Networking Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

A Cisco switch currently allows traffic tagged with VLANs 10 and 20 across trunk port Fa0/5. What is the effect of issuing a switchport trunk allowed vlan 30 command on Fa0/5? It allows only VLAN 30 on Fa0/5. It allows VLANs 1 to 30 on Fa0/5. It allows a native VLAN of 30 to be implemented on Fa0/5. It allows VLANs 10, 20, and 30 on Fa0/5.

A

A network administrator is configuring an EtherChannel link between two physical ports on a switch. Which statement describes the result when one of the physical ports fails? The EtherChannel continues transmitting data with reduced bandwidth. An STP recalculation is needed. The EtherChannel stops transmitting data until it is restarted. The EtherChannel link fails.

A

Which statement describes SVIs? A default SVI is created for VLAN 1 for switch administration. An SVI can only be created for the management VLAN. An SVI is created automatically for each VLAN on a multilayer switch. Creating an SVI automatically creates an associated VLAN.

A

Which switching method makes use of the FCS value? store-and-forward broadcast large frame buffer cut-through

A

A DHCP-enabled client PC has just booted. During which two steps will the client PC use broadcast messages when communicating with a DHCP server? (Choose two.) DHCPREQUEST DHCPOFFER DHCPDISCOVER DHCPNAK DHCPACK

A and C

What are three primary benefits of using VLANs? (Choose three.) cost reduction a reduction in the number of trunk links security end user satisfaction

A and C

A network administrator enters the following command sequence on a Cisco 3560 switch. What is the purpose of these commands? Switch(config)# interface gigabitethernet 0/1Switch(config-if)# no switchport to enable the Gi0/1 port as a switch virtual interface to make the Gi0/1 port a routed port to enable the Gi0/1 port as a bridge virtual interface to shut down the Gi0/1 port

B

When a Cisco switch receives untagged frames on a 802.1Q trunk port, which VLAN ID is the traffic switched to by default? management VLAN ID native VLAN ID unused VLAN ID data VLAN ID

B

If more than one DHCP server is available on the local network, in which order will DHCP messages be sent between a host and a DHCP server? request, acknowledgment, discover, offer acknowledgment, request, offer, discover discover, offer, request, acknowledgment request, discover, offer, acknowledgment

C

What advantage does SSH offer over Telnet? username and password authentication more connection lines encryption connection-oriented services

C

When a range of ports is being configured for EtherChannel by the use of PAgP, which mode will form the bundled channel only if the port receives PAgP packets from another device? passive active auto desirable

C

Which type of inter-VLAN communication design requires the configuration of multiple subinterfaces? routing for the management VLAN routing via a multilayer switch router on a stick legacy inter-VLAN routing

C

Which three port states are used by Rapid PVST+? (Choose three.) listening blocking learning trunking discarding forwarding

C, D, and F

What value determines the root bridge when all switches connected by trunk links have default STP configurations? VLAN ID extended system ID bridge priority MAC address

D

Which STP port role is adopted by a switch port if there is no other port with a lower cost to the root bridge? disabled port alternate designated port root port

D

Which distinct type of VLAN is used by an administrator to access and configure a switch? default VLAN data VLAN native VLAN management VLAN

D

Which switch characteristic helps alleviate network congestion when a 10 Gbps port is forwarding data to a 1 Gbps port? fast port speed fast internal switching high port density frame buffering

D

Which type of address does a switch use to build the MAC address table? destination IP address source IP address destination MAC address source MAC address

D

Which information does a switch use to keep the MAC address table information current? the source and destination MAC addresses and the incoming port the destination MAC address and the outgoing port the source MAC address and the outgoing port the source and destination MAC addresses and the outgoing port the destination MAC address and the incoming port the source MAC address and the incoming port

F

Which three Cisco products focus on endpoint security solutions? (Choose three.) Email Security Appliance Adaptive Security Appliance Web Security Appliance NAC Appliance IPS Sensor Appliance SSL/IPsec VPN Appliance

A, C, and D

If three 802.11b access points need to be deployed in close proximity, which three frequency channels should be used? (Choose three.) 11 8 3 1 6 5

A, D, and E

A user needs to add redundancy to the routers in a company. What are the three options the user can use? (Choose three.) VRRP STP IPFIX HSRP RAID GLBP

A, D, and F

A network administrator is analyzing the features that are supported by different first-hop router redundancy protocols. Which statement is a feature that is associated with GLBP? GLBP allows load balancing between routers. It works together with VRRP. It uses a virtual router master. It is nonproprietary.

A

A network administrator is configuring DHCP snooping on a switch. Which configuration command should be used first? ip dhcp snooping ip dhcp snooping limit rate ip dhcp snooping vlan ip dhcp snooping trust

A

A network administrator is entering the command ipv6 unicast-routing to start configuring DHCPv6 operation on a router. Which statement describes the function of this command? It is required for sending ICMPv6 RA messages. It is required for enabling DNS service in DHCPv6 configurations. It is required to configure stateful DHCPv6 server on the router. It is required to configure stateless DHCPv6 server on the router.

A

In a server-based AAA implementation, which protocol will allow the router to successfully communicate with the AAA server? RADIUS 802.1x TACACS​ SSH

A

What is a DHCP scope as it relates to a WLAN configured on the WLC controller? a pool of IP addresses for WLAN clients a corporate plan for allocation of IP addresses for wireless clients the distance allotted for wireless clients that can receive IP addressing information security rules associated with DHCP for WLANs

A

What is a characteristic of a default static route? ​ It identifies the gateway IP address to which the router sends all IP packets for which it does not have a learned or static route. It uses a single network address to send multiple static routes to one destination address. It is configured with a higher administrative distance than is the original dynamic routing protocol. It backs up a route already discovered by a dynamic routing protocol.

A

What is involved in an IP address spoofing attack? A legitimate network IP address is hijacked by a rogue node. Bogus DHCPDISCOVER messages are sent to consume all the available IP addresses on a DHCP server. A rogue DHCP server provides false IP configuration parameters to legitimate DHCP clients. A rogue node replies to an ARP request with its own MAC address indicated for the target IP address.

