LT1 and 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

accidental interference

The company handbook states that employees cannot have microwave ovens in their offices. Instead, all employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the company trying to avoid?

Configure SSH.

What is a secure configuration option for remote access to a network device?

on a network where there is a lot of topology changes

When would it be more beneficial to use a dynamic routing protocol instead of static routing?

ip route 0.0.0.0 0.0.0.0 S0/0/0

Which option shows a correctly configured IPv4 default static route?

Split the traffic between the 2.4 GHz and 5 GHz frequency bands.

A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network?

channels 1, 6, and 11

A company is deploying a wireless network in the distribution facility in a Boston suburb. The warehouse is quite large and it requires multiple access points to be used. Because some of the company devices still operate at 2.4GHZ, the network administrator decides to deploy the 802.11g standard. Which channel assignments on the multiple access points will make sure that the wireless channels are not overlapping?

Ensure that the wireless NIC is enabled. Ensure that the wireless SSID is chosen.

A laptop cannot connect to a wireless access point. Which two troubleshooting steps should be taken first? (Choose two.)

The interface fa0/0 has not been activated.

A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 255.255.255.0. However, when the administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem?

The VLANs for user access ports should be different VLANs than any native VLANs used on trunk ports.

A network administrator has found a user sending a double-tagged 802.1Q frame to a switch. What is the best solution to prevent this type of attack?

CONTROLLER

A network administrator is adding a new WLAN on a Cisco 3500 O series WLC. Which tab should the administrator use to create a new VLAN interface to be used for the new WLAN?

It is used to encrypt the messages between the WLC and the RADIUS server.

A network administrator is configuring a RADIUS server connection on a Cisco 3500 series WLC. The configuration requires a shared secret password. What is the purpose for the shared secret password?

802.11ac*

A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented?

RADIUS

A network administrator of a college is configuring the WLAN user authentication process. Wireless users are required to enter username and password credentials that will be verified by a server. Which server would provide such service?

The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia.*

A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users access high bandwidth services such as streaming video, the wireless network performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve the wireless network performance for that type of service?

creating SVI interfaces creating VLANs implementing a routing protocol

A new Layer 3 switch is connected to a router and is being configured for interVLAN routing. What are three of the five steps required for the configuration? (Choose three.)

ip route 172.16.32.0 255.255.224.0 S0/0/0 200*

A router has used the OSPF protocol to learn a route to the 172.16.32.0/19 network. Which command will implement a backup floating static route to this network?

Change the default user-name and password of the wireless router.

A technician is about to install and configure a wireless network at a small branch office. What is the first security measure the technician should apply immediately upon powering up the wireless router?

Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.

A technician is troubleshooting a slow WLAN that consists of 802.11b and 802.11g devices. A new 802.11n/ac dual-band router has been deployed on the network to replace the old 802.11g router. What can the technician do to address the slow wireless speed?

wireless router

After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?

Because these VLANs are stored in a file that is called vlan.dat that is located in flash memory, this file must be manually deleted.

An administrator is trying to remove configurations from a switch. After using the command erase startup- config and reloading the switch, the administrator finds that VLANs 10 and 100 still exist on the switch. Why were these VLANs not removed?

100

An administrator issues the ipv6 route 2001:db8:acad:1::/32 gigabitethernet0/0 2001:db8:acad:6::1 100 command on a router. What administrative distance is assigned to this route?

sticky secure MAC addresses

As part of the new security policy, all switches on the network are configured to automatically learn MAC addresses for each port. All running configurations are saved at the start and close of every business day. A severe thunderstorm causes an extended power outage several hours after the close of business. When the switches are brought back online, the dynamically learned MAC addresses are retained. Which port security configuration enabled this?

They improve netw​ork security. They use fewer router resources.

Compared with dynamic routes, what are two advantages of using static routes on a router? (Choose two.)

administrative distance

Consider the following command: ip route 192.168.10.0 255.255.255.0 10.10.10.2 5 What does the 5 at the end of the command signify?

stub router connection to the rest of the corporate or campus network edge router connection to the ISP

On which two routers would a default static route be configured? (Choose two.)

Routing between HQ and Branch is configured incorrectly.*

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. A user reports that PCO cannot visit the web server www.server.com. Troubleshoot the network configuration to identify the problem. What is the cause of the problem?

Packets with unknown source addresses will be dropped.

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Which event will take place if there is a port security violation on switch S1 interface Fa0/1?

