Chapter 5 and 6 cisco test

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

It allows only VLAN 30 on Fa0/5.

A CISCO SWITCH CURRENTLY ALLOWS TRAFFIC TAGGED WITH VLANS 10 AND 20 ACROSS TRUNK PORT FA0/5. WHAT IS THE EFFECT OF ISSUING A SWITCHPORT TRUNK ALLOWED VLAN 30 COMMAND ON FA0/5? It allows VLANs 1 to 30 on Fa0/5. It allows VLANs 10, 20, and 30 on Fa0/5. It allows only VLAN 30 on Fa0/5. It allows a native VLAN of 30 to be implemented on Fa0/5.

A switch with a port that is configured as a trunk is needed when connecting to the router.

A HIGH SCHOOL USES VLAN15 FOR THE LABORATORY NETWORK AND VLAN30 FOR THE FACULTY NETWORK. WHAT IS REQUIRED TO ENABLE COMMUNICATION BETWEEN THESE TWO VLANS WHILE USING THE ROUTER-ON-A-STICK APPROACH? A multilayer switch is needed. A router with at least two LAN interfaces is needed. Two groups of switches are needed, each with ports that are configured for one VLAN. A switch with a port that is configured as a trunk is needed when connecting to the router.

restrict

A NETWORK ADMINISTRATOR CONFIGURES THE PORT SECURITY FEATURE ON A SWITCH. THE SECURITY POLICY SPECIFIES THAT EACH ACCESS PORT SHOULD ALLOW UP TO TWO MAC ADDRESSES. WHEN THE MAXIMUM NUMBER OF MAC ADDRESSES IS REACHED, A FRAME WITH THE UNKNOWN SOURCE MAC ADDRESS IS DROPPED AND A NOTIFICATION IS SENT TO THE SYSLOG SERVER. WHICH SECURITY VIOLATION MODE SHOULD BE CONFIGURED FOR EACH ACCESS PORT? restrict protect warning shutdown

A router with at least two LAN interfaces should be used.

A SMALL COLLEGE USES VLAN 10 FOR THE CLASSROOM NETWORK AND VLAN 20 FOR THE OFFICE NETWORK. WHAT IS NEEDED TO ENABLE COMMUNICATION BETWEEN THESE TWO VLANS WHILE USING LEGACY INTER-VLAN ROUTING? A router with at least two LAN interfaces should be used. Two groups of switches are needed, each with ports that are configured for one VLAN. A router with one VLAN interface is needed to connect to the SVI on a switch. A switch with a port that is configured as trunk is needed to connect to a router.

on the half-duplex end of the connection

IF ONE END OF AN ETHERNET CONNECTION IS CONFIGURED FOR FULL DUPLEX AND THE OTHER END OF THE CONNECTION IS CONFIGURED FOR HALF DUPLEX, WHERE WOULD LATE COLLISIONS BE OBSERVED? on both ends of the connection on the full-duplex end of the connection only on serial interfaces on the half-duplex end of the connection

when packets are being dropped from a particular directly attached host

IN WHICH SITUATION WOULD A TECHNICIAN USE THE SHOW INTERFACES SWITCH COMMAND? to determine if remote access is enabled when packets are being dropped from a particular directly attached host when an end device can reach local devices, but not remote devices to determine the MAC address of a directly attached network device on a particular interface

Port Fa0/11 will be returned to VLAN 1.

PORT FA0/11 ON A SWITCH IS ASSIGNED TO VLAN 30. IF THE COMMAND NO SWITCHPORT ACCESS VLAN 30 IS ENTERED ON THE FA0/11 INTERFACE, WHAT WILL HAPPEN? Port Fa0/11 will be shutdown. An error message would be displayed. Port Fa0/11 will be returned to VLAN 1. VLAN 30 will be deleted.

