Official Cert Guide CCNA 200-301 Part 2
Refer to the diagram; which of the following connection parameters are used when connecting to the console of a Cisco switch? 19200, None, 7, 1 19200, Even, 8, 2 9600, None, 8, 1 9600, Even, 7, 2
9600, None, 8, 1
What are Input Errors?
:A total of many counters, including runts, giants, no buffer, CRC, frame, overrun, and ignored counts.
show show mac address-tablemac address-table
Shows all MAC table entries of all types
show mac address-table dynamic
Shows all dynamically learned MAC table entries
show mac address-table dynamic interface interface-id
Shows all dynamically learned MAC table entries associated with that interface
show mac address-table dynamic vlan vlan-id
Shows all dynamically learned MAC table entries in that VLAN
show mac address-table dynamic address mac-address
Shows the dynamically learned MAC table entries with that MAC address
show mac address-table aging-time
Shows the global and per-VLAN aging timeout for inactive MAC table entries
show mac address-table count
Shows the number of entries in the MAC table, and the total number of remaining empty slots in the MAC table
With a Cisco switch, when autonegotiation fails what logic does a Cisco switch use to chose the speed?
Speed: Sense the speed (without using autonegotiation), but if that fails, use the IEEE default (slowest supported speed, often 10 Mbps). Duplex: Use the IEEE defaults: If speed = 10 or 100, use half duplex; otherwise, use full duplex.
What is the IEEE autonegotiation rules (defaults) that nodes should use as defaults when autonegotiation fails?
Speed: Use your slowest supported speed (often 10 Mbps). Duplex: If your speed = 10 or 100, use half duplex; otherwise, use full duplex
What are the cabling options for console connection?
USB UTP (RJ45 port) Serial (DB9)
When the Cisco IOS CLI is initially accessed via console, Telnet, or SSH, with no extra privileges, which mode is the user placed into? Enable mode Configuration mode User mode Boot mode
User mode Explanation: The two Cisco IOS exec modes are user mode and enable mode (privileged mode). When a device is initially accessed via console, Telnet, or SSH, users will be placed into user mode. They can enter into enable mode by using the enable command from within user mode.
What are Collisions?
Counter of all collisions that occur when the interface is transmitting a frame.
What are the three main functions of a switch?
Deciding when to forward a frame or when a to not forward a frame based on the destination MAC address Preparing to forward frames by learning MAC addresses by examining the source MAC address of each frame received by the switch Preparing to forward only one copy of the frame to the destination by creating a (Layer 2) loop-free environment with other switches by using spanning tree protocol (STP)
What mode is the Router in Router >
Default mode (user mode)
What are three commands that can be used to erase the startup-config file
write erase erase startup-config erase nvram
Command for configuring a simple password?
● (config)# config line console 0 ● (config-line)# password pass - create console password and save it cleartext
Command to enable password?
● (config)# enable secret pass
What is the default aging time for MAC table entries that have not been used? 3 minutes 300 seconds 30 seconds 300 milliseconds
300 seconds
What is a CISCO default port settings __________bits flow control Parity bits __________stop bits
9600 bits/second no hardware flow control 8-bit ASCII No parity bits 1 stop bit
What is Secure Shell (SSH)
A TCP/IP application layer protocol that supports terminal emulation between client and server. It used dynamic key exchange and encryption to keep the communications private.
Switch SW1 connects via a cable to switch SW2's G0/1 port. Which of the following conditions is the most likely to cause SW1's late collision counter to continue to increment? a. SW2's G0/1 has been configured with a shutdown interface subcommand. b. The two switches have been configured with different values on the speed interface subcommand. c. A duplex mismatch exists with SW1 set to full duplex. d. A duplex mismatch exists with SW1 set to half duplex.
A duplex mismatch exists with SW1 set to half duplex.
What is the Spanning Tree Protocol (STP)?
A protocol defined by IEEE standard 802.ID. Allows switches and bridges to create a redundant LAN, with the protocol dynamically causing some ports to block traffic, so that the bridge/switch forwarding logic will not cause frames to loop indefinitely around the LAN.
What is a Broadcast frame?
