NET 126 FINAL EXAM

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

DHCPDISCOVER DHCPREQUEST

1. A DHCP-enabled client PC has just booted. During which two steps will the client PC use broadcast messages when communicating with a DHCP server? (Choose two.)

VLAN ID*

1. What additional information is contained in the 12-bit extended system ID of a BPDU?

DHCP starvation*

1. Which Layer 2 attack will result in legitimate users not getting valid IP addresses?

gateway of last resort*

1. Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route?

Set the command history buffer size.*Recall previously entered commands.*

1. Which tasks can be accomplished by using the command history feature? (Choose two.)

It is a logical interface internal to the router.*

10. What is a characteristic of an IPv4 loopback interface on a Cisco IOS router?​

designated root

10. When the show spanning-tree vlan 33 command is issued on a switch, three ports are shown in the forwarding state. In which two port roles could these interfaces function while in the forwarding state? (Choose two.)

100

19. An administrator issues the ipv6 route 2001:db8:acad:1::/32 gigabitethernet0/0 2001:db8:acad:6::1 100 command on a router. What administrative distance is assigned to this route?

the interface ID exit interface* the IP address of the next-hop neighbor*

34. What two pieces of information are needed in a fully specified static route to eliminate recursive lookups? (Choose two.)

CAPWAP provides the encapsulation and forwarding of wireless user traffic between an access point and a wireless LAN controller.*

35. What is the function provided by CAPWAP protocol in a corporate wireless network?

35. Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface?

35. Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface?

It is used within a group of routers for selecting an active device and a standby device to provide gateway services to a LAN.*

35. Which statement describes HSRP?​

61440

37. A set of switches is being connected in a LAN topology. Which STP bridge priority value will make it least likely for the switch to be selected as the root?

Assign the voice VLAN to the switch port.* Ensure that voice traffic is trusted and tagged with a CoS priority value.* Add a voice VLAN.* Configure the switch port in access mode.*

37. Which four steps are needed to configure a voice VLAN on a switch port? (Choose four).

Learning* Forwarding*

38. In which two PVST+ port states are MAC addresses learned? (Choose two.)

TACAS+ RADIUS

38. What are two protocols that are used by AAA to authenticate users against a central database of usernames and password? (Choose two.)

a directly connected network*

41. What route would have the lowest administrative distance?

accounting

41. Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?

extended system ID*

42. A switch is configured to run STP. What term describes a field used to specify a VLAN ID?

desirable auto

48. Which two channel group modes would place an interface in a negotiating state using PAgP? (Choose two.)

bridge priority MAC address

5. Which three components are combined to form a bridge ID?

FastEthernet ports 5 through 10 can receive up to 6 DHCP discovery messages per second.*

56. A network administrator enters the following commands on the switch SW1. What is the effect after these commands are entered?

data VLAN*

60. What type of VLAN should not carry voice and network management traffic?

boot system*

7. Which command is used to set the BOOT environment variable that defines where to find the IOS image file on a switch?

SSH

7. Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

a high port density switch*

72. Which solution would help a college alleviate network congestion due to collisions?

SSH

9. Which protocol adds security to remote connections?

no shutdown*

A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up?

switchport mode trunk*

A network administrator has configured router CiscoVille with the above commands to provide inter-VLAN routing. What command will be required on a switch that is connected to the Gi0/0 interface on router CiscoVille to allow inter-VLAN routing?​

trunk port*

A network administrator has configured router CiscoVille with the above commands to provide inter-VLAN routing. What type of port will be required on a switch that is connected to Gi0/0 on router CiscoVille to allow inter-VLAN routing?

IP addresses on the subinterfaces are incorrectly matched to the VLANs.*

A network administrator is configuring RT1 for inter-VLAN routing. The switch is configured correctly and is functional. Host1, Host2, and Host3 cannot communicate with each other. Based on the router configuration, what is causing the problem?

The state is not maintained by the DHCPv6 server under stateless DHCPv6 operation.*

A network administrator is configuring a router as a DHCPv6 server. The administrator issues a show ipv6 dhcp pool command to verify the configuration. Which statement explains the reason that the number of active clients is 0?

The router is configured for stateless DHCPv6 operation.*

A network administrator is configuring a router for DHCPv6 operation. Which conclusion can be drawn based on the commands?

192.168.2.100

A network engineer is troubleshooting host connectivity on a LAN that uses a first hop redundancy protocol. Which IPv4 gateway address should be configured on the host?

The static route for 192.168.2.0 is incorrectly configured.*

A ping from R1 to 10.1.1.2 is successful, but a ping from R1 to any address in the 192.168.2.0 network fails. What is the cause of this problem?

There is an incorrect IP address configured on GigabitEthernet 0/0.30.*

A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the show running-config command output. PCs on VLAN 45 that are using the 172.16.45.0 /24 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem?​

Allow VLAN 20 on the trunk link.*

All workstations are configured correctly in VLAN 20. Workstations that are connected to switch SW1 are not able to send traffic to workstations on SW2. What could be done to remedy the problem?

The EtherChannel was not configured with the same allowed range of VLANs on each interface.*

An EtherChannel was configured between switches S1 and S2, but the interfaces do not form an EtherChannel. What is the problem?

The next hop address is incorrect.*

An administrator is attempting to install a default static route on router R1 to reach the Site B network on router R2. After entering the static route command, the route is still not showing up in the routing table of router R1. What is preventing the route from installing in the routing table?

The interface is incorrect.*

An administrator is attempting to install an IPv6 static route on router R1 to reach the network attached to router R2. After the static route command is entered, connectivity to the network is still failing. What error has been made in the static route configuration?

desirable

An administrator wants to form an EtherChannel between the two switches by using the Port Aggregation Protocol. If switch S1 is configured to be in auto mode, which mode should be configured on S2 to form the EtherChannel?

stateless DHCPv6*

Based on the output that is shown, what kind of IPv6 addressing is being configured?