4

REFER TO THE EXHIBIT. A NETWORK ADMINISTRATOR NEEDS TO CONFIGURE ROUTER-ON-A-STICK FOR THE NETWORKS THAT ARE SHOWN. HOW MANY SUBINTERFACES WILL HAVE TO BE CREATED ON THE ROUTER IF EACH VLAN THAT IS SHOWN IS TO BE ROUTED AND EACH VLAN HAS ITS OWN SUBINTERFACE? 1 2 3 4 5

There is an incorrect IP address configured on GigabitEthernet 0/0.30.

REFER TO THE EXHIBIT. A ROUTER-ON-A-STICK CONFIGURATION WAS IMPLEMENTED FOR VLANS 15, 30, AND 45, ACCORDING TO THE SHOW RUNNING-CONFIG COMMAND OUTPUT. PCS ON VLAN 45 THAT ARE USING THE 172.16.45.0 /24 NETWORK ARE HAVING TROUBLE CONNECTING TO PCS ON VLAN 30 IN THE 172.16.30.0 /24 NETWORK. WHICH ERROR IS MOST LIKELY CAUSING THIS PROBLEM?​ The wrong VLAN has been configured on GigabitEthernet 0/0.45. The command no shutdown is missing on GigabitEthernet 0/0.30. The GigabitEthernet 0/0 interface is missing an IP address. There is an incorrect IP address configured on GigabitEthernet 0/0.30.

switchport trunk native vlan 66

REFER TO THE EXHIBIT. DLS1 IS CONNECTED TO ANOTHER SWITCH, DLS2, VIA A TRUNK LINK. A HOST THAT IS CONNECTED TO DLS1 IS NOT ABLE TO COMMUNICATE TO A HOST THAT IS CONNECTED TO DLS2, EVEN THOUGH THEY ARE BOTH IN VLAN 99. WHICH COMMAND SHOULD BE ADDED TO FA0/1 ON DLS1 TO CORRECT THE PROBLEM? switchport nonegotiate switchport mode dynamic auto switchport trunk native vlan 66 switchport trunk allowed vlan add 99

The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk.

REFER TO THE EXHIBIT. PC-A AND PC-B ARE BOTH IN VLAN 60. PC-A IS UNABLE TO COMMUNICATE WITH PC-B. WHAT IS THE PROBLEM? The native VLAN should be VLAN 60. The native VLAN is being pruned from the link. The trunk has been configured with the switchport nonegotiate command. The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk.

SWA(config-if)# switchport port-security SWA(config-if)# switchport port-security maximum 2 SWA(config-if)# switchport port-security mac-address sticky

REFER TO THE EXHIBIT. PORT FA0/2 HAS ALREADY BEEN CONFIGURED APPROPRIATELY. THE IP PHONE AND PC WORK PROPERLY. WHICH SWITCH CONFIGURATION WOULD BE MOST APPROPRIATE FOR PORT FA0/2 IF THE NETWORK ADMINISTRATOR HAS THE FOLLOWING GOALS? SWA(config-if)# switchport port-security SWA(config-if)# switchport port-security mac-address sticky SWA(config-if)# switchport port-security mac-address sticky SWA(config-if)# switchport port-security maximum 2 SWA(config-if)# switchport port-security SWA(config-if)# switchport port-security maximum 2 SWA(config-if)# switchport port-security mac-address sticky SWA(config-if)# switchport port-security SWA(config-if)# switchport port-security maximum 2 SWA(config-if)# switchport port-security mac-address sticky SWA(config-if)# switchport port-security violation restrict

The router will forward the packet out interface FastEthernet 0/1.2.

REFER TO THE EXHIBIT. ROUTER RA RECEIVES A PACKET WITH A SOURCE ADDRESS OF 192.168.1.35 AND A DESTINATION ADDRESS OF 192.168.1.85. WHAT WILL THE ROUTER DO WITH THIS PACKET? The router will drop the packet. The router will forward the packet out interface FastEthernet 0/1.1. The router will forward the packet out interface FastEthernet 0/1.2. The router will forward the packet out interface FastEthernet 0/1.3. The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.