An Ethernet frame sent to destination address FFFF.FFFF.FFFF, meaning that the frame should be delivered to all hosts on that LAN.
What is a Known Unicast frame?
An Ethernet frame whose destination MAC address is listed in a switch's MAC address table, so the switch will forward the frame out the one port associated with that entry in the MAC address table.
What is a unknown Unicast Frame?
An Ethernet frame whose destination MAC address is not listed in a switch's MAC address table, so the switch must flood the frame.
How does a switch build its MAC address table? By listening to outgoing frames and examining the source MAC address By listening to outgoing frames and examining the destination MAC address By listening to incoming frames and examining the destination MAC address By listening to incoming frames and examining the source MAC address
By listening to incoming frames and examining the source MAC address A switch will build its MAC address table by listening to incoming frames and comparing the source MAC address to its address table. If the source MAC is not seen in the table, an entry will be added that will map the MAC address to the port. The switch will not examine the outgoing frames to build its MAC address table.
clear mac address-table dynamic
Empties the MAC table of all dynamic entries
What are Runts?
Frames that did not meet the minimum frame size requirement (64 bytes, including the 18-byte destination MAC, source MAC, type, and FCS). Can be caused by collisions.
What are Giants?
Frames that exceed the maximum frame size requirement (1518 bytes, including the 18-byte destination MAC, source MAC, type, and FCS).
The process of a device learning a MAC address
Switched build the address table by listening to incoming frames and examining the source MAC address in the frame. If a frames enter that is not in the MAC address table, the switch creates an entry in the table
What is Telnet
The standard terminal-emulation application layer protocol in the TCP/IP protocol stack
What are Late Collisions?
The subset of all collisions that happen after the 64th byte of the frame has been transmitted. (In a properly working Ethernet LAN, collisions should occur within the first 64 bytes; late collisions today often point to a duplex mismatch.)
How can remove the dynamic entries from the MAC address table?
clear mac address-table dynamic
How can remove the dynamic entries from the MAC address table by VLAN?
clear mac address-table dynamic vlan vlan-number
Command to return to User Mode from Enable mode
disable
What is a Late Collision?
● collisions that happened after 64th byte of a frame - sign of duplex mismatch (in half-duplex mode, collisions should be detected before the 64th byte.)
What is a Giant
● frames larger than the maximum frame size, i.e. 1518 bytes. Note: in some situations (802.1Q-in-802.1Q, MLPS) the frame can be larger than 1518 bytes but smaller than 1600 - these are valid frames and are called baby giants. Additionally, some installations deliberately use larger maximum frame size, up to 9000 bytes, these are called jumbo frames.
What is a Runt
● frames smaller than 64 bytes, can be caused by collisions
Command to move from User Mode to Enable mode
Enable (Shorthand "en")
What mode is the Router in Router #
Enable mode
Consider the following output from a Cisco Catalyst switch: SW1# show mac address-table dynamic Mac Address Table ------------------------------------------- Vlan Mac Address Type Ports ---- ----------- -------- ----- 1 02AA.AAAA.AAAA DYNAMIC Gi0/1 1 02BB.BBBB.BBBB DYNAMIC Gi0/2 1 02CC.CCCC.CCCC DYNAMIC Gi0/3 Total Mac Addresses for this criterion: 3 Which of the following answers is true about this switch? a. The output proves that port Gi0/2 connects directly to a device that uses address 02BB.BBBB.BBBB. b. The switch has learned three MAC addresses since the switch powered on. c. The three listed MAC addresses were learned based on the destination MAC address of frames forwarded by the switch. d. 02CC.CCCC.CCCC was learned from the source MAC address of a frame that entered port Gi0/3.
02CC.CCCC.CCCC was learned from the source MAC address of a frame that entered port Gi0/3.
