Network+ Domain 2: Network Operations

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

You have two switches connected together as shown in the following diagram. How many broadcast domains are there in the network shown?

2 There are two broadcast domains. Each VLAN is in its own broadcast domain. When connecting devices to a switch, each switch port connection is in its own collision domain. In this graphic, there are five collision domains.

You are configuring PuTTY to be used to access the CLI of a Cisco switch. Which of the following configuration values would prevent PuTTY from connecting? (Select two.)

4600 baud Flow control = RTS/CTS In the terminal emulation program, use the following settings: • 9600 baud • Data bits = 8 (default) • Parity = None (default) • Stop bits = 1 (default) • Flow control = None

A router is configured with the login, no password condition for console access. Which of the following statements is true about access via a Telnet or SSH session?

Access is denied. Access to the console through a Telnet or SSH session is controlled by the login and password entries. To prevent VTY access, there must be a login entry without a password set. Access is allowed based on the following conditions: • no login, no password = access is allowed without a password • login, no password = access is denied (the error message indicates that a password is required but not set) • no login, password = access is allowed without a password • login, password = access is allowed only with a password

You have installed a new application on a network device. During testing, it appears as if the software is causing other services running on the device to stop responding. Which tool should you consult to identify the problem?

Application log Logs contain a record of events that have happened on a system. Logging capabilities are built into operating systems, services, and applications. Log entries are generated in response to configuration changes, changes in system state, or in response to network conditions.

Which of the following are improvements to SNMP that are included within SNMP version 3? (Select two.)

Authentication for agents and managers Encryption of SNMP messages SNMP v3 adds the following improvements for security: • Authentication for agents and managers • Encryption of SNMP information • Message integrity to ensure that data is not altered in transit

You have just connected four switches as shown in the Exhibit. Assuming the default switch configuration, which switch will become the root bridge?

B The switch with the lowest bridge ID becomes the root bridge. The bridge ID is composed of two parts: a bridge priority number and the MAC address assigned to the switch. The default priority number for all switches is 32,768.

You are in the habit of regularly monitoring performance statistics for your devices. You find that this month a specific server has averaged a higher number of active connections than last month. Which type of document should you update to reflect the change?

Baseline A baseline is a snapshot of the performance statistics of the network or devices. The baseline is used as a logical basis for future comparison. Baselines enable you to effectively monitor the performance of your system to determine when changes negatively impact performance or when systems need upgrading or replacing. It is important to measure network performance at subsequent intervals to see how your server is performing compared to the baseline.

A switch running STP is classified as a backup bridge. What state is it in?

Blocking A backup bridge is in the blocking state. It receives packets addressed specifically to it and packets addressed to all bridges. It does not forward packets or build its database.

To optimize your network, you want to configure your wireless AP to use a channel that meets the following criteria: • Non-overlapping • Low utilization • Low interference You performed a spectrum analysis to identify 2.4 GHz wireless channel utilization, as show in the exhibit. Based on the results, which channel should you configure your wireless AP to use?

Channel 1

Match each type of switch on the left with its corresponding characteristics on the right. Each switch type may be used once, more than once, or not at all.

Commonly sold at retail stores. ==> Unmanaged switch Provide very few configuration options. ==> Unmanaged switch Provide port security features. ==> Managed switch Support VLANs. ==> Managed switch Can be configured over a network connection. ==> Managed switch Can be confgured over a dedicated communication channel. ==> Managed switch

Match each switch management method on left with its corresponding characteristics on the right. Each method may be used once, more than once, or not at all.

Competes with normal network traffic for bandwidth. ==> In-band management Affected by network outages. ==> In-band management Must be encrypted to protect communications from sniffing. ==> In-band management Does not compete with normal network traffic for bandwidth. ==> Out-of-band management Uses a dedicated communication channel. ==> Out-of-band management

Computers A and B are on the same VLAN and are separated by two switches, as shown in the exhibit. Computer A sends a frame to Computer B. Which of the following best describes the composition of the frame as it travels from A to B?

Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B.