Modify the transport input command.

REFER TO THE EXHIBIT. THE NETWORK ADMINISTRATOR WANTS TO CONFIGURE SWITCH1 TO ALLOW SSH CONNECTIONS AND PROHIBIT TELNET CONNECTIONS. HOW SHOULD THE NETWORK ADMINISTRATOR CHANGE THE DISPLAYED CONFIGURATION TO SATISFY THE REQUIREMENT? Use SSH version 1. Reconfigure the RSA key. Configure SSH on a different line. Modify the transport input command.

The port violation mode is the default for any port that has port security enabled.

REFER TO THE EXHIBIT. WHAT CAN BE DETERMINED ABOUT PORT SECURITY FROM THE INFORMATION THAT IS SHOWN? The port has been shut down. The port has two attached devices. The port violation mode is the default for any port that has port security enabled. The port has the maximum number of MAC addresses that is supported by a Layer 2 switch port which is configured for port security.

There could be too much electrical interference and noise on the link.

REFER TO THE EXHIBIT. WHAT MEDIA ISSUE MIGHT EXIST ON THE LINK CONNECTED TO FA0/1 BASED ON THE SHOW INTERFACE COMMAND? The bandwidth parameter on the interface might be too high. There could be an issue with a faulty NIC. There could be too much electrical interference and noise on the link. The cable attaching the host to port Fa0/1 might be too long. The interface might be configured as half-duplex.

Packets with unknown source addresses will be dropped.

REFER TO THE EXHIBIT. WHICH EVENT WILL TAKE PLACE IF THERE IS A PORT SECURITY VIOLATION ON SWITCH S1 INTERFACE FA0/1? A notification is sent. A syslog message is logged. Packets with unknown source addresses will be dropped. The interface will go into error-disabled state.

security cost reduction improved IT staff efficiency

WHAT ARE THREE PRIMARY BENEFITS OF USING VLANS? (CHOOSE THREE.) security a reduction in the number of trunk links cost reduction end user satisfaction improved IT staff efficiency no required configuration

The port becomes inactive.

WHAT HAPPENS TO A PORT THAT IS ASSOCIATED WITH VLAN 10 WHEN THE ADMINISTRATOR DELETES VLAN 10 FROM THE SWITCH? The port becomes inactive. The port goes back to the default VLAN. The port automatically associates itself with the native VLAN. The port creates the VLAN again.

The router requires one Ethernet link for each VLAN.

WHAT IS A CHARACTERISTIC OF LEGACY INTER-VLAN ROUTING? Only one VLAN can be used in the topology. The router requires one Ethernet link for each VLAN. The user VLAN must be the same ID number as the management VLAN. Inter-VLAN routing must be performed on a switch instead of a router.

does not scale well beyond 50 VLANs

WHAT IS A DISADVANTAGE OF USING ROUTER-ON-A-STICK INTER-VLAN ROUTING? does not support VLAN-tagged packets requires the use of more physical interfaces than legacy inter-VLAN routing does not scale well beyond 50 VLANs requires the use of multiple router interfaces configured to operate as access links

to provide an environment to operate in when the switch operating system cannot be found

WHAT IS A FUNCTION OF THE SWITCH BOOT LOADER? to speed up the boot process to provide security for the vulnerable state when the switch is booting to control how much RAM is available to the switch during the boot process to provide an environment to operate in when the switch operating system cannot be found

Telnet sends a username and password in plain text, whereas SSH encrypts the username and password.

