Phase 1 Block 5 Test Review Questions (Book)

Ace your homework & exams now with Quizwiz!

The PC sends packets to its default gateway

1. A PC user opens a command prompt and uses the ipconfig command to see that the PC's IP address and mask are 192.168.4.77 and 255.255.255.224. The user then runs a test using the ping 192.168.4.117 command. Which of the following answers is the most likely to happen?

SSL

1. A colleague mentions using a client VPN. Which of the following protocols or technologies would you expect your colleague to have used?

Match the exact source IP Address Match all IP addresses in Barney's subnet with one access-list command without matching other IP addresses

1. Barney is a host with IP address 10.1.1.1 in subnet 10.1.1.0/24. Which of the following are things that a standard IP ACL could be configured to do?

enable secret

1. Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log out of the switch and log back in at the console., Which command defines the password that you had to enter to access privileged mode?

Broadcast domain

1. In a LAN, which of the following terms best equates to the term VLAN?

User mode and enable mode

1. In what modes can you type the command show mac address-table and expect to get a response with MAC table entries?

spanning-tree vlan vlan-number root {primary | secondary} spanning-tree vlan vlan-number priority value

1. On a 2960 switch, which of the following commands change the value of the bridge ID?

If one router fails, the host that uses that router as a default router cannot send packets off-subnet

1. R1 and R2 attach to the same Ethernet VLAN, with subnet 10.1.19.0/25, with addresses 10.1.19.1 and 10.1.19.2, respectively, configured with the ip address interface subcommand. Host A refers to 10.1.19.1 as its default router, and host B refers to 10.1.19.2 as its default router. The routers do not use an FHRP. Which of the following is a problem for this LAN?

Blocking Forwarding

1. Which of the following IEEE 802.1D port states are stable states used when STP has completed convergence?

Configure the speed 100 and duplex full interface subcommands

1. Which of the following describes a way to disable IEEE standard auto negotiation on a 10/100 port on a Cisco switch?

PC2, which is separated from PC1, by an Ethernet hub

1. Which of the following devise would be in the same collision domain as PC1?

URL Filename for FTP transfers

1. Which of the following fields cannot be compared based on an extended IP ACL?

Connect serial cables Turns the on/off switch to "on"

1. Which of the following installation steps are more likely required on a Cisco router, but not typically required on a Cisco switch?

network 10.0.0.0 0.255.255.255 area 0

1. Which of the following network commands following the command router ospf 1, tells this router to start using OSPF on interfaces whose IP addresses are 10.1.1.1, 10.1.100.1, and 10.1.120.1?

network 10.0.0.0 network 10.0.0.0 0.255.255.255

1. Which of the following network commands, following the command router eigrp 1, tells this router to start using EIGRP on interfaces whose IP addresses are 10.1.1.1, 10.1.100.1, and 10.1.120.1?

It compares the unicast destination address to the bridging, or MAC address, table

1. Which of the following statements describes part of the process of how a switch decides to forward a frame destined for a known unicast MAC address?

Router A's private address on an ip address command on Router A's tunnel interface

2. An engineer configures a point to point GRE tunnel between two Cisco routers, called A and B. The routers use public IP addresses assigned by ISP's, and private addresses from network 10.0.0.0. Which of the following answers accurately describes where the addresses could be reference in the GRE configuration?

A login vty mode subcommand

2. An engineer wants to set up a simple password protection with no usernames for some switches in a lab, for the purpose of keeping curious co workers from logging into thee lab switches from their desktop PCs. Which of the following commands would be a useful part of that configuration?

The information is about the STP instance for VLAn 3

2. Examine the following extract from the show spanning-tree command on a Cisco switch Bridge ID Priority 32771 (priority 32768 sys-id-ext 3) Address 0019.e86a.6f80 Which of the following answers is true bout the switch on which this command output was gathered?

3

2. Imagine a switch with three configured VLANs. How many IP subnets are required, assuming that all hosts in all VLANS want to use TCP/Ip?

