InterVLAN routing

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

How do you configure a hostname? A. Router(config)#hostname R1 B. Router#hostname R1 C. Router(config)#host name R1 D. Router>hostname R

Answer: A

Under which circumstance is a router on a stick most appropriate? A. When a router have multiple subnets on a single physical link B. When a router have single subnet on multiple physical links C. When a router have multiple interface on single physical links D. When a router have single interface on multiple physical links

Answer: A

Which statement about ACLs is true? A. An ACL have must at least one permit action, else it just blocks all traffic. B. ACLs go bottom-up through the entries looking for a match C. An ACL has a an implicit permit at the end of ACL. D. ACLs will check the packet against all entries looking for a match.

Answer: A

Which technology can enable multiple VLANs to communicate with one another? A. inter-VLAN routing using a Layer 3 switch B. inter-VLAN routing using a Layer 2 switch C. intra-VLAN routing using router on a stick D. intra-VLAN routing using a Layer 3 switch

Answer: A

How is master redundancy provided on a stacked switches? A. 1:N B. N:1 C. 1:1 D. 1+N E. N+1

Answer: A Explanation 1:N master redundancy: Every switch in the stack can act as the master. If the current master fails, another master is elected from the stack. 1:N master redundancy allows each stack member to serve as a master, providing the highest reliability for forwarding. Each switch in the stack can serve as a master, creating a 1:N availability scheme for network control. In the unlikely event of a single unit failure, all other units continue to forward traffic and maintain operation. Reference: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-3750-series-switches/prod_white_paper09186a00801b096a.html Note: N+1 simply means that there is a power backup in place should any single system component fail. The 'N' in this equation stands for the number of components necessary to run your system. The '+1' means there is one independent backup should a component of that system fail. An example of "N+1" is your family has 5 members, so you need 5 cups to drink. But you have one extra cup for redundancy (6 cups in total) so that if any cup breaks, you still have enough cups for the family.

After you configure the Loopback0 interface, which command can you enter to verify the status of the interface and determine whether fast switching is enabled? A. Router#show ip interface loopback 0 B. Router#show run C. Router#show interface loopback 0 D. Router#show ip interface brief

Answer: A Explanation An example of the output of the "show ip interface loopback 0" is shown below. show_ip_interface.jpg

Which range represents the standard access list? A. 99 B. 150 C. 299 D. 2000

Answer: A Explanation Below is the range of standard and extended access list Access list type Range Standard 1-99, 1300-1999 Extended 100-199, 2000-2699

What is the purpose of the POST operation on a router? A. determine whether additional hardware has been added B. locate an IOS image for booting C. enable a TFTP server D. set the configuration register

Answer: A Explanation In short, when powered on the router needs to do: 1. Run POST to check hardware 2. Search for a valid IOS (the Operating System of the router) 3. Search for a configuration file (all the configurations applied to this router)

Which command can you execute to set the user inactivity timer to 10 seconds? A. SW1(config-line)#exec-timeout 0 10 B. SW1(config-line)#exec-timeout 10 C. SW1(config-line)#absolute-timeout 0 10 D. SW1(config-line)#absolute-timeout 10

Answer: A Explanation The "exec-timeout" command is used to configure the inactive session timeout on the console port or the virtual terminal. The syntax of this command is: exec-timeout minutes [seconds] Therefore we need to use the "exec-timeout 0 10" command to set the user inactivity timer to 10 seconds.

Which step in the router boot process searches for an IOS image to load into the router? A. bootstrap B. POST C. mini-IOS D. ROMMON mode

Answer: A Explanation The following details the router boot process: 1. The router is powered on. 2. The router first runs Power-On Self Test (POST) 3. The bootstrap checks the Configuration Register value to specify where to load the IOS. By default (the default value of Configuration Register is 2102, in hexadecimal), the router first looks for "boot system" commands in startup-config file. If it finds these commands, it will run boot system commands in order they appear in startup-config to locate the IOS. If not, the IOS image is loaded from Flash . If the IOS is not found in Flash, the bootstrap can try to load the IOS from TFTP server or from ROM (mini-IOS). 4. After the IOS is found, it is loaded into RAM. 5. The IOS attempts to load the configuration file (startup-config) from NVRAM to RAM. If the startup-config is not found in NVRAM, the IOS attempts to load a configuration file from TFTP. If no TFTP server responds, the router enters Setup Mode (Initial Configuration Mode). For more information about booting process please read our Cisco Router Boot Sequence tutorial.