An engineer wants to set up simple password protection with no usernames for some switches in a lab, for the purpose of keeping curious coworkers from logging in to the lab switches from their desktop PCs. Which of the following commands would be a useful part of that configuration? a. A login vty mode subcommand b. A password password console subcommand c. A login local vty subcommand d. A transport input ssh vty subcommand
A login vty mode subcommand
clear mac address-table dynamic [vlan vlan-number] [interface interface-id] [address mac-address]
Clears (removes) dynamic MAC table entries: either all (with no parameters), or a subset based on VLAN ID, interface ID, or a specific MAC address
An engineer had formerly configured a Cisco 2960 switch to allow Telnet access so that the switch expected a password of mypassword from the Telnet user. The engineer then changed the configuration to support Secure Shell. Which of the following commands could have been part of the new configuration? (Choose two answers.) a. A username name secret password vty mode subcommand b. A username name secret password global configuration command c. A login local vty mode subcommand d. A transport input ssh global configuration command
A username name secret password global configuration command
Command to move from Enable Mode to Configuration Mode
Conf T
What mode is the Router in Router(config-if)#
Configuration Interface
What mode is the Router in Router(config)#
Configuration Terminal
Which of the following describes a way to disable IEEE standard autonegotiation on a 10/100 port on a Cisco switch? a. Configure the negotiate disable interface subcommand b. Configure the no negotiate interface subcommand c. Configure the speed 100 interface subcommand d. Configure the duplex half interface subcommand e. Configure the duplex full interface subcommand f. Configure the speed 100 and duplex full interface subcommands
Configure the speed 100 and duplex full interface subcommands
What are three methods a Switch CLI can be accessed?
Console Telnet Secure Shell (SSH)
What will a switch compare in its MAC table to be able to forward a frame? Source IP address Destination IP address Source MAC address Destination MAC address
Destination MAC address Explanation: A switch will compare the destination MAC address of the frame to its MAC table to decide whether it should forward the frame or simply ignore it. A switch will not look at the IP address (layer 3) information to forward the frame. It cares about Layer 2 information, which is the MAC address.
In which of the following modes of the CLI could you type the command reload and expect the switch to reboot? User mode Enable mode Global configuration mode Interface configuration mode
Enable mode Explanation: The command referenced in the question, the reload command, is an EXEC command that happens to require privileged mode, also known as enable mode. This command is not available in user mode. Note that you can put the word do in front of the EXEC command while in configuration mode (for example, do reload) to issue the command from inside any configuration mode.
What is the name of the Cisco IOS CLI exec mode that allows a user to run more powerful commands? Boot mode Enable mode User mode Configuration mode
Enable mode Explanation: The two Cisco IOS exec modes are user mode and enable mode (privileged mode). When a device is initially accessed via console, Telnet, or SSH, the user will be placed into user mode. However, to run more powerful commands, the user must access enable mode using the enable command.
In what modes can you type the command show mac address-table and expect to get a response with MAC table entries? (Choose two answers.) Enable mode Interface configuration mode User mode Global configuration mode
Enable mode User mode
What does the copy startup-config running-config command do
Enable mode EXEC command that merges the startup-config with the currently active config file RAM
What is the command RELOAD
Enable mode EXEC command that reboots the router or switch
What does copy running-config startup-config command do?
Enable mode EXEC command that saves the active config, replacing the startup-config file used when the switch initializes
What is No Debug all & Undebug all
Enable mode EXEC command to disable all currently enabled bugs
Command to move back to Enable mode from Configuration mode
End or CTL-Z
A Cisco Catalyst switch connects with its Gigabit0/1 port to an end user's PC. The end user, thinking the user is helping, manually sets the PC's OS to use a speed of 1000 Mbps and to use full duplex, and disables the use of autonegotiation. The switch's G0/1 port has default settings for speed and duplex. What speed and duplex settings will the switch decide to use? (Choose two answers.) a. Full duplex b. Half duplex c. 10 Mbps d. 1000 Mbps
Full duplex 1000 Mbps
In which of the following modes of the CLI could you configure the duplex setting for interface Fast Ethernet 0/5? a. User mode b. Enable mode c. Global configuration mode d. VLAN mode e. Interface configuration mode
Interface configuration mode
Which of the following statements describes part of the process of how a switch decides to forward a frame destined for a known unicast MAC address?
It compares the unicast destination address to the bridging, or MAC address, table.
Which of the following statements describes part of the process of how a switch decides to forward a frame destined for a known unicast MAC address? a. It compares the unicast destination address to the bridging, or MAC address, table. b. It compares the unicast source address to the bridging, or MAC address, table. c. It forwards the frame out all interfaces in the same VLAN except for the incoming interface. d. It compares the destination IP address to the destination MAC address. e. It compares the frame's incoming interface to the source MAC entry in the MAC address table.