You want to make sure that the correct ports on a firewall have been opened or closed. Which document should you check?

Configuration documentation

You have just connected four switches as shown in the exhibit. Assuming the default switch configuration, how can you force switch C to become the root bridge?

Configure a priority number of 4096 for switch C. To force a specific switch to become the root bridge, configure a priority number lower than the default (32768). The switch with the lowest bridge ID becomes the root bridge. The bridge ID is composed of two parts: a bridge priority number and the MAC address assigned to the switch.

Your organization recently purchased 30 tablet devices for your traveling sales force. These devices have Windows RT preinstalled on them. To increase the security of these devices, you want to apply a default set of security-related configuration settings. What is the best approach to take to accomplish this? (Select two. Each option is part of a complete solution.)

Configure and apply security policy settings in a mobile device management system. Enroll the devices in a mobile device management system.

You have three switches configured as shown in the Exhibit. How can you guarantee that switch C becomes the root bridge?

Configure switch C with a lower priority value. To force a specific switch to become the root bridge, configure a priority number lower than the default (32768). The switch with the lowest bridge ID becomes the root bridge. The bridge ID is composed of two parts: a bridge priority number and the MAC address assigned to the switch.

What does the ip address dhcp command allow you to do?

Configures the switch to obtain an IP address from a DHCP server. You can use the ip address dhcp command to configure a switch (or a router) to get its IP address from a DHCP server. The DHCP server can be configured to deliver the default gateway and DNS server addresses to the Cisco device as well. A manually configured default gateway address overrides any address received from the DHCP server.

Which of the following statements describe how VLANs affect broadcast traffic within an internetwork? (Select two.)

Devices on the same VLAN have the same subnet address. Broadcast traffic is transmitted only within a VLAN.

Which of the following best describes the concept of a VLAN?

Devices on the same network logically grouped as if they were on separate networks A VLAN is created by identifying a subset of devices on the same network, and logically identifying them as if they were on separate networks. Think of VLANs as a subdivision of a LAN.

Which of the following best describes the concept of a virtual LAN?

Devices on the same network logically grouped as if they were on separate networks A virtual LAN is created by identifying a subset of devices on the same network, and logically identifying them as if they were on separate networks. Think of VLANs as a subdivision of a LAN.

Which of the following functions can a port scanner provide? (Select two.)

Discovering unadvertised servers. Determining which ports are open on a firewall.

Your organization recently purchased 18 iPad tablets for use by the organization's management team. These devices have iOS pre-installed on them. To increase the security of these devices, you want to apply a default set of security-related configuration settings. What is the best approach to take to accomplish this? (Select two. Each option is a part of a complete solution.)

Enroll the devices in a mobile device management system. Configure and apply security policy settings in a mobile device management system.

You need to disable the FastEthernet 0/0 interface on a switch. Drag the command on the left to the appropriate configuration step on the right to accomplish this. Not all of the commands may be required.

Enter global configuration mode. => conf t Enter interface configuration mode. => int fa0/0 Disable the interface. => shutdown Verify the interface is disabled. => show ip interface brief

You have a network server with two network interface cards. You want both network adapters to be used at the same time to connect to the same network to double the amount of data the server can send. Which feature would you use?

Ethernet bonding With Ethernet bonding (also called NIC teaming), two or more physical connections to the same network are logically grouped (or bonded). Data is divided and sent on multiple interfaces, effectively increasing the speed at which the device can send and receive on the network. • A device must have multiple network interface cards connected to different switch ports. • The host operating system must be configured to bond the network adapters into a single entity. • The switch ports must be bonded together to recognize both ports as a valid destination for the same device.

You have a web server on your network that hosts the public website for your company. You want to make sure that a failure of the NIC in the server does not prevent the website from being accessible on the Internet. Which solution should you implement?

Ethernet bonding With Ethernet bonding (also called NIC teaming), two or more physical connections to the same network are logically grouped (or bonded). If one NIC fails, the second NIC with a connection to the same network can still be used.

You have heard about a Trojan horse program where the compromised system sends personal information to a remote attacker on a specific TCP port. You want to be able to easily tell whether any of your systems are sending data to the attacker. Which log would you monitor?

