Cisco 2 final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What address and prefix length is used when configuring an IPv6 default static route?

::/0

Refer to the exhibit. What is the metric to forward a data packet with the IPv6 destination address 2001:DB8:ACAD:E:240:BFF:FED4:9DD2? 90 128 2170112 2681856 2682112 3193856

2682112

Refer to the exhibit. A network administrator is configuring DAI on switch SW1. What is the result of entering the exhibited commands? A. DAI will validate only the IP addresses. B. DAI will validate both source and destination MAC addresses as well as the IP addresses in the order specified. When one set of parameters are valid, the ARP packet is allowed to pass. C. DAI will validate only the destination MAC addresses. D. DAI will validate both source and destination MAC addresses as well as the IP addresses in the order specified. If all parameters are valid then the ARP packet is allowed to pass.

DAI will validate only the destination MAC addresses.

Match the purpose with its DHCP message type. (Not all options are used.)

DHCPREQUEST- a message that is used to identify the explicit server and lease offer to accept DHCPDISCOVER- a message that is used to locate any available DHCP server on a network DHCPOFFER- a message that is used to suggest a lease to a client DHCPACK- a message that is used to acknowledge that the lease is successful

What protocol or technology is a Cisco proprietary protocol that is automatically enabled on 2960 switches? A. DTP B. STP C. VTP D. EtherChannel

DTP

What protocol or technology manages trunk negotiations between switches? A. VTP B. EtherChannel C. DTP D. STP

DTP

What is the best way to prevent a VLAN hopping attack? A. Use VLAN 1 as the native VLAN on trunk ports. B. Disable STP on all nontrunk ports. C. Disable trunk negotiation for trunk ports and statically set nontrunk ports as access ports. D. Use ISL encapsulation on all trunk links.

Disable trunk negotiation for trunk ports and statically set nontrunk ports as access ports.

Which Cisco solution helps prevent ARP spoofing and ARP poisoning attacks? A. IP Source Guard B. Dynamic ARP Inspection C. Port Security D. DHCP Snooping

Dynamic ARP Inspection

What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?

Enable port security.

Refer to the exhibit. A network administrator is reviewing the configuration of switch S1. Which protocol has been implemented to group multiple physical ports into one logical link? A. PAgP B. DTP C. LACP D. STP

PAgP

Match the spanning-tree feature with the protocol type. (Not all options are used.)

PVST+ - Cisco implementation of IEEE 802.1D RSTP- Fast converging enhancement of IEEE 802.1D MSTP- IEEE standard that reduces the number of STP instances Rapid PVST+ - Proprietary per VLAN implementation of IEEE 802.1w

A company has just switched to a new ISP. The ISP has completed and checked the connection from its site to the company. However, employees at the company are not able to access the internet. What should be done or checked? A. Verify that the static route to the server is present in the routing table. B. Check the configuration on the floating static route and adjust the AD. C. Ensure that the old default route has been removed from the company edge routers. D. Create a floating static route to that network.

Ensure that the old default route has been removed from the company edge routers.

What is an advantage of PVST+? A. PVST+ optimizes performance on the network through load sharing. B. PVST+ optimizes performance on the network through autoselection of the root bridge. C. PVST+ reduces bandwidth consumption compared to traditional implementations of STP that use CST. D. PVST+ requires fewer CPU cycles for all the switches in the network

PVST+ optimizes performance on the network through load sharing.

What are two characteristics of Cisco Express Forwarding (CEF)? (Choose two.) A. Packets are forwarded based on information in the FIB and an adjacency table. B. When a packet arrives on a router interface, it is forwarded to the control plane where the CPU matches the destination address with a matching routing table entry. C. This is the fastest forwarding mechanism on Cisco routers and multilayer switches. D. When a packet arrives on a router interface, it is E. forwarded to the control plane where the CPU searches for a match in the fast-switching cache. With this switching method, flow information for a packet is stored in the fast-switching cache to forward future packets to the same destination without CPU intervention

Packets are forwarded based on information in the FIB and an adjacency table This is the fastest forwarding mechanism on Cisco routers and multilayer switches.

