CCNA 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which access control component, implementation, or protocol is based upon usernames and passwords?

authentication

Which message does an IPv4 host use to reply when it receives a DHCPOFFER message from a DHCP server?

DHCPREQUEST

An administrator issues the ipv6 route 2001:db8:acad:1::/32 gigabitethernet0/0 2001:db8:acad:6::1 100 command on a router. What administrative distance is assigned to this route?

100

Which three parameters would need to be changed if best practices are being implemented for a home wireless AP? (Choose three.)

wireless network password AP password SSID

Which type of wireless network is suitable for national and global communications?

wireless wide-area network

Refer to the exhibit. What is the administrative distance value of the route for router R1 to reach the destination IPv6 address of 2001:DB8:CAFE:4::A?

120

Refer to the exhibit. PC A sends a request to Server B. What IPv4 address is used in the destination field in the packet as the packet leaves PC A?

192.168.12.16

Refer to the exhibit. A network engineer is troubleshooting host connectivity on a LAN that uses a first hop redundancy protocol. Which IPv4 gateway address should be configured on the host?

192.168.2.100

Refer to the exhibit. PC1 and PC2 should be able to obtain IP address assignments from the DHCP server. How many ports among switches should be assigned as trusted ports as part of the DHCP snooping configuration?

7

Refer to the exhibit. How many broadcast domains are displayed?

8

What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)

802.11a 802.11ac

Which spanning tree standard supports only one root bridge so that traffic from all VLANs flows over the same path?

802.1D

What network prefix and prefix-length combination is used to create a default static route that will match any IPv6 destination?

::/0

Refer to the exhibit. HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process? (Choose two.)

A frame with the destination MAC address of RouterA. A packet with the destination IP address of ServerB.

What is the significant difference between a hub and a Layer 2 LAN switch?

A hub extends a collision domain, and a switch divides collision domains.

Refer to the exhibit. What two commands will change the next-hop address for the 10.0.0.0/8 network from 172.16.40.2 to 192.168.1.2? (Choose two.)

A(config)# no ip route 10.0.0.0 255.0.0.0 172.16.40.2 A(config)# ip route 10.0.0.0 255.0.0.0 192.168.1.2

What is the function provided by CAPWAP protocol in a corporate wireless network?

CAPWAP provides the encapsulation and forwarding of wireless user traffic between an access point and a wireless LAN controller.

Refer to the exhibit. The Branch Router has an OSPF neighbor relationship with the HQ router over the 198.51.0.4/30 network. The 198.51.0.8/30 network link should serve as a backup when the OSPF link goes down. The floating static route command ip route 0.0.0.0 0.0.0.0 S0/1/1 100 was issued on Branch and now traffic is using the backup link even when the OSPF link is up and functioning. Which change should be made to the static route command so that traffic will only use the OSPF link when it is up?

Change the administrative distance to 120.

A technician is about to install and configure a wireless network at a small branch office. What is the first security measure the technician should apply immediately upon powering up the wireless router?

Change the default user-name and password of the wireless router.

Refer to the exhibit. A network administrator is configuring an EtherChannel link between two switches, SW1 and SW2. However, the EtherChannel link fails to establish. What change in configuration would correct the problem?

Configure SW2 EtherChannel mode to desirable.

Refer to the exhibit. What routing solution will allow both PC A and PC B to access the Internet with the minimum amount of router CPU and network bandwidth utilization?

Configure a static default route from R1 to Edge, a default route from Edge to the Internet, and a static route from Edge to R1.

What are two advantages of EtherChannel? (Choose two.)

Configuring the EtherChannel interface provides consistency in the configuration of the physical links. Spanning Tree Protocol views the physical links in an EtherChannel as one logical connection.

Which step is required before creating a new WLAN on a Cisco 3500 series WLC?

Create a new VLAN interface.

What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?

Disable both protocols on all interfaces where they are not required.

Refer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration?

Frames from PC1 will cause the interface to shut down immediately, and a log entry will be made.

Refer to the exhibit. A network administrator is verifying the configuration of inter-VLAN routing. Users complain that PCs on different VLANs cannot communicate. Based on the output, what are two configuration errors on switch interface Gi1/1? (Choose two.)

Gi1/1 is configured as trunk mode. Gi1/1 is in the default VLAN.