Router AD codes

C = 0 S = 5 Internal D = 90 O = 110 R = 120

PVST+

Cisco implementation of IEEE 802.1d

Steps of stateful and stateless DHCP

DHCPv6 SOLICIT DHCPv6 ADVERTISE DHCPv6 REQUEST (sfull) or INFORMATION REQUEST(sless) DHCPv6 REPLY

RSTP

Fast converging enhancement of IEEE 802.1D

MSTP

IEEE standard that reduces the number of STP instances

A Cisco proprietary protocol was used to negotiate the EtherChannel link.*

On the basis of the output that is shown, what can be determined about the EtherChannel bundle?

192.168.12.16

PC A sends a request to Server B. What IPv4 address is used in the destination field in the packet as the packet leaves PC A?

The ipv6 dhcp relay command should be applied to interface Gig0/0.*

PC-A is unable to receive an IPv6 address from the stateful DHCPv6 server. What is the problem?

7

PC1 and PC2 should be able to obtain IP address assignments from the DHCP server. How many ports among switches should be assigned as trusted ports as part of the DHCP snooping configuration?

255.255.255.255*

PC1 is configured to obtain a dynamic IP address from the DHCP server. PC1 has been shut down for two weeks. When PC1 boots and tries to request an available IP address, which destination IP address will PC1 place in the IP header?

Interface G0/2 is not configured as a trunk.*

PC1 is unable to communicate with server 1. The network administrator issues the show interfaces trunk command to begin troubleshooting. What conclusion can be made based on the output of this command?

Frames from PC1 will cause the interface to shut down immediately, and a log entry will be made.*

Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration?

Rapid PVST+

Proprietary per VLAN implementation of IEEE 802.1W

Serial0/0/0*

Refer to the exhibit. Which interface will be the exit interface to forward a data packet that has the destination IP address 172.18.109.152? 172.18.109.0/26 is variously subnetted, 7 subnets, 3 masks O 172.18.109.0/26 [110/10] via 172.18.32.1, 00:00:24, Serial0/0/0 O 172.18.109.64/26 [110/20] via 172.18.32.6, 00:00:56, Serial 0/0/1 O 172.18.109.128/26 [110/10] via 172.18.32.1, 00:00:24, Serial 0/0/0 C 172.18.109.192/27 is directly connected, GigabitEthernet0/0 L 172.18.109.193/27 is directly connected, GigabitEthernet0/0 C 172.18.109.224/27 is directly connected, GigabitEthernet0/1 L 172.18.109.225/27 is directly connected, GigabitEthernet0/1 172.18.32.0/24 is variably subnetted, 4 subnets, 2 masks C 172.18.32.0/30 is directly connected, Serial0/0/0 L 172.18.32.2/32 is directly connected, Serial0/0/0 C 172.18.32.4/30 is directly connected, Serial0/0/1 L 172.18.32.5/32 is directly connected, Serial0/0/1 S 172.18.33.0/26 [1/0] via 172.18.32.1, 00:00:24, Serial0/0/0 R1#

Change the administrative distance to 120.*

The Branch Router has an OSPF neighbor relationship with the HQ router over the 198.51.0.4/30 network. The 198.51.0.8/30 network link should serve as a backup when the OSPF link goes down. The floating static route command ip route 0.0.0.0 0.0.0.0 S0/1/1 100 was issued on Branch and now traffic is using the backup link even when the OSPF link is up and functioning. Which change should be made to the static route command so that traffic will only use the OSPF link when it is up?

DHCPACK

The DHCP server confirming the address lease has been completed

The MAC address of PC1 that connects to the Fa0/2 interface is not the configured MAC address.*

The Fa0/2 interface on switch S1 has been configured with the switchport port-security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown?

vModify the transport input command.*

The network administrator wants to configure Switch1 to allow SSH connections and prohibit Telnet connections. How should the network administrator change the displayed configuration to satisfy the requirement?

ip route 0.0.0.0 0.0.0.0 s0/0/0 ip route 0.0.0.0 0.0.0.0 s0/1/0 10*

The network engineer for the company that is shown wants to use the primary ISP connection for all external connectivity. The backup ISP connection is used only if the primary ISP connection fails. Which set of commands would accomplish this goal?

R1 needs a static route to the R2 LAN.*

The small company shown uses static routing. Users on the R2 LAN have reported a problem with connectivity. What is the issue?

alternate, designated, root, root*

What are the possible port roles for ports A, B, C, and D in this RSTP-enabled network?

The port violation mode is the default for any port that has port security enabled.*

What can be determined about port security from the information that is shown?

administrative distance*

What does the 5 at the end of the command signify? ip route 192.168.10.0 255.255.255.0 10.10.10.2 5

120

What is the administrative distance value of the route for router R1 to reach the destination IPv6 address of 2001:DB8:CAFE:4::A?

The encapsulation dot1Q 20 command has not been configured.​*

What is the cause of the error that is displayed in the configuration of inter-VLAN routing on router CiscoVille?

GLBP

What protocol can be configured on gateway routers R1 and R2 that will allow traffic from the internal LAN to be load balanced across the two gateways to the Internet?

Configure a static default route from R1 to Edge, a default route from Edge to the Internet, and a static route from Edge to R1.*

What routing solution will allow both PC A and PC B to access the Internet with the minimum amount of router CPU and network bandwidth utilization?