A network engineer is configuring a LAN with a redundant first hop to make better use of the available network resources. Which protocol should the engineer implement? A. GLBP B. HSRP C. FHRP D. VRRP

GLBP

What protocol or technology defines a group of routers, one of them defined as active and another one as standby? A. EtherChannel B. VTP C. HSRP D. DTP

HSRP

Match the FHRP protocols to the appropriate description. (Not all options are used.)

HSRP- a Cisco proprietary FHRP that provides redundancy through use of an active device and standby device VRRP- an open standard FHRP that provides redundancy through use of a virtual routers master and one or more backups GLBP- a Cisco proprietary FHRP that provides load sharing in addition to redundancy

What is the effect of entering the ip arp inspection validate src-mac configuration command on a switch? A. It checks the source L2 address in the Ethernet header against the sender L2 address in the ARP body. B. It disables all trunk ports. C. It displays the IP-to-MAC address associations for switch interfaces. D. It enables portfast on a specific switch interface.

It checks the source L2 address in the Ethernet header against the sender L2 address in the ARP body.

What is the effect of entering the show ip dhcp snooping binding configuration command on a switch? A. It switches a trunk port to access mode. B. It checks the source L2 address in the Ethernet header against the sender L2 address in the ARP body. C. It restricts the number of discovery messages, per second, to be received on the interface. D. It displays the IP-to-MAC address associations for switch interfaces.

It displays the IP-to-MAC address associations for switch interfaces.

A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config)#interface VLAN88 command?

It enters configuration mode for a switch virtual interface.

Which statement describes the behavior of a switch when the MAC address table is full? A. It treats frames as unknown unicast and floods all incoming frames to all ports within the collision domain. B. It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN. C. It treats frames as unknown unicast and floods all incoming frames to all ports on the switch. D. It treats frames as unknown unicast and floods all incoming frames to all ports across multiple switches.

It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN

A small coffee shop is offering free Wi-Fi to customers. The network includes a wireless router and a DSL modem that is connected to the local phone company. What method is typically used to configure the connection to the phone company? A. Set the DSL modem as a DHCP client to the phone company and a DHCP server for the internal connection. B. Set the WAN connection in the wireless router as a DHCP client. C. Set the connection between the wireless router and the DSL modem as a private IP network. D. Set the DSL modem as a DHCP client to get a public IP address from the wireless router.

Set the WAN connection in the wireless router as a DHCP client.

Refer to the exhibit. Host A has sent a packet to host B. What will be the source MAC and IP addresses on the packet when it arrives at host B? A. Source MAC: 00E0.FE91.7799 Source IP: 10.1.1.10 B. Source MAC: 00E0.FE10.17A3 Source IP: 10.1.1.10 C. Source MAC: 00E0.FE10.17A3 Source IP: 192.168.1.1 D. Source MAC: 00E0.FE91.7799 Source IP: 10.1.1.1 E. Source MAC: 00E0.FE91.7799 Source IP: 192.168.1.1

Source MAC: 00E0.FE91.7799 Source IP: 10.1.1.10

A network administrator is using the router-on-a-stick method to configure inter-VLAN routing. Switch port Gi1/1 is used to connect to the router. Which command should be entered to prepare this port for the task? A. Switch(config)# interface gigabitethernet 1/1 Switch(config-if)# spanning-tree portfast B. Switch(config)# interface gigabitethernet 1/1 Switch(config-if)# spanning-tree vlan 1 C. Switch(config)# interface gigabitethernet 1/1 Switch(config-if)# switchport mode trunk D. Switch(config)# interface gigabitethernet 1/1 Switch(config-if)# switchport access vlan 1

Switch(config)# interface gigabitethernet 1/1 Switch(config-if)# switchport mode trunk

Refer to the exhibit. The administrator wants to enable port security on an interface on switch S1, but the command was rejected. Which conclusion can be drawn? A. The interface needs to be configured initially with an IP address. B. The interface needs to be previously configured with the no shutdown command. C. The interface must be initially configured with the switchport mode access command. D. The interface must be initially configured with the switchport mode trunk command.

