CNET 246 Final Exam
What address and prefix length is used when configuring an IPv6 default static route?
::/0
Which problem is evident if the show ip interface command shows that the interface is down and the line protocol is down?
A cable has not been attached to the port
A network administrator is implementing DHCPv6 for the company. The administrator configures a router to send RA messages with M flag as 1 by using the interface command ipv6 nd managed-config-flag . What effect will this configuration have on the operation of the clients?
Clients must use all configuration information that is provided by a DHCPv6 server
After sticky learning of MAC addresses is enabled, what action is needed to prevent dynamically learned MAC addresses from being lost in the event that an associated interface goes down?
Copy the running configuration to the startup configuration
A network engineer is configuring a LAN with a redundant first hop to make better use of the available network resources. Which protocol should the engineer implement?
GLBP
Which command would create a valid IPv6 default route?
Ipv6 route ::/0 2001:db8:acad:2::a
A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config)#interface VLAN88 command?
It enters configuration mode for a switch virtual interface
Which statement describes the behavior of a switch when the MAC address table is full?
It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN.
Which three components are combined to form a bridge ID?
MAC address Extended system ID bridge priority
What is an advantage of PVST+?
PVST+ optimizes performance on the network through load sharing
Refer to the exhibit. When a packet arrives on interface Serial0/0/0 on R1, with a destination IP address of PC1, which two events occur? (Choose two)
Router R1 will forward the packet out Gig0/1 Router R1 will de-encapsulate the packet and encapsulate it in an Ethernet frame
Refer to the exhibit. How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty?
SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch
Refer to the exhibit. Which interface will be the exit interface to forward a data packet that has the destination IP address 172.18.109.152?
Serial0/0/0
A small coffee shop is offering free Wi-Fi to customers. The network includes a wireless router and a DSL modem that is connected to the local phone company. What method is typically used to configure the connection to the phone company?
Set the WAN connection in the wireless router as a DHCP client
A network administrator is using the router-on-a-stick method to configure inter-VLAN routing. Switch port Gi1/1 is used to connect to the router. Which command should be entered to prepare this port for the task?
Switch(config)# interface gigabitethernet 1/1 Switch(config-if)# switchport mode trunk
Refer to the exhibit. Based on the command output shown, what is the status of the EtherChannel?
The EtherChannel is in use and functional as indicated by the SU and P flags in the command output.
Refer to the exhibit. The users on the LAN network of R1 cannot receive an IPv6 address from the configured stateful DHCPv6 server. What is missing from the stateful DHCPv6 configuration on router R1?
The FA0/0 interface is missing the command that informs the clients to use stateful DHCPv6.
Refer to the exhibit. PC-A and PC-B are both in VLAN 60. PC-A is unable to communicate with PC-B. What is the problem?
The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk.
Refer to the exhibit. How was the host route 2001:DB8:CAFE:4::1/128 installed in the routing table?
The route has manually entered by an administrator
Refer to the exhibit. Inter-VLAN communication between VLAN 10, VLAN 20, and VLAN 30 is not successful. What is the problem? The access interfaces do not have IP addresses and each should be configured with an IP address.
The switch interface FastEthernet0/1 is configured as an access interface and should be configured as a trunk interface.
Refer to the exhibit. The configuration shows commands entered by a network administrator for inter-VLAN routing. However, host H1 cannot communicate with H2. Which part of the inter-VLAN configuration causes the problem?
VLAN Configuration
Which combination of WLAN authentication and encryption is recommended as a best practice for home users?
WPA2 and AES
On which port should Dynamic ARP Inspection (DAI) be configured on a switch?
an uplink port to another switch
Which term describes the role of a Cisco switch in the 802.1X port-based access control?
authenticator
Refer to the exhibit. Router R1 has an OSPF neighbor relationship with the ISP router over the 192.168.0.32 network. The 192.168.0.36 network link should serve as a backup when the OSPF link goes down. The floating static route command ip route 0.0.0.0 0.0.0.0 S0/0/1 100 was issued on R1 and now traffic is using the backup link even when the OSPF link is up and functioning. Which change should be made to the static route command so that traffic will only use the OSPF link when it is up?
change the administrative distance to 120
A junior technician was adding a route to a LAN router. A traceroute to a device on the new network revealed a wrong path and unreachable status. What should be done or checked?
check the configuration of the exit interface on the new static route
What are two switch characteristics that could help alleviate network congestion? (Choose two.)
fast internal switching large frame bufffers
Which command will start the process to bundle two physical interfaces to create an EtherChannel group via LACP?
interface range GigabitEthernet 0/4-5
What type of VLAN is configured specifically for network traffic such as SSH, Telnet, HTTPS, HTTP, and SNMP?
management VLAN
. An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation?
rogue access point
A small publishing company has a network design such that when a broadcast is sent on the LAN, 200 devices receive the transmitted broadcast. How can the network administrator reduce the number of devices that receive broadcast traffic?
segment the LAN into smaller LAN's and route between them
What will router R2 do with a packet destined for 192.168.10.129?
send the packet out interface serial0/0/1
Refer to the exhibit. A network administrator is troubleshooting a problem with EtherChannel. What command was used to produce the exhibited output?
show interfaces fastethernet 0/11 etherchannel
Refer to the exhibit. DLS1 is connected to another switch, DLS2, via a trunk link. A host that is connected to DLS1 is not able to communicate to a host that is connected to DLS2, even though they are both in VLAN 99. Which command should be added to Fa0/1 on DLS1 to correct the problem?
switchport trunk native vlan 66
Match the dynamic routing protocol component to the characteristic. (Not all options are used.)
tables or databases that are stored in RAM exchanges routing information and maintains accurate information about networks a finite list of steps used to determine the best path.
Refer to the exhibit. The administrator wants to enable port security on an interface on switch S1, but the command was rejected. Which conclusion can be drawn?
the interface must be initially configured with the switchport mode access command
What is a result of connecting two or more switches together?
the size of the broadcast domain is increased
What are the two methods that a wireless NIC can use to discover an AP? (Choose two.)
transmitting a probe request receiving a broadcast beacon
Which type of traffic is designed for a native VLAN?
untagged
In what situation would a Layer 2 switch have an IP address configured?
when the layer 2 switch needs to be remotely managed