A

What network address and subnet mask combination would be used to create a default static route that matches any IPv4 destination? 0.0.0.0 0.0.0.0 0.0.0.0 255.255.255.255 255.255.255.255 255.255.255.255 255.255.255.255 0.0.0.0

A

What type of static route is created when the next-hop IP address and exit interface are specified? fully specified static route recursive static route floating static route directly connected static route

A

When security is a concern, which OSI Layer is considered to be the weakest link in a network system?​ Layer 2 Layer 7 Layer 4 Layer 3

A

Which Layer 2 attack will result in a switch flooding incoming frames to all ports? MAC address overflow IP address spoofing ARP poisoning Spanning Tree Protocol manipulation

A

Which command should be configured on a router interface to set the router as a stateful DHCPv6 client? ipv6 address dhcp ipv6 dhcp server stateful ipv6 enable ipv6 address autoconfigure

A

Which command would be best to use on an unused switch port if a company adheres to the best practices as recommended by Cisco? shutdown switchport port-security mac-address sticky ip dhcp snooping switchport port-security mac-address sticky mac-address switchport port-security violation shutdown

A

Which nonproprietary protocol provides router redundancy for a group of routers which support IPv4 LANs? VRRPv2 SLB GLBP HSRP

A

Which parameter is commonly used to identify a wireless network name when a home wireless AP is being configured? SSID ESS ad hoc BESS

A

Which type of route would typically be used on a border router so that devices inside the company could access the Internet? default static summary directly connected

A

Which type of static route creates a gateway of last resort? default static route standard static route summary static route floating static route

A

Which type of static route typically uses the distance parameter in the ip route global configuration command? floating static route standard static route default static route summary static route

A

Which wireless network topology is being configured by a technician who is installing a keyboard, a mouse, and headphones, each of which uses Bluetooth? ad hoc mode hotspot infrastructure mode mixed mode

A

What are two reasons why an administrator might choose to use static routing rather than dynamic routing? (Choose two.) Static routing uses less router processing and bandwidth. Static routing is more secure. Static routing is easier to maintain in large networks. Static routing does not require complete knowledge of the whole network. Static routing is more scalable.

A and B

Which two commands can be used to enable PortFast on a switch? (Choose two.) S1(config-if)# spanning-tree portfast S1(config)# spanning-tree portfast default S1(config-if)# enable spanning-tree portfast S1(config-line)# spanning-tree portfast S1(config)# enable spanning-tree portfast default

A and B

A laptop cannot connect to a wireless access point. Which two troubleshooting steps should be taken first? (Choose two.) Ensure that the wireless NIC is enabled. Ensure that the laptop antenna is attached. Ensure that the wireless SSID is chosen. Ensure that the correct network media is selected. Ensure that the NIC is configured for the proper frequency.

A and C

A network administrator is overseeing the implementation of first hop redundancy protocols. Which two protocols are Cisco proprietary? (Choose two.) HSRP VRRPv2 GLBP IRDP VRRP

A and C

Which two features on a Cisco Catalyst switch can be used to mitigate DHCP starvation and DHCP spoofing attacks? (Choose two.) port security strong password on DHCP servers DHCP snooping DHCP server failover extended ACL

A and C

Which protocol and port numbers are used by both IPv4 and IPv6 CAPWAP tunnels? (Choose two.) UDP ICMP 17 and 163 5246 and 5247 TCP

A and D

What are two functions of a router? (Choose two.) A router connects multiple IP networks. It provides segmentation at Layer 2. It builds a routing table based on ARP requests. It controls the flow of data via the use of Layer 2 addresses. It determines the best path to send packets.

A and E

What are two functions of dynamic routing protocols? (Choose two.) to discover the network to assure low router overhead to avoid exposing network information to choose the path that is specified by the administrator to maintain routing tables

A and E

A network administrator is configuring DAI on a switch. Which command should be used on the uplink interface that connects to a router? ip arp inspection vlan ip arp inspection trust spanning-tree portfast ip dhcp snooping

B

A network administrator is configuring a route to forward packets to a specific web server. What type of route should be configured by the administrator? an EIGRP route a host route an OSPF route a default route a static route with an administrative distance higher than 1

B

A user has just purchased a generic home router and would like to secure it. What should be done to help secure the wireless home router? Change the default SSID. Change the default administrator password. Allow only IPv6 traffic to enter the router. Set a private IPv4 network for the internal network.

B

In setting up a small office network, the network administrator decides to assign private IP addresses dynamically to workstations and mobile devices. Which feature must be enabled on the company router in order for office devices to access the internet? QoS NAT UPnP MAC filtering

B

In the context of mobile devices, what does the term tethering involve? connecting a mobile device to a hands-free headset connecting a mobile device to another mobile device or computer to share a network connection connecting a mobile device to a USB port on a computer in order to charge the mobile device connecting a mobile device to a 4G cellular network

B

Users on an IEEE 802.11n network are complaining of slow speeds. The network administrator checks the AP and verifies it is operating properly. What can be done to improve the wireless performance in the network? Set the AP to mixed mode. Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band. Switch to an 802.11g AP. Change the authentication method on the AP.

B

What address and prefix length is used when configuring an IPv6 default static route? ::1/128 ::/0 FF02::1/8 0.0.0.0/0

B

What functionality is required on routers to provide remote workers with VoIP and videoconferencing capabilities? PPPoE QoS VPN IPsec

B

What is a potential disadvantage when implementing HSRP as compared to GLBP? HSRP does not have the capability to support IPv6 addresses. HSRP does not provide load balancing with multiple active routers. HSRP does not function in a multivendor environment. HSRP provides default gateway failover only when the active router fails.