The interface must be initially configured with the switchport mode access command.

An administrator has configured a DHCPv4 relay router and issued these commands: Router(config)# interface g0/0 Router(config-if)# ip address 10.0.1.1 255.255.255.0 Router(config-if)# no shutdown Router(config-if)# exit Router(config)# ip dhcp pool RELAY Router(dhcp-config)# end The clients are not receiving IP parameters from the DHCPv4 server. What is a possible cause?

The ip helper-address command is missing.

A network administrator is configuring a WLC to provide WLAN access to users in an office building. When testing the newly created WLAN, the administrator does not see the SSID from a wireless device. What is a possible cause?

The new WLAN needs to be enabled

A small publishing company has a network design such that when a broadcast is sent on the LAN, 200 devices receive the transmitted broadcast. How can the network administrator reduce the number of devices that receive broadcast traffic? A. Replace at least half of the switches with hubs to reduce the size of the broadcast domain. B. Segment the LAN into smaller LANs and route between them. C. Replace the switches with switches that have more ports per switch. This will allow more devices on a particular switch. D. Add more switches so that fewer devices are on a particular switch.

Segment the LAN into smaller LANs and route between them.

Gateway of last resort is not set. Refer to the exhibit. Which interface will be the exit interface to forward a data packet that has the destination IP address 172.18.109.152?

Serial0/0/0

What is the reason for disabling SSID broadcasting and changing the default SSID on a wireless access point? A. The access point stops broadcasting its own MAC address, thus preventing unauthorized wireless clients from connecting to the network. B. Anyone with the default SSID can gain access to the access point and change the configuration. C. Disabling SSID broadcasting frees up radio frequency bandwidth and increases the data throughput of the access point. D. Wireless clients must then have the SSID manually configured to connect to the wireless network.

Wireless clients must then have the SSID manually configured to connect to the wireless network.

Describe the dynamic routing protocol characteristic: Algorithm

a finite list of steps used to determine the best path

On which port should Dynamic ARP Inspection (DAI) be configured on a switch? A. on any port where DHCP snooping is disabled B. an uplink port to another switch C. any untrusted port D. access ports only

an uplink port to another switch

Which term describes the role of a Cisco switch in the 802.1X port-based access control? A. authentication server B. authenticator C. supplicant D. agent

authenticator

Refer to the exhibit. Based on the exhibited configuration and output, why is VLAN 99 missing? A. because VLAN 99 is not a valid management VLAN B. because there is a cabling problem on VLAN 99 C. because VLAN 1 is up and there can only be one management VLAN on the switch D. because VLAN 99 has not yet been created

because VLAN 99 has not yet been created

Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server? broadcast DHCPACK broadcast DHCPREQUEST unicast DHCPACK unicast DHCPREQUEST

broadcast DHCPREQUEST

Match the forwarding characteristic to its type. (Not all options are used.)

cut-through: appropriate for high performance computing applications, forwarding process can begin after receiving the destination address, may forward invalid frames store-and-forward: error checking before forwarding, forwarding process only begins after receiving the entire frame, only forwards valid frames

Match the description to the correct VLAN type. (Not all options are used.)

default VLAN: all switch ports are assigned to this VLAN after initial bootup of the switch. management VLAN: an IP address and subnet mask are assigned to this VLAN, allowing the switch to be accessed by HTTP, Telnet, SSH, or SNMP data VLANs: configured to carry user generated traffic native VLAN: carries untagged traffic