Interface configuration mode

2. In which of the following modes of the CLI could you configure the duplex setting for interface Fast Ethernet0/5?

Enable mode

2. In which of the following modes of the CLI could you type the command reload and expect the switch to reboot?

If one router fails, both host will use the one remaining router as a default router

2. R1 and R2 attach to the same Ethernet VLAN, with subnet 10.1.19.0/25, with addresses 10.1.19.1 and 10.1.19.2, respectively, configured with the ip address interface subcommand. The routers use an FHRP. Host A and host B attach to the same LAN and have correct default router settings per the FHRP configuration. Which of the following statements is true for this LAN?

Mask Subnet ID

2. Router R1 lists a router in its routing table. Which of the following answer lists a fact from a route that the router then compares to the packet's destination address?

network 10.0.0.2 0.0.0.0 network 10.0.0.0

2. Routers R1 and R2 attach to the same VLAN with IP addresses 10.0.0.1 and 10.0.0.2, respectively. R1 is configured with the commands router eigrp 99 and network 10.0.0.0. Which of the following commands might be part of a working EIGRP configuration on R2 that ensures that the two routers become neighbors and exchange routes?

access-list 101 permit tcp host 10.1.1.1 172.16.5.0 0.0.0.255 eq www access-list 2523 permit tcp host 10.1.1.1 172.16.5.0 0.0.0.255 eq www

2. Which of the following access-list commands permit packets going from host 10.1.1.1 to all web servers whose IP addresses begin with 172.16.5?

1987 87

2. Which of the following answers list a valid number that can be used with a standard numbered IP ACL's?

Listening Learning

2. Which of the following are transitory IEEE 802.1D port states used only during the process of STP convergence?

The clock rate command

2. Which of the following commands might you see associated with the router CLI, but not the switch CLI?

PC2, which is separated from PC1, by an Ethernet hub PC3, which is separated from PC1 by a transparent bridge PC4, which is separated from PC1 by an Ethernet Switch

2. Which of the following devices would be in the same broadcast domain as PC1?

network 10.1.0.0 0.0.255.255 area 0

2. Which of the following network commands, following the command router ospf 1, tells this router to start using OSPF on interfaces whose IP addresses are 10.1.1.1, 10.1.100.1, and 10.1.120.1?

It forwards the frame out all interfaces in the same VLAN except for the incoming itnerface

2. Which of the following statements describes part of the process of how a LAN switch decides to forward a frame destined for a broadcast MAC address?

Full duplex 1000 Mbps

3. A Cisco Catalyst switch connects with its Gigabit0/1 port to an end user's PC. The end user, thinking the user is helping, manually sets the PC's OS to use a speed of 1000 Mbps and to use full duplex, and disables the use of auto negotiation., The switch's G0/1 port has default settings for speed and duplex. What speed and duplex settings will the switch decide to use?

spanning-tree cost 19 Adding no configuration

3. A switch's G0/1 interface, a trunk that supports VLANs 1-10, has auto negotiated a speed of 100 Mbps. The switch currently has all default settings for STP. Which of the following actions results in the switch using an STP cost of 19 for that interface in VLAN3?

A username (name) secret (password) global configuration command A login local vty mode subcommand

3. An engineer had formerly configured a Cisco 2960 switch to allow Telnet access so that the switch expected a password of mypassword from the Telnet user. The engineer then changed the configuration to support Secure Shell. Which of the following commands could have been part of the new configuration?

R1 has a working (up/up) interface with address 1.1.1.1

3. An enterprise uses a site to site GRE tunnel that runes over the Internet between two routers R1 and R2. R1 uses tunnel interface 22. The tunnel has a source of 1.1.1.1 and a destination of 2.2.2.2. All the answers list facts that could be true, but which of the following must be true when Router R1's tunnel 22 is in an up/up state?