Firewall A firewall log identifies traffic that has been allowed or denied through a firewall. You can identify traffic types used by computers on your network by looking at the outgoing ports. For example, you can identify servers that are running a specific service, or you can see computers that are communicating using ports that might indicate malicious software.

You suspect that some of your computers have been hijacked and are being used to perform denial of service attacks directed against other computers on the Internet. Which log would you check to see if this is happening?

Firewall A firewall log identifies traffic that has been allowed or denied through a firewall. You can identify traffic types used by computers on your network by looking at the outgoing ports. For example, you can identify servers that are running a specific service, or you can see computers that are communicating using ports that might indicate malicious software.

What is the purpose of using Ethernet bonding? (Select two.)

Increases network performance Provides a failover solution for network adapters Ethernet bonding (also called adapter teaming) is a fault tolerant strategy that uses multiple network adapters configured in a failover solution. In the event of a NIC failure, other adapters will automatically provide link redundancy. Multiple adapters can also increase performance by distributing the network load between adapters.

A switch running STP is in the learning state. A message destined for a different network segment arrives at the switch. Which of the following best describes what the switch will do?

It uses the source MAC address and network segment information to build its bridge database, but does not forward the message. A switch in the learning state will build its database through the information it receives from incoming messages but does not forward messages. Remember, devices forward messages only if they are in the forwarding state.

Switches running STP are in the process of exchanging BPDUs and redefining their roles. In what port state are the switches?

Listening Switches that are exchanging STP configuration information to define their roles are in the listening state. After listening, designated bridges progress to learning and then forwarding. Backup bridges return to blocking.

You have a website that customers use to view product information and place orders. You would like to identify the maximum number of simultaneous sessions that this server can maintain before performance is negatively impacted. Which tool should you use?

Load tester A load tester simulates a load on a server or service. For example, the load tester might simulate a large number of client connections to a website, test file downloads for an FTP site, or simulate large volumes of email. Use a load tester to make sure that a system has sufficient capacity for expected loads, and even to estimate a failure point where the load is more than the system can handle.

You connect a packet sniffer to a switch to monitor frames on your local area network. However, the packet sniffer is only able to see broadcast frames and frames addressed specifically to the host device. Which feature should you enable on the switch so you can see frames from all devices connected to the switch?

Mirroring When using a switch, the switch will only forward packets to the switch port that holds a destination device. This means that when your packet sniffer is connected to a switch port, it will not see traffic sent to other switch ports. To configure the switch to send all frames to the packet sniffing device, configure port mirroring on the switch.

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device which is connected to a hub with three other computers. The hub is connected to the same switch that is connected to the router. When you run the software, you only see frames addressed to the four workstations but not to the router. Which feature should you configure?

Mirroring When using a switch, the switch will only forward packets to the switch port that holds a destination device. This means that when your packet sniffer is connected to a switch port, it will not see traffic sent to other switch ports. To configure the switch to send all frames to the packet sniffing device, configure port mirroring on the switch.

Most mobile device management (MDM) systems can be configured to track the physical location of enrolled mobile devices. Arrange the location technology on the left in order of accuracy on the right, from most accurate to least accurate.

Most accurate ==> GPS More accurate ==> Wi-Fi triangulation Less accurate ==> Cell phone tower triangulation Least accurate ==> IP address resolution

Match the Network Access Protection (NAP) component on the left with its description on the right.

NAP Client ==> Generates a Statement of Health (SoH) that reports the client configuration for health requirements. NAP Server ==> Runs the System Health Validator (SHV) Enforcement Server (ES) ==> Is the connection point for clients to the network. Remediation Server ==> Contain resources accessible to non-compliant computers on the limited-access network.

Which media types can backup files be saved to? (Select two.)