What is a characteristic of a floating static route?

It is configured with a higher administrative distance than the original dynamic routing protocol has.

A network administrator is configuring a RADIUS server connection on a Cisco 3500 series WLC. The configuration requires a shared secret password. What is the purpose for the shared secret password?

It is used to encrypt the messages between the WLC and the RADIUS server.

A network administrator is working to improve WLAN performance on a dual-band wireless router. What is a simple way to achieve a split-the-traffic result?

Make sure that different SSIDs are used for the 2.4 GHz and 5 GHz bands.

Consider the following command:ip route 192.168.10.0 255.255.255.0 10.10.10.2 5How would an administrator test this configuration?

Manually shut down the router interface used as a primary route.

Which route would be used to forward a packet with a source IP address of 192.168.10.1 and a destination IP address of 10.1.1.1?

O 10.1.1.0/24 [110/65] via 192.168.200.2, 00:01:20, Serial0/1/0

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.Which event will take place if there is a port security violation on switch S1 interface Fa0/1?

Packets with unknown source addresses will be dropped.

Refer to the exhibit. Which set of commands will configure static routes that will allow the Park and the Alta routers to a) forward packets to each LAN and b) direct all other traffic to the Internet?

Park(config)# ip route 0.0.0.0 0.0.0.0 192.168.14.1Alta(config)# ip route 10.0.234.0 255.255.255.0 192.168.14.2Alta(config)# ip route 0.0.0.0 0.0.0.0 s0/0/0

Which two Cisco solutions help prevent DHCP starvation attacks? (Choose two.)

Port Security DHCP Snooping

Refer to the exhibit. The small company shown uses static routing. Users on the R2 LAN have reported a problem with connectivity. What is the issue?

R1 needs a static route to the R2 LAN.

Refer to the exhibit. Which command will properly configure an IPv6 static route on R2 that will allow traffic from PC2 to reach PC1 without any recursive lookups by router R2?

R2(config)# ipv6 route 2001:db8:10:12::/64 S0/0/0

A network administrator of a college is configuring the WLAN user authentication process. Wireless users are required to enter username and password credentials that will be verified by a server. Which server would provide such service?

RADIUS

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.What is the keyword that is displayed on www.netacad.com?

Router

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.A user reports that PC0 cannot visit the web server www.server.com . Troubleshoot the network configuration to identify the problem.What is the cause of the problem?

Routing between HQ and Branch is configured incorrectly.

Which two commands can be used to enable BPDU guard on a switch? (Choose two.)

S1(config)# spanning-tree portfast bpduguard default S1(config-if)# spanning-tree bpduguard enable

Gateway of last resort is not set.172.18.109.0/26 is variously subnetted, 7 subnets, 3 masksO 172.18.109.0/26 [110/10] via 172.18.32.1, 00:00:24, Serial0/0/0O 172.18.109.64/26 [110/20] via 172.18.32.6, 00:00:56, Serial 0/0/1O 172.18.109.128/26 [110/10] via 172.18.32.1, 00:00:24, Serial 0/0/0C 172.18.109.192/27 is directly connected, GigabitEthernet0/0L 172.18.109.193/27 is directly connected, GigabitEthernet0/0C 172.18.109.224/27 is directly connected, GigabitEthernet0/1L 172.18.109.225/27 is directly connected, GigabitEthernet0/1172.18.32.0/24 is variably subnetted, 4 subnets, 2 masksC 172.18.32.0/30 is directly connected, Serial0/0/0L 172.18.32.2/32 is directly connected, Serial0/0/0C 172.18.32.4/30 is directly connected, Serial0/0/1L 172.18.32.5/32 is directly connected, Serial0/0/1S 172.18.33.0/26 [1/0] via 172.18.32.1, 00:00:24, Serial0/0/0R1#Refer to the exhibit. Which interface will be the exit interface to forward a data packet that has the destination IP address 172.18.109.152?

Serial0/0/0

What are three techniques for mitigating VLAN attacks? (Choose three.)

Set the native VLAN to an unused VLAN. Disable DTP. Enable trunking manually.

A technician is troubleshooting a slow WLAN that consists of 802.11b and 802.11g devices . A new 802.11n/ac dual-band router has been deployed on the network to replace the old 802.11g router. What can the technician do to address the slow wireless speed?

Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.

What are two advantages of static routing over dynamic routing? (Choose two.)

Static routing uses fewer router resources than dynamic routing. Static routing is more secure because it does not advertise over the network.

On a switch that is configured with multiple VLANs, which command will remove only VLAN 100 from the switch?

Switch(config)# no vlan 100

Refer to the exhibit. What would happen after the IT administrator enters the new static route?

The 172.16.1.0 route learned from RIP would be replaced with the 172.16.1.0 static route.

Refer to the exhibit. An administrator is attempting to install an IPv6 static route on router R1 to reach the network attached to router R2. After the static route command is entered, connectivity to the network is still failing. What error has been made in the static route configuration?

The interface is incorrect.

Refer to the exhibit. An administrator is attempting to install a default static route on router R1 to reach the Site B network on router R2. After entering the static route command, the route is still not showing up in the routing table of router R1. What is preventing the route from installing in the routing table?

The next hop address is incorrect.

Refer to the exhibit. What can be determined about port security from the information that is shown?

The port violation mode is the default for any port that has port security enabled.

Refer to the exhibit. How was the host route 2001:DB8:CAFE:4::1/128 installed in the routing table?

The route was manually entered by an administrator.

Refer to the exhibit. A network administrator is configuring a router as a DHCPv6 server. The administrator issues a show ipv6 dhcp pool command to verify the configuration. Which statement explains the reason that the number of active clients is 0?

The state is not maintained by the DHCPv6 server under stateless DHCPv6 operation.

Refer to the exhibit. A ping from R1 to 10.1.1.2 is successful, but a ping from R1 to any address in the 192.168.2.0 network fails. What is the cause of this problem?

The static route for 192.168.2.0 is incorrectly configured.

Refer to the exhibit. A network administrator is reviewing port and VLAN assignments on switch S2 and notices that interfaces Gi0/1 and Gi0/2 are not included in the output. Why would the interfaces be missing from the output?

They are configured as trunk interfaces.

Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN?

VLAN double-tagging

On a Cisco 3504 WLC Summary page ( Advanced > Summary ), which tab allows a network administrator to access and configure a WLAN for a specific security option such as WPA2?

WLANs

Consider the following command:ip route 192.168.10.0 255.255.255.0 10.10.10.2 5Which route would have to go down in order for this static route to appear in the routing table?

a static route to the 192.168.10.0/24 network

The company handbook states that employees cannot have microwave ovens in their offices. Instead, all employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the company trying to avoid?

accidental interference

Which impact does adding a Layer 2 switch have on a network?

an increase in the size of the broadcast domain

Refer to the exhibit. The network engineer for the company that is shown wants to use the primary ISP connection for all external connectivity. The backup ISP connection is used only if the primary ISP connection fails. Which set of commands would accomplish this goal?

ip route 0.0.0.0 0.0.0.0 s0/0/0 ip route 0.0.0.0 0.0.0.0 s0/1/0 10

Refer to the exhibit. Which static route would an IT technician enter to create a backup route to the 172.16.1.0 network that is only used if the primary RIP learned route fails?

ip route 172.16.1.0 255.255.255.0 s0/0/0 121

Refer to the exhibit. What command would be used to configure a static route on R1 so that traffic from both LANs can reach the 2001:db8:1:4::/64 remote network?

ipv6 route 2001:db8:1:4::/64 2001:db8:1:3::2

When would it be more beneficial to use a dynamic routing protocol instead of static routing?

on a network where there is a lot of topology changes

A network administrator is configuring port security on a Cisco switch. The company security policy specifies that when a violation occurs, packets with unknown source addresses should be dropped and no notification should be sent. Which violation mode should be configured on the interfaces?

protect

Refer to the exhibit. Which type of IPv6 static route is configured in the exhibit?

recursive static route

As part of the new security policy, all switches on the network are configured to automatically learn MAC addresses for each port. All running configurations are saved at the start and close of every business day. A severe thunderstorm causes an extended power outage several hours after the close of business. When the switches are brought back online, the dynamically learned MAC addresses are retained. Which port security configuration enabled this?

sticky secure MAC addresses

On which two routers would a default static route be configured? (Choose two.)

stub router connection to the rest of the corporate or campus network edge router connection to the ISP

What characteristic completes the following statement?When an IPv6 static route is configured, it is first necessary to configure ......

the "ipv6 unicast-routing" command.