It compares the unicast destination address to the bridging, or MAC address, table.
Which of the following comparisons does a switch make when deciding whether a new MAC address should be added to its MAC address table? a. It compares the unicast destination address to the bridging, or MAC address, table. b. It compares the unicast source address to the bridging, or MAC address, table. c. It compares the VLAN ID to the bridging, or MAC address, table. d. It compares the destination IP address's ARP cache entry to the bridging, or MAC address, table.
It compares the unicast source address to the bridging, or MAC address, table.
Which of the following comparisons does a switch make when deciding whether a new MAC address should be added to its MAC address table? It compares the unicast source address to the bridging, or MAC address, table. It compares the unicast destination address to the bridging, or MAC address, table. It compares the VLAN ID to the bridging, or MAC address, table. It compares the destination IP address's ARP cache entry to the bridging, or MAC address, table.
It compares the unicast source address to the bridging, or MAC address, table. Switches need to learn the location of each MAC address used in the LAN relative to that local switch. When a switch receives a frame, the source MAC identifies the sender. The interface in which the frame arrives identifies the local switch interface closest to that node in the LAN topology.
Which of the following statements best describes what a switch does with a frame destined for an unknown unicast address? It compares the frame's incoming interface to the source MAC entry in the MAC address table. It forwards the frame out the one interface identified by the matching entry in the MAC address table. It forwards out all interfaces in the same VLAN except for the incoming interface. It compares the destination IP address to the destination MAC address.
It forwards out all interfaces in the same VLAN except for the incoming interface.
Which of the following statements best describes what a switch does with a frame destined for an unknown unicast address? a. It forwards out all interfaces in the same VLAN except for the incoming interface. b. It forwards the frame out the one interface identified by the matching entry in the MAC address table. c. It compares the destination IP address to the destination MAC address. d. It compares the frame's incoming interface to the source MAC entry in the MAC address table.
It forwards out all interfaces in the same VLAN except for the incoming interface.
Which of the following statements describes part of the process of how a LAN switch decides to forward a frame destined for a broadcast MAC address? It compares the unicast source address to the bridging, or MAC address, table. It forwards the frame out all interfaces in the same VLAN except for the incoming interface. It compares the unicast destination address to the bridging, or MAC address, table. It compares the destination IP address to the destination MAC address. It compares the frame's incoming interface to the source MAC entry in the MAC address table.
It forwards the frame out all interfaces in the same VLAN except for the incoming interface.
The MAC address table will hold which pieces of information? MAC address Switch port numbers Source IP address Transport protocols Destination IP address
MAC address Switch port numbers When a MAC address is learned on a port, the switch will update its MAC address table to map the MAC address learned along with the correspondingswitch port. The source IP, destination IP addresses and tranport port numbers will not be mapped in the MAC table.
Which of the following statements describes part of the process of how a LAN switch decides to forward a frame destined for a broadcast MAC address? a. It compares the unicast destination address to the bridging, or MAC address, table. b. It compares the unicast source address to the bridging, or MAC address, table. c. It forwards the frame out all interfaces in the same VLAN except for the incoming interface. d. It compares the destination IP address to the destination MAC address. e. It compares the frame's incoming interface to the source MAC entry in the MAC address table.
It forwards the frame out all interfaces in the same VLAN except for the incominginterface.
show interfaces status
Lists one line per interface on the switch, with basic status and operating information for each
Using a cable to connect a workbench PC to the console port of the switch, you notice that the switch is nonresponsive. A co-worker mentioned that the same PC was used with that same switch earlier in the day. The SYST LED on the switch is green. Considering the given scenario, what should the technician do? Check to see if the cable used is a Category 5 or higher cable. Verify the cable used is a crossover cable. Verify a straight-through cable is being used. Make sure the cable is a rollover cable. Verify the correct physical connections have been made.