Network Attached Storage (NAS) External hard drives Backups can be saved to: • Secondary internal hard drives • External hard drives • Optical drives • USB flash drives • Network shares • .vhd files • Network Attached Storage (NAS) or Storage Area Network (SAN). Backup files cannot be saved to: • The same disk being backed up • A system disk • A Bitlocker-enabled volume • A tape drive

In troubleshooting a router, you want to identify which other devices are connected to the router, as well as the subnet addresses of each connected subnet. Which type of document would most likely have this information?

Network diagram

You are configuring a switch so that you can manage it via PuTTY from the same network segment as the switch. On the switch, you enter the following commands: switch#config terminal switch(config)#interface vlan 1 switch(config-if)#ip address 192.168.1.10 255.255.255.0 Will this configuration work?

No, the no shutdown command needs to be entered By default, the Vlan1 interface is set to administratively down, preventing remote access. Use the following commands to configure the switch IP address and allow management: switch#config terminal switch(config)#interface vlan 1 switch(config-if)#ip address 192.168.1.10 255.255.255.0 switch(config-if)#no shutdown Because the witch is being accessed from the same network segment, the ip default-gateway command doesn't need to be used. The ip address dhcp command merely allows the switch to obtain an IP address via DHCP.

You are concerned about attacks directed against the firewall on your network. You would like to examine the content of individual frames sent to the firewall. Which tool should you use?

Packet sniffer A packet sniffer is special software that captures (records) frames that are transmitted on the network. Use a packet sniffer to: • View packet contents. • Identify the types of traffic on a network. • View the exchange of packets between communicating devices. For example, you can capture frames related to DNS and view the exact exchange of packets for a specific name resolution request. • Analyze packets sent to and from a specific device.

You suspect that your web server has been the target of a denial-of-service attack. You would like to view information about the number of connections to the server over the past three days. Which log would you most likely examine?

Performance A performance log records information about the use of system resources. For example, the performance log records processor, memory, disk, and network utilization. In addition, the performance log can record information related to the performance of a specific service, such as the number of connections to a web server. You might also find this information in an application log for the service.

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device which is connected to the same hub that is connected to the router. When you run the software, you only see frames addressed to the workstation and not other devices. Which feature should you configure?

Promiscuous mode By default, a NIC will only accept frames addressed to that NIC. To enable the packet sniffer to capture frames sent to other devices, configure the NIC in promiscuous mode (sometimes called p-mode). In p-mode, the NIC will process every frame it sees.

You want to be able to identify traffic that is being generated and sent through the network by a specific application running on a device. Which tool should you use?

Protocol analyzer Use a protocol analyzer (also called a packet sniffer) to examine network traffic. You can capture or filter packets from a specific device or that use a specific protocol.

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the same switch which is in VLAN 2. What should you configure so that the two devices can communicate?

Routing In a typical configuration with multiple VLANs and a single or multiple switches, workstations in one VLAN will not be able to communicate with workstations in other VLANs. To enable inter-VLAN communication, you will need to use a router (or a Layer 3 switch).

You have a small network of devices connected together using a switch. You want to capture the traffic that is sent from Host A to Host B. On Host C, you install a packet sniffer that captures network traffic. After running the packet sniffer, you cannot find any captured packets between Host A and Host B. What should you do?

Run the packet sniffer application on Host B. You need to run the packet sniffing software on either Host A or Host B. When using a switch, network traffic is sent through the switch to only the destination device. In this scenario, Host C will only receive broadcast traffic and traffic addressed to its own MAC address.

Consider the following output generated by the show interface fa0/0 command generated on a router: FastEthernet0/0 is up, line protocol is up [...] Auto-duplex, 100Mb/s, 100BaseTX/FX [...] Input queue: 0/75/1771/0 (size/max/drops/flushes); Total output drops: 0 [...] 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 15387 packets input, 1736263 bytes, 0 no buffer Received 15241 broadcasts, 0 runts, 0 giants 0 input errors, 1 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 watchdog, 0 multicast 0 input packets with dribble condition detected 607 packets output, 6141 bytes, 0 underruns 4 output errors, 10 collisions, 3 interface resets, 0 restarts 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier 0 output buffer failures, 0 output buffers swapped out Which of the following statements are true about the fa0/0 interface? (Select three.)