R1(config)# interface G0/0 R1(config-if)# ip helper-address 10.2.0.250

Refer to the exhibit. A network administrator has added a new subnet to the network and needs hosts on that subnet to receive IPv4 addresses from the DHCPv4 server. What two commands will allow hosts on the new subnet to receive addresses from the DHCP4 server?

ipv6 route ::/0 serial 0/1/1

Refer to the exhibit. A network engineer is configuring IPv6 routing on the network. Which command issued on router HQ will configure a default route to the Internet to forward packets to an IPv6 destination network that is not listed in the routing table?

on a network where there is a lot of topology changes*

Refer to the exhibit. A ping from R1 to 10.1.1.2 is successful, but a ping from R1 to any address in the 192.168.2.0 network fails. What is the cause of this problem?

The next hop address is incorrect.

Refer to the exhibit. An administrator is attempting to install a default static route on router R1 to reach the Site B network on router R2. After entering the static route command, the route is still not showing up in the routing table of router R1. What is preventing the route from installing in the routing table?

The interface is incorrect.

Refer to the exhibit. An administrator is attempting to install an IPv6 static route on router R1 to reach the network attached to router R2. After the static route command is entered, connectivity to the network is still failing. What error has been made in the static route configuration?

to Fa0/1, Fa0/2, and Fa0/3 only

Refer to the exhibit. Consider that the main power has just been restored. PC3 issues a broadcast IPv4 DHCP request. To which port will SW1 forward this request?

Source MAC: 00E0.FE91.7799 Source IP: 10.1.1.10

Refer to the exhibit. Host A has sent a packet to host B. What will be the source MAC and IP addresses on the packet when it arrives at host B?

A frame with the destination MAC address of RouterA. A packet with the destination IP address of ServerB

Refer to the exhibit. HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process? (Choose two.)

SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch.

Refer to the exhibit. How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty?

The route was manually entered by an administrator.

Refer to the exhibit. How was the host route 2001:DB8:CAFE:4::1/128 installed in the routing table?

Frames from PC1 will cause the interface to shut down immediately, and a log entry will be made.*

Refer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration?

The ip helper-address command was applied on the wrong interface.

Refer to the exhibit. R1 has been configured as shown. However, PC1 is not able to receive an IPv4 address. What is the problem?

Change the destination network and mask to 0.0.0.0 0.0.0.0

Refer to the exhibit. R1 was configured with the static route command ip route 209.165.200.224 255.255.255.224 S0/0/0 and consequently users on network 172.16.0.0/16 are unable to reach resources on the Internet. How should this static route be changed to allow user traffic from the LAN to reach the Internet?

The MAC address of PC1 that connects to the Fa0/2 interface is not the configured MAC address.*

Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured with the switchport port-security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown?

R1 needs a static route to the R2 LAN.

Refer to the exhibit. The small company shown uses static routing. Users on the R2 LAN have reported a problem with connectivity. What is the issue?

alternate, designated, root, root

Refer to the exhibit. What are the possible port roles for ports A, B, C, and D in this RSTP-enabled network?

The port violation mode is the default for any port that has port security enabled.

Refer to the exhibit. What can be determined about port security from the information that is shown?

ipv6 route 2001:db8:1:4::/64 2001:db8:1:3::2

Refer to the exhibit. What command would be used to configure a static route on R1 so that traffic from both LANs can reach the 2001:db8:1:4::/64 remote network?

Configure a static default route from R1 to Edge, a default route from Edge to the Internet, and a static route from Edge to R1.

Refer to the exhibit. What routing solution will allow both PC A and PC B to access the Internet with the minimum amount of router CPU and network bandwidth utilization?

A(config)# no ip route 10.0.0.0 255.0.0.0 172.16.40.2 A(config)# ip route 10.0.0.0 255.0.0.0 192.168.1.2

Refer to the exhibit. What two commands will change the next-hop address for the 10.0.0.0/8 network from 172.16.40.2 to 192.168.1.2? (Choose two.)

Send the packet out the Serial0/0/0 interface.

Refer to the exhibit. What will the router do with a packet that has a destination IP address of 192.168.12.227?

The 172.16.1.0 route learned from RIP would be replaced with the 172.16.1.0 static route.

Refer to the exhibit. What would happen after the IT administrator enters the new static route?

R2(config)# ipv6 route 2001:db8:10:12::/64 S0/0/0

Refer to the exhibit. Which command will properly configure an IPv6 static route on R2 that will allow traffic from PC2 to reach PC1 without any recursive lookups by router R2?

R1(config)# ipv6 route ::/0 G0/1 fe80::2

Refer to the exhibit. Which default static route command would allow R1 to potentially reach all unknown networks on the Internet?

GigabitEthernet0/0

Refer to the exhibit. Which interface will be the exit interface to forward a data packet that has the destination IP address 10.55.99.78?

ip route 172.16.1.0 255.255.255.0 s0/0/0 121

Refer to the exhibit. Which static route would an IT technician enter to create a backup route to the 172.16.1.0 network that is only used if the primary RIP learned route fails?