B

What is an advantage of using dynamic routing protocols instead of static routing? more secure in controlling routing updates ability to actively search for new routes if the current path becomes unavailable​ easier to implement fewer router resource overhead requirements

B

What is the most likely scenario in which the WAN interface of a router would be configured as a DHCP client to be assigned a dynamic IP address from an ISP? There is a web server for public access on the LAN that is attached to the router. It is a SOHO or home broadband router. The router is configured as a DHCP server. The router is also the gateway for a LAN.

B

What is the purpose of AAA accounting? to prove users are who they say they are to collect and report application usage to determine which operations the user can perform to determine which resources the user can access

B

What is the purpose of a floating static route? It is commonly used when a dynamic routing protocol is not being used. It allows an alternate connection to be used when the preferred link fails. It allows connectivity to remote destinations that are not contained in the routing table. It allows summarization of contiguous networks.

B

Where are dynamically learned MAC addresses stored when sticky learning is enabled with the switchport port-security mac-address sticky command? NVRAM RAM ROM flash

B

Which Cisco solution helps prevent MAC and IP address spoofing attacks? Dynamic ARP Inspection IP Source Guard Port Security DHCP Snooping

B

Which IPv6 static route would serve as a backup route to a dynamic route learned through OSPF? Router1(config)# ipv6 route 2001:db8:acad:1::/32 gigabitethernet0/0 2001:db8:acad:6::100 100 Router1(config)# ipv6 route 2001:db8:acad:1::/32 2001:db8:acad:6::2 200 Router1(config)# ipv6 route 2001:db8:acad:1::/32 2001:db8:acad:6::100 Router1(config)# ipv6 route 2001:db8:acad:1::/32 2001:db8:acad:6::2 100

B

Which Layer 2 attack will result in legitimate users not getting valid IP addresses? IP address spoofing DHCP starvation MAC address flooding ARP spoofing

B

Which WLC tab would a network administrator typically use to see a summary view of the most heavily used WLANs including the number of clients using a particular WLAN? Controller Monitor Commands WLANs

B

Which protocol could be used by a company to monitor devices such as a wireless LAN controller (WLC)? NTP SNMP PAT SSH

B

Which security feature should be enabled in order to prevent an attacker from overflowing the MAC address table of a switch? storm control port security root guard BPDU filter

B

Which statement describes an autonomous access point? It is managed by a WLAN controller. It is a standalone access point. It is server-dependent. It is used for networks that require a large number of access points.

B

Which type of static route that is configured on a router uses only the exit interface? default static route directly connected static route fully specified static route recursive static route

B

Which type of telecommunication technology is used to provide Internet access to vessels at sea? municipal WiFi satellite cellular WiMax

B

Why would a technician configure a passphrase for a WLAN on a wireless router? to protect the SSID from being changed to configure wireless client authentication to protect someone from changing the configuration to protect someone from cabling directly to the router and accessing the router

B

When first hop redundancy protocols are used, which two items will be shared by a set of routers that are presenting the illusion of being a single router? (Choose two.) BID MAC address IP address static route hostname

B and C

What are two types of switch ports that are used on Cisco switches as part of the defense against DHCP spoofing attacks? (Choose two.) established DHCP port untrusted port unauthorized port trusted DHCP port unknown port authorized DHCP port

B and D

Which two route source codes are automatically created within a routing table whenever a router interface is configured with an IP address and activated? (Choose two.) D C S L O

B and D

Which three interface parameters must match for an EtherChannel to form? (Choose three.) EtherChannel mode allowed VLANs native VLAN trunking mode spanning-tree state PortFast mode

B, C , and D

Which three advantages are provided by static routing? (Choose three.) Configuration of static routes is error-free. The path a static route uses to send data is known. No intervention is required to maintain changing route information. Static routes scale well as the network grows. Static routing typically uses less network bandwidth and fewer CPU operations than dynamic routing does. Static routing does not advertise over the network, thus providing better security.

B, E, and F

A client is using SLAAC to obtain an IPv6 address for its interface. After an address has been generated and applied to the interface, what must the client do before it can begin to use this IPv6 address? It must send a DHCPv6 REQUEST message to the DHCPv6 server to request permission to use this address. It must send an ICMPv6 Router Solicitation message to determine what default gateway it should use. It must send an ICMPv6 Neighbor Solicitation message to ensure that the address is not already in use on the network. It must send a DHCPv6 INFORMATION-REQUEST message to request the address of the DNS server.

C

A network administrator configures a router by the command ip route 0.0.0.0 0.0.0.0 209.165.200.226. What is the purpose of this command? to forward packets destined for the network 0.0.0.0 to the device with IP address 209.165.200.226 to add a dynamic route for the destination network 0.0.0.0 to the routing table to provide a route to forward packets for which there is no route in the routing table to forward all packets to the device with IP address 209.165.200.226

C

A network administrator is analyzing first-hop router redundancy protocols. What is a characteristic of VRRPv3? VRRPv3 is Cisco proprietary. It allows load balancing between routers. It supports IPv6 and IPv4 addressing. It works together with HSRP.

C

A network administrator is configuring DAI on a switch with the command ip arp inspection validate dst-mac. What is the purpose of this configuration command? to check the destination MAC address in the Ethernet header against the user-configured ARP ACLs to check the destination MAC address in the Ethernet header against the source MAC address in the ARP body to check the destination MAC address in the Ethernet header against the target MAC address in the ARP body to check the destination MAC address in the Ethernet header against the MAC address table

C

A network engineer is configuring a LAN with a redundant first hop to make better use of the available network resources. Which protocol should the engineer implement? FHRP VRRP GLBP HSRP

C

A user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take? Enable WPA encryption. Configure a DNS server. Disable SSID broadcast. Configure DMZ settings.

C

A wireless router is displaying the IP address of 192.168.0.1. What could this mean? Dynamic IP address allocation has been configured on the router and is functioning correctly. The NAT function is not working on the wireless router. The wireless router still has the factory default IP address. The wireless router has been configured to use the frequencies on channel 1.