Several collisions have occurred. The interface has been dropping incoming packets. One cyclic redundancy check error has occurred. Based on the output, the following information can be identified: • 1771 packets have been dropped. • Auto-duplex mode is selected. • 1 CRC error has occurred. • 3 interface resets have occurred. • 0 input errors have occurred, but there have been 4 output errors. • 10 collisions have occurred.

Your organization's security policy specifies that any mobile device (regardless of ownership) that connects to your internal network must have remote wipe enabled. If the device is lost or stolen, then it must be wiped to remove any sensitive data from it. Your organization recently purchased several Windows RT tablets. Which should you do?

Sign up for a Microsoft Intune account to manage the tablets. You can use Microsoft Intune to remotely wipe a Windows RT device if it is reported lost or stolen. You can selectively wipe data or wipe the entire device.

You are considering using WiFi triangulation to track the location of wireless devices within your organization. However, you have read on the Internet that this type of tracking can produce inaccurate results. What is the most important consideration for getting reliable results when implementing this type of system?

Signal strength

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature prevents switching loops and ensures there is only a single active path between any two switches?

Spanning tree Spanning tree is a protocol on a switch that allows the switch to maintain multiple paths between switches within a subnet. The spanning tree protocol runs on each switch and is used to select a single path between any two switches. • Without the spanning tree protocol, switches that are connected together with multiple links would form a switching loop, where frames are passed back and forth continuously. • Spanning tree provides only a single active path between switches. Switch ports that are part of that path are placed in a forwarding state. • Switch ports that are part of redundant but unused paths are placed in a blocking (non-forwarding) state. • When an active path goes down, the spanning tree protocol automatically recovers and activates the backup ports necessary to provide continued connection between devices.

A virtual LAN can be created using which of the following?

Switch Use a switch to create virtual LANs (VLANs). The various ports on a switch can be assigned to a specific VLAN to create logically distinct networks on the same physical network topology.

When configuring VLANs on a switch, what is used to identify VLAN membership of a device?

Switch port VLAN membership is configured by assigning a switch port to a VLAN. A switch can have multiple VLANs configured on it, but each switch port can only be a member of a single VLAN. All devices connected to a switch port are members of the same VLAN.

Which of the following statements accurately describes a VLAN ID?

Switches append a VLAN ID to the header of each frame to identify the virtual network to which it belongs. A VLAN ID is a unique identifier attached to each frame. Switches in the network understand the ID as they forward the frame. When the frame reaches its destination, the last switch removes the VLAN ID, because no other device understands it. VLAN IDs work at the Data Link layer.

What problem does the Spanning Tree Protocol prevent?

Switching loops from developing when redundant paths are implemented between switches.

Which of the following is a standard for sending log messages to a central logging server?

Syslog Syslog is a protocol that defines how log messages are sent from one device to a logging server on an IP network. The sending device sends a small text message to the syslog receiver (the logging server).

Over the past few days, a server has gone offline and rebooted automatically several times. You would like to see a record of when each of these restarts has occurred. Which log type should you check?

System A system log records operating system, system, and hardware events. The system log will contain entries for when the system was shut down or started, when new hardware is added, and when new services are started.

When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch?

Trunk ports A trunk port is a member of all VLANs defined on a switch, and carries traffic between the switches. When trunking is used, frames that are sent over a trunk port are tagged by the first switch with the VLAN ID so that the receiving switch knows to which VLAN the frame belongs. Typically, uplink ports (that are faster than the other switch ports) are used for trunk ports, although any port can be designated as a trunking port.

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch also in VLAN 1. What should you configure to allow communication between these two devices through the switches?

Trunking

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature allows the switches to pass VLAN traffic between the switches?

Trunking A trunk port is used to connect two switches together. A trunk port is a member of all VLANs, and carries traffic between the switches. When trunking is used, frames that are sent over a trunk port are tagged by the first switch with the VLAN ID so that the receiving switch knows to which VLAN the frame belongs.