The design uses a partial mesh of links between access and distribution switches The end user and server devices connect directly to access layer switches

3. In a two-tier campus LAN design, which of the following are typically true of the topology design?

D

3. In the show ip route command, what code designation implies that a route was learned with EIGRP?

Another IP address in subnet 10.1.19.0/25 other than 10.1.19.1 and 10.1.19.2

3. R1 and R2 attach to the same Ethernet VLAN, with subnet 10.1.19.0/25, with addresses 10.1.19.1 and 10.1.19.2, respectively, configured with the ip address interface subcommand. The routers use HSRP. The network engineer prefers to have R1 be the default router when both R1 and R2 are up. Which of the following is the likely default router setting for hosts in this subnet?

interface fastethernet 0/0.4 encapsulation dot1q 4

3. Router 1 has a Fast Ethernet interface 0/0- with IP address 10.1.1.1 The interface is connected to a switch. This connection is then migrated to use 802.1q trunking. Which of the following commands could be part of a valid configuration for Router 1's Fa0/0 interface?

Inserts a 4 byte header and does not change the mac address

3. Switch SW1 sends a frame to switch SW2 using 802.1q trunking. Which of the answers describes how SW1 changes or adds to the Ethernet frame before forwarding the frame to SW2?

access-list 2523 permit tcp 172.16.5.0 0.0.0.255 eq www any

3. Which of the following access-list commands permits packets going to any web client from all web servers whose IP address begin with 172.16.5

4097:0200.1111.1111

3. Which of the following bridge IDs wins election as root, assuming that the switches with these bridge IDs are in the same network?

show ip ospf neighbor show ip ospf neighbor serial 0/0

3. Which of the following commands lists the OSPF neighbors off interface serial 0/0?

SSH encrypts all data exchange, including login passwords; Telnet encrypts nothing

3. Which of the following is a difference between Telnet and SSH as supported by a Cisco switch?

It forwards out all interfaces in the same VLAN except for the incoming interface

3. Which of the following statements best describes what a switch does with a frame destined for an unknown unicast address?

0.0.0.255

3. Which of the following wildcard masks is most useful for matching all IP packets in subnet 10.1.128.0 mask 255.255.255.0?

Configuring the bandwidth command on the router's serial interface Setting the interface description on both the Fast Ethernet and serial interface of each router

3. You just bought two Cisco routers for use in a lab, connecting each router to a different LAN switch with their Fa0/0 interfaces. You also connected the two router's serial interfaces using a back to back cable. Which of the following steps are not required to be able to forward IPv4 packets on both router's interfaces?

interface VLAN 2

4. A layer 3 switch has been configured to route IP packets between VLANS 1, 2, and3, which connect to subnets 172.20.1.0/25, 172.20.2.0/25, 172.20.3.0/25, respectively. The engineer issues a show ip route command on the layer 3 switch, listing the connected routes. Which of the following answers lists a piece of information that should be in at least one of the routes?

Channel-group

4. An engineer configures a switch to put interfaces G0/1 and G0/2 into the same layer 2 EtherChannel. Which of the following terms is used in the configuration commands?

The ip address command in interface configuration mode the ip default gateway command in global configuration mode The password command ion vty line configuration mode

4. An engineer's desktop PC connects to a switch at the main site. A router at the main site connects to each branch office through a serial link, with one small router and switch at each branch. Which of the following commands must be configured on the branch office switches, in the listed configuration mode, to allow the engineer to telnet to the branch office switches?

The hub router needs less than 10 tunnel interfaces

4. An enterprise has 1000 small retail locations and a central site. The enterprise uses Internet access links to each retail store and DMVPN to securely create a VPN back to the central site. Which of the following answers is true about the operation and configuration of DMVPN?

Address 10.1.5.2 identifies a working neighbor based on that neighbor's interface IP address on the link between R1 and that neighbor

4. Examine the following excerpt from a show command on Router R1: EIGRP-IPv4 Neighbors for AS(1) H AddressInterfaceHoldUptimeSRTT RTO Q Seq (Sec) (ms) Cnt Num 1 10.1.4.3 Se0/0/1 13 00:05:49 2 100 0 29 0 10.1.5.2 e0/0/0 12 00:05:49 2 100 0 39 Which of the following answers is true about this router based on this output?

trunk dynamic desirable

4. Imagine that you are told that switch 1 is configured with the dynamic auto parameter for trunking on its Fa0/5 interface, Which is connected to switch 2. You have to configure switch 2. Which of the followings settings for trunking could allow trunking to work?