A network administrator issues the show vlan brief command while troubleshooting a user support ticket. What output will be displayed?

the VLAN assignment and membership for all switch ports

Which feature on a switch makes it vulnerable to VLAN hopping attacks?

the automatic trunking port feature enabled for all ports by default

What two pieces of information are needed in a fully specified static route to eliminate recursive lookups? (Choose two.)

the interface ID exit interface the IP address of the next-hop neighbor

A company uses the SLAAC method to configure IPv6 addresses for the employee workstations. Which address will a client use as its default gateway?​

the link-local address of the router interface that is attached to the network

A technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel?

to avoid interference from nearby wireless devices

Which statement is correct about Ethernet switch frame forwarding decisions?

Frame forwarding decisions are based on MAC address and port mappings in the CAM table.

Which FHRP implementation is a Cisco-proprietary protocol that supports IPv4 load sharing?

GLBP

Refer to the exhibit. PC1 is configured to obtain a dynamic IP address from the DHCP server. PC1 has been shut down for two weeks. When PC1 boots and tries to request an available IP address, which destination IP address will PC1 place in the IP header?

255.255.255.255

A small company network has six interconnected Layer 2 switches. Currently all switches are using the default bridge priority value. Which value can be used to configure the bridge priority of one of the switches to ensure that it becomes the root bridge in this design?

28672

Refer to the exhibit. A network administrator needs to configure router-on-a-stick for the networks that are shown. How many subinterfaces will have to be created on the router if each VLAN that is shown is to be routed and each VLAN has its own subinterface?

4

The address pool of a DHCP server is configured with 192.168.184.0/26. The network administrator reserves 18 IP addresses for access points. How many IP addresses are left in the pool to be assigned to other hosts?

44

A set of switches is being connected in a LAN topology. Which STP bridge priority value will make it least likely for the switch to be selected as the root?

61440

A company uses DHCP to manage IP address deployment for employee workstations. The IT department deploys multiple DHCP servers in the data center and uses DHCP relay agents to facilitate the DHCP requests from workstations. Which two UDP ports are used to forward DHCP traffic? (Choose two.)

67 68

Refer to the exhibit. On the basis of the output that is shown, what can be determined about the EtherChannel bundle?

A Cisco proprietary protocol was used to negotiate the EtherChannel link.

Which statement describes an EtherChannel implementation?

A trunked port can be part of an EtherChannel bundle.

Which four steps are needed to configure a voice VLAN on a switch port? (Choose four).

Add a voice VLAN. Assign the voice VLAN to the switch port. Configure the switch port in access mode. Ensure that voice traffic is trusted and tagged with a CoS priority value.

What does a switch use to locate and load the IOS image?

BOOT environment variable

What are two drawbacks to turning spanning tree off and having multiple paths through the Layer 2 switch network? (Choose two.)

Broadcast frames are transmitted indefinitely. The MAC address table becomes unstable.

Refer to the exhibit. Which switching technology would allow each access layer switch link to be aggregated to provide more bandwidth between each Layer 2 switch and the Layer 3 switch?

EtherChannel

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.Which message is displayed when 10.10.10.1 is entered into the PC1 Web Browser address bar?

File Server

Refer to the exhibit. What protocol can be configured on gateway routers R1 and R2 that will allow traffic from the internal LAN to be load balanced across the two gateways to the Internet?

GLBP

A network administrator is analyzing the features that are supported by different first-hop router redundancy protocols. Which statement describes a feature that is associated with HSRP?

HSRP uses active and standby routers.

Refer to the exhibit. PC1 is unable to communicate with server 1. The network administrator issues the show interfaces trunk command to begin troubleshooting. What conclusion can be made based on the output of this command?

Interface G0/2 is not configured as a trunk.

What are two advantages of using LACP? (Choose two.)

It allows the use of multivendor devices. It allows directly connected switches to negotiate an EtherChannel link.

What is an advantage of configuring a Cisco router as a relay agent? It will allow DHCPDISCOVER messages to pass without alteration. It can forward both broadcast and multicast messages on behalf of clients. It can provide relay services for multiple UDP services. It reduces the response time from a DHCP server.