Which statement about named ACLs is true? A. They support standard and extended ACLs. B. They are used to filter usernames and passwords for Telnet and SSH. C. They are used to filter Layer 7 traffic. D. They support standard ACLs only. E. They are used to rate limit traffic destined to targeted networks.

Answer: A Explanation The syntax of a named ACL is: ip access-list {standard | extended} {name | number} Therefore we can configure a standard acl with keyword "standard" and configure an extended acl with keyword "extended". For example this is how to configure an named extended access-list: Router(config)#ip access-list extended in_to_out permit tcp host 10.0.0.1 host 187.100.1.6 eq telnet

The network shown in the diagram is experiencing connectivity problems. Which of the following will correct the problems? (Choose two) vlansetup A. Configure the gateway on Host A as 10.1.1.1. B. Configure the gateway on Host B as 10.1.2.254. C. Configure the IP address of Host A as 10.1.2.2. D. Configure the IP address of Host B as 10.1.2.2. E. Configure the masks on both hosts to be 255.255.255.224. F. Configure the masks on both hosts to be 255.255.255.240.

Answer: B D

Which command can you enter to block HTTPS traffic from the whole class A private network range to a host? A. R1(config)#access-list 105 deny tcp 10.1.0.0 0.0.255.255 40.0.0.2 0.0.0.0 eq 443 B. R1(config)#access-list 105 deny tcp 10.1.0.0 0.0.255.255 40.0.0.2 0.0.0.0 eq 53 C. R1(config)#access-list 105 deny tcp 10.0.0.0 0.255.255.255 40.0.0.2 0.0.0.0 eq 53 D. R1(config)#access-list 105 deny tcp 10.0.0.0 0.255.255.255 40.0.0.2 0.0.0.0 eq 443

Answer: D

Which function enables an administrator to route multiple VLANs on a router? A. IEEE 802.1X B. HSRP C. port channel D. router on a stick

Answer: D

Which statement about a router on a stick is true? A. Its date plane router traffic for a single VI AN over two or more switches. B. It uses multiple subinterfaces of a single interface to encapsulate traffic for different VLANs on the same subnet. C. It requires the native VLAN to be disabled. D. It uses multiple subinterfaces of a single interface to encapsulate traffic for different VLANs.

Answer: D

Which technology provides chassis redundancy in a VSS environment? A. BFD B. multichassis EtherChannels C. VRRP D. StackWise

Answer: D

While troubleshooting a connection problem on a computer, you determined that the computer can ping a specific web server but it cannot connect to TCP port 80 on that server. Which reason for the problem is most likely true? A. A VLAN number is incorrect B. An ARP table entry is missing C. A route is missing D. An ACL is blocking the TCP port

Answer: D

Which identification number is valid for an extended ACL? A. 1 B. 64 C. 99 D. 100 E. 299 F. 1099

Answer: D Explanation Below is the range of standard and extended access list: Access list type Range Standard 1-99, 1300-1999 Extended 100-199, 2000-2699 In most cases we only need to remember 1-99 is dedicated for standard access lists while 100 to 199 is dedicated for extended access lists.

Which statement about recovering a password on a Cisco router is true? A. The default reset password is cisco B. It requires a secure SSL/VPN connection C. A factory reset is required if you forget the password D. It requires physical access to the router

Answer: D Explanation Other choices are surely incorrect so only "physical access" answer is the correct one. In order to recover a password on a Cisco router, the first thing you have to do is either switch off or shut down the router. For more information about this process, please read http://www.cisco.com/c/en/us/support/docs/routers/2800-series-integrated-services-routers/112033-c2900-password-recovery-00.html

A Cisco router is booting and has just completed the POST process. It is now ready to find and load an IOS image. What function does the router perform next? A. It checks the configuration register B. It attempts to boot from a TFTP server C. It loads the first image file in flash memory D. It inspects the configuration file in NVRAM for boot instructions

Answer: A Explanation When you turn the router on, it runs through the following boot process. The Power-On Self Test (POST) checks the router's hardware. When the POST completes successfully, the System OK LED indicator comes on. The router checks the configuration register to identify where to load the IOS image from. A setting of 0×2102 means that the router will use information in the startup-config file to locate the IOS image. If the startup-config file is missing or does not specify a location, it will check the following locations for the IOS image: 1. Flash (the default location) 2. TFTP server 3. ROM (used if no other source is found) The router loads the configuration file into RAM (which configures the router). The router can load a configuration file from: + NVRAM (startup-configuration file) + TFTP server If a configuration file is not found, the router starts in setup mode.