Delete the entire ACL and reconfigure the three ACL statements that should remain in the ACL Delete one line from the ACL by entering ACL configuration mode of the ACL and then deleting only the second line based on in its sequence number.

4. In a router running a recent IOS version (at least 15.0), an engineer needs to delete the second line in ACL 101, which currently has four commands configured. Which of the following options could be used?

The design uses a partial mesh of links between access and distribution switches The design uses a partial mesh of links between the distribution and core switches

4. In a three-tier campus LAN design, which of the following are typically true of the topology design?

The network router subcommands refer to multiple areas, including the backbone

4. Routers R1, R2, and R3 are internal routers in areas 1,2, and 3, respectively. Router R4 is an ABR connected to the backbone area (0) and to areas 1, 2, and 3. Which of the following answers describes the configuration on Router R4, which is different from the other three routers that makes it an ABR?

Hosts with a default router setting of 10.1.12.2 are sending their packets to Router R3

4. The following text lists output taken from Router R3, which is using HSRP. Subnet 10.1.12.0 uses mask 255.255.255.0. Based on the output of this command, which of the following answers is true? R3# show standby brief Interface Grp Pri P State Active Standby VirtualIP Gi0/0 1 105 Active local 0.1.12.1 10.1.12.2

R1's serial interface does not have a serial cable installed

4. The output of the show ip interface brief command on R1 lists interface status codes of "down" and "down" for interface Serial0/0. Which of the following could be true?

RAM

4. What type of switch memory is used to store the configuration used by the switch when it is up and working?

It compares the unicast source address to the bridging, or MAC address, table

4. Which of the following comparisons does a switch make when deciding whether a new MAC address should be added to its MAC address table?

The Hello timer as configured on the root switch

4. Which of the following facts determines how often a nonroot bridge or switch sends an 802.1D STP Hello BPDU message

Enabling port security with the switchport port-security interface subcommand

4. Which of the following is required when configuring port security with sticky learning?

0.0.15.255

4. Which of the following wildcards masks is most useful for matching all IP packets in subnet 10.1.128.0 mask 255.255.240.0?

Port Fast Ethernet 0/5 is in a connected state

5. A Cisco Catalyst switch has 24 10/100 ports, numbered 0/1 through 0/24. Ten PC's connect to the ten lowest numbered port, with those PCs working and sending data over the network. The other ports are not connected to any device. Which of the following answers lists facts displayed by the show interfaces status command?

The ip address 172.16.2.250 255.255.255.0 command in interface vlan 2 configuration mode The ip default-gateway 172.16.2.254 command in global configuration mode

5. A LAYER 2 SWITCH CONFIGURATION PLACES ALL ITS PHYSICAL PORTS INTO VLAN2. THE IP ADDRESSING PLAN SHOWS THAT ADDRESS 172.16.2.250 WITH MASK OF 255.255.255.0 IS RESERVED FOR USE BY THIS NEW LAN SWITCH, AND THAT 172.16.2.254 IS ALREADY CONFIGURED ON THE ROUTER CONNECTED TO THAT SAME VLAN. THE SWITCH NEEDS TO SUPPORT SSH CONNECTIONS INTO THE SWITCH FROM ANY SUBNET IN THE NETWORK. *WHICH OF THE FOLLOWING COMMANDS ARE PART OF THE REQUIRED CONFIGURATION IN THIS CASE?*

VLAN 22 is listed in the output of the show vlan brief command VLAN 22 is listed in the output of the show running-config command

5. A switch has just arrived from Cisco. The switch has never been configured with any VLAN's, but VTP has been disabled. An engineer gets into configuration mode and issues the 'vlan 22' command, followed by the name Hannahs-VLAN command. Which of the following are true?

The switch generates syslog messages about the violating traffic for the first frame The switch increments the violation counter for Gi0/1 by 1

5. A switch's port Gi0/1 has been correctly enabled with port security. The configuration sets the violation mode to restrict. A frame that violates the port security policy enters the interface followed by a frame that does not. Which of the following answers correctly describes what will happen in this scenario?