Which mitigation technique would prevent rogue servers from providing false IPv6 configuration parameters to clients? A. enabling DHCPv6 Guard B. enabling RA Guard C. implementing port security on edge ports D. disabling CDP on edge ports

enabling DHCPv6 Guard

Describe the dynamic routing protocol characteristic: Routing protocol messages

exchanges routing information and maintains accurate information about networks

Which three components are combined to form a bridge ID?

extended system ID MAC address bridge priority

Refer to the exhibit. All the displayed switches are Cisco 2960 switches with the same default priority and operating at the same bandwidth. Which three ports will be STP designated ports? (Choose three.) fa0/9 fa0/13 fa0/10 fa0/20 fa0/21 fa0/11

fa0/13 fa0/10 fa0/21

What are two switch characteristics that could help alleviate network congestion? (Choose two.)

fast internal switching large frame buffers

Refer to the exhibit. What will router R1 do with a packet that has a destination IPv6 address of 2001:db8:cafe:5::1? A. forward the packet out GigabitEthernet0/0 B. drop the packet C. forward the packet out GigabitEthernet0/1 D. forward the packet out Serial0/0/0

forward the packet out Serial0/0/0

Which command will start the process to bundle two physical interfaces to create an EtherChannel group via LACP? A. interface port-channel 2 B. channel-group 2 mode auto C. channel-group 1 mode desirable D. interface range GigabitEthernet 0/4 - 5

interface range GigabitEthernet 0/4 - 5

Which command would create a valid IPv6 default route? A. ipv6 route ::/0 fe80::1 B. ipv6 route 2001:db8:acad:1::/64 ::1 C. ipv6 route ::/128 2001:db8:acad:1::1 D. ipv6 route ::/0 2001:db8:acad:2::a

ipv6 route ::/0 2001:db8:acad:2::a

What type of VLAN is configured specifically for network traffic such as SSH, Telnet, HTTPS, HTTP, and SNMP?

management VLAN

Refer to the exhibit. Match the description with the routing table entries. (Not all options are used.)

next hop - 172.16.2.2 destination network- 10.3.0.0 metric- 21024000 administrative distance- 1 route timestamp- 00:22:15 route source protocol- D

Give the function of the DTP mode: dynamic auto

passively waits for the neighbor to initiate trunking

Give the function of the DTP mode: trunk

permanent trunking mode

Give the function of the DTP mode: nonegotiate

requires manual configuration of trunking or nontrunking

An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation? A. denial of service B. rogue access point C. spoofing D. cracking

rogue access point

Refer to the exhibit. The routing table for R2 is as follows: Gateway of last resort is not set 10.0.0.0/30 is subnetted, 2 subnets C 10.0.0.0 is directly connected, Serial0/0/0 C 10.0.0.4 is directly connected, Serial0/0/1 192.168.10.0/26 is subnetted, 3 subnets S 192.168.10.0 is directly connected, Serial0/0/0 C 192.168.10.64 is directly connected, FastEthernet0/0 S 192.168.10.128 [1/0] via 10.0.0.6 What will router R2 do with a packet destined for 192.168.10.129? A. send the packet out interface Serial0/0/0 B. send the packet out interface FastEthernet0/0 C. drop the packet D. send the packet out interface Serial0/0/1

send the packet out interface Serial0/0/1

Refer to the exhibit. A network administrator is troubleshooting a problem with EtherChannel. What command was used to produce the exhibited output? A. show etherchannel summary B. show interfaces Port-channel11 C. show etherchannel Port-channel D. show interfaces fastethernet 0/11 etherchannel

show interfaces fastethernet 0/11 etherchannel

Refer to the exhibit. A network administrator is configuring the router R1 for IPv6 address assignment. Based on the partial configuration, which IPv6 global unicast address assignment scheme does the administrator intend to implement? A. stateful B. stateless C. manual configuration D. SLAAC

stateful

Refer to the exhibit. DLS1 is connected to another switch, DLS2, via a trunk link. A host that is connected to DLS1 is not able to communicate to a host that is connected to DLS2, even though they are both in VLAN 99. Which command should be added to Fa0/1 on DLS1 to correct the problem?