Make sure the cable is a rollover cable. Verify the correct physical connections have been made. Explanation: A rollover cable is required for console access. The UTP rollover cable has RJ-45 connectors on each end, with pin 1 on one end connected to pin 8 on the other, pin 2 to pin 7, pin 3 to pin 6, and pin 4 to pin 5. Making sure the cable is connected to the console port, and not a different RJ-45jack, is also important. Crossover and straight-through cables are not correct for access to the console port. The serial line of the console port is slow compared to Ethernet, and does not require Ethernet rated cabling for correct functionality.
If an engineer issued the copy running-config startup-config command, which Cisco memory type would the configuration be copied to? NVRAM ROM Flash RAM
NVRAM Explanation: There are four different Cisco memory types: RAM, ROM, Flash (Memory), and NVRAM. The RAM holds the working IOS memory along with the running configuration. The ROM holds a devices bootstrap system that is used should an IOS upgrade fail as a backstop. The Flash that is used to hold the IOS images that are run on a device and the NVRAM which is used to store the startup configuration of a device.
What is the possible problem here Line Status Protocol Status Interface Status down down not connected
No cable; bad cable; wrong cable pinouts; speed mismatch; neighboring device is (a) powered off, (b) shutdown, or (c) error disabled.
Can IEEE autonegotiation sense the the speed used by other nodes?
No, only CISCO can
What is the possible problem here Line Status Protocol Status Interface Status up down not connected
Not expected on LAN switch physical interfaces
A Cisco Catalyst switch has 24 10/100 ports, numbered 0/1 through 0/24. Ten PCs connect to the 10 lowest numbered ports, with those PCs working and sending data over the network. The other ports are not connected to any device. Which of the following answers lists facts displayed by the show interfaces status command? a. Port Ethernet 0/1 is in a connected state. b. Port Fast Ethernet 0/11 is in a connected state. c. Port Fast Ethernet 0/5 is in a connected state. d. Port Ethernet 0/15 is in a not connected state
Port Fast Ethernet 0/5 is in a connected state.
A Cisco Catalyst switch has 24 10/100 ports, numbered 0/1 through 0/24. Ten PCs connect to the 10 lowest numbered ports, with those PCs working and sending data over the network. The other ports are not connected to any device. Which of the following answers lists facts displayed by the show interfaces status command?
Port Fast Ethernet 0/5 is in a connected state. The show interfaces status command lists one line of output per interface. Cisco Catalyst switches name the type of interface based on the fastest speed of the interface, so 10/100 interfaces would be Fast Ethernet. With a working connection, ports from FastEthernet 0/1 through 0/10 would be listed in a connected state, while the rest would be listed in a notconnected state.
What is the possible problem here Line Status Protocol Status Interface Status down down (err-disabled) err-disabled
Port security has disabled the interface.
A switch user is currently in console line configuration mode. Which of the following would place the user in enable mode? (Choose two answers.) Using the exit command once Pressing the Ctrl+Z key sequence once Using the quit command Using the end command once
Pressing the Ctrl+Z key sequence once Using the end command once Explanation: The exit command moves the user one config mode backward, toward global configuration mode, or if already in global configuration mode, it moves the user back to enable mode. From console mode, it moves the user back to global configuration mode. The end command and the Ctrl+Z key sequence both move the user back to enable mode regardless of the current configuration submode.
What type of switch memory is used to store the configuration used by the switch when it is up and working? Flash Bubble ROM RAM NVRAM
RAM Explanation: Switches (and routers) keep the currently used configuration in RAM, using NVRAM to store the configuration file that is loaded when the switch (or router) next loads the IOS.
If an engineer issued the copy startup-config running-config command, which Cisco memory type would the configuration be copied to? Flash RAM ROM NVRAM
RAM Explanation:There are four different Cisco memory types: RAM, ROM, Flash (Memory), and NVRAM. The RAM holds the working IOS memory along with the running configuration. The ROM holds a device's bootstrap system that is used if an IOS upgrade fails as a backstop. The Flash holds the IOS images that are run on a device, and the NVRAM stores the startup configuration of a device.
What are CRC?
Received frames that did not pass the FCS math; can be caused by collisions.
What is a Frame when dealing with Layer 1 problems?