Which of the following are the valid numbers of standard ACL? (Choose two) A. 50 B. 1550 C. 150 D. 1250 E. 2050

Answer: A B Explanation The range of standard ACL is 1-99, 1300-1999 so 50 and 1550 are two valid numbers.

Which three commands can you use to set a router boot image? (Choose three) A. Router(config)# boot system flash c4500-p-mz.121-20.bin B. Router(config)# boot system tftp c7300-js-mz.122-33.SB8a.bin C. Router(config)#boot system rom c7301-advipservicesk9-mz.124-24.T4.bin D. Router> boot flash:c180x-adventerprisek9-mz-124-6T.bin E. Router(config)#boot flash:c180x-adventerprisek9-mz-124-6T.bin F. Router(config)#boot bootldr bootflash:c4500-jk9s-mz.122-23f.bin

Answer: A B C Explanation The correct syntax of the "boot" command is "boot system" path. In which the popular for path can be: + flash + rom + tftp + ftp + IP address (IP address of the server containing the system image file) Therefore answers A, B, C are correct.

Which two options describe benefits of aggregated chassis technology? (Choose two) A. It reduces management overhead B. Switches can be located anywhere regardless of there physical location C. It requires only one IP address per VLAN D. It requires only three IP addresses per VLAN E. It supports HSRP VRRP GLBP F. It support redundant configuration files

Answer: A C Explanation Chassis aggregation is a Cisco technology to make multiple switches operate as a single switch. It is similar to stacking but meant for powerful switches (like the 6500 and 6800 series switches). Chassis aggregation is often used in the core layer and distribution layer (while switching stacking is used for access layer). The books do not mention about the benefits of chassis aggregation but they are the same as switch stacking. + The stack would have a single management IP address. + The engineer would connect with Telnet or SSH to one switch (with that one management IP address), not multiple switches. + One configuration file would include all interfaces in all physical switches. + STP, CDP, VTP would run on one switch, not multiple switches. + The switch ports would appear as if all are on the same switch. + There would be one MAC address table, and it would reference all ports on all physical switches. Reference: CCNA Routing and Switching ICND2 200-105 Official Cert Guide VSS is a chassis aggregation technology but it is dedicated for Cisco Catalyst 6500 or 4500 Series Switches. VSS increases operational efficiency by simplifying the network, reducing switch management overhead by at least 50 percent -> A is correct Single point of management, IP address, and routing instance for the Cisco Catalyst 6500 virtual switch + Single configuration file and node to manage. Removes the need to configure redundant switches twice with identical policies. + Only one gateway IP address is required per VLAN, instead of the three IP addresses per VLAN used today -> C is correct while D is not correct. + Removes the need for Hot Standby Router Protocol (HSRP), Virtual Router Redundancy Protocol (VRRP), and Gateway Load Balancing Protocol (GLBP)-> so maybe E is not correct. Reference: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-virtual-switching-system-1440/prod_qas0900aecd806ed74b.html

Which two steps must you perform to enable router-on-stick on a switch? A. connect the router to a trunk port B. configure the subinterface number exactly the same as the matching VLAN C. configure full duplex D. configure an ip route to the vlan destination network E. assign the access port to the vlan

Answer: A E Explanation This question only asks about enable router-on-stick on a switch, not a router. We don't have subinterface on a switch so B is not a correct answer.

Which type of access list compares source and destination IP address? A. standard B. extended C. IP named D. reflexive

Answer: B

Which command is used to show the interface status of a router? A. show interface status B. show ip interface brief C. show ip route D. show interface

Answer: B Explanation The "show ip interface brief" command can be used to view a summary of the router interfaces. This command displays the IP address, interface status, and additional information. An example of the "show ip interface brief" command is shown below. We can see the interface status of E0/0 is "up/up". R3_show_ip_int_brief.jpg

Which item represents the standard IP ACL? A. Access-list 110 permit any any B. Access-list 50 deny 192.168.1.1 0.0.0.255 C. Access list 101 deny tvp any host 192.168.1.1 D. Access-list 2500 deny tcp any host 192.168.1.1 eq 22

Answer: B Explanation The range of standard ACL is 1-99, 1300-1999 so 50 is a valid number for standard ACL.

