CCNA2 Chapter 4-6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Match the step to each switch boot sequence description. (Not all options are used.)

3,1,4,2,5,6

Refer to the exhibit. A network administrator needs to configure router-on-a-stick for the networks that are shown. How many subinterfaces will have to be created on the router if each VLAN that is shown is to be routed and each VLAN has its own subinterface? 1 2 3 4 5

4

Refer to the exhibit. How many broadcast domains are displayed? 1 4 8 16 55

8

Refer to the exhibit. A network technician is troubleshooting connectivity issues in an Ethernet network with the command show interfaces fastEthernet 0/0. What conclusion can be drawn based on the partial output in the exhibit? All hosts on this network communicate in full-duplex mode. Some workstations might use an incorrect cabling type to connect to the network. There are collisions in the network that cause frames to occur that are less than 64 bytes in length. A malfunctioning NIC can cause frames to be transmitted that are longer than the allowed maximum length.

A malfunctioning NIC can cause frames to be transmitted that are longer than the allowed maximum length.

A small college uses VLAN 10 for the classroom network and VLAN 20 for the office network. What is needed to enable communication between these two VLANs while using legacy inter-VLAN routing? A router with at least two LAN interfaces should be used. Two groups of switches are needed, each with ports that are configured for one VLAN. A router with one VLAN interface is needed to connect to the SVI on a switch. A switch with a port that is configured as trunk is needed to connect to a router.

A router with at least two LAN interfaces should be used.

A high school uses VLAN15 for the laboratory network and VLAN30 for the faculty network. What is required to enable communication between these two VLANs while using the router-on-a-stick approach? A multilayer switch is needed. A router with at least two LAN interfaces is needed. Two groups of switches are needed, each with ports that are configured for one VLAN. A switch with a port that is configured as a trunk is needed when connecting to the router.

A switch with a port that is configured as a trunk is needed when connecting to the router.

Which four steps are needed to configure a voice VLAN on a switch port? (Choose four). Configure the switch port in access mode.* Assign a data VLAN to the switch port. Add a voice VLAN.* Assign the voice VLAN to the switch port.* Activate spanning-tree PortFast on the interface. Ensure that voice traffic is trusted and tagged with a CoS priority value.* Configure the switch port interface with subinterfaces. Configure the interface as an IEEE 802.1Q trunk.

Configure the switch port in access mode, Add a voice VLAN, Assign the voice VLAN to the switch port, Ensure that voice traffic is trusted and tagged with a CoS priority value

Which two statements are true regarding switch port security? (Choose two.) The three configurable violation modes all log violations via SNMP. Dynamically learned secure MAC addresses are lost when the switch reboots. The three configurable violation modes all require user intervention to re-enable ports. After entering the sticky parameter, only MAC addresses subsequently learned are converted to secure MAC addresses. If fewer than the maximum number of MAC addresses for a port are configured statically, dynamically learned addresses are added to CAM until the maximum number is reached.

Dynamically learned secure MAC addresses are lost when the switch reboots and If fewer than the maximum number of MAC addresses for a port are configured statically, dynamically learned addresses are added to CAM until the maximum number is reached.

What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3? Enter the no vlan 2 and the vlan 3 commands in global configuration mode. Enter the switchport access vlan 3 command in interface configuration mode. Enter the switchport trunk native vlan 3 command in interface configuration mode. Enter the no shutdown command in interface configuration mode to return it to the default configuration and then configure the port for VLAN 3.

Enter the switchport access vlan 3 command in interface configuration mode.

What is the destination address in the header of a broadcast frame? 0.0.0.0 255.255.255.255 11-11-11-11-11-11 FF-FF-FF-FF-FF-FF

FF-FF-FF-FF-FF-FF

Which statement describes the port speed LED on the Cisco Catalyst 2960 switch? If the LED is green, the port is operating at 100 Mb/s. If the LED is off, the port is not operating. If the LED is blinking green, the port is operating at 10 Mb/s. If the LED is amber, the port is operating at 1000 Mb/s.

If the LED is green, the port is operating at 100 Mb/s.

Which action will bring an error-disabled switch port back to an operational state? Remove and reconfigure port security on the interface. Issue the switchport mode access command on the interface. Clear the MAC address table on the switch. Issue the shutdown and then no shutdown interface commands.

Issue the shutdown and then no shutdown interface commands.