Add the ipv6 dhcp relay command to interface Fa0/0.*

What should be done to allow PC-A to receive an IPv6 address from the DHCPv6 server?

send the packet out interface Serial0/0/1*

What will router R2 do with a packet destined for 192.168.10.129? Gateway of last resort is not set 10.0.0.0/30 is subnetted, 2 subnets C 10.0.0.0 is directly connected, Serial0/0/0 C 10.0.0.4 is directly connected, Serial0/0/1 192.168.10.0/26 is subnetted, 3 subnets S 192.168.10.0 is directly connected, Serial0/0/0 C 192.168.10.64 is directly connected, FastEthernet0/0 S 192.168.10.128 [1/0] via 10.0.0.6

What would happen after the IT administrator enters the new static route?

What would happen after the IT administrator enters the new static route?

R2(config)# ipv6 route 2001:db8:10:12::/64 S0/0/0*

Which command will properly configure an IPv6 static route on R2 that will allow traffic from PC2 to reach PC1 without any recursive lookups by router R2?

A(config)# ip route 192.168.4.0 255.255.255.0 192.168.3.2*

Which command would be used on router A to configure a static route to direct traffic from LAN A that is destined for LAN C?

R1(config)# ipv6 route ::/0 G0/1 fe80::2*

Which default static route command would allow R1 to potentially reach all unknown networks on the Internet?

MAC address of the virtual router*

Which destination MAC address is used when frames are sent from the workstation to the default gateway?

a static route to the 192.168.10.0/24 network*

Which route would have to go down in order for this static route to appear in the routing table?

Park(config)# ip route 0.0.0.0 0.0.0.0 192.168.14.1 Alta(config)# ip route 10.0.234.0 255.255.255.0 192.168.14.2 Alta(config)# ip route 0.0.0.0 0.0.0.0 s0/0/0*

Which set of commands will configure static routes that will allow the Park and the Alta routers to a) forward packets to each LAN and b) direct all other traffic to the Internet?

ip route 172.16.1.0 255.255.255.0 s0/0/0 121*

Which static route would an IT technician enter to create a backup route to the 172.16.1.0 network that is only used if the primary RIP learned route fails?

S2

Which switch will be the root bridge after the election process is complete?

EtherChannel

Which switching technology would allow each access layer switch link to be aggregated to provide more bandwidth between each Layer 2 switch and the Layer 3 switch?

recursive static route*

Which type of IPv6 static route is configured in the exhibit?

RAPID PVST+

a Cisco enhancement of RSTP to provide a spanning-tree instance for each VLAN

GLBP

a Cisco proprietary FHRP that provides load sharing in addition to redundancy

DHCPOFFER

a DHCP server responding to the initial request by a client

VLAN ID

a VLAN number

dynamic desirable

actively attempts to convert the link to a trunk

Canonical Format Identifier

an identifier that enables token ring frames to be carried across ethernet links

VRRP

an open standard FHRP that provides redundancy through use of a virtual routers master and back up

metric

identifies the value assigned to reach a remote network

Stateful DHCP

ipv6 managed-flag set to one use address command to create poo; client has ipv6 add DHCP

Stateless DHCP

ipv6 nd other-config-flag client send DHCP INFORMATION REQUEST client has ipv6 add autoconfig

dynamic auto

passively waits for the neighbor to initiate trunking

authentication

proves that users are who they say they are

accounting

records what users do and what they access

nonegotiate

requires manual configuration of trunking or non trunking

HSRP Failover steps

router fails stop sending hello messages standby router becomes active router new active router gets mac and ip of virtual router

DHCPREQUEST

the client accepting the IP address provided by the DHCP server

STP

the legacy standard for STP that runs all VLANs in a single spanning tree instance

fields in vlan tag 802.1q

type vlan id user priority cfi

a DHCPREQUEST unicast message​*

10. Which kind of message is sent by a DHCP client when its IP address lease has expired?​

administrative distance*

10. Which value in a routing table represents trustworthiness and is used by the router to determine which route to install into the routing table when there are multiple routes toward the same destination?

DHCPACK

11. A host PC is attempting to lease an address through DHCP. What message is sent by the server to let the client know it is able to use the provided IP information?

It disables redundant paths to eliminate Layer 2 loops.*

11. What is the function of STP in a scalable network?

64 bytes*

11. What is the minimum Ethernet frame size that will not be discarded by the receiver as a runt frame?

after POST execution*

12. After which step of the switch bootup sequence is the boot loader executed?

It is enabled by default on Cisco switches.*

12. What is a characteristic of spanning tree?

The computer receives an IP address that starts with 169.254.*

12. What is one indication that a Windows computer did not receive an IPv4 address from a DHCP server?

VLAN double-tagging*

12. Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN?

It checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body.*

13. A network administrator is configuring DAI on a switch with the command ip arp inspection validate src-mac. What is the purpose of this configuration command?

edge router connection to the ISP* stub router connection to the rest of the corporate or campus network

13. On which two routers would a default static route be configured? (Choose two.)

broadcast DHCPREQUEST*

13. Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server?

an increase in the size of the broadcast domain*

13. Which impact does adding a Layer 2 switch have on a network?

802.1D*

13. Which spanning tree standard supports only one root bridge so that traffic from all VLANs flows over the same path?

Set the WAN connection in the wireless router as a DHCP client.*

14. A small coffee shop is offering free Wi-Fi to customers. The network includes a wireless router and a DSL modem that is connected to the local phone company. What method is typically used to configure the connection to the phone company?

prevents Layer 2 loops*

14. What is the purpose of the Spanning Tree Protocol (STP)?

Frames are forwarded without any error checking.*

14. Which characteristic describes cut-through switching?

S1(config)# spanning-tree portfast bpduguard default* S1(config-if)# spanning-tree bpduguard enable*

14. Which two commands can be used to enable BPDU guard on a switch? (Choose two.)

67 68

15. A company uses DHCP to manage IP address deployment for employee workstations. The IT department deploys multiple DHCP servers in the data center and uses DHCP relay agents to facilitate the DHCP requests from workstations. Which two UDP ports are used to forward DHCP traffic? (Choose two.)

sticky secure MAC addresses*

15. As part of the new security policy, all switches on the network are configured to automatically learn MAC addresses for each port. All running configurations are saved at the start and close of every business day. A severe thunderstorm causes an extended power outage several hours after the close of business. When the switches are brought back online, the dynamically learned MAC addresses are retained. Which port security configuration enabled this?