You are the network administrator for a growing business. When you were initially hired, the organization was small and only a single switch and router were required to support your users. During this time, you monitored log messages from your router and switch directly from each device's console. However, the organization has grown considerably in recent months. You now must manage 8 individual switches and three routers. It's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner. What should you do?

Use syslog to implement centralized logging. By default, routers and switches send all log messages for all severity levels directly to the console. If a network contains a small number of devices, this default configuration is usually manageable. However, on a growing network, it quickly becomes impractical to visit each device to view log messages. Instead, you can configure your network devices to redirect logging to a syslog server somewhere in the network. By doing this, all log messages from all devices can be consolidated and viewed from a single location.

Match each bring your own device (BYOD) security concern on the right with a possible remedy on the left. Each remedy may be used once, more than once, or not at all.

Users take pictures of proprietary processes and procedures. ==> Specify where and when mobile devices can be possessed in your acceptable use policy. Devices with a data plan can e-mail stolen data. ==> Specify where and when mobile devices can be possessed in your acceptable use policy. Devices have no PIN or password configured. ==> Enroll devices in a mobile device management system. Anti-malware software is not installed. ==> Implement a network access control (NAC) solution. A device containing sensitive data may be lost. ==> Enroll devices in a mobile device management system.

You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation?

VLAN Define virtual LANs (VLANs) on the switch. With a VLAN, a port on the switch is associated with a VLAN. Only devices connected to ports that are members of the same VLAN can communicate with each other. Routers are used to allow communication between VLANs if necessary.

Your company is a small start-up company that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides Internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented?

VLAN Define virtual LANs (VLANs) on the switch. With a VLAN, a port on the switch is associated with a VLAN. Only devices connected to ports that are members of the same VLAN can communicate with each other. Routers are used to allow communication between VLANs if necessary.

You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ-45 ports connected to the switch. You want to allow visitors to plug into these ports to gain Internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and Internet access. Which feature should you implement?

VLANs Use VLANs to segregate hosts based on switch ports. You could define two VLANs: one for employees connected throughout the building, and another for the ports in the lobby. The ports in the lobby would have only Internet access, while devices connected to ports in the rest of the building could communicate with other devices within the same VLAN.

You are troubleshooting the connection of a computer in an office to the punchdown block in the distribution closet. Which document would you consult to identify the termination of the cable on the punchdown block based on the wall jack location in the office?

Wiring schematic A wiring schematic is a type of network diagram that focuses on the physical connections between devices. The wiring diagram typically shows: • The location of drop cables and ports within offices or cubicles. • The path that wires take between wiring closets and offices. • A labeling scheme that matches endpoints in offices and cubicles with specific switch ports or punchdown block locations.

Which of the following features dynamically places switch ports in blocking or forwarding states?

Spanning tree

Which of the following solutions would you implement to eliminate switching loops?

Spanning tree Run the spanning tree protocol to prevent switching loops. A switching loop occurs when there are multiple active paths between switches. The spanning tree protocol runs on each switch and is used to select a single path between any two switches

You manage a network that uses multiple switches. You want to provide multiple paths between switches so that if one link goes down, an alternate path is available. Which feature should your switch support?

Spanning tree Spanning tree is a protocol on a switch that allows the switch to maintain multiple paths between switches within a subnet. The spanning tree protocol runs on each switch and is used to select a single path between any two switches. • Without the spanning tree protocol, switches that are connected together with multiple links would form a switching loop, where frames are passed back and forth continuously. • Spanning tree provides only a single active path between switches. Switch ports that are part of that path are placed in a forwarding state. • Switch ports that are part of redundant but unused paths are placed in a blocking (non-forwarding) state. • When an active path goes down, the spanning tree protocol automatically recovers and activates the backup ports necessary to provide continued connection between devices.

Select the statement that best describes a broadcast storm.

A broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth.

Consider the following log message, generated on a router: *Aug 8 11:18:12.081: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down What facility generated this message?