Which two Cisco IOS commands, used in troubleshooting, can enable debug output to a remote location? (Choose two) A. no logging console B. logging host ip-address C. terminal monitor D. show logging | redirect flashioutput.txt E. snmp-server enable traps syslog

Answer: B C Explanation The "no logging console" turns off logging to the console connection (it is turned on by default) and it is often used if the console received large amount of logging output. But this command is not recommended in normal configuration -> A is not correct. The command "logging host ip-address" instructs the device to send syslog messages to an external syslog server -> B is correct. The "show logging | redirect flashioutput.txt" command will put the text file in the router flash memory because we did not specify a remote location (like tftp) -> D is not correct. The command "snmp-server enable traps syslog" instructs the device to send syslog messages to your network management server as SNMP traps instead of syslog packets. This command itself does not enable debug output to a remote location -> E is not correct. By default, Cisco IOS does not send log messages to a terminal session over IP, that is, telnet or SSH connections don't get log messages. But notice that console connections on a serial cable do have logging enabled by default. The command "terminal monitor" helps logging messages appear on the your terminal. First we don't think this is a correct answer but after reading the question again, we believe it is a suitable one as a Telnet/SSH session may be considered a "remote location" -> C is correct.

Which two benefits can you get by stacking Cisco switches? (Choose two) A. Each switch in the stack handles the MAC table independently from the others B. You can add or remove switches without taking the stack down C. Each switch in the stack can use a different IOS image D. The stack enables any active member to take over as the master switch if the existing master fails E. You can license the entire stack with a single master license

Answer: B D Explanation Each stack has only one configuration file, which is distributed to each member in the stack. This allows each switch in the stack to share the same network topology, MAC address, and routing information. In addition, it allows for any member to become the master, if the master ever fails -> Answer D is correct while answer A is not correct. Switches can be added and deleted to a working stack without affecting stack performance. When a new switch is added, the master switch automatically configures the unit with the currently running Cisco IOS Software image and configuration of the stack. The stack will gather information such as switching table information and update the MAC tables as new addresses are learned. The network manager does not have to do anything to bring up the switch before it is ready to operate. Similarly, switches can be removed from a working stack without any operational effect on the remaining switches. When the stack discovers that a series of ports is no longer present, it will update this information without affecting forwarding or routing. A working stack can accept new members or delete old ones without service interruption -> Answer B is correct. Reference: https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-3750-series-switches/prod_white_paper09186a00801b096a.html

Host is able to ping a web server but it is not able to do HTTP request. What is the most likely cause the problem? A. ACL blocking port 23 B. ACL blocking all ports C. ACL blocking port 80 D. ACL blocking port 443 E. None of the above

Answer: C

In which CLI configuration mode can you configure the hostname of a device? A. line mode B. interface mode C. global mode D. router mode

Answer: C

Which functionality does an SVI provide? A. OSI Layer 2 connectivity to switches B. remote switch administration C. traffic routing for VLANs D. OSI Layer 3 connectivity to switches

Answer: C

Which type of device can be replaced by the use of subinterfaces for VLAN routing? A. Layer 2 bridge B. Layer 2 switch C. Layer 3 switch D. router

Answer: C

Which of the following privilege level is the most secured? A. Level 0 B. Level 1 C. Level 15 D. Level 16

Answer: C Explanation By default, the Cisco IOS CLI has two privilege levels enabled, level 1 and level 15. + User EXEC mode (privilege level 1): provides the lowest EXEC mode user privileges and allows only user-level commands available at the Router> prompt. + Privileged EXEC mode (privilege level 15): includes all enable-level commands at the Router# prompt. Level 15 users can execute all commands and this is the most secured and powerful privilege level. However, there are actually 16 privilege levels available on the CLI, from 0 to 15 and you can assign users to any of those levels. Zero-level access allows only five commands -logout, enable, disable, help, and exit. User level (level 1) provides very limited read-only access to the router, and privileged level (level 15) provides complete control over the router.

