NET 289 Chapter 6

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A network has two distribution switches, A and B, connected via a Layer 2 trunk. Distribution A switch is the Spanning Tree Protocol root, and distribution B is the active HSRP gateway. Layer 2 links are used to connect access layer switches to both distribution switches. Which statement is true? Traffic will transit from the access switches through distribution switch A through the Layer 2 trunk to distribution switch B. A Spanning Tree Protocol loop will be created. The access switches will not be able to communicate. Loop Guard will prevent the loop from being created.

A

Which are key features of the distribution layer? (Choose two.) Aggregates access layer switches Provides a routing boundary between the access and core layers Provides connectivity to end devices Provides fast switching Provides transport to the enterprise edge Provides VPN termination

A and B

Which statement is correct regarding Local VLANs? (Select two.) It is the preferred design. Users are grouped into VLANs depending on their physical location. VLAN membership does not change if the user moves to another building within the campus. VLANs are dispersed throughout the campus.

A and B.

Which are two benefits of using a modular approach? (Choose two.) Simplifies the network design Reduces the amount of network traffic on the network Often reduces the cost and complexity of the network Simplifies the network by using full-mesh topologies

A and C.

Which of the following describe the core layer? (Choose two.) High-speed data transport Applies network policies Performs network aggregation Concentrates user access Provides PoE Avoids data manipulation

A and F. The core layer provides high-speed data transport without manipulating the data.

Which layers provide redundancy? (Choose two.) Core layer Distribution layer Access layer Data link layer

A and b

Which are best practices for the access layer? (Choose four.) Disable trunking in host ports. Limit VLANs to one closet. Use PVST+ with multilayer switches. Enable trunking on host ports. Use VLAN spanning to speed convergence of Spanning Tree Protocol. Use VTP Server mode in hierarchical networks. Use VTP Transparent mode in hierarchical networks. Use RPVST+ as the Spanning Tree Protocol with multilayer switches.

A, B, G, and H.

Which are best practices for the distribution layer? (Choose three.) Use HSRP or GLBP. Provide fast transport. Use Layer 3 routing protocols to the core. Use Layer 2 routing protocols to the core. Summarize routes to the core layer. Summarize routes to the access layer.

A, C, and E.

Which are best practices for the core layer? (Choose three.) Use routing with no Layer 2 loops. Limit VLANs to one closet. Use HSRP. Use GLBP. Use Layer 3 switches with fast forwarding. Use Layer 3 routing to the core. Use two equal-cost paths to every destination network. Use RPVST+ with multilayer switches.

A, E, and G.

What is correct regarding Spanning Tree Protocol stability mechanisms? Apply PortFast to all end-user ports. Apply RootGuard to all ports where a root is never expected. Apply RootGuard to all end-user ports. Apply PortFast to all ports where a root is never expected. Apply PortFast to all end-user ports. Apply RootGuard to all ports where a root is expected. Apply Loop Guard to all end-user ports. Apply RootGuard to all ports.

A. Apply PortFast to all end-user ports. Apply RootGuard to all ports where a root is never expected.

Which of the following is a core layer best practice? Reduce switch peering and routing. Use HSRP and summarize routes. Disable trunking and use RPVST+. Offload SSL sessions and use load balancers.

A. Best practices for the core include the use of triangle connections to reduce switch peering and using routing to prevent network loops.

What is the recommended method to connect the distribution switches to the core? Redundant triangle links Redundant cross-connect links Redundant Layer 3 squares Redundant Layer 2 links

A. The core and the distribution layers should be connected using redundant Layer 3 triangular links.

Which layer performs port security and DHCP snooping? Core layer Distribution layer Access layer Application layer

Access layer

Which layer performs rate limiting, network access control, and broadcast suppression? Core layer Distribution layer Access layer Data link layer

Access layer

Which layer handles Active Directory and messaging? Core layer Distribution layer Access layer Application layer

Application layer

Which of the following describe the distribution layer? (Choose two.) Transports data at high speed Applies network policies Performs network aggregation Concentrates user access Provides PoE Avoids data manipulation

B and C. The distribution layer concentrates the network access switches and routers and applies network policies with access lists.