Received frames that have an illegal format, for example, ending with a partial byte; can be caused by collisions
Which of the following is a difference between Telnet and SSH as supported by a Cisco switch? Telnet is used from Microsoft operating systems, and SSH is used from UNIX and Linux operating systems. SSH encrypts all data exchange, including login passwords; Telnet encrypts nothing. SSH encrypts the passwords used at login, but not other traffic; Telnet encrypts nothing. Telnet encrypts only password exchanges; SSH encrypts all data exchanges.
SSH encrypts all data exchange, including login passwords; Telnet encrypts nothing. Explanation: SSH provides a secure remote login option, encrypting all data flows, including password exchanges. Telnet sends all data (including passwords) as clear tex
What does the Running-config contain
Stores the currently used configuration commands. This file changes dynamically when someone enters commands in configuration mode
What does the Startup-config contain
Stores the initial configuration used anytime the device reloads CISCO IOS
Which type of memory does a switch use to build the MAC address table ? DRAM NVRAM Flash TCAM
TCAM Explanation: The MAC address table uses the ternary content-addressable memory (TCAM). Flash is where the IOS resides. The NVRAM is where the startup-configuration resides. DRAM is where you will find the running-configuration, logs, and so on, which will be lost if the device reboots.
In the figure, all devices are statically configured with the IP addresses, masks, and default gateway information. Assume that all switches have learned the MAC addresses of all devices in the figure. PC1 pings PC4, and PC1 receives replies, confirming that the ping worked. Which of the following are true about the frames sent in this network, and their encapsulated packets? When considering a frame, consider the header of the frame, and any encapsulated packet as well. The frame that contains the ICMP Echo request, sent by PC1, has a destination IP address of 10.1.2.4. The frame that contains the ICMP Echo request, sent by PC1, has a destination IP address of 10.1.1.254. The frame that contains the ICMP Echo reply, sent by PC4, has a destination MAC address of R1's fa0/0 interface's MAC. The frame that contains the ICMP Echo request, sent by PC1, has a destination MAC address of PC4's MAC. The frame that contains the ICMP Echo request, sent by PC1, has a destination MAC address of R1's fa0/0 interface's MAC. The frame that contains the ICMP Echo reply, sent by PC4, has a destination MAC address of PC1's MAC.
The frame that contains the ICMP Echo request, sent by PC1, has a destination IP address of 10.1.2.4. The frame that contains the ICMP Echo request, sent by PC1, has a destination MAC address of R1's fa0/0 interface's MAC. Explanation: In this example, PC1 and PC4 reside in different subnets, with one router between them. As a result, the router de-encapsulates the IP packet (holding the ICMP message) from the Ethernet frame, discarding the old Ethernet header and trailer - and then adding a new Ethernet header and trailer. Each frame uses a destination MAC address of a device on the same LAN or broadcast domain. Considering an ICMP Echo message sent by PC1 to PC4, the frame encapsulating the ICMP message uses: The IP header shows PC1's IPv4 address as the source and PC4's IPv4 address as the destination. The Ethernet header of the frame as sent by PC1 includes a source MAC of PC1's MAC and a destination MAC of R1-fa0/0's MAC. The Ethernet header of the frame after the router routes the packet (including de-encapsulation and re-encapsulation) shows a source MAC of R1-Fa0/1's MAC and PC4's MAC address as the destination. In the reverse direction, with PC4 sending an ICMP Echo Reply: The IP header shows PC4's IPv4 address as the source and PC1's IPv4 address as the destination. The Ethernet header of the frame sent by PC4 shows PC4's MAC address as the source and R1-Fa0/1's MAC as the destination. The Ethernet header of the frame after the router routes the packet (including de-encapsulation and re-encapsulation) shows the R1-Fa0/0's MAC as the source and PC1's MAC address as the destination. If you apply all these facts to the various answers, you can rule in and rule out each correct and incorrect answer, respectively.