First

5. ACL 1 has three statements, in the following order, with address and wildcard mask values as follows: 1.0.0.0 0.255.255.255, 1.1.0.0 0.0.255.255, and 1.1.1.0 0.0.0.255. If a router tried to match a packet sourced from IP address 1.1.1.1 using this ACL, which ACL statement does a router consider the packet to have matched?

The next hop router's neighboring interface

5. An engineer configures a static IPv4 route on Router R1. Which of the following pieces of information should not be listed as a parameter in the configuration command that creates this static IPV4 route?

Router 2.2.2.2 is a backup designated router

5. An engineer connects to Router R1 and issues a show ip ospf neighbor command. The status of neighbor 2.2.2.2 lists FULL/BDR. What does the BDR mean?

ACL B creates more risk of filtering important overhead traffic than ACL A A ping 1.1.1.1 command on R1 would bypass ACL A even if enabled

5. An engineer is considering configuring an ACL on Router R1. The engineer could use ACL A which could be enabled with the ip access-group A out command on interface G0/1, or ACL B, which would be enabled with the ip access-group B in command on that same interface. R1's G0/1 interface uses IPv4 address 1.1.1.1. Which of the answers is true when comparing these options?

Some dialer interface has an ip address negotiated interface subcommand

5. An enterprise uses Cisco IOS routers and DSL connections to local ISPs for their retail locations. The ISPs require the use of PPPoE. The routers at each retail site use dynamically learned public IP addresses as learned from the ISPs. Each router uses its F0/0 interface to connect to an external DSL modem, which then connects to a phone line. Which of the following is the most likely choice for configuring the router to use the IP address as assigned buy the ISP?

10.1.5.4

5. Examine the following excerpt from a router's CLI: P 10.1.1.0/24, 1 successors, FD is 2172416 Via 10.1.6.3 (2172416/28160), Serial0/1 Via 10.1.4.2 (2684416/2284156), Serial0/0 Via 10.1.6.3 (2684416/2165432), Serial0/0 Which of the following identifies a next-hop IP address on a feasible successor route?

The root switch's MAC address is 1833.9d7b.0e80 and the local switch is the root This switch uses RSTP

5. Examine the following first seven lines of output from the show spanning-tree command on a Cisco switch. Sw#1 show spanning-tree vlan 5 VLAN0005 Spanning tree enabled protocol rstp Root ID Priority 32773 Address 1833.9d7b.0e80 Cost 15 Port 25 (GigabitEthernet 0/1) Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Which of the following answers is true about the switch on which this command output was gathered?

R2 is active only if R2 is also configured with standby 1 preempt

5. Two routers, R1 and R2, are configured to be part of an HSRP group. R1's configuration includes the standby 1 priority 1 command, and R2's configuration includes the standby 1 priority 2 command. R1 powers up. An hour later, R2 powers up. Which of the following answers is true about which router is now the HSRP active router?

copy running-config startup-config

5. What command copies the configuration from RAM into NVRAM?

Forwarding Learning

5. Which of the following RSTP port states have the same name and purpose as a port state in traditional 802.1D STP?

show ip interface brief show version

5. Which of the following commands do not list the IP address and mask of at least one interface?

The access layer looks like a star design

5. Which one answer gives the strongest match between one part of a typical three-tier design with the idea behind the listed generic topology design term?

If a user connects a switch to the cable, prevents multiple devices from sending data through the port. Will allow any one device to connect to each port, but will not save that devices MAC address into the startup- config

6. A Cisco Catalyst switch connects to what should be individual user PCs. Each port has the same port security configuration, configured as follows: Interface range gigabit ethernet 0/1-24 Switchport mode access Switchport port-security Switchport port-security mac-address sticky WHICH OF THE FOLLOWING ANSWERS DESCRIBE THE RESULT OF THE PORT SECURITY CONFIGURATION CREATED WITH THESE COMMANDS?