It is configured with a higher administrative distance than the original dynamic routing protocol has.*

15. What is a characteristic of a floating static route?

A hub extends a collision domain, and a switch divides collision domains.*

15. What is the significant difference between a hub and a Layer 2 LAN switch?

the path cost

15. What is the value used to determine which port on a non-root bridge will become a root port in a STP network?

Send a DHCPDISCOVER message to physical address FF-FF-FF-FF-FF-FF.*

16. A client device on an Ethernet segment needs an IP address in order to communicate on the network. A DHCP server with IP address 192.168.1.1 has been configured and enabled on the network. How will a client device obtain a usable IP address for this network?

::/0*

16. What network prefix and prefix-length combination is used to create a default static route that will match any IPv6 destination?

Frame forwarding decisions are based on MAC address and port mappings in the CAM table.*

16. Which statement is correct about Ethernet switch frame forwarding decisions?

beacon

16. Which type of management frame may regularly be broadcast by an AP?

They store frames received, thus preventing premature frame discarding when network congestion occurs.*

17. How do switch buffers affect network performance?

receiving a broadcast beacon frame* transmitting a probe request*

17. What are the two methods that are used by a wireless NIC to discover an AP? (Choose two.)

The MAC address table becomes unstable.* Broadcast frames are transmitted indefinitely.*

17. What are two drawbacks to turning spanning tree off and having multiple paths through the Layer 2 switch network? (Choose two.)

It can provide relay services for multiple UDP services.*

17. What is an advantage of configuring a Cisco router as a relay agent?

28672*

18. A small company network has six interconnected Layer 2 switches. Currently all switches are using the default bridge priority value. Which value can be used to configure the bridge priority of one of the switches to ensure that it becomes the root bridge in this design?

to avoid interference from nearby wireless devices*

18. A technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel?

When a device that is configured to use DHCP boots, the client broadcasts a DHCPDISCOVER message to identify any available DHCP servers on the network.​*

18. Which statement is true about DHCP operation?​

high port density*

18. Which switch characteristic helps keep traffic local and alleviates network congestion?

ASIC

19. Which switch component reduces the amount of packet handling time inside the switch?

active

19. While attending a conference, participants are using laptops for network connectivity. When a guest speaker attempts to connect to the network, the laptop fails to display any available wireless networks. The access point must be operating in which mode?

configuring the router to obtain IP parameters from a DHCPv4 server*

2. An administrator issues the commands:

All the switches send out BPDUs advertising themselves as the root bridge.*

2. During the implementation of Spanning Tree Protocol, all switches are rebooted by the network administrator. What is the first step of the spanning-tree election process?

load a power-on self-test program*

2. What is the first action in the boot sequence when a switch is powered on?

Enable port security.*

2. What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?

Static routing does not advertise over the network, thus providing better security.* Static routing typically uses less network bandwidth and fewer CPU operations than dynamic routing does.* The path a static route uses to send data is known.*

2. Which three advantages are provided by static routing? (Choose three.)

It should use the information that is contained in the RA message and contact a DHCPv6 server for additional information.*

20. A network administrator configures a router to send RA messages with M flag as 0 and O flag as 1. Which statement describes the effect of this configuration when a PC tries to configure its IPv6 address?

802.11ac*

20. A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented?

It is Cisco proprietary.*

20. Which statement is true regarding the use of PAgP to create EtherChannels?

Change the default user-name and password of the wireless router.*

21. A technician is about to install and configure a wireless network at a small branch office. What is the first security measure the technician should apply immediately upon powering up the wireless router?

All the interfaces need to work at the same speed.* All the interfaces need to be working in the same duplex mode.*

21. What are two requirements to be able to configure an EtherChannel between two switches? (Choose two.)

source MAC address and incoming port number*

21. What information is added to the switch table from incoming frames?

Advanced

22. On a Cisco 3504 WLC dashboard, which option provides access to the full menu of features?

store-and-forward*

22. Which switching method ensures that the incoming frame is error-free before forwarding?

Create a new VLAN interface.*

23. Which step is required before creating a new WLAN on a Cisco 3500 series WLC?

Speed* VLAN information*

23. Which two parameters must match on the ports of two switches to create a PAgP EtherChannel between the switches? (Choose two.)

the link-local address of the router interface that is attached to the network*

24. A company uses the SLAAC method to configure IPv6 addresses for the employee workstations. Which address will a client use as its default gateway?​

The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia.*

24. A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users access high bandwidth services such as streaming video, the wireless network performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve the wireless network performance for that type of service?

when connecting a Cisco switch to a non-Cisco switch* on links that should not be trunking*

24. Under which two occasions should an administrator disable DTP while managing a local area network? (Choose two.)

It is used to encrypt the messages between the WLC and the RADIUS server.*

25. A network administrator is configuring a RADIUS server connection on a Cisco 3500 series WLC. The configuration requires a shared secret password. What is the purpose for the shared secret password?