C

After booting, a client receives an ICMPv6 RA message with the M flag set to 0 and the O flag set to 1. What does this indicate? The client should automatically configure an IPv6 address without contacting a DHCPv6 server. The client should be statically configured with an IPv6 address because the local router does not support autoconfiguration. The client should automatically configure an IPv6 address and then contact a DHCPv6 server for more information. The client should request an IPv6 address directly from a DHCPv6 server.

C

An EtherChannel link using LACP was formed between two switches, S1 and S2. While verifying the configuration, which mode combination could be utilized on both switches?​ S1-on and S2-passive S1-on and S2-active​ S1-passive and S2-active S1-passive and S2-passive​

C

Because of implemented security controls, a user can only access a server with FTP. Which AAA component accomplishes this? accessibility auditing authorization accounting authentication

C

How is a DHCPDISCOVER transmitted on a network to reach a DHCP server? A DHCPDISCOVER message is sent with a multicast IP address that all DHCP servers listen to as the destination address. A DHCPDISCOVER message is sent with the IP address of the default gateway as the destination address. A DHCPDISCOVER message is sent with the broadcast IP address as the destination address. A DHCPDISCOVER message is sent with the IP address of the DHCP server as the destination address.

C

In which alternative to DHCPv6 does a router dynamically provide IPv6 configuration information to hosts? ICMPv6 EUI-64 SLAAC ARP

C

On what switch ports should PortFast be enabled to enhance STP stability? only ports that are elected as designated ports only ports that attach to a neighboring switch all end-user ports all trunk ports that are not root ports

C

The output of the show ip route command contains the following entry: S 10.2.0.0 [1/0] via 172.16.2.2. What value is indicated by the 1 in the [1/0] portion of the output? metric number of hops administrative distance interface ID through which the network can be reached

C

What Layer 2 attack is mitigated by disabling Dynamic Trunking Protocol? ARP spoofing ARP poisoning VLAN hopping DHCP spoofing

C

What is a difference between autonomous APs that operate in a home environment and controller-based APs that operate in a corporate environment? Controller-based APs are known as lightweight APs and require an initial configuration to operate. Autonomous APs incorporate the functions of a router, switch, and AP into one device.​ Controller-based APs can be automatically configured and managed by a WLAN controller. Autonomous APs do not support PoE.

C

What is the correct syntax of a floating static route? ip route 172.16.0.0 255.248.0.0 10.0.0.1 ip route 209.165.200.228 255.255.255.248 serial 0/0/0 ip route 209.165.200.228 255.255.255.248 10.0.0.1 120 ip route 0.0.0.0 0.0.0.0 serial 0/0/0

C

What is the destination IP address when an IPv4 host sends a DHCPDISCOVER message? 192.168.1.1 224.0.0.1 255.255.255.255 0.0.0.0

C

What is the reason why the DHCPREQUEST message is sent as a broadcast during the DHCPv4 process? to notify other hosts not to request the same IP address for routers to fill their routing tables with this new information to notify other DHCP servers on the subnet that the IP address was leased for hosts on other subnets to receive the information

C

What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow? Disable DTP. Place unused ports in an unused VLAN. Enable port security. Disable STP.

C

When a wireless network in a small office is being set up, which type of IP addressing is typically used on the networked devices? wireless network private public

C

Which command would create a valid IPv6 default route? ipv6 route ::/128 2001:db8:acad:1::1 ipv6 route 2001:db8:acad:1::/64 ::1 ipv6 route ::/0 2001:db8:acad:2::a ipv6 route ::/0 fe80::1

C

Which destination IP address is used when an IPv6 host sends a DHCPv6 SOLICIT message to locate a DHCPv6 server? FF02::1:2 FF02::1 FF02::2 FE80::1

C

Which feature of 802.11n wireless access points allows them to transmit data at faster speeds than previous versions of 802.11 Wi-Fi standards did? SPS MITM MIMO WPS

C

Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route? route source next-hop gateway of last resort outgoing interface

C

Which method would an IPv6-enabled host using SLAAC employ to learn the address of the default gateway? neighbor advertisements that are eceived from link neighbors advertise messages that are received from the DHCPv6 server router advertisements that are received from the link router reply messages that are received from the DHCPv6 server

C

Which prompt is displayed when a network administrator successfully accesses the boot loader on a switch to recover from a system crash? system: switch# switch: system#

C

Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack? HTTP LLDP CDP FTP

C

Which statement describes a characteristic of GLBP? It does not provide support for IPv6.​ It provides multiple virtual IP addresses and multiple virtual MAC addresses. It provides automatic rerouting if any router in the group fails. It provides load balancing for a maximum of four gateways.

C

Which type of wireless topology is created when two or more Basic Service Sets are interconnected by Ethernet? WiFi Direct ad hoc WLAN ESS BSS IBISS

C

Which value represents the "trustworthiness" of a route and is used to determine which route to install into the routing table when there are multiple routes toward the same destination? metric routing protocol administrative distance outgoing interface

C

Why is authentication with AAA preferred over a local database method? It requires a login and password combination on the console, vty lines, and aux ports.​ It specifies a different password for each line or port. It provides a fallback authentication method if the administrator forgets the username or password. It uses less network bandwidth.

C

What are two characteristics of the SLAAC method for IPv6 address configuration? (Choose two.) This stateful method of acquiring an IPv6 address requires at least one DHCPv6 server. Router solicitation messages are sent by the router to offer IPv6 addressing to clients. The default gateway of an IPv6 client on a LAN will be the link-local address of the router interface attached to the LAN. IPv6 addressing is dynamically assigned to clients through the use of ICMPv6. Clients send router advertisement messages to routers to request IPv6 addressing.

C and D

Which two roles are typically performed by a wireless router that is used in a home or small business? (Choose two.) repeater RADIUS authentication server access point Ethernet switch WLAN controller

C and D

Which two statements are true about half-duplex and full-duplex communications? (Choose two.) Half duplex has only one channel. Full duplex offers 100 percent potential use of the bandwidth. Full duplex increases the effective bandwidth. Full duplex allows both ends to transmit and receive simultaneously. All modern NICs support both half-duplex and full-duplex communication.