Refer to the exhibit. Why is flash memory erased prior to upgrading the IOS image from the TFTP server? Router# copy tftp flash Address or name of remote host []? 192.168.2.167 Source filename []? c1600-k8sy-mz.123-16a.bin Destination filename [c1600-k8sy-mz.123-16a.bin]? Accessing tftp://192.168.2.167/ c1600-k8sy-mz.l23-16a.bin... Erasing flash before copying? [confirm] Erasing the flash filesystem will remove all files! continue? [confirm] Erasing device Eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee Eeeeeeeeeeeeeeeeeeeeeeeeeeeeeee ...erased Erase of flash: complete Loading c1600-k8sy-mz.l23-16a.bin from 192.168.2.167 (via Ethernet0): !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! [OK - 6888962/13777920 bytes] verifying checksum... OK (0x7BF3) 6888962 bytes copied in 209.920 secs (32961 bytes/sec) Router# A. The router cannot verify that the Cisco IOS image currently in flash is valid B. Flash memory on Cisco routers can contain only a single IOS image. C. Erasing current flash content is requested during the copy dialog. D. In order for the router to use the new image as the default, it must be the only IOS image in flash.

Answer: C Explanation During the copy process, the router asked "Erasing flash before copying? [confirm]" and the administrator confirmed (by pressing Enter) so the flash was deleted. Note: In this case, the flash has enough space to copy a new IOS without deleting the current one. The current IOS is deleted just because the administrator wants to do so. If the flash does not have enough space you will see an error message like this: %Error copying tftp://192.168.2.167/ c1600-k8sy-mz.l23-16a.bin (Not enough space on device)

If a router has four interfaces and each interface is connected to four switches, how many broadcast domains are present on the router? A. 1 B. 2 C. 4 D. 8

Answer: C Explanation Remember that only route interface can separate broadcast domain (while switch interface separate collision domain) so the broadcast domains are equal to the number of router interfaces, which is four in this case.

Which configuration register value can you set on a Cisco device so that it ignores the NVRAM when it boots? A. 0x2124 B. 0x2120 C. 0x2142 D. 0x2102

Answer: C Explanation To reset the password we can type "confreg 0x2142" under rommon mode to set the configuration register to 2142 in hexadecimal (the prefix 0x means hexadecimal (base 16)). With this setting when that router reboots, it bypasses the startup-config.

To enable router on a stick on a router subinterface, which two steps must you perform? (Choose two) A. configure full duplex and speed B. configure a default to route traffic between subinterfaces C. configure the subinterface with an IP address D. configure encapsulation dot1q E. configure an ip route to the vlan destination network

Answer: C D

When you are troubleshooting an ACL issue on a router, which command would you use to verify which interfaces are affected by the ACL? A. show ip access-lists B. show access-lists C. show interface D. show ip interface E. list ip interface

Answer: D

Which option is a benefit of switch stacking? A. It provides redundancy with no impact on resource usage. B. It simplifies adding and removing hosts. C. It supports better performance of high-needs applications. D. It provides higher port density with better resource usage.

Answer: D Explanation Switch stacking technology allows the network engineer to make that stack of physical switches act like one switch. The stacking cables together make a ring between the switches. That is, the switches connect in series, with the last switch connecting again to the first. switch_stacking.jpg Answer B is not correct as switch stacking is about connecting switches together so that they act as one switch, not about adding and removing hosts. Answer C is not correct because switch stacking has nothing to do with performance of high-needs applications. Surely switch stacking provides redundancy as stacking creates a ring of connection with two opposite paths. Whenever a frame is ready for transmission onto the path, a calculation is made to see which path has the most available bandwidth. The entire frame is then copied onto this half of the path. With switch stacking, STP, CDP and VTP would run on one switch, not multiple switches. Also there would be one MAC address table, and it would reference all ports on all physical switches so we may say switch stacking has better resource usage. Also if we consider all stacking switches as one logical switch then surely the port density is increase very much. Therefore answer D is the most suitable one. Reference: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-3750-series-switches/prod_white_paper09186a00801b096a.html

Which configuration can you apply to enable encapsulation on a subinterface? A. interface FastEthernet 0/0 encapsulation dot1Q 30 ip address 10.1.1.30 255.255.255.0 B. interface FastEthernet 0/0.30 ip address 10.1.1.30 255.255.255.0 C. interface FastEthernet 0/0.30 description subinterface vlan 30 D. interface FastEthernet 0/0.30 encapsulation dot1Q 30 ip address 10.1.1.30 255.255.255.0

Answer: D Explanation To enabe encapsulation on a subinterface we have type the "encapsulation" command under that subinterface, not the main interface. An example of configuring encapsulation on subinterface of Fa0/1 is shown below: Router(config)#interface f0/0 Router(config-if)#no shutdown (Note: The main interface f0/0 doesn't need an IP address but it must be turned on) Router(config)#interface f0/0.0 Router(config-subif)#encapsulation dot1q 10 Router(config-subif)#ip address 192.168.1.1 255.255.255.0 Router(config-subif)#interface f0/0.1 Router(config-subif)#encapsulation dot1q 20 Router(config-subif)#ip address 192.168.2.1 255.255.255.0 Note: In the "encapsulation dot1q 10", number 10 is the VLAN applied to that subinterface. Or you can understand that the subinterface belongs to that VLAN.