The native VLAN traffic will be untagged across the trunk link.* The native VLAN provides a common identifier to both ends of a trunk.*

25. Which two characteristics describe the native VLAN? (Choose two.)

The remaining two interfaces continue to load balance traffic.*

26. A network administrator configured an EtherChannel link with three interfaces between two switches. What is the result if one of the three interfaces is down?

HSRP uses active and standby routers.*

26. A network administrator is analyzing the features that are supported by different first-hop router redundancy protocols. Which statement describes a feature that is associated with HSRP?

Switch(config)# no vlan 100*

26. On a switch that is configure0d with multiple VLANs, which command will remove only VLAN 100 from the switch?

wireless network password* AP password* SSID*

26. Which three parameters would need to be changed if best practices are being implemented for a home wireless AP? (Choose three.)

SW2(config-if-range)# channel-group 1 mode desirable*

27. A network administrator is configuring an EtherChannel link between switches SW1 and SW2 by using the command SW1(config-if-range)# channel-group 1 mode auto . Which command must be used on SW2 to enable this EtherChannel?

authentication

27. Which access control component, implementation, or protocol is based upon usernames and passwords?

Only devices in VLAN 20 see the frame.*

28. A network contains multiple VLANs spanning multiple switches. What happens when a device in VLAN 20 sends a broadcast Ethernet frame?

LACP*

28. Which technology is an open protocol standard that allows switches to automatically bundle physical ports into a single logical link?

wireless local-area network*

28. Which type of wireless network is based on the 802.11 standard and a 2.4-GHz or 5-GHz radio frequency?

The allowed range of VLANs must be the same on both switches.*

29. What is a requirement to configure a trunking EtherChannel between two switches?

DHCP Snooping* Port Security

29. Which two Cisco solutions help prevent DHCP starvation attacks? (Choose two.)

to maintain routing tables* to discover the network*

3. What are two functions of dynamic routing protocols? (Choose two.)

physical access to the router*

3. What must an administrator have in order to reset a lost password on a router?

The client may have received offers from multiple servers, and the broadcast serves to implicitly decline those other offers.*

3. When a client is requesting an initial address lease from a DHCP server, why is the DHCPREQUEST message sent as a broadcast?

root port*

3. Which STP port role is adopted by a switch port if there is no other port with a lower cost to the root bridge?

Web Security Appliance* Email Security Appliance* NAC Appliance*

3. Which three Cisco products focus on endpoint security solutions? (Choose three.)

Enable trunking manually.* Disable DTP. Set the native VLAN to an unused VLAN.*

30. What are three techniques for mitigating VLAN attacks? (Choose three.)

It allows directly connected switches to negotiate an EtherChannel link.* It allows the use of multivendor devices.*

30. What are two advantages of using LACP? (Choose two.)

an IPv6 link-local address on the adjacent router.*

30. What characteristic completes the following statement?

The ports stop communicating with the attached devices.*

30. What happens to switch ports after the VLAN to which they are assigned is deleted?

designated port*

31. A switch is configured to run STP. What term describes a non-root port that is permitted to forward traffic on the network?

GLBP

31. Which FHRP implementation is a Cisco-proprietary protocol that suppports IPv4 load sharing?

RADIUS

32. A network administrator of a college is configuring the WLAN user authentication process. Wireless users are required to enter username and password credentials that will be verified by a server. Which server would provide such service?

118

32. The address pool of a DHCP server is configured with 10.92.71.0/25. The network administrator reserves 8 IP addresses for servers. How many IP addresses are left in the pool to be assigned to other hosts?

Spanning Tree Protocol views the physical links in an EtherChannel as one logical connection.* Configuring the EtherChannel interface provides consistency in the configuration of the physical links.*

32. What are two advantages of EtherChannel? (Choose two.)

Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.*

33. A technician is troubleshooting a slow WLAN that consists of 802.11b and 802.11g devices . A new 802.11n/ac dual-band router has been deployed on the network to replace the old 802.11g router. What can the technician do to address the slow wireless speed?

The host sends an ICMPv6 neighbor solicitation message to the DHCP or SLAAC-learned address and if no neighbor advertisement is returned, the address is considered unique.*

34. After a host has generated an IPv6 address by using the DHCPv6 or SLAAC process, how does the host verify that the address is unique and therefore usable?

Port Fa0/11 will be returned to VLAN 1.*

34. Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport access vlan 30 is entered on the Fa0/11 interface, what will happen?

accidental interference*

34. The company handbook states that employees cannot have microwave ovens in their offices. Instead, all employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the company trying to avoid?

Legitimate clients are unable to lease IP addresses.*

39. What is the result of a DHCP starvation attack?

root port*

39. Which port role is assigned to the switch port that has the lowest cost to reach the root bridge?

ability to actively search for new routes if the current path becomes unavailable​*

4. What is an advantage of using dynamic routing protocols instead of static routing?

username username secret secret* login block-for seconds attempts number within*seconds*

4. When configuring a switch for SSH access, what other command that is associated with the login local command is required to be entered on the switch?

DHCPDISCOVER*

4. Which DHCP IPv4 message contains the following information?

edge port Port fast

4. Which two concepts relate to a switch port that is intended to have only end devices attached and intended never to be used to connect to another switch? (Choose two.)

root port*

40. A switch is configured to run STP. What term describes the switch port closest, in terms of overall cost, to the root bridge

If the destination MAC address that corresponds to the IPv4 address is not in the ARP cache, R1 sends an ARP request.*

40. What does R1 use as the MAC address of the destination when constructing the frame that will go from R1 to Server B?

the native VLAN of the trunking port being the same as a user VLAN*

40. Which feature or configuration on a switch makes it vulnerable to VLAN double-tagging attacks?

A switch with a port that is configured as a trunk is needed when connecting to the router.*

41. A high school uses VLAN15 for the laboratory network and VLAN30 for the faculty network. What is required to enable communication between these two VLANs while using the router-on-a-stick approach?

