4
119. Users are complaining of sporadic access to the internet every afternoon. What should be done or checked?
Check the statistics on the default route for oversaturation.
106. A network administrator is using the router-on-a-stick model to configure a switch and a router for inter-VLAN routing. What configuration should be made on the switch port that connects to the router?
Configure the port as an 802.1q trunk port.
98. What network attack seeks to create a DoS for clients by preventing them from being able to obtain a DHCP lease?
DHCP starvation
97. Match each DHCP message type with its description. (Not all options are used.)
DHCPACK -> DHCP server confirming that...; DHCPREQUEST -> the client accepting the IP address...; DHCPDISCOVER -> a client initiating a message...; DHCPOFFER -> DHCP server responding to the initial...
93. Match the purpose with its DHCP message type. (Not all options are used.)
DHCPREQUEST -> a message that is used to identify...; DHCPDISCOVER -> a message that is used to locate...; DHCPOFFER -> a message that is used to suggest...; DHCPACK -> a message that is used to acknowledge...
102. What protocol should be disabled to help mitigate VLAN attacks?
DTP
107. What are three techniques for mitigating VLAN attacks? (Choose three.)
Enable trunking manually; Disable DTP; Set the native VLAN to an unused VLAN
101. What protocol or technology uses source IP to destination IP as a load-balancing mechanism?
EtherChannel
96. Refer to the exhibit. A network administrator is configuring inter-VLAN routing on a network. For now, only one VLAN is being used, but more will be added soon. What is the missing parameter that is shown as the highlighted question mark in the graphic?
It identifies the VLAN number.
111. What action does a DHCPv4 client take if it receives more than one DHCPOFFER from multiple DHCP servers?
It sends a DHCPREQUEST that identifies which lease offer the client is accepting.
91. Refer to the exhibit. Which destination MAC address is used when frames are sent from the workstation to the default gateway?
MAC address of the virtual router
100. Refer to the exhibit. A network administrator has added a new subnet to the network and needs hosts on that subnet to receive IPv4 addresses from the DHCPv4 server.What two commands will allow hosts on the new subnet to receive addresses from the DHCP4 server? (Choose two.)
R1(config-if)# ip helper-address 10.2.0.250; R1(config)# interface G0/0
94. Which protocol adds security to remote connections?
SSH
108. Match the DHCP message types to the order of the DHCPv4 process. (Not all options are used.)
Step 1 -> DHCPDISCOVER; Step 2 -> DHCPOFFER; Step 3 -> DHCPREQUEST; Step 4 -> DHCPACK
116. Match the step number to the sequence of stages that occur during the HSRP failover process. (Not all options are used.)
Step 1 -> The forwarding router fails; Step 2 -> The standby router stops seeing hello...; Step 3 -> The standby router assumes the role...
115. Refer to the exhibit. Which two conclusions can be drawn from the output? (Choose two.)
The EtherChannel is down; The port channel ID is 2.
99. Refer to the exhibit. If the IP addresses of the default gateway router and the DNS server are correct, what is the configuration problem?
The IP address of the default gateway router is not contained in the excluded address list.
114. A network administrator has found a user sending a double-tagged 802.1Q frame to a switch. What is the best solution to prevent this type of attack?
The VLANs for user access ports should be different VLANs than any native VLANs used on trunk ports.
95. Refer to the exhibit. A network administrator is verifying the configuration of inter-VLAN routing. Users complain that PC2 cannot communicate with PC1. Based on the output, what is the possible cause of the problem?
The encapsulation dot1Q 5 command contains the wrong VLAN.
92. After a host has generated an IPv6 address by using the DHCPv6 or SLAAC process, how does the host verify that the address is unique and therefore usable?
The host sends an ICMPv6 neighbor solicitation message to the DHCP or SLAAC-learned address and if no neighbor advertisement is returned, the address is considered unique.
120. What action takes place when the source MAC address of a frame entering a switch appears in the MAC address table associated with a different port?
The switch replaces the old entry and uses the more current port.
112. Refer to the exhibit. The network administrator is configuring the port security feature on switch SWC. The administrator issued the command show port-security interface fa 0/2 to verify the configuration. What can be concluded from the output that is shown? (Choose three.)
This port is currently up; Security violations will cause this port to shut down immediately; The switch port mode for this interface is access mode
110. What is a drawback of the local database method of securing device access that can be solved by using AAA with centralized servers?
User accounts must be configured locally on each device, which is an unscalable authentication solution.
103. What protocol or technology requires switches to be in server mode or client mode?
VTP
117. On a Cisco 3504 WLC Summary page ( Advanced > Summary ), which tab allows a network administrator to configure a particular WLAN with a WPA2 policy?
WLANs
113. What method of wireless authentication is dependent on a RADIUS authentication server?
WPA2 Enterprise
118. Refer to the exhibit. A network engineer is configuring IPv6 routing on the network. Which command issued on router HQ will configure a default route to the Internet to forward packets to an IPv6 destination network that is not listed in the routing table?
ipv6 route ::/0 serial 0/1/1
105. What command will enable a router to begin sending messages that allow it to configure a link-local address without using an IPv6 DHCP server?
the ipv6 unicast-routing command
104. What are two reasons a network administrator would segment a network with a Layer 2 switch? (Choose two.)
to enhance user bandwidth; to isolate traffic between segments
109. In which situation would a technician use the show interfaces switch command?
when packets are being dropped from a particular directly attached host