A Cisco switch currently allows traffic tagged with VLANs 10 and 20 across trunk port Fa0/5. What is the effect of issuing a switchport trunk allowed vlan 30 command on Fa0/5? It allows VLANs 1 to 30 on Fa0/5. It allows VLANs 10, 20, and 30 on Fa0/5. It allows only VLAN 30 on Fa0/5. It allows a native VLAN of 30 to be implemented on Fa0/5.

It allows only VLAN 30 on Fa0/5.

Refer to the exhibit. The network administrator wants to configure Switch1 to allow SSH connections and prohibit Telnet connections. How should the network administrator change the displayed configuration to satisfy the requirement? Use SSH version 1. Reconfigure the RSA key. Configure SSH on a different line. Modify the transport input command.

Modify the transport input command.

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Which PCs will receive the broadcast sent by PC-C? PC-A, PC-B PC-D, PC-E PC-A, PC-B, PC-E PC-A, PC-B, PC-D, PC-E PC-A, PC-B, PC-D, PC-E, PC-F

PC-D, PC-E

A production switch is reloaded and finishes with a Switch> prompt. What two facts can be determined? (Choose two.) POST occurred normally. The boot process was interrupted. There is not enough RAM or flash on this router. A full version of the Cisco IOS was located and loaded. The switch did not locate the Cisco IOS in flash, so it defaulted to ROM.

POST occurred normally and A full version of the Cisco IOS was located and loaded.

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.Which event will take place if there is a port security violation on switch S1 interface Fa0/1? Packets with unknown source addresses will be dropped. A syslog message is logged. The interface will go into error-disabled state. A notification is sent.

Packets with unknown source addresses will be dropped.

Refer to the exhibit. Which event will take place if there is a port security violation on switch S1 interface Fa0/1? A notification is sent. A syslog message is logged. Packets with unknown source addresses will be dropped. The interface will go into error-disabled state.

Packets with unknown source addresses will be dropped.

Which two statements are true about using full-duplex Fast Ethernet? (Choose two.) Performance is improved with bidirectional data flow. Latency is reduced because the NIC processes frames faster. Nodes operate in full-duplex with unidirectional data flow. Performance is improved because the NIC is able to detect collisions. Full-duplex Fast Ethernet offers 100 percent efficiency in both directions.

Performance is improved with bidirectional data flow and Full-duplex Fast Ethernet offers 100 percent efficiency in both directions.

Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport access vlan 30 is entered on the Fa0/11 interface, what will happen? Port Fa0/11 will be shutdown. An error message would be displayed. Port Fa0/11 will be returned to VLAN 1. VLAN 30 will be deleted.

Port Fa0/11 will be returned to VLAN 1.

Where are dynamically learned MAC addresses stored when sticky learning is enabled with the switchport port-security mac-address sticky command? ROM RAM NVRAM flash

RAM

Refer to the exhibit. How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty? SW1 floods the frame on all ports on the switch, excluding the interconnected port to switch SW2 and the port through which the frame entered the switch. SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch. SW1 forwards the frame directly to SW2. SW2 floods the frame to all ports connected to SW2, excluding the port through which the frame entered the switch. SW1 drops the frame because it does not know the destination MAC address.

SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch.

Refer to the exhibit. Port Fa0/2 has already been configured appropriately. The IP phone and PC work properly. Which switch configuration would be most appropriate for port Fa0/2 if the network administrator has the following goals? Refer to the exhibit. Port Fa0/2 has already been configured appropriately. The IP phone and PC work properly. Which switch configuration would be most appropriate for port Fa0/2 if the network administrator has the following goals? SWA(config-if)# switchport port-securitySWA(config-if)# switchport port-security mac-address sticky SWA(config-if)# switchport port-security mac-address stickySWA(config-if)# switchport port-security maximum 2 SWA(config-if)# switchport port-securitySWA(config-if)# switchport port-security maximum 2SWA(config-if)# switchport port-security mac-address sticky SWA(config-if)# switchport port-securitySWA(config-if)# switchport port-security maximum 2SWA(config-if)# switchport port-security mac-address stickySWA(config-if)# switchport port-security violation restrict

SWA(config-if)# switchport port-securitySWA(config-if)# switchport port-security maximum 2SWA(config-if)# switchport port-security mac-address sticky

A small publishing company has a network design such that when a broadcast is sent on the LAN, 200 devices receive the transmitted broadcast. How can the network administrator reduce the number of devices that receive broadcast traffic? Add more switches so that fewer devices are on a particular switch. Replace the switches with switches that have more ports per switch. This will allow more devices on a particular switch. Segment the LAN into smaller LANs and route between them. Replace at least half of the switches with hubs to reduce the size of the broadcast domain.