It can provide relay services for multiple UDP services.

What is the function of STP in a scalable network?

It disables redundant paths to eliminate Layer 2 loops.

A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw> enable command?

It enters configuration mode for a switch virtual interface.

Refer to the exhibit. A network administrator is configuring inter-VLAN routing on a network. For now, only one VLAN is being used, but more will be added soon. What is the missing parameter that is shown as the highlighted question mark in the graphic?

It identifies the VLAN number.

Which statement is true regarding the use of PAgP to create EtherChannels?

It is Cisco proprietary.

What is a characteristic of an IPv4 loopback interface on a Cisco IOS router?​

It is a logical interface internal to the router.

What is a characteristic of a routed port on a Layer 3 switch?

It is commonly used as a WAN link.

What is a characteristic of spanning tree?

It is enabled by default on Cisco switches.

Which statement describes HSRP?​

It is used within a group of routers for selecting an active device and a standby device to provide gateway services to a LAN.

A network administrator configures a router to send RA messages with M flag as 0 and O flag as 1. Which statement describes the effect of this configuration when a PC tries to configure its IPv6 address?

It should use the information that is contained in the RA message and contact a DHCPv6 server for additional information.

Refer to the exhibit. Which destination MAC address is used when frames are sent from the workstation to the default gateway?

MAC address of the virtual router

Which protocol provides up to 16 instances of RSTP, combines many VLANs with the same physical and logical topology into a common RSTP instance, and provides support for PortFast, BPDU guard, BPDU filter, root guard, and loop guard?

MST

Refer to the exhibit. The network administrator wants to configure Switch1 to allow SSH connections and prohibit Telnet connections. How should the network administrator change the displayed configuration to satisfy the requirement?

Modify the transport input command.

Which command will allow a network administrator to check the IP address that is assigned to a particular MAC address?

Router# show ip dhcp binding

Which mode configuration setting would allow formation of an EtherChannel link between switches SW1 and SW2 without sending negotiation traffic?

SW1: on SW2: on

A network administrator is configuring an EtherChannel link between switches SW1 and SW2 by using the command SW1(config-if-range)# channel-group 1 mode auto . Which command must be used on SW2 to enable this EtherChannel?

SW2(config-if-range)# channel-group 1 mode desirable

A client device on an Ethernet segment needs an IP address in order to communicate on the network. A DHCP server with IP address 192.168.1.1 has been configured and enabled on the network. How will a client device obtain a usable IP address for this network?

Send a DHCPDISCOVER message to physical address FF-FF-FF-FF-FF-FF.

A small coffee shop is offering free Wi-Fi to customers. The network includes a wireless router and a DSL modem that is connected to the local phone company. What method is typically used to configure the connection to the phone company?

Set the WAN connection in the wireless router as a DHCP client.

Which two statements are correct with respect to SVI inter-VLAN routing? (Choose two.)

Switching packets is faster with SVI. There is no need for a connection to a router.

What is the result of a network technician issuing the command ip dhcp excluded-address 10.0.15.1 10.0.15.15 on a Cisco router?

The Cisco router will exclude 15 IP addresses from being leased to DHCP clients.

Refer to the exhibit. A network administrator is configuring an EtherChannel link between two switches, SW1 and SW2. Which statement describes the effect after the commands are issued on SW1 and SW2?

The EtherChannel fails to establish.

What is a requirement to configure a trunking EtherChannel between two switches?

The allowed range of VLANs must be the same on both switches.

Refer to the exhibit. What is the cause of the error that is displayed in the configuration of inter-VLAN routing on router CiscoVille?

The encapsulation dot1Q 20 command has not been configured.​

After a host has generated an IPv6 address by using the DHCPv6 or SLAAC process, how does the host verify that the address is unique and therefore usable?

The host sends an ICMPv6 neighbor solicitation message to the DHCP or SLAAC-learned address and if no neighbor advertisement is returned, the address is considered unique.

Refer to the exhibit. PC-A is unable to receive an IPv6 address from the stateful DHCPv6 server. What is the problem?

The ipv6 dhcp relay command should be applied to interface Gig0/0.

What happens to switch ports after the VLAN to which they are assigned is deleted?

The ports are disabled.

