ITNv7 Sem2 Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The address pool of a DHCP server is configured with 10.7.30.0/24. The network administrator reserves 5 IP addresses for printers. How many IP addresses are left in the pool to be assigned to other hosts?

249

What is the minimum Ethernet frame size that will not be discarded by the receiver as a runt frame?

64 bytes

A company uses DHCP to manage IP address deployment for employee workstations. The IT department deploys multiple DHCP servers in the data center and uses DHCP relay agents to facilitate the DHCP requests from workstations. Which two UDP ports are used to forward DHCP traffic

67 68

A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented

802.11ac

Which spanning tree standard supports only one root bridge so that traffic from all VLANs flows over the same path?

802.1D

Which access control component, implementation, or protocol is based on device roles of supplicant, authenticator, and authentication server?

802.1X

What address and prefix length is used when configuring an IPv6 default static route?

::/0

What network prefix and prefix-length combination is used to create a default static route that will match any IPv6 destination?

::/0

Which problem is evident if the show ip interface command shows that the interface is down and the line protocol is down?

A cable has not been attached to the port.

When routing a large number of VLANs, what are two disadvantages of using the router-on-a-stick inter-VLAN routing method rather than the multilayer switch inter-VLAN routing method?

A dedicated router is required. Multiple subinterfaces may impact the traffic flow speed.

What is the significant difference between a hub and a Layer 2 LAN switch?

A hub extends a collision domain, and a switch divides collision domains.

A high school uses VLAN15 for the laboratory network and VLAN30 for the faculty network. What is required to enable communication between these two VLANs while using the router-on-a-stick approach?

A switch with a port that is configured as a trunk is needed when connecting to the router.

Which statement describes an EtherChannel implementation?

A trunked port can be part of an EtherChannel bundle

Which mode configuration setting would allow formation of an EtherChannel link between switches SW1 and SW2 without sending negotiation traffic?

SW1: on SW2: on

A network administrator is configuring an EtherChannel link between switches SW1 and SW2 by using the command SW1(config-if-range)# channel-group 1 mode auto . Which command must be used on SW2 to enable this EtherChannel?

SW2(config-if-range)# channel-group 1 mode desirable

A small publishing company has a network design such that when a broadcast is sent on the LAN, 200 devices receive the transmitted broadcast. How can the network administrator reduce the number of devices that receive broadcast traffic?

Segment the LAN into smaller LANs and route between them.

A client device on an Ethernet segment needs an IP address in order to communicate on the network. A DHCP server with IP address 192.168.1.1 has been configured and enabled on the network. How will a client device obtain a usable IP address for this network?

Send a DHCPDISCOVER message to physical address FF-FF-FF-FF-FF-FF.

A small coffee shop is offering free Wi-Fi to customers. The network includes a wireless router and a DSL modem that is connected to the local phone company. What method is typically used to configure the connection to the phone company?

Set the WAN connection in the wireless router as a DHCP client.

Which tasks can be accomplished by using the command history feature?

Set the command history buffer size. Recall previously entered commands.

What are two advantages of EtherChannel?

Spanning Tree Protocol views the physical links in an EtherChannel as one logical connection.. Configuring the EtherChannel interface provides consistency in the configuration of the physical links.

A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network?

Split the traffic between the 2.4 GHz and 5 GHz frequency bands

A technician is troubleshooting a slow WLAN that consists of 802.11b and 802.11g devices . A new 802.11n/ac dual-band router has been deployed on the network to replace the old 802.11g router. What can the technician do to address the slow wireless speed?

Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.

What are two advantages of static routing over dynamic routing?

Static routing is more secure because it does not advertise over the network. Static routing uses fewer router resources than dynamic routing.

. A network administrator is using the router-on-a-stick method to configure inter-VLAN routing. Switch port Gi1/1 is used to connect to the router. Which command should be entered to prepare this port for the task?

Switch(config)# interface gigabitethernet 1/1 Switch(config-if)# switchport mode trunk

On a switch that is configured with multiple VLANs, which command will remove only VLAN 100 from the switch?

Switch(config)# no vlan 100

Which two statements are correct with respect to SVI inter-VLAN routing?

Switching packets is faster with SVI. There is no need for a connection to a router.

What are two protocols that are used by AAA to authenticate users against a central database of usernames and password?

TACACS+ RADIUS

What is the result of a network technician issuing the command ip dhcp excluded-address 10.0.15.1 10.0.15.15 on a Cisco router?