The interface fa0/0 has not been activated.*

42. A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 255.255.255.0. However, when the administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem?

A dedicated router is required.* Multiple subinterfaces may impact the traffic flow speed.*

42. When routing a large number of VLANs, what are two disadvantages of using the router-on-a-stick inter-VLAN routing method rather than the multilayer switch inter-VLAN routing method? (Choose two.)

ip route 172.16.32.0 255.255.224.0 S0/0/0 200*

43. A router has used the OSPF protocol to learn a route to the 172.16.32.0/19 network. Which command will implement a backup floating static route to this network?

root bridge*

43. A switch is configured to run STP. What term describes the reference point for all path calculations?

Shutdown

43. An IT security specialist enables port security on a switch port of a Cisco switch. What is the default violation mode in use until the switch port is configured to use a different violation mode?

8

43. The address pool of a DHCP server is configured with 192.168.234.0/27. The network administrator reserves 22 IP addresses for IP phones. How many IP addresses are left in the pool to be assigned to other hosts?

FF-FF-FF-FF-FF-FF and 255.255.255.255*

44. A company uses DHCP servers to dynamically assign IPv4 addresses to employee workstations. The address lease duration is set as 5 days. An employee returns to the office after an absence of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain?

Ensure that the wireless NIC is enabled.* Ensure that the wireless SSID is chosen.*

44. A laptop cannot connect to a wireless access point. Which two troubleshooting steps should be taken first? (Choose two.)

bridge priority*

44. A switch is configured to run STP. What term describes a field that has a default value of 32,768 and is the initial deciding factor whenelecting a root bridge?

Clients will have to manually identify the SSID to connect to the network.​*

45. What is an advantage of SSID cloaking?​

show ip dhcp binding

45. Which command will allow a network administrator to check the IP address that is assigned to a particular MAC address?

A trunked port can be part of an EtherChannel bundle.*

45. Which statement describes an EtherChannel implementation?

Enterprise

46. What is a wireless security mode that requires a RADIUS server to authenticate wireless users?

easy IP address management*

46. What is the reason that an ISP commonly assigns a DHCP address to a wireless router in a SOHO environment?

Split the traffic between the 2.4 GHz and 5 GHz frequency bands.*

47. A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network?

the IPv4 addresses that are assigned to hosts by the DHCP server*

47. What information can be verified through the show ip dhcp binding command?

It is made by combining multiple physical links that are seen as one link between two switches.*

47. Which statement describes a characteristic of EtherChannel?

It is not assigned to a VLAN.*

48. What is a characteristic of a routed port on a Layer 3 switch?

The Cisco router will exclude 15 IP addresses from being leased to DHCP clients.*

48. What is the result of a network technician issuing the command ip dhcp excluded-address 10.0.15.1 10.0.15.15 on a Cisco router?

SNMP

48. Which protocol can be used to monitor the network?

NAT

49. A network administrator deploys a wireless router in a small law firm. Employee laptops join the WLAN and receive IP addresses in the 10.0.10.0/24 network. Which service is used on the wireless router to allow the employee laptops to access the internet?

SW1: onSW2: on**

49. Which mode configuration setting would allow formation of an EtherChannel link between switches SW1 and SW2 without sending negotiation traffic?

The static route is removed from the routing table.*

5. What happens to a static route entry in a routing table when the outgoing interface associated with that route goes into the down state?

local AAA*

5. Which authentication method stores usernames and passwords in the router and is ideal for small networks?

show controllers*

5. Which command displays information about the auto-MDIX setting for a specific interface?​

It automatically adjusts the port to allow device connections to use either a straight-through or a crossover cable.*

50. A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-if)# mdix auto command?

Static routing is more secure because it does not advertise over the network.* Static routing uses fewer router resources than dynamic routing.*

50. What are two advantages of static routing over dynamic routing? (Choose two.)

QoS*

50. Which service can be used on a wireless router to prioritize network traffic among different types of applications so that voice and video data are prioritized over email and web data?

It applies an IPv4 address to the virtual interface.*

51. A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-if)# ip address 172.18.33.88 255.255.255.0 command?

the next-hop address of two different adjacent routers.*

51. What characteristic completes the following statement?When an IPv6 static route is configured, it is possible that the same IPv6 link-local address is used for ...

on

51. When EtherChannel is configured, which mode will force an interface into a port channel without exchanging aggregation protocol packets?

GLBP for IPv6

51. Which FHRP implementation is a Cisco-proprietary protocol that suppports IPv6 load balancing?

802.1X*

51. Which access control component, implementation, or protocol is based on device roles of supplicant, authenticator, and authentication server?

It enters the global configuration mode.*

52. A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw# configure terminal command?

source IP to destination IP* source MAC to destination MAC*

52. What are two load-balancing methods in the EtherChannel technology? (Choose two.)

ip dhcp excluded-address 192.168.100.1 192.168.100.10ip dhcp excluded-address 192.168.101.254ip dhcp pool LAN-POOL-100network 192.168.100.0 255.255.254.0default-router 192.168.100.1*****

52. Which set of commands will configure a router as a DHCP server that will assign IPv4 addresses to the 192.168.100.0/23 LAN while reserving the first 10 and the last addresses for static assignment?

wireless wide-area network*

52. Which type of wireless network is suitable for national and global communications?

Workstations are assigned with IP addresses in the 169.254.0.0/16 network.*

53. What is a result when the DHCP servers are not operational in a network?

the automatic trunking port feature enabled for all ports by default*

53. Which feature on a switch makes it vulnerable to VLAN hopping attacks?

MST*

53. Which protocol provides up to 16 instances of RSTP, combines many VLANs with the same physical and logical topology into a common RSTP instance, and provides support for PortFast, BPDU guard, BPDU filter, root guard, and loop guard?