Which is true in regard to using UDLD? (Choose three.) It is used instead of Loop Guard. It should be used in aggressive mode. It should be enabled in global configuration mode. It prevents blackholing and loops. It should be used only on UTP links. It cannot protect against miswiring.

B, C, and D.

Which statement regarding campus design is correct? Connect access switches directly to summarize via the uplinks. Build using triangles rather than squares. Configure a security ACL in the core. Avoid summarization at the distribution layer.

B. Build triangles.

Which topology is best used for connectivity in the building distribution layer? Full mesh Partial mesh Hub and spoke Dual ring EtherChannel

B. Partial-mesh connectivity is best suited for the distribution layer.

In the Cisco hierarchical network model, which layer is responsible for fast transport? Network layer Core layer Distribution layer Access layer

B. The core layer is responsible for fast transport.

Which layer provides routing between VLANs and security filtering? Access layer Distribution layer Enterprise edge WAN module

B. The distribution layer provides routing between VLANs and security filtering.

Which of the following is a distribution layer best practice? Reduce switch peering and routing. Use HSRP and summarize routes. Disable trunking and use RPVST+. Offload SSL sessions and use load balancers.

B. The use of HSRP and summarization of routes are best practices in the distribution layer.

Which Cisco solution allows a pair of switches to act as a single logical switch? HSRP VSS Spanning Tree Protocol GLB

B. VSS allows a Catalyst switch pair to act as a single logical switch.

Which solution remotely powers up a machine? PoE WoL OOB switch ON switch

B. Wake on LAN (WoL) is a combination of hardware and software technologies to wake up sleeping systems. The WoL feature allows an administrator to remotely power up all sleeping machines so that they can receive updates.

Which statement is correct regarding end-to-end VLAN design? It is the preferred design. Users are grouped into VLANs based on their physical location. VLAN membership does not change if the user moves to another building within the campus. VLANs are dispersed throughout the campus.

C and D.

What are the three layers of the hierarchical model? (Choose three.) WAN layer LAN layer Core layer Aggregation layer Access layer Distribution layer Edge layer

C, E, and F. Core, distribution, and access layers.

Which is the recommended design geometry for routed networks? Linear point-to-point networks Rectangular networks Triangular networks Circular networks

C. Build in triangles.

What is the minimum cable requirement for Cisco UPOE+? CAT 5 CAT 5e CAT 6a CAT 7

C. Category 6a.

Which of the following is an access layer best practice? Reduce switch peering and routing. Use HSRP and summarize routes. Disable trunking and use RPVST+. Offload SSL sessions and use load balancers.

C. Disabling trunking on host ports and using RPVST+ are best practices at the access layer.

Which type of cable is the best solution in terms of cost for connecting an access switch to the distribution layer requiring 140 meters? UTP Copper Multimode fiber Single-mode fiber

C. Multimode fiber provide a cost-effective solution for that distance. Single-mode fiber is more expensive. UTP's maximum distance is 100 meters.

You need to connect a building access switch to the distribution switch. The cable distance is 135 meters. What type of cable do you recommend? UTP Coaxial cable Multimode fiber Single-mode fiber

C. Multimode fiber provides the necessary connectivity at the required distance. UTP can reach only 100 meters. Single-mode fiber is more expensive.

Which mechanism transitions an access port directly to the forwarding state? UplinkFast Root Guard PortFast AccessPortFast

C. PortFast bypasses the listening/learning phase for access ports and goes directly to the port-forwarding state.

What is true regarding Spanning Tree Protocol design? Best practice is for the network to determine the root bridge. All ports should be configured with PortFast to enable root bridge selection. The root bridge and HSRP primary router should be on the same distribution switch. It is best practice to disable the toolkit when setting the root bridge.