%LINEPROTO The default log message format is as follows: *Aug 8 11:18:12.081: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down Timestamp => the message was generated: *Aug 8 11:18:12.081: Facility => the facility that created the message: %LINEPROTO Severity level => the severity level of the message: -5- Mnemonic => Provides a mnemonic to help the administrator quickly identify the nature of the message: UPDOWN: Message text => Provides a description of the event: Line protocol on Interface FastEthernet0/0, changed state to down

Which of the following information are you likely to find in a policy document?

A requirement for using encrypted communications for web transactions.

You are concerned about the amount of traffic that passed through a router on your network. You want to see how the amount of traffic has changed over time. Which document would help in identifying past average network traffic?

Baseline A baseline is a snapshot of the performance statistics of the network or devices. The baseline is used as a logical basis for future comparison. Baselines enable you to effectively monitor the performance of your system to determine when changes negatively impact performance or when systems need upgrading or replacing. It is important to measure network performance at subsequent intervals to see how your server is performing compared to the baseline.

Match the Etherchannel protocol on the left with its characteristics on the right. Each protocol may be used once, more than once, or not at all.

Desirable mode places the port in a negotiating state. ==> Port Aggregation Protocol (PAgP) Auto mode places the port into a passive negotiating state. ==> Port Aggregation Protocol (PAgP) Based on the 802.3ad standard. ==> Link Aggregation Control Protocol (LACP) Passive mode places the port into a passive negotiating state. ==> Link Aggregation Control Protocol (LACP) Active mode places the port in a negotiating state. ==> Link Aggregation Control Protocol (LACP)

Which of the following information are you likely to find in a procedure document?

Details on how to test and deploy patches.

Your organization has recently purchased 20 tablet devices for the Human Resource department to use for training sessions. You are concerned that these devices could represent a security risk to your network and want to strengthen their security profile as much as possible. Which actions should you take? (Select two. Each response is a separate solution.)

Enable device encryption. Implement storage segmentation.

The FastEthernet 0/0 interface on a switch is currently disabled. You need to enable it so a workstation can be connected to it. Drag the command on the left to the appropriate configuration step on the right to accomplish this. Not all of the commands may be required.

Enter global configuration mode. => conf t Enter interface configuration mode. => int fa0/0 Enable the interface. => no shut Verify the interface is disabled. => show interface status

You need to configure the FastEthernet 0/1 interface on a switch to automatically detect the appropriate link speed and duplex setting by negotiating with the device connected to the other end of the link. Drag the command on the left to the appropriate configuration step on the right to accomplish this. Not all of the commands may be required.

Enter global configuration mode. => conf t Enter interface configuration mode. => int fa0/1 Set the speed of the interface. => speed auto Set the duplex setting for the interface. => duplex auto

You manage a firewall that connects your private network to the Internet. You would like to see a record of every packet that has been rejected by the firewall in the past month. Which tool should you use?

Event log

You have two switches connected as shown in the exhibit. You would like to configure rapid spanning tree on switch A. On which ports would you use the portfast command?

Fa0/1 and Fa0/2 The PortFast feature allows the port to transition immediately to a forwarding state. Enable PortFast only on ports that have a single device attached. Configuring PortFast on interfaces connected to hubs, concentrators, switches, and bridges can cause temporary bridging loops.

You are interested in identifying the source of potential attacks that have recently been directed against your network but which have been successfully blocked. Which log would you check?

Firewall A firewall log identifies traffic that has been allowed or denied through a firewall. You can detect attempted attacks by examining firewall logs and looking for traffic allowed or blocked by the firewall.

A switch running STP is in the listening state. A message destined for a different network segment arrives at the switch. Which of the following best describes what the switch will do?

It does not record address or segment information. It does not forward the message.

You have been using SNMP on your network for monitoring and management. You are concerned about the security of this configuration. What should you do?

Implement version 3 of SNMP. Simple Network Management Protocol (SNMP) is a protocol designed for managing complex networks. SNMP lets network hosts exchange configuration and status information. The original version of SNMP has several vulnerabilities. For added security, implement version 3 of SNMP.

Which of the following are reasons to configure VLANs on a switch as opposed to using switches without VLANs? (Select two.)