A network administrator configured an EtherChannel link with three interfaces between two switches. What is the result if one of the three interfaces is down?

The remaining two interfaces continue to load balance traffic.

Refer to the exhibit. A network administrator is implementing the stateless DHCPv6 operation for the company. Clients are configuring IPv6 addresses as expected. However, the clients are not getting the DNS server address and the domain name information configured in the DHCP pool. What could be the cause of the problem?

The router is configured for SLAAC operation.

Which two parameters must match on the ports of two switches to create a PAgP EtherChannel between the switches? (Choose two.)

VLAN information speed

Which statement is true about DHCP operation?​

When a device that is configured to use DHCP boots, the client broadcasts a DHCPDISCOVER message to identify any available DHCP servers on the network.​

What is a result when the DHCP servers are not operational in a network?

Workstations are assigned with IP addresses in the 169.254.0.0/16 network.

Which kind of message is sent by a DHCP client when its IP address lease has expired?​

a DHCPREQUEST unicast message​

Which solution would help a college alleviate network congestion due to collisions?

a high port density switch

Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?

accounting

Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?

authorization

Which type of management frame may regularly be broadcast by an AP?

beacon

Which command is used to set the BOOT environment variable that defines where to find the IOS image file on a switch?

boot system

A switch is configured to run STP. What term describes a field that has a default value of 32,768 and is the initial deciding factor when electing a root bridge?

bridge priority

Which three components are combined to form a bridge ID?

bridge priority MAC address extended system ID

When the show spanning-tree vlan 33 command is issued on a switch, three ports are shown in the forwarding state. In which two port roles could these interfaces function while in the forwarding state? (Choose two.)

designated root

Refer to the exhibit. An administrator wants to form an EtherChannel between the two switches by using the Port Aggregation Protocol. If switch S1 is configured to be in auto mode, which mode should be configured on S2 to form the EtherChannel?

desirable

Which protocol automates assignment of IP addresses on a network, and which port number does it use? (Choose two.) DHCP DNS SMB 53 67 80

dhcp 67

What is the reason that an ISP commonly assigns a DHCP address to a wireless router in a SOHO environment?

easy IP address management

What is a wireless security mode that requires a RADIUS server to authenticate wireless users?

enterprise

In which two PVST+ port states are MAC addresses learned? (Choose two.)

forwarding learning

In which two port states does a switch learn MAC addresses and process BPDUs in a PVST network? (Choose two.)

forwarding learning

Which switch characteristic helps keep traffic local and alleviates network congestion?

high port density

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.Which set of configuration commands issued on SW1 will successfully complete the EtherChannel link between SW1 and SW2?

interface GigabitEthernet0/1channel-group 1 mode desirable

Which command, when issued in the interface configuration mode of a router, enables the interface to acquire an IPv4 address automatically from an ISP, when that link to the ISP is enabled?

ip address dhcp

Which type of VLAN is used to designate which traffic is untagged when crossing a trunk port?

native

What type of VLAN supports untagged traffic?

native VLAN

Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up?

no shutdown

What type of wireless antenna is best suited for providing coverage in large open spaces, such as hallways or large conference rooms?

omnidirectional

When EtherChannel is configured, which mode will force an interface into a port channel without exchanging aggregation protocol packets?

on

What is the purpose of the Spanning Tree Protocol (STP)?

prevents Layer 2 loops

Which port role is assigned to the switch port that has the lowest cost to reach the root bridge?

root port

Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface?

show interfaces Fa0/1 switchport

What information is added to the switch table from incoming frames?

source MAC address and incoming port number

Which switching method ensures that the incoming frame is error-free before forwarding?

store-and-forward

Refer to the exhibit. A network administrator has configured router CiscoVille with the above commands to provide inter-VLAN routing. What command will be required on a switch that is connected to the Gi0/0 interface on router CiscoVille to allow inter-VLAN routing?​

switchport mode trunk


Set pelajaran terkait

Chapter 12 - Financial Statement Analysis

View Set

GEOG_3153_Quiz 03-the American Conservation Movement to 1914

View Set

IV. Heat and Mass Transfer Properties

View Set

Pathology Chapters 7-9 Case Studies

View Set

Chapter 23 The Respiratory System

View Set

Economics California Topic 4 Quick Study Guide

View Set