Segment the LAN into smaller LANs and route between them.

What is one difference between using Telnet or SSH to connect to a network device for management purposes? Telnet uses UDP as the transport protocol whereas SSH uses TCP. Telnet does not provide authentication whereas SSH provides authentication. Telnet supports a host GUI whereas SSH only supports a host CLI. Telnet sends a username and password in plain text, whereas SSH encrypts the username and password.

Telnet sends a username and password in plain text, whereas SSH encrypts the username and password.

Refer to the exhibit. PC-A and PC-B are both in VLAN 60. PC-A is unable to communicate with PC-B. What is the problem? The native VLAN should be VLAN 60. The native VLAN is being pruned from the link. The trunk has been configured with the switchport nonegotiate command. The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk.

The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk.

Which statement describes a result after multiple Cisco LAN switches are interconnected? The broadcast domain expands to all switches. One collision domain exists per switch. Frame collisions increase on the segments connecting the switches. There is one broadcast domain and one collision domain per switch.

The broadcast domain expands to all switches.

What happens to a port that is associated with VLAN 10 when the administrator deletes VLAN 10 from the switch? The port becomes inactive. The port goes back to the default VLAN. The port automatically associates itself with the native VLAN. The port creates the VLAN again.

The port becomes inactive.

The following words are displayed:ATC_S2# show port-security interface fastethernet 0/3Port Security : EnabledPort Status : Secure-upViolation Mode : ShutdownAging Time : 0 minsAging Type : AbsoluteSecureStatic Address Aging : DisabledMaximum MAC Addresses : 2Total MAC Addresses : 1Configured MAC Addresses : 0Sticky MAC Addresses : 1Last Source Address:Vlan : 00D0.D3B6.C26B:10Security Violation Count : 0Refer to the exhibit. What can be determined about port security from the information that is shown? The port has been shut down. The port has two attached devices. The port violation mode is the default for any port that has port security enabled. The port has the maximum number of MAC addresses that is supported by a Layer 2 switch port which is configured for port security.

The port violation mode is the default for any port that has port security enabled.

What is a characteristic of legacy inter-VLAN routing? Only one VLAN can be used in the topology. The router requires one Ethernet link for each VLAN. The user VLAN must be the same ID number as the management VLAN. Inter-VLAN routing must be performed on a switch instead of a router.

The router requires one Ethernet link for each VLAN.

Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.35 and a destination address of 192.168.1.85. What will the router do with this packet? The router will drop the packet. The router will forward the packet out interface FastEthernet 0/1.1. The router will forward the packet out interface FastEthernet 0/1.2. The router will forward the packet out interface FastEthernet 0/1.3. The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.

The router will forward the packet out interface FastEthernet 0/1.2

Refer to the exhibit. What media issue might exist on the link connected to Fa0/1 based on the show interface command? The bandwidth parameter on the interface might be too high. There could be an issue with a faulty NIC. There could be too much electrical interference and noise on the link. The cable attaching the host to port Fa0/1 might be too long. The interface might be configured as half-duplex.

There could be too much electrical interference and noise on the link.

Refer to the exhibit. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the show running-config command output. PCs on VLAN 45 that are using the 172.16.45.0 /24 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem?​ The wrong VLAN has been configured on GigabitEthernet 0/0.45. The command no shutdown is missing on GigabitEthernet 0/0.30. The GigabitEthernet 0/0 interface is missing an IP address. There is an incorrect IP address configured on GigabitEthernet 0/0.30.

There is an incorrect IP address configured on GigabitEthernet 0/0.30.

Match the IEEE 802.1Q standard VLAN tag field with the descriptions. (Not all options are used.) User Priority -> value that supports level or service implementation Type -> value for the tag protocol ID value Canonical Format Identifier -> an identifier that enables Token Ring frames to be carried across Ethernet Links - not scored - -value for the application protocol of the user data in a frame VLAN ID -> VLAN number

User Priority -> value that supports level or service implementation Type -> value for the tag protocol ID value VLAN ID -> VLAN number

Which interface is the default location that would contain the IP address used to manage a 24-port Ethernet switch? VLAN 1 Fa0/0 Fa0/1 interface connected to the default gateway VLAN 99

VLAN 1

Which two characteristics match extended range VLANs? (Choose two.) CDP can be used to learn and store these VLANs. VLAN IDs exist between 1006 to 4094. They are saved in the running-config file by default.* VLANs are initialized from flash memory. They are commonly used in small networks.