switchport trunk native vlan 66

Describe the dynamic routing protocol characteristic: Data structures

tables or databases that are stored in RAM

What command will enable a router to begin sending messages that allow it to configure a link-local address without using an IPv6 DHCP server? A. a static route B. the ipv6 route ::/0 command C. the ipv6 unicast-routing command D. the ip routing command

the ipv6 unicast-routing command

Refer to the exhibit. A network administrator configured routers R1 and R2 as part of HSRP group 1. After the routers have been reloaded, a user on Host1 complained of lack of connectivity to the Internet The network administrator issued the show standby brief command on both routers to verify the HSRP operations. In addition, the administrator observed the ARP table on Host1. Which entry should be seen in the ARP table on Host1 in order to gain connectivity to the Internet? A. the virtual IP address and the virtual MAC address for the HSRP group 1 B. the virtual IP address of the HSRP group 1 and the MAC address of R1 C. the virtual IP address of the HSRP group 1 and the MAC address of R2 D. the IP address and the MAC address of R1

the virtual IP address and the virtual MAC address for the HSRP group 1

A network administrator is configuring a WLAN. Why would the administrator apply WPA2 with AES to the WLAN? A. to reduce the risk of unauthorized APs being added to the network B. to centralize management of multiple WLANs C. to provide prioritized service for time-sensitive applications D. to provide privacy and integrity to wireless traffic by using encryption

to provide privacy and integrity to wireless traffic by using encryption

A network administrator is configuring a WLAN. Why would the administrator change the default DHCP IPv4 addresses on an AP? A. to restrict access to the WLAN by authorized, authenticated users only B. to monitor the operation of the wireless network C. to reduce outsiders intercepting data or accessing the wireless network by using a well-known address range D. to reduce the risk of interference by external devices such as microwave ovens

to reduce outsiders intercepting data or accessing the wireless network by using a well-known address range

A network administrator is configuring a WLAN. Why would the administrator use RADIUS servers on the network? A. to centralize management of multiple WLANs B. to restrict access to the WLAN by authorized, authenticated users only C. to facilitate group configuration and management of multiple WLANs through a WLC D. to monitor the operation of the wireless network

to restrict access to the WLAN by authorized, authenticated users only

What are the two methods that a wireless NIC can use to discover an AP? (Choose two.)

transmitting a probe request receiving a broadcast beacon frame

Which type of traffic is designed for a native VLAN? A. untagged B. user-generated C. management D. tagged

untagged

In what situation would a Layer 2 switch have an IP address configured?

when the Layer 2 switch needs to be remotely managed

Which problem is evident if the show ip interface command shows that the interface is down and the line protocol is down?

A cable has not been attached to the port

What defines a host route on a Cisco router? A. The link-local address is added automatically to the routing table as an IPv6 host route. B. An IPv4 static host route configuration uses a destination IP address of a specific device and a /32 subnet mask. C. A host route is designated with a C in the routing table. D. A static IPv6 host route must include the interface type and the interface number of the next hop router.

An IPv4 static host route configuration uses a destination IP address of a specific device and a /32 subnet mask.

Refer to the exhibit. Router R1 has an OSPF neighbor relationship with the ISP router over the 192.168.0.32 network. The 192.168.0.36 network link should serve as a backup when the OSPF link goes down. The floating static route command ip route 0.0.0.0 0.0.0.0 S0/0/1 100 was issued on R1 and now traffic is using the backup link even when the OSPF link is up and functioning. Which change should be made to the static route command so that traffic will only use the OSPF link when it is up? A. Change the destination network to 192.168.0.34. B. Change the administrative distance to 1. C. Change the administrative distance to 120. D. Add the next hop neighbor address of 192.168.0.36.