The Cisco router will exclude 15 IP addresses from being leased to DHCP clients.

A network administrator has configured an EtherChannel between two switches that are connected via four trunk links. If the physical interface for one of the trunk links changes to a down state, what happens to the EtherChannel?

The EtherChannel will remain functional.

Which two characteristics describe the native VLAN?

The native VLAN traffic will be untagged across the trunk link. The native VLAN provides a common identifier to both ends of a trunk.

A network administrator is configuring a WLC to provide WLAN access to users in an office building. When testing the newly created WLAN, the administrator does not see the SSID from a wireless device. What is a possible cause?

The new WLAN needs to be enabled.

What is the function provided by CAPWAP protocol in a corporate wireless network?

CAPWAP provides the encapsulation and forwarding of wireless user traffic between an access point and a wireless LAN controller.

What happens to switch ports after the VLAN to which they are assigned is deleted?

The ports stop communicating with the attached devices.

A network administrator configured an EtherChannel link with three interfaces between two switches. What is the result if one of the three interfaces is down?

The remaining two interfaces continue to load balance traffic.

What is a result of connecting two or more switches together?

The size of the broadcast domain is increased.

A technician is about to install and configure a wireless network at a small branch office. What is the first security measure the technician should apply immediately upon powering up the wireless router?

Change the default user-name and password of the wireless router.

A network administrator is implementing DHCPv6 for the company. The administrator configures a router to send RA messages with M flag as 1 by using the interface command ipv6 nd managed-config-flag . What effect will this configuration have on the operation of the clients?

Clients must use all configuration information that is provided by a DHCPv6 server.

What happens to a static route entry in a routing table when the outgoing interface associated with that route goes into the down state?

The static route is removed from the routing table.

Refer to the exhibit. Inter-VLAN communication between VLAN 10, VLAN 20, and VLAN 30 is not successful. What is the problem?

The switch interface FastEthernet0/1 is configured as an access interface and should be configured as a trunk interface.

After sticky learning of MAC addresses is enabled, what action is needed to prevent dynamically learned MAC addresses from being lost in the event that an associated interface goes down?

Copy the running configuration to the startup configuration.

Which step is required before creating a new WLAN on a Cisco 3500 series WLC

Create a new VLAN interface.

Which protocol automates assignment of IP addresses on a network, and which port number does it use?

DHCP 67

Which two Cisco solutions help prevent DHCP starvation attacks?

DHCP Snooping Port Security

Which Layer 2 attack will result in legitimate users not getting valid IP addresses?

DHCP starvation

A host PC is attempting to lease an address through DHCP. What message is sent by the server to let the client know it is able to use the provided IP information?

DHCPACK

Which DHCP IPv4 message contains the following information?

DHCPDISCOVER

A DHCP-enabled client PC has just booted. During which two steps will the client PC use broadcast messages when communicating with a DHCP server?

DHCPDISCOVER DHCPREQUEST

Which message does an IPv4 host use to reply when it receives a DHCPOFFER message from a DHCP server?

DHCPREQUEST

What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?

Disable both protocols on all interfaces where they are not required.

What is the best way to prevent a VLAN hopping attack?

Disable trunk negotiation for trunk ports and statically set nontrunk ports as access ports.

What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?

Enable port security.

What are three techniques for mitigating VLAN attacks?

Enable trunking manually. Disable DTP. Set the native VLAN to an unused VLAN.

A laptop cannot connect to a wireless access point. Which two troubleshooting steps should be taken first?

Ensure that the wireless NIC is enabled. Ensure that the wireless SSID is chosen.

A company uses DHCP servers to dynamically assign IPv4 addresses to employee workstations. The address lease duration is set as 5 days. An employee returns to the office after an absence of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain?

FF-FF-FF-FF-FF-FF and 255.255.255.255

Which statement is correct about Ethernet switch frame forwarding decisions?

Frame forwarding decisions are based on MAC address and port mappings in the CAM table.

Which characteristic describes cut-through switching?

Frames are forwarded without any error checking.

A network engineer is configuring a LAN with a redundant first hop to make better use of the available network resources. Which protocol should the engineer implement?

GLBP

What are two advantages of using LACP?

It allows directly connected switches to negotiate an EtherChannel link. It allows the use of multivendor devices.

A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-if)# ip address 172.18.33.88 255.255.255.0 command?

It applies an IPv4 address to the virtual interface.

A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-if)# mdix auto command?