C and D

What are two common types of static routes in routing tables? (Choose two) a static route shared between two neighboring routers a built-in static route by IOS a static route to a specific network a static route converted from a route that is learned through a dynamic routing protocol a default static route

C and E

What two methods can be used to generate an interface ID by an IPv6 host that is using SLAAC? (Choose two.) ARP DAD random generation stateful DHCPv6 EUI-64

C and E

Which two protocols provide gateway redundancy at Layer 3? (Choose two.) RSTP STP HSRP PVST VRRP

C and E

An administrator who is troubleshooting connectivity issues on a switch notices that a switch port configured for port security is in the err-disabled state. After verifying the cause of the violation, how should the administrator re-enable the port without disrupting network operation? Issue the no switchport port-security command, then re-enable port security. Reboot the switch. Issue the no switchport port-security violation shutdown command on the interface. Issue the shutdown command followed by the no shutdown command on the interface.

D

How does an IPv6 client ensure that it has a unique address after it configures its IPv6 address using the SLAAC allocation method? It checks with the IPv6 address database that is hosted by the SLAAC server. It contacts the DHCPv6 server via a special formed ICMPv6 message. It sends an ARP message with the IPv6 address as the destination IPv6 address. It sends an ICMPv6 Neighbor Solicitation message with the IPv6 address as the target IPv6 address.

D

In FHRP terminology, what represents a set of routers that present the illusion of a single router to hosts? forwarding router default gateway standby router virtual router

D

What Wi-Fi management frame is regularly broadcast by APs to announce their presence? association authentication probe beacon

D

What command, or set of commands, would be used to determine if the following configuration on router HQ works as designed? ip route 0.0.0.0 0.0.0.0 serial 0/0/0 10ip route 0.0.0.0 0.0.0.0 serial 0/1/0 HQ# show ip route HQ# ping 128.107.0.99HQ# ping 64.100.0.5 HQ# show ip interface brief HQ(config)# interface serial 0/1/0HQ(config-if)# shutdownHQ(config-if)# endHQ# show ip route HQ# traceroute 128.107.0.99

D

What is a recommended best practice when dealing with the native VLAN? Assign the same VLAN number as the management VLAN. Use port security. Turn off DTP. Assign it to an unused VLAN.

D

What is the best way to prevent a VLAN hopping attack? Use VLAN 1 as the native VLAN on trunk ports. Use ISL encapsulation on all trunk links. Disable STP on all nontrunk ports. Disable trunk negotiation for trunk ports and statically set nontrunk ports as access ports.

D

What is the purpose of HSRP? It enables an access port to immediately transition to the forwarding state. It prevents malicious hosts from connecting to trunk ports. It prevents a rogue switch from becoming the STP root. It provides a continuous network connection when a router fails.

D

What message informs IPv6 enabled interfaces to use stateful DHCPv6 for obtaining an IPv6 address? the DHCPv6 Reply message the DHCPv6 Advertise message the ICMPv6 Router Solicitation the ICMPv6 Router Advertisement

D

What process is used in ICMPv6 for a host to verify that an IPv6 address is unique before configuring it on an interface? SLAAC EUI-64 ARP DAD

D

When a router learns that multiple paths are available to a destination network from the same routing protocol, which factor is considered by a router to choose the best path to forward a packet? the order of paths on the routing table the fastest bandwidth of exiting interfaces the reliability value of the neighboring routers the lowest metric

D

When configuring a Cisco 3500 series wireless LAN controller (WLC) for a WPA2 Enterprise WLAN, what has to be created on the WLC before creating the new WLAN? a security module a security policy a new SSID a VLAN for the wireless network

D

Which IEEE standard operates at wireless frequencies in both the 5 GHz and 2.4 GHz ranges? 802.11b 802.11g 802.11a 802.11n

D

Which characteristic describes a wireless client operating in active mode? must be configured for security before attaching to an AP ability to dynamically change channels broadcasts probes that request the SSID must know the SSID to connect to an AP

D

Which packet-forwarding method does a router use to make switching decisions when it is using a forwarding information base and an adjacency table? fast switching process switching flow process Cisco Express Forwarding

D

Which port state will switch ports immediately transition to when configured for PortFast? learning listening blocking forwarding

D

Which procedure is recommended to mitigate the chances of ARP spoofing? Enable IP Source Guard on trusted ports. Enable DAI on the management VLAN. Enable port security globally. Enable DHCP snooping on selected VLANs.

D

Which scalable method must be implemented in order to provide inter-VLAN routing on a switched network with more than 1000 VLANs? connecting a router interface to a switch port that is configured in trunk mode to route packets between VLANs, with each VLAN assigned to a router subinterface​ connecting each physical router interface to a different physical switch port, with each switch port assigned to a different VLAN configuring static routes on a Layer 2 switch device routing traffic internally to a Layer 3 switch device

D

Which static route statement shows a recursive IPv6 static route? ipv6 route 0::/0 S0/0/0 ipv6 route 2001:db8:cafe:1::/56 S0/0/0 2001:db8:1000:10::1 ipv6 route 2001:db8:cafe:1::/56 S0/0/0 ipv6 route 2001:db8:cafe:1::/56 2001:db8:1000:10::1 ipv6 route 0::/0 S0/0/0 254

D

Why would a floating static route be configured with an administrative distance that is higher than the administrative distance of a dynamic routing protocol that is running on the same router? to be the priority route in the routing table to load-balance the traffic to act as a gateway of last resort to be used as a backup route

D

What two protocols are supported on Cisco devices for AAA communications? (Choose two.) LLDP HSRP VTP TACACS+ RADIUS

D and E

What three services are provided by the AAA framework? (Choose three.) autoconfiguration autobalancing automation authorization authentication accounting

D, E, and F

A customer installs a wireless access point at home in the closet next to the kitchen. The customer mentions that the wireless communication performance seems degraded when the cordless phone or the microwave oven is in use. What is the possible reason for this degradation? The access point is close to walls. The surge of electricity when a microwave oven is in use disrupts the operation of the access point. The access point is on the same electrical circuit as the phone base unit and microwave oven are. The cordless phone joins the WLAN and shares the available bandwidth. The wireless signal is in the same radio frequency range as the household devices are in.