Change the administrative distance to 120

Refer to the exhibit. R1 was configured with the static route command ip route 209.165.200.224 255.255.255.224 S0/0/0 and consequently users on network 172.16.0.0/16 are unable to reach resources on the Internet. How should this static route be changed to allow user traffic from the LAN to reach the Internet? A. Add an administrative distance of 254. B. Change the destination network and mask to 0.0.0.0 0.0.0.0 C. Change the exit interface to S0/0/1. D. Add the next-hop neighbor address of 209.165.200.226.

Change the destination network and mask to 0.0.0.0 0.0.0.0

A junior technician was adding a route to a LAN router. A traceroute to a device on the new network revealed a wrong path and unreachable status. What should be done or checked? A. Verify that the static route to the server is present in the routing table. B. Create a floating static route to that network. C. Check the configuration on the floating static route and adjust the AD. D. Check the configuration of the exit interface on the new static route.

Check the configuration of the exit interface on the new static route

A network administrator is implementing DHCPv6 for the company. The administrator configures a router to send RA messages with M flag as 1 by using the interface command ipv6 nd managed-config-flag . What effect will this configuration have on the operation of the clients? A. Clients must use the prefix and prefix length that are provided by RA messages and obtain additional information from a DHCPv6 server. B. Clients must use the information that is contained in RA messages. C. Clients must use the prefix and prefix length that are provided by a DHCPv6 server and generate a random interface ID. D. Clients must use all configuration information that is provided by a DHCPv6 server

Clients must use all configuration information that is provided by a DHCPv6 server.

After sticky learning of MAC addresses is enabled, what action is needed to prevent dynamically learned MAC addresses from being lost in the event that an associated interface goes down? A. Shut down the interface then enable it again with the no shutdown command. B. Copy the running configuration to the startup configuration. C. Reboot the switch. D. Configure port security for violation protect mode.

Copy the running configuration to the startup configuration.

Refer to the exhibit. In addition to static routes directing traffic to networks 10.10.0.0/16 and 10.20.0.0/16, Router HQ is also configured with the following command: ip route 0.0.0.0 0.0.0.0 serial 0/1/1 What is the purpose of this command? A. Packets that are received from the Internet will be forwarded to one of the LANs connected to R1 or R2. B. Packets with a destination network that is not 10.10.0.0/16 or is not 10.20.0.0/16 or is not a directly connected network will be forwarded to the Internet. C. Packets from the 10.10.0.0/16 network will be forwarded to network 10.20.0.0/16, and packets from the 10.20.0.0/16 network will be forwarded to network 10.10.0.0/16. D. Packets that are destined for networks that are not in the routing table of HQ will be dropped.

Packets with a destination network that is not 10.10.0.0/16 or is not 10.20.0.0/16 or is not a directly connected network will be forwarded to the Internet.

Refer to the exhibit. What can be concluded about the configuration shown on R1? A. R1 is configured as a DHCPv4 relay agent. B. R1 is operating as a DHCPv4 server. C. R1 will broadcast DHCPv4 requests on behalf of local DHCPv4 clients. D. R1 will send a message to a local DHCPv4 client to contact a DHCPv4 server at 10.10.10.8.

R1 is configured as a DHCPv4 relay agent.

A network administrator of a college is configuring WLAN security with WPA2 Enterprise authentication. Which server is required when deploying this type of authentication?

RADIUS

Refer to the exhibit. When a packet arrives on interface Serial0/0/0 on R1, with a destination IP address of PC1, which two events occur? (Choose two)

Router R1 will de-encapsulate the packet and encapsulate it in an Ethernet frame Router R1 will forward the packet out Gig0/1.

