VLANs?

VLAN IDs exist between 1006 to 4094. They are saved in the running-config file by default.

In which situation would a technician use the show interfaces switch command?

When packets are being dropped from a particular directly attached host.

What is a collapsed core in a network design?

a combination of the functionality of the distribution and core layers

Which solution would help a college alleviate network congestion due to collisions?

a high port density switch

What is a basic function of the Cisco Borderless Architecture distribution layer?

aggregating Layer 3 routing boundaries

Which command is used to set the BOOT environment variable that defines where to find the IOS image file on a switch?

boot system

A _____ network is one that uses the same infrastructure to carry voice, data, and video signals.

converged

What is one function of a Layer 2 switch?

determines which interface is used to forward a frame based on the destination MAC address

What is a disadvantage of using router-on-a-stick inter-VLAN routing?

does not scale well beyond 50 VLANs

What is the effect of using the switchport port-security command?

enables port security on an interface

A local law firm is redesigning the company network so that all 20 employees can be connected to a LAN and to the Internet. The law firm would prefer a low cost and easy solution for the project. What type of switch should be selected?

fixed configuration

What are two advantages of modular switches over fixed-configuration switches?

increased scalability need for fewer power outlets

What two criteria are used by a Cisco LAN switch to decide how to forward Ethernet frames?

ingress port destination MAC address

Do not use abbreviations.What is the missing command on S1?

ip address 192.168.99.2 255.255.255.0

When a Cisco switch receives untagged frames on a 802.1Q trunk port, which VLAN ID is the traffic switched to by default?

native VLAN ID

Which command is used to remove only VLAN 20 from a switch?

no vlan 20

If one end of an Ethernet connection is configured for full duplex and the other end of the connection is configured for half duplex, where would late collisions be observed?

on the half-duplex end of the connection

Which network device can serve as a boundary to divide a Layer 2 broadcast domain?

router

Which type of address does a switch use to build the MAC address table?

source MAC address

Which network device can be used to eliminate collisions on an Ethernet network?

switch

Refer to the exhibit. DLS1 is connected to another switch, DLS2, via a trunk link. A host that is connected to DLS1 is not able to communicate to a host that is connected to DLS2, even though they are both in VLAN 99. Which command should be added to Fa0/1 on DLS1 to correct the problem?

switchport trunk native vlan 66

What does the term "port density" represent for an Ethernet switch?

the number of available ports

Refer to the exhibit. Consider that the main power has just been restored. PC3 issues a broadcast IPv4 DHCP request. To which port will SW1 forward this request?​

to Fa0/1, Fa0/2, and Fa0/3 only

What are two reasons a network administrator would segment a network with a Layer 2 switch?

to enhance user bandwidth to isolate traffic between segments

When configuring a router as part of a router-on-a-stick inter-VLAN routing topology, where should the IP address be assigned?

to the subinterface

Refer to the exhibit. In what switch mode should port G0/1 be assigned if Cisco best practices are being used?

trunk

Which two previously independent technologies should a network administrator attempt to combine after choosing to upgrade to a converged network infrastructure?

user data traffic VoIP phone traffic


Conjuntos de estudio relacionados

LearningCurve: 8b. Storing and Retrieving Memories

View Set

Lifespan Final Review Chapter 7 - 15

View Set

Bio Practical 2 (behavior, climate change)

View Set

Health Insurance Policy Provisions

View Set

Joseph Stalin and Totalitarianism

View Set

Synonyms and Antonyms Vocabulary Test

View Set

Chap 14 Development through the Lifespan, 7e

View Set

EMS Chapter 2 - Workforce Safety and Wellness

View Set

New Deal - Relief, Recovery, Reform

View Set

International Political Economy- Chapter 1

View Set

Chapter 59: Caring for Clients with Disorders of the Bladder and Urethra

View Set