VLAN IDs exist between 1006 to 4094.

Distribution layer

[#] implements network access policy[#] establishes Layer 3 routing boundaries

Core layer

[*] provides high-speed backbone connectivity[*] functions as an aggregator for all the campus blocks

Access layer

[+] represents the network edge[+] provides network access to the user

What is a collapsed core in a network design? a combination of the functionality of the access and distribution layers a combination of the functionality of the distribution and core layers a combination of the functionality of the access and core layers a combination of the functionality of the access, distribution, and core layers

a combination of the functionality of the distribution and core layers

Which solution would help a college alleviate network congestion due to collisions? a firewall that connects to two Internet providers a high port density switch a router with two Ethernet ports a router with three Ethernet ports

a high port density switch

What is a basic function of the Cisco Borderless Architecture distribution layer? acting as a backbone aggregating all the campus blocks aggregating Layer 3 routing boundaries providing access to end user devices

aggregating Layer 3 routing boundaries

A network administrator is determining the best placement of VLAN trunk links. Which two types of point-to-point connections utilize VLAN trunking?​ (Choose two.) between two switches that utilize multiple VLANs between a switch and a client PC between a switch and a server that has an 802.1Q NIC between a switch and a network printer between two switches that share a common VLAN

between two switches that utilize multiple VLANs and between a switch and a server that has an 802.1Q NIC

Which command is used to set the BOOT environment variable that defines where to find the IOS image file on a switch? config-register boot system boot loader confreg

boot system

A ___________ network is one that uses the same infrastructure to carry voice, data, and video signals.

converged

What is one function of a Layer 2 switch? forwards data based on logical addressing duplicates the electrical signal of each frame to every port learns the port assigned to a host by examining the destination MAC address determines which interface is used to forward a frame based on the destination MAC address

determines which interface is used to forward a frame based on the destination MAC address

What is a definition of a two-tier LAN network design? access and core layers collapsed into one tier, and the distribution layer on a separate tier access and distribution layers collapsed into one tier, and the core layer on a separate tier distribution and core layers collapsed into one tier, and the access layer on a separate tier access, distribution, and core layers collapsed into one tier, with a separate backbone layer

distribution and core layers collapsed into one tier, and the access layer on a separate tier

What is a disadvantage of using router-on-a-stick inter-VLAN routing? does not support VLAN-tagged packets requires the use of more physical interfaces than legacy inter-VLAN routing does not scale well beyond 50 VLANs requires the use of multiple router interfaces configured to operate as access links

does not scale well beyond 50 VLANs

A network designer must provide a rationale to a customer for a design which will move an enterprise from a flat network topology to a hierarchical network topology. Which two features of the hierarchical design make it the better choice? (Choose two.) lower bandwidth requirements reduced cost for equipment and user training easier to provide redundant links to ensure higher availability less required equipment to provide the same performance levels simpler deployment for additional switch equipment

easier to provide redundant links to ensure higher availability and simpler deployment for additional switch equipment

What is the effect of using the switchport port-security command? enables port security on an interface enables port security globally on the switch automatically shuts an interface down if applied to a trunk port detects the first MAC address in a frame that comes into a port and places that MAC address in the MAC address table

enables port security on an interface

A local law firm is redesigning the company network so that all 20 employees can be connected to a LAN and to the Internet. The law firm would prefer a low cost and easy solution for the project. What type of switch should be selected? fixed configuration modular configuration stackable configuration StackPower StackWise

fixed configuration

allows intelligent traffic load sharing by using all network resources

flexibility

facilitates understanding the role of each device at every tier, simplifies deployment, operation, management, and reduces fault domains at every tier

hierarchical

What are two advantages of modular switches over fixed-configuration switches? (Choose two.) lower cost per switch increased scalability lower forwarding rates need for fewer power outlets availability of multiple ports for bandwidth aggregation

increased scalability and need for fewer power outlets

What two criteria are used by a Cisco LAN switch to decide how to forward Ethernet frames? (Choose two.) path cost egress port ingress port destination IP address destination MAC address

ingress port and destination MAC address

Do not use abbreviations.What is the missing command on S1?

