Final Exam CNT 150
A new switch is to be added to an existing network in a remote office. The network administrator does not want the technicians in the remote office to be able to add new VLANs to the switch, but the switch should receive VLAN updates from the VTP domain. Which two steps must be performed to configure VTP on the new switch to meet these conditions? (Choose two.)
Configure the new switch as a VTP client. Configure the existing VTP domain name on the new switch.
Which statement is correct about how a Layer 2 switch determines how to forward frames?
Frame forwarding decisions are based on MAC address and port mappings in the CAM table.
What protocol or technology uses a standby router to assume packet-forwarding responsibility if the active router fails?
HSRP
What is the effect of entering the spanning-tree portfast configuration command on a switch?
It enables portfast on a specific switch interface.
Why is DHCP snooping required when using the Dynamic ARP Inspection feature?
It uses the MAC-address-to-IP-address binding database to validate an ARP packet
A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users access high bandwidth services such as streaming video, the wireless network performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve the wireless network performance for that type of service?
The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia.
What action takes place when a frame entering a switch has a unicast destination MAC address that is not in the MAC address table?
The switch will forward the frame out all ports except the incoming port.
Users on a LAN are unable to get to a company web server but are able to get elsewhere. What should be done or checked?
Verify that the static route to the server is present in the routing table.
What method of wireless authentication is dependent on a RADIUS authentication server?
WPA2 Enterprise
Refer to the exhibit. Based on the exhibited configuration and output, why is VLAN 99 missing?
because VLAN 99 has not yet been created
Which command will start the process to bundle two physical interfaces to create an EtherChannel group via LACP?
channel-group 2 mode auto
What else is required when configuring an IPv6 static route using a next-hop link-local address? **
interface number and type
What is a method to launch a VLAN hopping attack?
introducing a rogue switch and enabling trunking
Select the three PAgP channel establishment modes. (Choose three.)
on desirable auto
A network administrator configures the port security feature on a switch. The security policy specifies that each access port should allow up to two MAC addresses. When the maximum number of MAC addresses is reached, a frame with the unknown source MAC address is dropped and a notification is sent to the syslog server. Which security violation mode should be configured for each access port?
restrict
Which two VTP modes allow for the creation, modification, and deletion of VLANs on the local switch? (Choose two.)
server transparent
What would be the primary reason an attacker would launch a MAC address overflow attack?
so that the attacker can see frames that are destined for other hosts
A company security policy requires that all MAC addressing be dynamically learned and added to both the MAC address table and the running configuration on each switch. Which port security configuration will accomplish this?
sticky secure MAC addresses
Which information does a switch use to populate the MAC address table?
the source MAC address and the incoming port
What are two reasons a network administrator would segment a network with a Layer 2 switch? (Choose two.)
to enhance user bandwidth to isolate traffic between segments