E

Which method of wireless authentication is currently considered to be the strongest? open shared key WEP WPA WPA2

E

What additional information is contained in the 12-bit extended system ID of a BPDU? VLAN ID IP address port ID MAC address

A

Which is a DHCPv4 address allocation method that assigns IPv4 addresses for a limited lease period? dynamic allocation automatic allocation manual allocation pre-allocation

A

A network administrator is determining the best placement of VLAN trunk links. Which two types of point-to-point connections utilize VLAN trunking?​ (Choose two.) between two switches that share a common VLAN between a switch and a client PC between a switch and a network printer between two switches that utilize multiple VLANs between a switch and a server that has an 802.1Q NIC

A and E

On a Cisco switch, where is extended range VLAN information stored? startup configuration file running configuration file NVRAM flash

B

What is the meaning of the number 10 in the encapsulation dot1Q 10 native router subinterface command?​ the subnet number the VLAN ID the interface number the subinterface number​

B

Which DHCP IPv4 message contains the following information? Destination address: 255.255.255.255Client IPv4 address: 0.0.0.0Default gateway address: 0.0.0.0Subnet mask: 0.0.0.0 DHCPREQUEST DHCPDISCOVER DHCPACK DHCPOFFER

B

Which network device can be used to eliminate collisions on an Ethernet network? hub router switch firewall

C

Which option correctly describes a switching method? cut-through: makes a forwarding decision after receiving the entire frame cut-through: provides the flexibility to support any mix of Ethernet speeds store-and-forward: ensures that the frame is free of physical and data-link errors store-and-forward: forwards the frame immediately after examining its destination MAC address

C

Which destination IPv4 address does a DHCPv4 client use to send the initial DHCP Discover packet when the client is looking for a DHCP server? 127.0.0.1 224.0.0.1 the IP address of the default gateway 255.255.255.255

D

Which function is provided by EtherChannel? dividing the bandwidth of a single link into separate time slots enabling traffic from multiple VLANs to travel over a single Layer 2 link spreading traffic across multiple physical WAN links creating one logical link by using multiple physical links between two LAN switches

D

Which is the default STP operation mode on Cisco Catalyst switches? MST RSTP MSTP PVST+ Rapid PVST+

D

Which network device can serve as a boundary to divide a Layer 2 broadcast domain? Ethernet hub Ethernet bridge access point router

D

What operational mode should be used on a switch port to connect it to a router for router-on-a-stick inter-VLAN routing? dynamic desirable trunk access dynamic auto

B

What will a Cisco LAN switch do if it receives an incoming frame and the destination MAC address is not listed in the MAC address table? Drop the frame. Forward the frame out all ports except the port where the frame is received. Use ARP to resolve the port that is related to the frame. Send the frame to the default gateway address.

B

When PVST is running over a switched network, which port state can participate in BPDU frame forwarding based on BPDUs received, but does not forward data frames? blocking listening forwarding disabled

B

An administrator is troubleshooting a switch and wants to verify if it is a root bridge. What command can be used to do this? show running-config show startup-config show spanning-tree show vlan

C

As a DHCPv4 client lease is about to expire, what is the message that the client sends the DHCP server? DHCPDISCOVER DHCPOFFER DHCPREQUEST DHCPACK

C

During the implementation of Spanning Tree Protocol, all switches are rebooted by the network administrator. What is the first step of the spanning-tree election process? Each switch with a lower root ID than its neighbor will not send BPDUs. Each switch determines what port to block to prevent a loop from occurring. All the switches send out BPDUs advertising themselves as the root bridge. Each switch determines the best path to forward traffic.

C

What is the purpose of frame buffers on a switch? They provide temporary storage of the frame checksum. They provide a basic security scan on received frames. They hold traffic, thus alleviating network congestion. They execute checksum values before transmission.

C

What is an accurate description of redundancy? designing a network to use multiple paths between switches to ensure there is no single point of failure configuring a switch with proper security to ensure that all traffic forwarded through an interface is filtered configuring a router with a complete MAC address database to ensure that all frames can be forwarded to the correct destination designing a network to use multiple virtual devices to ensure that all traffic uses the best path through the internetwork

A

What is required to perform router-on-a-stick inter-VLAN routing? a router that is configured with multiple subinterfaces a router with multiple physical interfaces a multilayer switch a Layer 2 switch that is configured with multiple trunk ports

A

What is the purpose of the vlan.dat file on a switch? It holds the operating system. It holds the VLAN database. It holds the running configuration. It holds the saved configuration.

B

Which two concepts relate to a switch port that is intended to have only end devices attached and intended never to be used to connect to another switch? (Choose two.) PVST+ edge port extended system ID bridge ID PortFast

B and E

What is the first action in the boot sequence when a switch is powered on? load boot loader software load the default Cisco IOS software load a power-on self-test program low-level CPU initialization

C

What is the purpose of setting the native VLAN separate from data VLANs? The security of management frames that are carried in the native VLAN can be enhanced. The native VLAN is for carrying VLAN management traffic only. A separate VLAN should be used to carry uncommon untagged frames to avoid bandwidth contention on data VLANs. The native VLAN is for routers and switches to exchange their management information, so it should be different from data VLANs.

C

Where is the vlan.dat file stored on a switch? on the externally attached storage media or internal hard drive in RAM in flash memory in NVRAM

C

Which address does a DHCPv4 server target when sending a DHCPOFFER message to a client that makes an address request? broadcast MAC address client IP address client hardware address gateway IP address

C

An administrator issues the commands: Router(config)# interface g0/1Router(config-if)# ip address dhcp What is the administrator trying to achieve? configuring the router to act as a DHCPv4 server configuring the router to resolve IP address conflicts configuring the router to act as a relay agent configuring the router to obtain IP parameters from a DHCPv4 server

D

How is traffic routed between multiple VLANs on a multilayer switch? Traffic is routed via subinterfaces. Traffic is broadcast out all physical interfaces. Traffic is routed via physical interfaces. Traffic is routed via internal VLAN interfaces.