All host switch ports reside in VLAN 1, with no port security nor static MAC address table entries defined. Host B remains powered off, but all other hosts can ping each other successfully. Later, host B powers up, and the user issues a ping 10.1.1.4 command to generate host B's first network traffic. Which answer(s) describe frame forwarding in this scenario? The frame will not be forwarded to host A The frame will be forwarded out SW2's Gi0/1 interface The frame will be forwarded to host D The frame will be forwarded to SW2, but not SW3
The frame will be forwarded out SW2's Gi0/1 interface The frame will be forwarded to host D Explanation: In this scenario, because of the recent boot, host B begins with an empty ARP table. As a result, host B needs to send an ARP request, also called an ARP broadcast, as the first frame. So this question asks about the flow of the ARP Request, which is a LAN broadcast, with a destination MAC address of FFFF.FFFF.FFFF. As a result, all three switches flood the frame, so a copy of the frame is forwarded out all active interfaces in VLAN 1. As stated in the question, and as confirmed in the exhibit's output, all interfaces are in VLAN 1. So, the frame will be flooded out all interfaces in the figure, except the interfaces in which a frame arrived into the switch. Considering each answer, beginning with the correct answers: The answer that claims the frame will be forwarded to host D is correct, in that the frame - a LAN broadcast - will be forwarded to all the hosts, including host D. The answer that claims that SW2 WILL forward the frame out SW2's G0/1 interface is correct for the LAN broadcast used for the ARP Request, as explained earlier. However, this answer would be incorrect for a unicast frame sent to host C's MAC address, because SW2 should know host C's MAC address, and would forward the frame out only the correct port to reach host C. Incorrect: The frame will be forwarded into SW1, then to SW2, and then to SW3, which rules out one incorrect answer that claims that the frame would not be forwarded to SW3. The answer that claims the frame will NOT be forwarded to host A is incorrect, because the frame - a LAN broadcast - will be forwarded to all the hosts, including host A.
The output of the show interfaces status command on a 2960 switch shows interface Fa0/1 in a "disabled" state. Which of the following is true about interface Fa0/1? (Choose three answers.) a. The interface is configured with the shutdown command. b. The show interfaces fa0/1 command will list the interface with two status codes of administratively down and line protocol down. c. The show interfaces fa0/1 command will list the interface with two status codes of up and down. d. The interface cannot currently be used to forward frames. e. The interface can currently be used to forward frames
The interface is configured with the shutdown command. The show interfaces fa0/1 command will list the interface with two status codes of administratively down and line protocol down. The interface cannot currently be used to forward frames.
What is the possible problem here Line Status Protocol Status Interface Status up up connected
The interface is working.
A Layer 2 switch configuration places all its physical ports into VLAN 2. The IP addressing plan shows that address 172.16.2.250 (with mask 255.255.255.0) is reserved for use by this new LAN switch and that 172.16.2.254 is already configured on the router connected to that same VLAN. The switch needs to support SSH connections into the switch from any subnet in the network. Which of the following commands are part of the required configuration in this case? (Choose two answers.) a. The ip address 172.16.2.250 255.255.255.0 command in interface vlan 1 configuration mode. b. The ip address 172.16.2.250 255.255.255.0 command in interface vlan 2 configuration mode. c. The ip default-gateway 172.16.2.254 command in global configuration mode. d. The switch cannot support SSH because all its ports connect to VLAN 2, and the IP address must be configured on interface VLAN 1.
The ip address 172.16.2.250 255.255.255.0 command in interface vlan 2 configuration mode. The ip default-gateway 172.16.2.254 command in global configuration mode.
An engineer's desktop PC connects to a switch at the main site. A router at the main site connects to each branch office through a serial link, with one small router and switch at each branch. Which of the following commands must be configured on the branch office switches, in the listed configuration mode, to allow the engineer to telnet to the branch office switches and supply only a password to login? (Choose three answers.) a. The ip address command in interface configuration mode b. The ip address command in global configuration mode c. The ip default-gateway command in VLAN configuration mode d. The ip default-gateway command in global configuration mode e. The password command in console line configuration mode f. The password command in vty line configuration mode
The ip address command in interface configuration mode The ip default-gateway command in global configuration mode The password command in vty line configuration mode
Switch SW1 uses its Gigabit 0/1 interface to connect to switch SW2's Gigabit 0/2 interface. SW2's Gi0/2 interface is configured with the speed 1000 and duplex full commands. SW1 uses all defaults for interface configuration commands on its Gi0/1 interface. Which of the following are true about the link after it comes up? (Choose two answers.) a. The link works at 1000 Mbps (1 Gbps). b. SW1 attempts to run at 10 Mbps because SW2 has effectively disabled IEEE standard autonegotiation. c. The link runs at 1 Gbps, but SW1 uses half duplex and SW2 uses full duplex. d. Both switches use full duplex
The link works at 1000 Mbps (1 Gbps). Both switches use full duplex
What is the possible problem here Line Status Protocol Status Interface Status administratively down down disabled
The shutdown command is configured on the interface.