It automatically adjusts the port to allow device connections to use either a straight-through or a crossover cable.

What is an advantage of configuring a Cisco router as a relay agent?

It can provide relay services for multiple UDP services.

A network administrator is configuring DAI on a switch with the command ip arp inspection validate src-mac. What is the purpose of this configuration command?

It checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body.

A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-if)# shutdown command?

It disables a virtual or physical switch interface.

What is the function of STP in a scalable network?

It disables redundant paths to eliminate Layer 2 loops.

A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config)#interface VLAN88 command?

It enters configuration mode for a switch virtual interface.

A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw# configure terminal command?

It enters the global configuration mode.

What is a characteristic of a static route that matches all packets?

It identifies the gateway IP address to which the router sends all IP packets for which it does not have a learned or static route.

Which statement is true regarding the use of PAgP to create EtherChannels?

It is Cisco proprietary.

What is a characteristic of an IPv4 loopback interface on a Cisco IOS router?​

It is a logical interface internal to the router.

What is a characteristic of a floating static route?

It is configured with a higher administrative distance than the original dynamic routing protocol has.

What is a characteristic of spanning tree?

It is enabled by default on Cisco switches.

A network administrator is configuring a RADIUS server connection on a Cisco 3500 series WLC. The configuration requires a shared secret password. What is the purpose for the shared secret password?

It is used to encrypt the messages between the WLC and the RADIUS server.

Which statement describes HSRP

It is used within a group of routers for selecting an active device and a standby device to provide gateway services to a LAN.

A network administrator configures a router to send RA messages with M flag as 0 and O flag as 1. Which statement describes the effect of this configuration when a PC tries to configure its IPv6 address?

It should use the information that is contained in the RA message and contact a DHCPv6 server for additional information.

Which statement describes the behavior of a switch when the MAC address table is full?

It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN.

Which technology is an open protocol standard that allows switches to automatically bundle physical ports into a single logical link?

LACP

What is the result of a DHCP starvation attack?

Legitimate clients are unable to lease IP addresses.

Which three components are combined to form a bridge ID?

MAC address extended system ID bridge priority

. Which protocol provides up to 16 instances of RSTP, combines many VLANs with the same physical and logical topology into a common RSTP instance, and provides support for PortFast, BPDU guard, BPDU filter, root guard, and loop guard?

MST

How would an administrator test this configuration?

Manually shut down the router interface used as a primary route.

What is the outcome of a Layer 2 broadcast storm?

New traffic is discarded by the switch because it is unable to be processed.

A network contains multiple VLANs spanning multiple switches. What happens when a device in VLAN 20 sends a broadcast Ethernet frame?

Only devices in VLAN 20 see the frame.

What is an advantage of PVST+?

PVST+ optimizes performance on the network through load sharing.

Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport access vlan 30 is entered on the Fa0/11 interface, what will happen?

Port Fa0/11 will be returned to VLAN 1.

How do switch buffers affect network performance?

They store frames received, thus preventing premature frame discarding when network congestion occurs.

What are two characteristics of Cisco Express Forwarding (CEF)?

This is the fastest forwarding mechanism on Cisco routers and multilayer switches. Packets are forwarded based on information in the FIB and an adjacency table.

What is a potential issue when using the WLC to upgrade and deploy the latest firmware image to all APs?

Users will not be able to use the WLAN.

What additional information is contained in the 12-bit extended system ID of a BPDU?

VLAN ID

Refer to the exhibit. The configuration shows commands entered by a network administrator for inter-VLAN routing. However, host H1 cannot communicate with H2. Which part of the inter-VLAN configuration causes the problem?

VLAN configuration

A network administrator of a college is configuring WLAN security with WPA2 Enterprise authentication. Which server is required when deploying this type of authentication?

RADIUS

Which command will allow a network administrator to check the IP address that is assigned to a particular MAC address?

Router# show ip dhcp binding

Which two commands can be used to enable BPDU guard on a switch

S1(config)# spanning-tree portfast bpduguard default S1(config-if)# spanning-tree bpduguard enable

Which protocol can be used to monitor the network?

SNMP

Which protocol adds security to remote connections?

SSH

Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

SSH

Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN

VLAN double-tagging

Which combination of WLAN authentication and encryption is recommended as a best practice for home users?

WPA2 and AES

Which three Cisco products focus on endpoint security solutions?