D

If an organization is changing to include Cisco IP phones in its network, what design feature must be considered to ensure voice quality? Voice traffic and data traffic require separate trunk links between switches. Additional switch ports that are dedicated to Cisco IP phones are required. Voice traffic needs to be tagged with the native VLAN. A separate VLAN is needed for voice traffic.

D

What is one way to correct a spanning tree failure? Replace all instances of STP with RSTP. Insert redundant links to replace the failed STP links. Replace the cables on failed STP links. Manually remove redundant links in the switched network.

D

What kind of message is sent by a DHCPv4 client requesting an IP address? DHCPACK unicast message DHCPDISCOVER unicast message DHCPOFFER unicast message DHCPDISCOVER broadcast message

D

Which two statements describe a switch port that is configured with PortFast? (Choose two.) The switch port immediately transitions from blocking to the forwarding state. The switch port immediately transitions from the listening to the forwarding state. The switch port immediately processes any BPDUs before transitioning to the forwarding state. The switch port sends DHCP requests before transitioning to the forwarding state. The switch port should never receive BPDUs.

A and E

When configuring a router as part of a router-on-a-stick inter-VLAN routing topology, where should the IP address be assigned? to the SVI to the subinterface to the interface to the VLAN

B

Which statement is true about EtherChannel technology? Links must be upgraded to support EtherChannel. EtherChannel uses existing switch ports. All configuration tasks must be done on the individual ports in the EtherChannel link. STP does not run on redundant EtherChannel links.

B

Under which two circumstances would a router usually be configured as a DHCPv4 client? (Choose two.) The administrator needs the router to act as a relay agent. The router is intended to be used as a SOHO gateway. The router is meant to provide IP addresses to the hosts. This is an ISP requirement. The router has a fixed IP address.

B and D

Which tasks can be accomplished by using the command history feature? (Choose two.) Recall up to 15 command lines by default. Recall previously entered commands. Save command lines in a log file for future reference. View a list of commands entered in a previous session. Set the command history buffer size.

B and E

When configuring a switch for SSH access, what other command that is associated with the login local command is required to be entered on the switch? login block-for seconds attempts number within seconds password password username username secret secret enable secret password

C

A PC is to access a web server on another network. Which inter-VLAN method will provide the highest bandwidth at Layer 3 and also provide a default gateway for the PC? router on a stick multiple physical interfaces on the router, all connected to a Layer 2 switch trunked interface between the router and the switch multilayer switch with routing enabled

D

A small college uses VLAN 10 for the classroom network and VLAN 20 for the office network. What is needed to enable communication between these two VLANs while using legacy inter-VLAN routing? Two groups of switches are needed, each with ports that are configured for one VLAN. A router with one VLAN interface is needed to connect to the SVI on a switch. A switch with a port that is configured as trunk is needed to connect to a router. A router with at least two LAN interfaces should be used.

D

What must an administrator have in order to reset a lost password on a router? a crossover cable a TFTP server access to another router physical access to the router

D

For what reason would a network administrator use the show interfaces trunk command on a switch? to view the native VLAN to examine DTP negotiation as it occurs to verify port association with a particular VLAN to display an IP address for any existing VLAN

A

In which location are the normal range VLANs stored on a Cisco switch by default? flash memory RAM running-config startup-config

A

In which memory location are the VLAN configurations of normal range VLANs stored on a Catalyst switch? flash RAM NVRAM ROM

A

What is a disadvantage of using router-on-a-stick inter-VLAN routing? does not scale well beyond 50 VLANs requires the use of more physical interfaces than legacy inter-VLAN routing does not support VLAN-tagged packets requires the use of multiple router interfaces configured to operate as access links

A

Which two mode combinations would result in the successful negotiation of an EtherChannel? (Choose two.) desirable; desirable active; on desirable; active passive; auto active; passive auto; auto

A and E

When EtherChannel is implemented, multiple physical interfaces are bundled into which type of logical connection? VLAN interface interface range loopback port channel

D

An administrator is investigating a failure on a trunk link between a Cisco switch and a switch from another vendor. After a few show commands, the administrator notices that the switches are not negotiating a trunk. What is a probable cause for this issue? Both switches are in trunk mode. Switches from other vendors do not support DTP. Both switches are in nonegotiate mode. DTP frames are flooding the entire network.

B

What does the term "port density" represent for an Ethernet switch? the speed of each port the number of available ports the memory space that is allocated to each switch port the numbers of hosts that are connected to each switch port

B

What happens to a port that is associated with VLAN 10 when the administrator deletes VLAN 10 from the switch? The port goes back to the default VLAN. The port becomes inactive. The port automatically associates itself with the native VLAN. The port creates the VLAN again.

B

What is one function of a Layer 2 switch? learns the port assigned to a host by examining the destination MAC address determines which interface is used to forward a frame based on the destination MAC address duplicates the electrical signal of each frame to every port forwards data based on logical addressing

B

Which sentence correctly describes the SVI inter-VLAN routing method? The encapsulation type must be configured on the SVI. An SVI is needed for each VLAN. Subinterfaces have to be created. A physical interface is needed for every VLAN that is created.

B

What are three advantages of using EtherChannel technology? (Choose three.) The Spanning Tree Protocol shuts down the unused interfaces in the bundle to avoid loops. There is no need to upgrade links to faster connections to increase bandwidth. EtherChannel uses multiple logical links to provide redundancy. Load balancing is not needed with EtherChannel. Configuration tasks can be done on the EtherChannel interface. A spanning tree recalculation is not required when a single link within the channel goes down.

