S & R Final Part 11
What are three techniques for mitigating VLAN attacks? (Choose three.)
-Enable trunking manually -Disable DTP. -Set the native VLAN to an unused VLAN.
Refer to the exhibit. A network administrator has added a new subnet to the network and needs hosts on that subnet to receive IPv4 addresses from the DHCPv4 server. What two commands will allow hosts on the new subnet to receive addresses from the DHCP4 server? (Choose two.)
-R1(config-if)# ip helper-address 10.2.0.250 -R1(config)# interface G0/0
What are two reasons a network administrator would segment a network with a Layer 2 switch? (Choose two.)
-to enhance user bandwidth -to isolate traffic between segments
A network administrator is using the router-on-a-stick model to configure a switch and a router for inter-VLAN routing. What configuration should be made on the switch port that connects to the router?
Configure the port as an 802.1q trunk port.
What protocol should be disabled to help mitigate VLAN attacks?
DTP
What protocol or technology uses source IP to destination IP as a load-balancing mechanism?
EtherChannel
Match the DHCP message types to the order of the DHCPv4 process. (Not all options are used.)
Step 1- DHCPDISCOVER Step 2- DHCPOFFER Step 3- DHCPREQUEST Step 4- DHCPACK
What protocol or technology requires switches to be in server mode or client mode?
VTP
What command will enable a router to begin sending messages that allow it to configure a link-local address without using an IPv6 DHCP server?
the ipv6 unicast-routing command
In which situation would a technician use the show interfaces switch command?
when packets are being dropped from a particular directly attached host