Web Security Appliance Email Security Appliance NAC Appliance

Which statement is true about DHCP operation?​

When a device that is configured to use DHCP boots, the client broadcasts a DHCPDISCOVER message to identify any available DHCP servers on the network.​

Which kind of message is sent by a DHCP client when its IP address lease has expired?​

a DHCPREQUEST unicast message​

What route would have the lowest administrative distance?

a directly connected network

Which solution would help a college alleviate network congestion due to collisions?

a high port density switch

What is an advantage of using dynamic routing protocols instead of static routing?

ability to actively search for new routes if the current path becomes unavailable​

Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?

accounting

While attending a conference, participants are using laptops for network connectivity. When a guest speaker attempts to connect to the network, the laptop fails to display any available wireless networks. The access point must be operating in which mode?

active

Which value in a routing table represents trustworthiness and is used by the router to determine which route to install into the routing table when there are multiple routes toward the same destination?

administrative distance

ip route 192.168.10.0 255.255.255.0 10.10.10.2 5 What does the 5 at the end of the command signify

administrative distance

After which step of the switch bootup sequence is the boot loader executed?

after POST execution

What characteristic completes the following statement?When an IPv6 static route is configured, as a backup route to a static route in the routing table, the "distance" command is used with ......

an administrative distance of 2.

Which impact does adding a Layer 2 switch have on a network?

an increase in the size of the broadcast domain

On which port should Dynamic ARP Inspection (DAI) be configured on a switch?

an uplink port to another switch

Which access control component, implementation, or protocol is based upon usernames and passwords?

authentication

Which term describes the role of a Cisco switch in the 802.1X port-based access control?

authenticator

Which type of management frame may regularly be broadcast by an AP?

beacon

Which command is used to set the BOOT environment variable that defines where to find the IOS image file on a switch?

boot system

A switch is configured to run STP. What term describes a field that has a default value of 32,768 and is the initial deciding factor when electing a root bridge?

bridge priority

Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server?

broadcast DHCPREQUEST

Router(config)# interface g0/1 Router(config-if)# ip address dhcp

configuring the router to obtain IP parameters from a DHCPv4 server

What type of VLAN should not carry voice and network management traffic?

data VLAN

What type of VLAN is initially the management VLAN?

default VLAN

A switch is configured to run STP. What term describes a non-root port that is permitted to forward traffic on the network?

designated port

Which two channel group modes would place an interface in a negotiating state using PAgP?

desirable auto

What is the reason that an ISP commonly assigns a DHCP address to a wireless router in a SOHO environment?

easy IP address management

Which two concepts relate to a switch port that is intended to have only end devices attached and intended never to be used to connect to another switch?

edge port PortFast

What is a wireless security mode that requires a RADIUS server to authenticate wireless users?

enterprise

Which three components are combined to form a bridge ID?

extended system ID bridge priority MAC address

What are two switch characteristics that could help alleviate network congestion?

fast internal switching large frame buffers

In which two port states does a switch learn MAC addresses and process BPDUs in a PVST network?

forwarding learning

Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route?

gateway of last resort

Which switch characteristic helps keep traffic local and alleviates network congestion?

high port density

Which command, when issued in the interface configuration mode of a router, enables the interface to acquire an IPv4 address automatically from an ISP, when that link to the ISP is enabled?

ip address dhcp

Which command would create a valid IPv6 default route?

ipv6 route ::/0 2001:db8:acad:2::a

What is the first action in the boot sequence when a switch is powered on?

load a power-on self-test program

Which authentication method stores usernames and passwords in the router and is ideal for small networks?

local AAA

If no bridge priority is configured in PVST, which criteria is considered when electing the root bridge?

lowest MAC address

What type of VLAN is configured specifically for network traffic such as SSH, Telnet, HTTPS, HTTP, and SNMP?

management VLAN

What type of VLAN supports untagged traffic?

native VLAN

When would it be more beneficial to use a dynamic routing protocol instead of static routing?

on a network where there is a lot of topology changes

If one end of an Ethernet connection is configured for full duplex and the other end of the connection is configured for half duplex, where would late collisions be observed?

on the half-duplex end of the connection

What must an administrator have in order to reset a lost password on a router?

physical access to the router

What is the purpose of the Spanning Tree Protocol (STP)?

prevents Layer 2 loops

What are the two methods that are used by a wireless NIC to discover an AP?

receiving a broadcast beacon frame transmitting a probe request

An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation?

rogue access point

A switch is configured to run STP. What term describes the reference point for all path calculations?

root bridge

Which STP port role is adopted by a switch port if there is no other port with a lower cost to the root bridge?