R1(config)# ipv6 unicast-routing*

54. A company uses the method SLAAC to configure IPv6 addresses for the workstations of the employees. A network administrator configured the IPv6 address on the LAN interface of the router. The interface status is UP. However, the workstations on the LAN segment did not obtain the correct prefix and prefix length. What else should be configured on the router that is attached to the LAN segment for the workstations to obtain the information?​

It disables a virtual or physical switch interface.*

54. A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-if)# shutdown command?

New traffic is discarded by the switch because it is unable to be processed.*

54. What is the outcome of a Layer 2 broadcast storm?

authorization

54. Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?

IRDP

55. Which FHRP implementation is a nonproprietary protocol which relies on ICMP to provide IPv4 redundancy?

redundant links between Layer 2 switches* removing single points of failure with multiple Layer 2 switches*

55. Which two network design features require Spanning Tree Protocol (STP) to ensure correct network operation? (Choose two.)

The EtherChannel will remain functional.*

56. A network administrator has configured an EtherChannel between two switches that are connected via four trunk links. If the physical interface for one of the trunk links changes to a down state, what happens to the EtherChannel?

It applies an IPv6 address to the virtual interface.*

56. A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-if)# ipv6 address 2001:db8:a2b4:88::1/64 command?

protect

57. A network administrator is configuring port security on a Cisco switch. The company security policy specifies that when a violation occurs, packets with unknown source addresses should be dropped and no notification should be sent. Which violation mode should be configured on the interfaces?

It returns to global configuration mode.*

57. A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-if)# exit command?

Make sure that different SSIDs are used for the 2.4 GHz and 5 GHz bands.*

58. A network administrator is working to improve WLAN performance on a dual-band wireless router. What is a simple way to achieve a split-the-traffic result?

It allows data to flow in both directions at the same time on the interface.*

58. A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-if)# duplex full command?

It enters privileged mode.*

58. A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw> enable command?

Authorization

59. Which access control component, implementation, or protocol controls what users can do on the network?

on the half-duplex end of the connection*

6. If one end of an Ethernet connection is configured for full duplex and the other end of the connection is configured for half duplex, where would late collisions be observed?

the "ipv6 unicast-routing" command.*

6. What characteristic completes the following statement?When an IPv6 static route is configured, it is first necessary to configure ......

It identifies the gateway IP address to which the router sends all IP packets for which it does not have a learned or static route.*

6. What is a characteristic of a static route that matches all packets?

Disable both protocols on all interfaces where they are not required.*

6. What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?

DHCP 67

6. Which protocol automates assignment of IP addresses on a network, and which port number does it use? (Choose two.)

wireless metropolitan-area network*

60. Which type of wireless network is suitable for providing wireless access to a city or district?

WLANs

61. On a Cisco 3504 WLC Summary page ( Advanced > Summary ), which tab allows a network administrator to access and configure a WLAN for a specific security option such as WPA2?

voice VLAN*

62. What type of VLAN is designed to reserve bandwidth to ensure IP Phone quality?

Omnidirectional

62. What type of wireless antenna is best suited for providing coverage in large open spaces, such as hallways or large conference rooms?

802.11ac* 802.11ª*

63. What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)

default VLAN*

63. What type of VLAN is initially the management VLAN?

preventing rogue switches from being added to the network*

64. What security benefit is gained from enabling BPDU guard on PortFast enabled interfaces?

voice VLAN*

64. What type of VLAN is designed to have a delay of less than 150 ms across the network?

data VLAN*

65. What type of VLAN is used to separate the network into groups of users or devices?

Authentication*

65. Which access control component, implementation, or protocol logs EXEC and configuration commands configured by a user?

management VLAN*

66. What type of VLAN is configured specifically for network traffic such as SSH, Telnet, HTTPS, HHTP, and SNMP?

wireless wide-area network*

66. Which type of wireless network uses transmitters to provide coverage over an extensive geographic area?

802.1X*

67. Which access control component, implementation, or protocol controls who is permitted to access a network?

802.11ac* 802.11n

68. What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)

native VLAN*

68. What type of VLAN supports untagged traffic?

forwarding learning

7. In which two port states does a switch learn MAC addresses and process BPDUs in a PVST network? (Choose two.)

on a network where there is a lot of topology changes*

7. When would it be more beneficial to use a dynamic routing protocol instead of static routing?

Switching packets is faster with SVI.* There is no need for a connection to a router.*

73. Which two statements are correct with respect to SVI inter-VLAN routing? (Choose two.)

the VLAN assignment and membership for all switch ports*

76. A network administrator issues the show vlan brief command while troubleshooting a user support ticket. What output will be displayed?

lowest MAC address

8. If no bridge priority is configured in PVST, which criteria is considered when electing the root bridge?

BOOT environment variable*

8. What does a switch use to locate and load the IOS image?

DHCPREQUEST*

8. Which message does an IPv4 host use to reply when it receives a DHCPOFFER message from a DHCP server?

O 10.1.1.0/24 [110/65] via 192.168.200.2, 00:01:20, Serial0/1/0*

8. Which route would be used to forward a packet with a source IP address of 192.168.10.1 and a destination IP address of 10.1.1.1?

It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN.*

8. Which statement describes the behavior of a switch when the MAC address table is full?

the client that is requesting authentication*

9. What device is considered a supplicant during the 802.1X authentication process?

ip address dhcp*

9. Which command, when issued in the interface configuration mode of a router, enables the interface to acquire an IPv4 address automatically from an ISP, when that link to the ISP is enabled?