Refer to the exhibit. Which route was configured as a static route to a specific network using the next-hop address? A. S 10.17.2.0/24 [1/0] via 10.16.2.2 B. S 0.0.0.0/0 [1/0] via 10.16.2.2 C. S 10.17.2.0/24 is directly connected, Serial 0/0/0 D. C 10.16.2.0/24 is directly connected, Serial0/0/0

S 10.17.2.0/24 [1/0] via 10.16.2.2

Refer to the exhibit. How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty? A. SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch. B. SW1 drops the frame because it does not know the destination MAC address. C. SW1 forwards the frame directly to SW2. SW2 floods the frame to all ports connected to SW2, excluding the port through which the frame entered the switch. D. SW1 floods the frame on all ports on the switch, excluding the interconnected port to switch SW2 and the port through which the frame entered the switch.

SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch.

Which combination of WLAN authentication and encryption is recommended as a best practice for home users?

WPA2 and AES

Refer to the exhibit. Based on the command output shown, what is the status of the EtherChannel? A. The EtherChannel is dynamic and is using ports Fa0/10 and Fa0/11 as passive ports. B. The EtherChannel is down as evidenced by the protocol field being empty. C. The EtherChannel is partially functional as indicated by the P flags for the FastEthernet ports. D. The EtherChannel is in use and functional as indicated by the SU and P flags in the command output.

The EtherChannel is in use and functional as indicated by the SU and P flags in the command output.

Refer to the exhibit. The users on the LAN network of R1 cannot receive an IPv6 address from the configured stateful DHCPv6 server. What is missing from the stateful DHCPv6 configuration on router R1? A. IPv6 has not been enabled globally on router R1. B. The DHCPv6 pool has not been bound to the LAN interface. C. The DHCPv6 pool does not match the IPv6 address configured on interface FA0/0. D. The FA0/0 interface is missing the command that informs the clients to use stateful DHCPv6.

The FA0/0 interface is missing the command that informs the clients to use stateful DHCPv6.

Refer to the exhibit. PC-A and PC-B are both in VLAN 60. PC-A is unable to communicate with PC-B. What is the problem? A. The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk. B. The native VLAN is being pruned from the link. C. The trunk has been configured with the switchport nonegotiate command. D. The native VLAN should be VLAN 60.

The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk

Refer to the exhibit. A network administrator is verifying the configuration of inter-VLAN routing. Users complain that PC2 cannot communicate with PC1. Based on the output, what is the possible cause of the problem?

The encapsulation dot1Q 5 command contains the wrong VLAN.

Refer to the exhibit. A network administrator configures R1 for inter-VLAN routing between VLAN 10 and VLAN 20. However, the devices in VLAN 10 and VLAN 20 cannot communicate. Based on the configuration in the exhibit, what is a possible cause for the problem? A. The port Gi0/0 should be configured as trunk port. B. The encapsulation is misconfigured on a subinterface. C. A no shutdown command should be added in each subinterface configuration. D. The command interface gigabitEthernet 0/0.1 is wrong.

The encapsulation is misconfigured on a subinterface.

Refer to the exhibit. How was the host route 2001:DB8:CAFE:4::1/128 installed in the routing table? A. The route was dynamically created by router R1. B. The route was manually entered by an administrator. C. The route was dynamically learned from another router. D. The route was automatically installed when an IP address was configured on an active interface.

The route was manually entered by an administrator

What is a result of connecting two or more switches together? A. The size of the collision domain is increased. B. The number of broadcast domains is increased. C. The number of collision domains is reduced. D. The size of the broadcast domain is increased

The size of the broadcast domain is increased.

Refer to the exhibit. A network administrator is configuring a router as a DHCPv6 server. The administrator issues a show ipv6 dhcp pool command to verify the configuration. Which statement explains the reason that the number of active clients is 0? A. The default gateway address is not provided in the pool. B. No clients have communicated with the DHCPv6 server yet. C. The IPv6 DHCP pool configuration has no IPv6 address range specified. D. The state is not maintained by the DHCPv6 server under stateless DHCPv6 operation.

The state is not maintained by the DHCPv6 server under stateless DHCPv6 operation.