B, E, and F

What is a disadvantage of using multilayer switches for inter-VLAN routing? Multilayer switches are limited to using trunk links for Layer 3 routing. Multilayer switches have higher latency for Layer 3 routing. Multilayer switches are more expensive than router-on-a-stick implementations. Spanning tree must be disabled in order to implement routing on a multilayer switch.

C

Which statement is true about broadcast and collision domains? The more interfaces a router has the larger the resulting broadcast domain. The size of the collision domain can be reduced by adding hubs to a network. Adding a switch to a network will increase the size of the broadcast domain. Adding a router to a network will increase the size of the collision domain.

C

While configuring inter-VLAN routing on a multilayer switch, a network administrator issues the no switchport command on an interface that is connected to another switch. What is the purpose of this command? to provide an access link that tags VLAN traffic to provide a static trunk link to create a routed port for a single network to create a switched virtual interface

C

After the election of the root bridge has been completed, how will switches find the best paths to the root bridge? Each switch will analyze the sum of the hops to reach the root and use the path with the fewest hops. Each switch will analyze the port states of all neighbors and use the designated ports to forward traffic to the root. Each switch will analyze the BID of all neighbors to reach the root and use the path through the lowest BID neighbors. Each switch will analyze the sum of all port costs to reach the root and use the path with the lowest cost.

D

When a client is requesting an initial address lease from a DHCP server, why is the DHCPREQUEST message sent as a broadcast? The client does not yet know the IP address of the DHCP server that sent the offer. The client does not have a MAC address assigned yet, so it cannot send a unicast message at Layer 2. The DHCP server may be on a different subnet, so the request must be sent as a broadcast. The client may have received offers from multiple servers, and the broadcast serves to implicitly decline those other offers.

D

When a range of ports is being configured for EtherChannel, which mode will configure PAgP so that it initiates the EtherChannel negotiation? active auto passive desirable

D

Which router bootup sequence is correct?​ 1 - perform the POST and load the Cisco IOS software 2 - locate and load the startup configuration file or enter setup mode 3 - locate and load the bootstrap program 1 - perform the POST and load the startup configuration file 2 - locate and load the bootstrap program 3 - locate and load the Cisco IOS software​ 1 - perform the POST and load the bootstrap program 2 - locate and load the startup configuration file or enter setup mode 3 - locate and load the Cisco IOS software​ 1 - perform the POST and load the bootstrap program 2 - locate and load the Cisco IOS software 3 - locate and load the startup configuration file or enter setup mode

D

Which statement describes the system LED operation on Cisco Catalyst switches? If the LED is blinking green, the system is operating normally. If the LED is amber, the system is not powered on. If the LED is blinking amber, the switch is performing POST. If the LED is amber, the system is receiving power but it is not functioning properly.

D

Which two load balancing methods can be implemented with EtherChannel technology? (Choose two.) destination IP to destination MAC destination IP to source IP destination MAC to destination IP source MAC to destination MAC source IP to destination IP destination MAC to source MAC

D and E

Which two protocols are link aggregation protocols? (Choose two.) EtherChannel STP RSTP PAgP 802.3ad

D and E

What will happen if a network administrator puts a port that is part of an EtherChannel bundle into a different VLAN than the other ports in that bundle? The EtherChannel bundle will stay up if either PAgP or LACP is used. The EtherChannel bundle will stay up only if PAgP is used. The EtherChannel bundle will stay up only if LACP is used. The EtherChannel bundle will stay up if the ports were configured with no negotiation between the switches to form the EtherChannel. The EtherChannel will fail.

E

A company implements the stateless DHCPv6 method for configuring IPv6 addresses on employee workstations. After a workstation receives messages from multiple DHCPv6 servers to indicate their availability for DHCPv6 service, which message does it send to a server for configuration information? DHCPv6 REQUEST DHCPv6 ADVERTISE DHCPv6 SOLICIT DHCPv6 INFORMATION-REQUEST

D

A network administrator uses the command ip route 172.18.0.0 255.255.0.0 S0/0/1 to configure a floating static route on a router. That route will function as a backup route to reach the EIGRP learned network 172.18.0.0/16. After this configuration, the EIGRP route is removed from the routing table even though EIGRP is still functioning properly. Why is the static route not functioning as intended? The next hop neighbor IP address is not configured. The destination network is incorrectly configured. The network mask is incorrectly configured. The administrative distance value is not high enough on the static route.

D

True or False?In the 802.1X standard, the client attempting to access the network is referred to as the supplicant. false true

true

What is the significant difference between a hub and a Layer 2 LAN switch? A switch creates many smaller collision domains, and a hub increases the size of a single collision domain. A hub divides collision domains, and a switch divides broadcast domains. Each port of a hub is a collision domain, and each port of a switch is a broadcast domain. A hub forwards frames, and a switch forwards only packets.

A

What type of Ethernet cable would be used to connect one switch to another switch when neither switch supports the auto-MDIX feature? crossover straight-through rollover coaxial

A

When a range of ports is being configured for EtherChannel, which mode will configure LACP on a port only if the port receives LACP packets from another device? passive auto desirable active

A

When a range of ports is being configured for EtherChannel, which mode will configure LACP so that it initiates the EtherChannel negotiation? active auto passive desirable

A

Which command will provide information about the status of all interfaces including the number of giants, runts, and collisions on the interface? show interfaces show running-config show ip interface brief show history

A

An administrator was troubleshooting a router-on-a-stick topology and concluded that the problem was related to the configuration of VLANs on the router subinterfaces. Which two commands can the administrator use in the router to identify the problem? (Choose two.) show ip interface show controllers show ip protocols show running-config show vlan

A and D

A network administrator has configured ​VLAN 99 as the management VLAN and has configured it with an IP address and subnet mask. The administrator issues the show interface vlan 99 command and notices that the line protocol is down. Which action can change the state of the line protocol to up? Remove all access ports from VLAN 99. Connect a host to an interface associated with VLAN 99. Configure a transport input method on the vty lines. Configure a default gateway.

B


Conjuntos de estudio relacionados

Preguntas (questions) y respuestas (answers) #1 español-inglés (Spanish-English)

View Set