ip address 192.168.99.2 255.255.255.0

allows seamless network expansion and integrated service enablement on an on-demand basis

modularity

Which type of VLAN is used to designate which traffic is untagged when crossing a trunk port? data default native management

native

When a Cisco switch receives untagged frames on a 802.1Q trunk port, which VLAN ID is the traffic switched to by default? unused VLAN ID native VLAN ID data VLAN ID management VLAN ID

native VLAN ID

Which command is used to remove only VLAN 20 from a switch? delete vlan.dat delete flash:vlan.dat no vlan 20 no switchport access vlan 20

no vlan 20

If one end of an Ethernet connection is configured for full duplex and the other end of the connection is configured for half duplex, where would late collisions be observed? on both ends of the connection on the full-duplex end of the connection only on serial interfaces on the half-duplex end of the connection

on the half-duplex end of the connection

satisfies user expectations for keeping the network always on

resiliency

A network administrator configures the port security feature on a switch. The security policy specifies that each access port should allow up to two MAC addresses. When the maximum number of MAC addresses is reached, a frame with the unknown source MAC address is dropped and a notification is sent to the syslog server. Which security violation mode should be configured for each access port? restrict protect warning shutdown

restrict

Which network device can serve as a boundary to divide a Layer 2 broadcast domain? router Ethernet bridge Ethernet hub access point

router

What are three primary benefits of using VLANs? (Choose three.) security a reduction in the number of trunk links cost reduction end user satisfaction improved IT staff efficiency no required configuration

security, cost reduction, and improved IT staff efficiency

Fill in the blank. Use the full command syntax. The ___________ command displays the VLAN assignment for all ports as well as the existing VLANs on the switch.

show vlan

Which type of address does a switch use to build the MAC address table? destination IP address source IP address destination MAC address source MAC address

source MAC address

Which network device can be used to eliminate collisions on an Ethernet network? firewall hub router switch

switch

Refer to the exhibit. DLS1 is connected to another switch, DLS2, via a trunk link. A host that is connected to DLS1 is not able to communicate to a host that is connected to DLS2, even though they are both in VLAN 99. Which command should be added to Fa0/1 on DLS1 to correct the problem? switchport nonegotiate switchport mode dynamic auto switchport trunk native vlan 66 switchport trunk allowed vlan add 99

switchport trunk native vlan 66*

What does the term "port density" represent for an Ethernet switch? the memory space that is allocated to each switch port the number of available ports the numbers of hosts that are connected to each switch port the speed of each port

the number of available ports

Refer to the exhibit. Consider that the main power has just been restored. PC3 issues a broadcast IPv4 DHCP request. To which port will SW1 forward this request?​ to Fa0/1 only​ to Fa0/1 and Fa0/2 only to Fa0/1, Fa0/2, and Fa0/3 only to Fa0/1, Fa0/2, Fa0/3, and Fa0/4 to Fa0/1, Fa0/2, and Fa0/4 only​

to Fa0/1, Fa0/2, and Fa0/3 only

What are two reasons a network administrator would segment a network with a Layer 2 switch? (Choose two.) to create fewer collision domains to enhance user bandwidth to create more broadcast domains to eliminate virtual circuits to isolate traffic between segments to isolate ARP request messages from the rest of the network

to enhance user bandwidth and to isolate traffic between segments

What is a function of the switch boot loader? to speed up the boot process to provide security for the vulnerable state when the switch is booting to control how much RAM is available to the switch during the boot process to provide an environment to operate in when the switch operating system cannot be found

to provide an environment to operate in when the switch operating system cannot be found

When configuring a router as part of a router-on-a-stick inter-VLAN routing topology, where should the IP address be assigned? to the interface to the subinterface to the SVI to the VLAN

to the subinterface

Refer to the exhibit. In what switch mode should port G0/1 be assigned if Cisco best practices are being used? access trunk native auto

trunk

Which two previously independent technologies should a network administrator attempt to combine after choosing to upgrade to a converged network infrastructure? (Choose two.) user data traffic VoIP phone traffic scanners and printers mobile cell phone traffic electrical system

user data traffic and VoIP phone traffic

In which situation would a technician use the show interfaces switch command? to determine if remote access is enabled when packets are being dropped from a particular directly attached host when an end device can reach local devices, but not remote devices to determine the MAC address of a directly attached network device on a particular

when packets are being dropped from a particular directly attached host


Ensembles d'études connexes

Final Exam PSY 1400 (flashcards from all exams)

View Set

Community Organization and Development

View Set

8th English review IXL skills K1,3,4,5,and 6

View Set

Pharmacology Prep U Chapter 19 Nerves and the Nervous System

View Set

MGMT3000 Exam 2 Practice Questions simoon, Management 3000 (Online Exam 2)

View Set

Stalin - Status of Women and Treatment of Religious Groups and National Minorities

View Set