C. The Spanning Tree Protocol root bridge and HSRP active router should match.

In the hierarchical network model, at which layer do security filtering, address aggregation, and media translation occur? Network layer Core layer Distribution layer Access layer

C. The distribution layer is responsible for security filtering, address and area aggregation, and media translation.

What is the maximum segment distance for Fast Ethernet over UTP? 100 feet 500 feet 100 meters 285 feet

C. The maximum distance for 100BASE-T is 100 meters.

You have powered devices that require a maximum power of 60 watts per PSE port. Which PoE solution do you recommend? PoE PoE+ Cisco UPOE Cisco UPOE+

C. The maximum power per PSE port for Cisco UPOE is 60W. for PoE it is 15.4W, for PoE+ it is 30W, and for Cisco UPOE+ it is 90W.

You need to power a PD that requires 50 watts. Which solution is preferred? PoE PoE+ UPOE UPOE+

C. UPOE provides up to 51W to a powered device.

An administrator requests a way to do remote maintenance on desktops. What solution would allow the administrator to power up end devices to do maintenance? PoE ON switch WoL Cisco UPOE

C. Wake on LAN.

Which topology allows for maximum growth? Triangles Collapsed core-distribution Full mesh Core-distribution-access

Core-distribution-access

What are four benefits of hierarchical network design?

Cost savings, ease of understanding, easy network growth (scalability), and improved fault isolation.

Which of the following describe the access layer? (Choose two.) Transports data at high speed Applies network policies Performs network aggregation Concentrates user access Provides PoE Avoids data manipulation

D and E. The access layer concentrates user access and provides PoE to IP phones.

High availability, port security, and rate limiting are functions of which hierarchical layer? Network layer Core layer Distribution layer Access layer

D. The access layer functions are high availability, port security, rate limiting, ARP inspection, and trust classification.

Which layer performs routing between VLANs, filtering, and load balancing? Core layer Distribution layer Access layer Application layer

Distribution layer

True or false: The core layer of the hierarchical model does security filtering and media translation.

False

True or false: You can implement a full-mesh network to increase redundancy and reduce a WAN's costs.

False. A full-mesh network increases costs.

True or false: Small to medium campus networks must always implement three layers of hierarchical design.

False. Small campus networks can have collapsed core and distribution layers and implement a two-layer design. Medium campus networks can have two-tier or three-tier designs.

Which statement is true regarding hierarchical network design? It makes the network harder since there are many submodules to use. It provides better performance and network scalability. It prepares the network for migration from IPv4 to IPv6. It secures the network with access filters in all layers.

It provides better performance and network scalability.

Which Cisco STP Toolkit mechanisms are recommended on user access ports? (Select two.) PortFast RootGuard UplinkFast Loop Guard BPDU Guard

PortFast BPDU Guard

A network has two distribution switches, A and B, connected via a Layer 2 trunk. Distribution A switch is the HSRP active gateway and Spanning Tree Protocol root. Layer 2 links are used to connect access layer switches to both distribution switches. Which version of spanning tree is recommended? PVST+ Rapid PVST+ MST VSS

Rapid PVST+

What is a major requirement if you use a Layer 3 access layer design? The distribution switches are configured as a VSS pair. The core switches need to support EIGRP. The access layer switch needs to be able to route. HSRP is configured on the distribution switches.

The access layer switch needs to be able to route.

What is an advantage of using the updated Layer 2 access layer design over the traditional model? There is an increase in uplink bandwidth. The updated model adds routing between the distribution and access layers. The access layer switch needs to be able to route. Layer 3 load balancing is enabled.

There is an increase in uplink bandwidth.

True or false: The access layer provides high availability and port security.

True

How many links are required for a full mesh of six sites?

Use n(n − 1)/2, where n = 6. 6(6 − 1)/2 = (6 × 5)/2 = 30/2 = 15.

How many full-mesh links do you need for a network with 10 routers?

Use the formula n(n − 1)/2, where n = 10. 10(10 − 1)/2 = 90/2 = 45 links.

You want to enable physical device virtualization. Which feature provides that? VLAN VFR VSS VPN

VSS


संबंधित स्टडी सेट्स

Cognitive Psychology Chapter 9: Language

View Set

Chapter 11: Requirements for a Contract

View Set

IIBA-ECBA Study Guide "Understands" - Chapter 4,5,7

View Set

Money and Banking: book questions and quizzes: FINAL EXAM

View Set

Math: Multi-Digit Multiplication and Division (Module 3)

View Set