What to do when the router password was forgotten? A. use default password cisco to reset B. access router physically C. use ssl/vpn D. Type confreg 0x2142 at the rommon 1

Answer: D Explanation To reset the password we can type "confreg 0x2142" under rommon mode to set the configuration register to 2142 in hexadecimal (the prefix 0x means hexadecimal (base 16)). With this setting when that router reboots, it bypasses the startup-config.

A network engineer wants to allow a temporary entry for a remote user with a specific username and password so that the user can access the entire network over the internet. Which ACL can be used? A. reflexive B. extended C. standard D. dynamic

Answer: D Explanation We can use a dynamic access list to authenticate a remote user with a specific username and password. The authentication process is done by the router or a central access server such as a TACACS+ or RADIUS server. The configuration of dynamic ACL can be read here: http://www.cisco.com/en/US/tech/tk583/tk822/technologies_tech_note09186a0080094524.shtml

Which action can change the order of entries in a named access-list? A. removing an entry B. opening the access-list in notepad C. adding an entry D. resequencing

Answer: D Explanation You can check the named access-list with the "show ip access-list" (or "show access-list") command: R1#show ip access-list Standard IP access list nat_traffic 10 permit 10.1.0.0, wildcard bits 0.0.255.255 15 permit 10.2.0.0, wildcard bits 0.0.255.255 20 permit 10.3.0.0, wildcard bits 0.0.255.255 We can resequence a named access-list with the command: "ip access-list resequence access-list-name starting-sequence-number increment". For example: R1(config)#ip access-list nat_traffic 100 10 Then we can check this access-list again: R1#show ip access-list Standard IP access list nat_traffic 100 permit 10.1.0.0, wildcard bits 0.0.255.255 110 permit 10.2.0.0, wildcard bits 0.0.255.255 120 permit 10.3.0.0, wildcard bits 0.0.255.255 We can see the starting sequence number is now 100 and the increment is 10. But notice that resequencing an access-list cannot change the order of entries inside it but it is the best choice in this question. Adding or removing a n entry does not change the order of entries. Maybe we should understand this question "how to renumber the entries in a named access-list".

Refer to the exhibit: interVLAN_subinterfaces_encapsulation.jpg Which two statements are true about interVLAN routing in the topology that is shown in the exhibit? (Choose two) A. Host E and host F use the same IP gateway address. B. Routed and Switch2 should be connected via a crossover cable. C. Router1 will not play a role in communications between host A and host D. D. The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces. E. Router1 needs more LAN interfaces to accommodate the VLANs that are shown in the exhibit. F. The FastEthernet 0/0 interface on Router1 and Switch2 trunk ports must be configured using the same encapsulation type.

Answer: D F

Which statement about slow inter VLAN forwarding is true? A. The VLAN is experiencing slowness in the point-to-point collisionless connection. B. The VLANs are experiencing slowness because multiple devices are connected to the same hub. C. The local VLAN is working normally, but traffic to the alternate VLAN is forwarded slower than expected. D. The entire VLAN is experiencing slowness. E. The VLANs are experiencing slowness due to a duplex mismatch.

Answer: E Explanation The causes of slow interVLAN are usually duplex mismatch or collision domain issues, user misconfiguration. For more information please read: http://www.cisco.com/c/en/us/support/docs/lan-switching/virtual-lans-vlan-trunking-protocol-vlans-vtp/23637-slow-int-vlan-connect.html#troubleshoot_slow_interv


Ensembles d'études connexes

Psych 178 Final LESSS GOOOO **** DIS FOOOOOOOOO

View Set

Session 6: License renewal and insurance requirements

View Set

Chapter 19, Nursing Management: Postoperative Care

View Set

CH 46 LISTENING QUIZ Tchaikovsky: The Nutcracker, Trepak

View Set

Chapt. 10: Rehabilitation Services, Case Management, and Related Services 2

View Set