root port

Which command displays information about the auto-MDIX setting for a specific interface?

show controllers

Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface?

show interfaces Fa0/1 switchport

What information is added to the switch table from incoming frames?

source MAC address and incoming port number

What are two load-balancing methods in the EtherChannel technology?

source MAC to destination MAC source IP to destination IP

Which two parameters must match on the ports of two switches to create a PAgP EtherChannel between the switches?

speed VLAN information

As part of the new security policy, all switches on the network are configured to automatically learn MAC addresses for each port. All running configurations are saved at the start and close of every business day. A severe thunderstorm causes an extended power outage several hours after the close of business. When the switches are brought back online, the dynamically learned MAC addresses are retained. Which port security configuration enabled this?

sticky secure MAC addresses

Which switching method ensures that the incoming frame is error-free before forwarding?

store-and-forward

What information can be verified through the show ip dhcp binding command?

the IPv4 addresses that are assigned to hosts by the DHCP server

Which feature on a switch makes it vulnerable to VLAN hopping attacks

the automatic trunking port feature enabled for all ports by default

What device is considered a supplicant during the 802.1X authentication process?

the client that is requesting authentication

A company uses the SLAAC method to configure IPv6 addresses for the employee workstations. Which address will a client use as its default gateway?

the link-local address of the router interface that is attached to the network

Which feature or configuration on a switch makes it vulnerable to VLAN double-tagging attacks?

the native VLAN of the trunking port being the same as a user VLAN

What is the value used to determine which port on a non-root bridge will become a root port in a STP network?

the path cost

What are two functions of dynamic routing protocols?

to maintain routing tables. to discover the network

What are the two methods that a wireless NIC can use to discover an AP?

transmitting a probe request receiving a broadcast beacon frame

True or False?In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

true

When configuring a switch for SSH access, what other command that is associated with the login local command is required to be entered on the switch?

username username secret secret

Under which two occasions should an administrator disable DTP while managing a local area network?

when connecting a Cisco switch to a non-Cisco switch on links that should not be trunking

In what situation would a Layer 2 switch have an IP address configured?

when the Layer 2 switch needs to be remotely managed

Which type of wireless network is based on the 802.11 standard and a 2.4-GHz or 5-GHz radio frequency?

wireless local-area network

Which three parameters would need to be changed if best practices are being implemented for a home wireless AP?

wireless network password AP password SSID

Which switch component reduces the amount of packet handling time inside the switch?

ASIC

What are two requirements to be able to configure an EtherChannel between two switches

All the interfaces need to work at the same speed. All the interfaces need to be working in the same duplex mode.

During the implementation of Spanning Tree Protocol, all switches are rebooted by the network administrator. What is the first step of the spanning-tree election process?

All the switches send out BPDUs advertising themselves as the root bridge

Which four steps are needed to configure a voice VLAN on a switch port?

Assign the voice VLAN to the switch port. Ensure that voice traffic is trusted and tagged with a CoS priority value. Add a voice VLAN. Configure the switch port in access mode.

What does a switch use to locate and load the IOS image?

BOOT environment variable

What are two drawbacks to turning spanning tree off and having multiple paths through the Layer 2 switch network?

The MAC address table becomes unstable. Broadcast frames are transmitted indefinitely.

What is a requirement to configure a trunking EtherChannel between two switches?

The allowed range of VLANs must be the same on both switches.

When a client is requesting an initial address lease from a DHCP server, why is the DHCPREQUEST message sent as a broadcast

The client may have received offers from multiple servers, and the broadcast serves to implicitly decline those other offers.

What is one indication that a Windows computer did not receive an IPv4 address from a DHCP server?

The computer receives an IP address that starts with 169.254.

After a host has generated an IPv6 address by using the DHCPv6 or SLAAC process, how does the host verify that the address is unique and therefore usable?

The host sends an ICMPv6 neighbor solicitation message to the DHCP or SLAAC-learned address and if no neighbor advertisement is returned, the address is considered unique.


संबंधित स्टडी सेट्स

Types of Health Insurance Policies

View Set

The Dynamic Environment of HRM Chapter One

View Set

managerial accounting smartbook ch 4

View Set

Topic 13 - section 3 key terms (16-17) history

View Set

Les adjectifs numéraux ordinaux

View Set

SPCH 1315 ECHS Midterm Exam Review

View Set

health online starting from (maintaining a healthy body comp. and body image)

View Set