Configure SW2 EtherChannel mode to desirable.*

A network administrator is configuring an EtherChannel link between two switches, SW1 and SW2. However, the EtherChannel link fails to establish. What change in configuration would correct the problem?

The EtherChannel fails to establish.*

A network administrator is configuring an EtherChannel link between two switches, SW1 and SW2. Which statement describes the effect after the commands are issued on SW1 and SW2?

It identifies the VLAN number.*

A network administrator is configuring inter-VLAN routing on a network. For now, only one VLAN is being used, but more will be added soon. What is the missing parameter that is shown as the highlighted question mark in the graphic?

The router is configured for SLAAC operation.*

A network administrator is implementing the stateless DHCPv6 operation for the company. Clients are configuring IPv6 addresses as expected. However, the clients are not getting the DNS server address and the domain name information configured in the DHCP pool. What could be the cause of the problem?

They are configured as trunk interfaces.*

A network administrator is reviewing port and VLAN assignments on switch S2 and notices that interfaces Gi0/1 and Gi0/2 are not included in the output. Why would the interfaces be missing from the output?

The encapsulation dot1Q 5 command contains the wrong VLAN. *

A network administrator is verifying the configuration of inter-VLAN routing. Users complain that PC2 cannot communicate with PC1. Based on the output, what is the possible cause of the problem?

Gi1/1 is in the default VLAN.* Gi1/1 is configured as trunk mode.*

A network administrator is verifying the configuration of inter-VLAN routing. Users complain that PCs on different VLANs cannot communicate. Based on the output, what are two configuration errors on switch interface Gi1/1? (Choose two.)

The EtherChannel is not functional.*

A network administrator issued the show etherchannel summary command on the switch S1. What conclusion can be drawn?

4*

A network administrator needs to configure router-on-a-stick for the networks that are shown. How many subinterfaces will have to be created on the router if each VLAN that is shown is to be routed and each VLAN has its own subinterface?

A packet with the destination IP address of ServerB.* A frame with the destination MAC address of RouterA.*

HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process? (Choose two.)

The route was manually entered by an administrator.*

How was the host route 2001:DB8:CAFE:4::1/128 installed in the routing table?

Manually shut down the router interface used as a primary route.*

How would an administrator test this configuration? ip route 192.168.10.0 255.255.255.0 10.10.10.2 5

True

In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

trunk

In what switch mode should port G0/1 be assigned if Cisco best practices are being used?

SWA(config-if)# switchport port-security SWA(config-if)# switchport port-security maximum 2 SWA(config-if)# switchport port-security mac-address sticky***

Port Fa0/2 has already been configured appropriately. The IP phone and PC work properly. Which switch configuration would be most appropriate for port Fa0/2 if the network administrator has the following goals?

GigabitEthernet0/0*

Refer to the exhibit. Which interface will be the exit interface to forward a data packet that has the destination IP address 172.19.115.206? 172.19.115.0/26 is variously subnetted, 7 subnets, 3 masks O 172.19.115.0/26 [110/10] via 172.19.39.1, 00:00:24, Serial0/0/0 O 172.19.115.64/26 [110/20] via 172.19.39.6, 00:00:56, Serial 0/0/1 O 172.19.115.128/26 [110/10] via 172.19.39.1, 00:00:24, Serial 0/0/0 C 172.19.115.192/27 is directly connected, GigabitEthernet0/0 L 172.19.115.193/27 is directly connected, GigabitEthernet0/0 C 172.19.115.224/27 is directly connected, GigabitEthernet0/1 L 172.19.115.225/27 is directly connected, GigabitEthernet0/1 172.19.39.0/24 is variably subnetted, 4 subnets, 2 masks C 172.19.39.0/30 is directly connected, Serial0/0/0 L 172.19.39.2/32 is directly connected, Serial0/0/0 C 172.19.39.4/30 is directly connected, Serial0/0/1 L 172.19.39.5/32 is directly connected, Serial0/0/1 S 172.19.40.0/26 [1/0] via 172.19.39.1, 00:00:24, Serial0/0/0 R1#

Traffic cannot be sent to two different switches through the same EtherChannel link.*

The administrator tried to create an EtherChannel between S1 and the other two switches via the commands that are shown, but was unsuccessful. What is the problem?

Create a fully specified static route pointing to Fa0/0 with an AD of 95.*

This network has two connections to the ISP, one via router C and one via router B. The serial link between router A and router C supports EIGRP and is the primary link to the Internet. If the primary link fails, the administrator needs a floating static route that avoids recursive route lookups and any potential next-hop issues caused by the multiaccess nature of the Ethernet segment with router B. What should the administrator configure?

HRSP

a cisco proprietary FHRP that provides redundancy through use of an active device and standby device

DHCPDISCOVER

a client initiating a message to find a DHCP server

MSTP

a protocol that allows multiple VLANs to run in a single spanning-tree instance

type

a value for the tag protcol id x8100 = ether

user pritority

a value that supports level or service implementation

authorization

determines what resources users can access or the operations they are allowed to perfrom

route soruce

identifies how a route was learned

destination network

identifies the address of the remote network

administrative distance

identifies the trustworthiness of a route source


संबंधित स्टडी सेट्स

Graded Potentials, Action Potentials&Synapse

View Set

Chapter 24: Management of Patients With Chronic Pulmonary Disease

View Set

Rita Questions - Ch 12 Procurement Management

View Set

Fundamentals of Insurance Chapter 3

View Set

Chapter 38: Family-Centered Care of the Child During Illness and Hospitalization NCLEX

View Set

(Midterms) Chapter 5: Ethical Issues in Clinical Psychology

View Set

Chapter 6.1 and 6.2: Entrepreneurship

View Set