Trunk2

Refer to the exhibit. Which trunk link will not forward any traffic after the root bridge election process is complete?

A(config)# ip route 192.168.4.0 255.255.255.0 192.168.3.2

Refer to the graphic. Which command would be used on router A to configure a static route to direct traffic from LAN A that is destined for LAN C?

The root bridge BID. The role of the ports in all VLANs.

To obtain an overview of the spanning tree status of a switched network, a network engineer issues the show spanning-tree command on a switch. Which two items of information will this command display? (Choose two.)

The switch adds the MAC address and incoming port number to the table.

What action takes place when the source MAC address of a frame entering a switch is not in the MAC address table?

receiving a broadcast beacon frame transmitting a probe request

What are the two methods that are used by a wireless NIC to discover an AP? (Choose two.)

Enable trunking manually. Disable DTP. Set the native VLAN to an unused VLAN.

What are three techniques for mitigating VLAN attacks?

a directly connected multiaccess network.

What characteristic completes the following statement? When an IPv6 static route is configured, a fully-specified configuration should be used with ......

the client that is requesting authentication

What device is considered a supplicant during the 802.1X authentication process?

It identifies the gateway IP address to which the router sends all IP packets for which it does not have a learned or static route.

What is a characteristic of a static route that matches all packets?

enterprise

What is a wireless security mode that requires a RADIUS server to authenticate wireless users?

FE80::/10

What is the IPv6 prefix that is used for link-local addresses?

traps

What is the common term given to SNMP log messages that are generated by network devices and sent to the SNMP server?

It disables DTP on a non-trunking interface.

What is the effect of entering the switchport mode access configuration command on a switch?

What is the function provided by CAPWAP protocol in a corporate wireless network?

What is the function provided by CAPWAP protocol in a corporate wireless network?

::/0

What network prefix and prefix-length combination is used to create a default static route that will match any IPv6 destination?

Disable both protocols on all interfaces where they are not required.

What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?

preventing rogue switches from being added to the network

What security benefit is gained from enabling BPDU guard on PortFast enabled interfaces?

the interface ID exit interface* the IP address of the next-hop neighbor*

What two pieces of information are needed in a fully specified static route to eliminate recursive lookups? (Choose two.)

send the packet out interface Serial0/0/1*

What will router R2 do with a packet destined for 192.168.10.129?

authentication

Which access control component, implementation, or protocol is implemented either locally or as a server-based solution?

local AAA*

Which authentication method stores usernames and passwords in the router and is ideal for small networks?

Change the administrative distance to 120.

Which change should be made to the static route command so that traffic will only use the OSPF link when it is up?

R2(config)# ip route 172.16.2.0 255.255.255.0 172.16.3.1

Which command will create a static route on R2 in order to reach PC B?

rogue switches on a network

Which network attack is mitigated by enabling BPDU guard?

O 10.1.1.0/24 [110/65] via 192.168.200.2, 00:01:20, Serial0/1/0

Which route would be used to forward a packet with a source IP address of 192.168.10.1 and a destination IP address of 10.1.1.1?

Qos

Which service can be used on a wireless router to prioritize network traffic among different types of applications so that voice and video data are prioritized over email and web data?

It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN.

Which statement describes the behavior of a switch when the MAC address table is full?

wireless network password AP password SSID

Which three parameters would need to be changed if best practices are being implemented for a home wireless AP? (Choose three.)

DHCP Snooping Port Security

Which two Cisco solutions help prevent DHCP starvation attacks? (Choose two.)

S1(config)# spanning-tree portfast bpduguard default* S1(config-if)# spanning-tree bpduguard enable*

Which two commands can be used to enable BPDU guard on a switch? (Choose two.)

RSTP STP

Which two types of spanning tree protocols can cause suboptimal traffic flows because they assume only one spanning-tree instance for the entire bridged network? (Choose two.)

VLAN double-tagging

Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN?

Wireless LANs (WLAN)

Which type of wireless network uses transmitters to cover a medium-sized network, usually up to 300 feet (91.4 meters)?

WPA2 with AES

Which wireless encryption method is the most secure?

infrastructure

Which wireless network topology would be used by network engineers to provide a wireless network for an entire college building?

Recursive static

ipv6 route 2001:0DB8::/32 2001:0DB8:3000::1 Refer to the exhibit. Which type of IPv6 static route is configured in the exhibit?


Kaugnay na mga set ng pag-aaral

Chapters: 8,14,15,16,17,18,19 - Review Questions

View Set

Nursing Leadership & Management Final

View Set

Pediatrie - dr Dracea C2 - Nou-născutul - puericultură

View Set

English collocation in use advanced

View Set