After power on, a frame arrives at a switch. The switch had not yet learned the source MAC address of that frame. Which actions must the switch take in this case? The switch adds the source MAC address to its MAC table. The switch adds the source and destination MAC address to the MAC address table. The switch checks the frame for loops. The switch adds the destination MAC address to the MAC address table.
The switch adds the source MAC address to its MAC table. This scenario focuses on switch learning. First, for switch learning, the switch's MAC address table may have some MAC addresses in it, but it does not contain the source MAC address of the frame. Switch learning means that the switch learns the source MAC address of the frame (identifying the one correct answer). Switches do not learn based on the destination MAC address of the frame (ruling out two answers). One incorrect answer mentions a frame loop. The frame does not contain any fields that allow a check to discover if the frame has been looping through the switch.
What is the primary role of a LAN switch?
To forward ethernet frames
What are Packets Output?
Total number of packets (frames) forwarded out the interface
What are Output Errors?
Total number of packets (frames) that the switch port tried to transmit, but for which some problem occurred.
Which Cisco IOS command is used to access global configuration mode? configure terminal configure mode enable mode terminal
configure terminal Explanation: There are a number of different Cisco IOS command modes; they include the user and enable exec modes, global configuration mode, interface configuration mode, subinterface configuration mode, and line configuration mode, to name a few. To access any of the configuration modes, the user must first get into global configuration mode using the configure terminal command.
If an engineer has completed a series of changes to a Cisco switch and wants to ensure that the changes are saved and retained across reboots, which command should be issued? copy config startup running copy running-config startup-config copy config running startup copy startup-config running-config
copy running-config startup-config Explanation: Three primary sources and destinations are used when saving the configurations of a Cisco switch (or router): the startup configuration (startup-config), the running configuration (running-config), and TFTP. Both the startup and running configurations are local to the Cisco device, with the startup configuration being persistent across reboots while the running configuration is the active configuration that is used by a "running" device. The TFTP source/destination is an option that allows engineers to save their configuration to an external device or to replace the local configuration with a remote copy.
What command copies the configuration from RAM into NVRAM? copy startup-config running-config copy start-up-config running-config copy running-config tftp copy running-config startup-config copy running-config start-up-config copy tftp running-config
copy running-config startup-config Explanation: The startup-config file is in NVRAM, and the running-config file is in RAM
If one device uses autonegotiation and the other disables it, what must the first device must resort to?
default settings of "Autonegotiation Results When Only One Node Uses Autonegotiation." ■ Speed: Sense the speed (without using autonegotiation), but if that fails, use the IEEE default (slowest supported speed, often 10 Mbps). ■ Duplex: Use the IEEE defaults: If speed = 10 or 100, use half duplex; otherwise, use full duplex
Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log out of the switch and log back in at the console. Which command defines the password that you had to enter to access privileged mode? a. enable password b. enable secret c. Neither d. The password command, if it is configured
enable secret
What command erases the startup-config file?
erase startup-config
On the show interfaces status command what does a-full mean
full duplex as autonegotiated
On the show interfaces status command what does half mean
half duplex but as manually configured
Which Cisco IOS command is used to access console line configuration mode? line console 0 mode terminal mode console configure console
line console 0 Explanation: There are a number of different Cisco IOS command modes; they include the user and enable exec modes, global configuration mode, interface configuration mode, subinterface configuration mode, and line configuration mode, to name a few. To access the console line configuration mode, you must first get into global configuration mode using the configure terminal command and then use the line console 0 command.
Which of the following line subcommands tells a switch to wait until a show command's output has completed before displaying log messages on the screen? a. logging synchronous b. no ip domain-lookup c. exec-timeout 0 0 d. history size 15
logging synchronous