WHAT IS ONE DIFFERENCE BETWEEN USING TELNET OR SSH TO CONNECT TO A NETWORK DEVICE FOR MANAGEMENT PURPOSES? Telnet uses UDP as the transport protocol whereas SSH uses TCP. Telnet does not provide authentication whereas SSH provides authentication. Telnet supports a host GUI whereas SSH only supports a host CLI. Telnet sends a username and password in plain text, whereas SSH encrypts the username and password.

enables port security on an interface

WHAT IS THE EFFECT OF USING THE SWITCHPORT PORT-SECURITY COMMAND? enables port security on an interface enables port security globally on the switch automatically shuts an interface down if applied to a trunk port detects the first MAC address in a frame that comes into a port and places that MAC address in the MAC address table

Enter the switchport access vlan 3 command in interface configuration mode.

WHAT MUST THE NETWORK ADMINISTRATOR DO TO REMOVE FAST ETHERNET PORT FA0/1 FROM VLAN 2 AND ASSIGN IT TO VLAN 3? Enter the no vlan 2 and the vlan 3 commands in global configuration mode. Enter the switchport access vlan 3 command in interface configuration mode. Enter the switchport trunk native vlan 3 command in interface configuration mode. Enter the no shutdown command in interface configuration mode to return it to the default configuration and then configure the port for VLAN 3.

native VLAN ID

WHEN A CISCO SWITCH RECEIVES UNTAGGED FRAMES ON A 802.1Q TRUNK PORT, WHICH VLAN ID IS THE TRAFFIC SWITCHED TO BY DEFAULT? unused VLAN ID native VLAN ID data VLAN ID management VLAN ID

to the subinterface

WHEN CONFIGURING A ROUTER AS PART OF A ROUTER-ON-A-STICK INTER-VLAN ROUTING TOPOLOGY, WHERE SHOULD THE IP ADDRESS BE ASSIGNED? to the interface to the subinterface to the SVI to the VLAN

RAM

WHERE ARE DYNAMICALLY LEARNED MAC ADDRESSES STORED WHEN STICKY LEARNING IS ENABLED WITH THE SWITCHPORT PORT-SECURITY MAC-ADDRESS STICKY COMMAND? ROM RAM NVRAM flash

Issue the shutdown and then no shutdown interface commands.

WHICH ACTION WILL BRING AN ERROR-DISABLED SWITCH PORT BACK TO AN OPERATIONAL STATE? Remove and reconfigure port security on the interface. Issue the switchport mode access command on the interface. Clear the MAC address table on the switch. Issue the shutdown and then no shutdown interface commands.

no vlan 20

WHICH COMMAND IS USED TO REMOVE ONLY VLAN 20 FROM A SWITCH? delete vlan.dat delete flash:vlan.dat no vlan 20 no switchport access vlan 20

boot system

WHICH COMMAND IS USED TO SET THE BOOT ENVIRONMENT VARIABLE THAT DEFINES WHERE TO FIND THE IOS IMAGE FILE ON A SWITCH? config-register boot system boot loader confreg

VLAN 1

WHICH INTERFACE IS THE DEFAULT LOCATION THAT WOULD CONTAIN THE IP ADDRESS USED TO MANAGE A 24-PORT ETHERNET SWITCH? VLAN 1 Fa0/0 Fa0/1 interface connected to the default gateway VLAN 99

If the LED is green, the port is operating at 100 Mb/s.

WHICH STATEMENT DESCRIBES THE PORT SPEED LED ON THE CISCO CATALYST 2960 SWITCH? If the LED is green, the port is operating at 100 Mb/s. If the LED is off, the port is not operating. If the LED is blinking green, the port is operating at 10 Mb/s. If the LED is amber, the port is operating at 1000 Mb/s.

native

WHICH TYPE OF VLAN IS USED TO DESIGNATE WHICH TRAFFIC IS UNTAGGED WHEN CROSSING A TRUNK PORT? data default native management


संबंधित स्टडी सेट्स

MHR Quiz and Unit 6 Terms - Leadership

View Set

MGMT 445 Ronald Cheek Final SP21

View Set

Research Methods- Dr. Wood Ch1,2,3

View Set

ch8 managing in competitive, monopolistic, and monopolistically competitive markets

View Set

PROMULGATED CONTRACTS PRACTICE EXAM

View Set