Quiz 6.0-6.9

¡Supera tus tareas y exámenes ahora con Quizwiz!

Fill in the Cisco device password type with its function A. Controls the ability to log on through a LAN or WAN interface configured on the device. B. Controls the ability to connect to the device using a web browser using HTTPS. C. Controls the ability to connect to the device using a direct connection.

A. Controls the ability to log on through a LAN or WAN interface configured on the device. : VTY B. Controls the ability to connect to the device using a web browser using HTTPS.: SDM C. Controls the ability to connect to the device using a direct connection.: Console

Which of the following connectivity hardware is used to create a VLAN? A. Switch B. Bridge C. Router D. Hub

A. Switch

Which of the following best describes the purpose of using subnets? A. Subnets place each device within its own collision domain. B. Subnets divide an IP network address into multiple network addresses. C. Subnets let you connect a private network to the internet. D. Subnets combine multiple IP network addresses into one network address.

B. Subnets divide an IP network address into multiple network addresses.

Which protocol does an IP host use to inform a router that it wants to receive specific multicast frames? A. IP B. SNMP C. MGP D. IGMP E. ICM

D. IGMP

Which command would you use on a switch to enable management from a remote network? A. no shutdown B. ip address dhcp C. ip address 192.168.10.185 255.255.255.0 D. ip default-gateway 192.168.10.185

D. ip default-gateway 192.168.10.185

Which of the following best describes the purpose of using subnets?

Subnets divide an IP network address into multiple network addresses.

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature allows the switches to pass VLAN traffic between the switches?

Trunking

Computers A and B are on the same VLAN and are separated by two switches as shown in the exhibit. Computer A sends a frame to Computer B. Which of the following best describes the composition of the frame as it travels from A to B? A. Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B. B. Computer A appends a VLAN ID to the frame. It travels from switch to switch and arrives at Computer B where it removes the VLAN ID. C. Computer A sends a normal frame. The first switch forwards the frame to the second switch, where the VLAN ID is appended to the frame and forwarded to Computer B. D. Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The VLAN ID remains on the frame through the second switch up to Computer B.

A. Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B.

Which of the following best describes the concept of a VLAN? A. Devices on the same network logically grouped as if they were on separate networks. B. Devices on different networks that can receive multicast packets. C. Devices connected by a transmission medium other than cable (such as microwave or radio transmissions). D. Devices connected through the internet that can communicate without using a network address. E. Devices in separate networks (which means they have different network addresses) logically grouped as if they were in the same network.

A. Devices on the same network logically grouped as if they were on separate networks.

You manage a network that uses multiple switches. You want to provide multiple paths between switches so that if one link goes down, an alternate path is available. Which feature should your switch support? A. OSPF B. Spanning Tree C. Mirroring D. Trunking E. PoE

B. Spanning Tree

A host on the network has an IP address of 129.11.99.78 using the default subnet mask. How would you identify the address and mask using CIDR notation? A.129.11.99.78/24 B.129.11.99.78:16 C.129.11.99.78/16 D.129.11.99.78:24 E.129.11.99.78:8 F.129.11.99.78/8

C.129.11.99.78/16

You have three switches configured as shown in the Exhibit. How can you guarantee that switch C becomes the root bridge? A. Configure Fa0/1 and Fa0/2 on switch C with a higher cost value. B. Configure Fa0/1 and Fa0/2 on switch C with a higher port priority. C. Configure Fa0/1 and Fa0/2 on switch C with a lower port priority. D. Configure switch C with a higher priority value. E. Configure switch C with a lower priority value. F. Configure Fa0/1 and Fa0/2 on switch C with a lower cost value.

E. Configure switch C with a lower priority value.

The FastEthernet 0/0 interface on a switch is currently disabled. You need to enable it so a workstation can be connected to it. Place the command the appropriate configuration steps. Enter global configuration mode: Enter interface configuration mode: enable the interface: verify that the interface is enabled:

Enter global configuration mode: Conf t Enter interface configuration mode: Int fa0/0 enable the interface: no shut verify that the interface is enabled: show interface status

You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. Which of the following should you use in this situation? A.VPN B.VLAN C. Spanning tree E. Port security

VLAN

Which of the following features dynamically places switch ports in blocking or forwarding states?

spanning tree


Conjuntos de estudio relacionados

Fundamentals of Nursing Ch 20 PrepU 2

View Set

Programming Logic and Design 5th. Ch. 1

View Set

Starting a Business - Partnership

View Set