Increased number of broadcast domains Increased security

Which of the following is true for a system image backup?

Is saved as a .vhd file. A system image backup consists of an entire volume backed up to a .vhd file. It contains everything on the system, including the operating system, installed programs, drivers, and user data files.

Which of the following are advantages of using the Spanning Tree Protocol (STP) in network segmented bridges? (Select three.)

Lets you provide redundancy by using more than one connection between devices, making your network more reliable. Prevents switching loops from forming. Identifies the optimal path between network devices.

You want to know what protocols are being used on your network. You'd like to monitor network traffic and sort traffic based on protocol. Which tool should you use?

Packet sniffer A packet sniffer is special software that captures (records) frames that are transmitted on the network. Use a packet sniffer to: • Identify the types of traffic on a network. • View the exchange of packets between communicating devices. For example, you can capture frames related to DNS and view the exact exchange of packets for a specific name resolution request. • Analyze packets sent to and from a specific device. • View packet contents.

A new law was recently passed that states that all businesses must keep a history of all e-mails sent between members of the board of directors. You need to ensure that your organization complies with this law. Which document type would you update first in response to this new law?

Policy

Which statements accurately describe the port states of both bridges and switches? (Select two.)

Ports in a blocked state still receive BPDUs. In the learning state, the MAC address table can be populated, but frames are not forwarded.

You need to configure spanning tree on a Cisco switch. You'd like to use a protocol that conforms to the 802.1w standards. Which protocol should you use?

Rapid PVST+ Rapid PVST+ is the IEEE 802.1w standard. RSTP improves convergence by actively confirming that a switch is ready to transition to a forwarding state, eliminating the listening and learning stages. RSTP defines several new types of links and uses fewer spanning tree states.

You need to find out what kind of laws might apply to the design and operation of your network. Which type of document would you consult?

Regulation

Which of the following mobile device security consideration will disable the ability to use the device after a short period of inactivity?

Screen lock

One of the components of Simple Network Management Protocol (SNMP) is an alert. Which of the following best describes an SNMP alert?

Sends a message via email or SMS when an event occurs.

Which of the following connectivity hardware is used to create a VLAN?

Switch

You want to reduce collisions by creating separate collision domains and virtual LANs. Which of the following devices should you choose?

Switch Use a switch to create additional collision domains on a LAN. A switch filters an entire network and creates virtual LANs inside it, rather than dividing it into separate internetworks as a router does.

Which of the following are true regarding using multiple VLANs on a single switch? (Select two.)

The number of broadcast domains increases. The number of collision domains remains the same.

Match the Cisco device password type on the left with its function on the right.

VTY => Controls the ability to log on through a LAN or WAN interface configured on the device EXEC => Controls the ability to switch configuration modes Console => Controls the ability to connect to the device using a direct connection

Which of the following are not reasons to remote wipe a mobile device?

When the device is inactive for a period of time.

Which of the following documents would likely identify that drop cables on your network use the T568A standard?

Wiring schematic

Which type of documentation would you consult to find the location of RJ-45 wall jacks and their endpoints in the intermediate distribution closet?

Wiring schematic

Which of the following benefits apply only to creating VLANs with switches and not to segmenting the network with regular switches?

You can create multiple broadcast domains.

Which command would you use on a switch to enable management from a remote network?

ip default-gateway 192.168.10.185 To enable management from a remote network, configure the default gateway. Use the following command in global configuration mode: switch(config)#ip default-gateway IP_address

Each of the following are tools used to check the health of a network. Which of these is typically used for managing and sending messages from one computer system to another?

syslog


संबंधित स्टडी सेट्स

Chapter 5 - Commercial Bank Management

View Set

4.5-4.7: Feedback/Cell Cycle Regulation

View Set

Unidad 2: Preparando el viaje, preguntas para usar el vocabulario

View Set

Chapter 9: Organizing the Body of the Speech

View Set

ASM 275: Lab 4 - Arizona State University

View Set

STEERING AND SUSPENSION ADVANCED CH36

View Set

Lesson 1 Property and Casualty Insurance Basics

View Set