Refer to the exhibit. Inter-VLAN communication between VLAN 10, VLAN 20, and VLAN 30 is not successful. What is the problem? A. The switch interface FastEthernet0/1 is configured to not negotiate and should be configured to negotiate. B. The access interfaces do not have IP addresses and each should be configured with an IP address. C. The switch interface FastEthernet0/1 is configured as an access interface and should be configured as a trunk interface. D. The switch interfaces FastEthernet0/2, FastEthernet0/3, and FastEthernet0/4 are configured to not negotiate and should be configured to negotiate.

The switch interface FastEthernet0/1 is configured as an access interface and should be configured as a trunk interface.

What action takes place when the source MAC address of a frame entering a switch is in the MAC address table? A. The switch forwards the frame out of the specified port. B. The switch updates the refresh timer for the entry. C. The switch replaces the old entry and uses the more current port. D. The switch adds a MAC address table entry for the destination MAC address and the egress port.

The switch updates the refresh timer for the entry.

What action takes place when a frame entering a switch has a multicast destination MAC address? A. The switch will forward the frame out all ports except the incoming port. B. The switch forwards the frame out of the specified port. C. The switch adds a MAC address table entry mapping for the destination MAC address and the ingress port. D. The switch replaces the old entry and uses the more current port.

The switch will forward the frame out all ports except the incoming port.

What is a potential issue when using the WLC to upgrade and deploy the latest firmware image to all APs?

Users will not be able to use the WLAN.

Refer to the exhibit. The configuration shows commands entered by a network administrator for inter-VLAN routing. However, host H1 cannot communicate with H2. Which part of the inter-VLAN configuration causes the problem? A. trunking B. port mode on the two switch FastEthernet ports C. VLAN configuration D. router port configuration

VLAN configuration

While attending a conference, participants are using laptops for network connectivity. When a guest speaker attempts to connect to the network, the laptop fails to display any available wireless networks. The access point must be operating in which mode? A. mixed B. passive C. active D. open

active

Give the function of the DTP mode: dynamic desirable

actively attempts to convert the link to a trunk

Consider the following command: ip route 192.168.10.0 255.255.255.0 10.10.10.2 5 What does the 5 at the end of the command signify? A. administrative distance B. metric C. maximum number of hops to the 192.168.10.0/24 network D. exit interface

administrative distance

Match the link state to the interface and protocol status. (Not all options are used.)

administratively down: disabled down/down: Layer 1 problem up/down: Layer 2 problem up/up: operational

Refer to the exhibit. Currently router R1 uses an EIGRP route learned from Branch2 to reach the 10.10.0.0/16 network. Which floating static route would create a backup route to the 10.10.0.0/16 network in the event that the link between R1 and Branch2 goes down? A. ip route 10.10.0.0 255.255.0.0 Serial 0/0/0 100 B. ip route 10.10.0.0 255.255.0.0 209.165.200.226 100 C. ip route 10.10.0.0 255.255.0.0 209.165.200.225 100 D. ip route 10.10.0.0 255.255.0.0 209.165.200.225 50

ip route 10.10.0.0 255.255.0.0 209.165.200.225 100

Refer to the exhibit. Which statement shown in the output allows router R1 to respond to stateless DHCPv6 requests? ipv6 nd other-config-flag​ prefix-delegation 2001:DB8:8::/48 00030001000E84244E70​ ipv6 dhcp server LAN1​ ipv6 unicast-routing dns-server 2001:DB8:8::8​

ipv6 nd other-config-flag​


संबंधित स्टडी सेट्स

Alzheimer's Disease (Advanced Stages) HESI Case Study

View Set

ch 16 - nursing postpartum period

View Set

QUIZ 3 STUDY GUIDE- in progress (granados ap spanish 4)

View Set

HDF 315 Wortham Chapter 10 Communicating with Families: Assessment Systems

View Set

Tuesdays with Morrie Vocabulary List

View Set