Using the end command once Pressing the ctrl+z key sequence once

6. A switch user is currently in console line configuration mode. Which of the following would place the user in enable mode?

show ip access-lists show access-lists

6. An engineer configures an ACL but forgets to save the configuration. At that point, which of the following commands displays the configuration of an IPv4 ACL, including line numbers?

The ip ospf command in interface configuration mode

6. An engineer migrates from a more traditional OSPFv2 configuration that uses network commands in OSPF configuration mode to instead use OSPFv2 interface configuration. Which of the following commands configures the area number assigned to an interface in this new configuration?

Dialer interface 1 and virtual-access 1 are bound together The PPPoE session is currently working.

6. An enterprise uses Cisco IOS routers and DSL connections to local ISPs for their retail locations. The ISPs require the use of PPPoE. The following output listed comes from one such Router R1. Which of the following answers are true about the configuration on Router R1 and its current PPPoE state? R1# show pppoe session 1 client session Uniq ID PPPoE RemMAc Port VT VA State SID LocMAC VA-st Type N/A 1 0200.0000.3333 Gi0/1 Di1 Vi1 Up 0200.0000.3003 Up

The two HSRP routers are configured with different HSRP group numbers The two HSRP routers are configured with different HSRP version numbers

6. Another engineer has configured HSRP on two routers that connect to the same LAN. You connect to the console of one of the routers, and see this log message: *Mar 12 17:18:19.123 %IP-4-DUPADDR: Duplicate address 10.2.2.2 on GigabitEthernet0/0, sourced by 0000.0c9f.f002 Which of the following answers list an HSRP configuration mistake that would cause the router to list this message?

02CC.CCCC.CCCC was learned from the source MAC address of a frame that entered port Gi0/3

6. Consider the following output from a Cisco Catalyst switch: SW1# show mac address-table dynamic MAC Address Table VLAN MAC Type Ports 1 02AA.AAAA.AAAA Dynamic gio/1 1 02BB.BBBB.BBBB Dynamic gio/2 1 02CC.CCCC.CCCC Dynamic gio/3 Total MAC addresses for this criterion:3 WHICH OF THE FOLLOWING ANSWERS ARE TRUE ABOUT THIS SWITCH?

An alternate port waits to become a root port A backup port waits to become a designated port

6. RSTP adds some concepts to STP that enable ports to be used for a role if another port on the same switch fails. Which of the following statements correctly describe a port role that is waiting to take over for another port role?

show ip eigrp topology

6. Router R1's EIGRP process knows of three possible routers to subnet 1. One route is a successor, and one is a feasible successor. R1 is not using the variance command to allow for unequal-cost load balancing. Which of the following command shows information about the feasible successor route, including its metric, whether as EIGRP topology information or as an IPv4 route?

Fa0/2 is Shr because Fa0/2 uses half duplex Gi0/2 is P2p because the switch had no reason to make it Shr or P2p Edge

6. The following output shows the last line of output of a show spanning-tree command extracted from a Cisco switch running IOS: SW#1 show spanning-tree vlan 10 ! lines omitted Interface Role Sts Cost Prio.Nbr Type Fa 0/1 Desg FWD 100 128.1 P2p Edge Fa0/2 Desg FWD 19 128.2 Shr Gi0/1 Desg FWD 4 128.25 P2p Gi0/2 Root FWD 4 128.26 P2p The answers all mention an interface and the state listed in the Type column of the output, along with a reason why that port should be listed as that type of STP port. Which answers list what could be a correct reason for the interface to be listed as that type of STP port?

1000Base-SX 1000Base-LX

6. Which of the following Ethernet standards support a max cable length of a longer than 100 meters?

access-list 1 permit 172.16.4.0 0.0.1.255

6. Which of the following access-list commands matches all packets sent from hosts in subnet 172.16.4.0/23?

ip route 10.1.3.0 --255.255.255.0-- 10.1.130.253

6. Which of the following commands correctly configures a static route?

show interfaces switchport show interfaces trunk

6. Which of the following commands identify switch interfaces as being trunking interfaces: interfaces that currently operate as VLAN trunks?

The number of IP addresses configured

6. Which of the following is different on the Cisco switch CLI for a layer 2 switch as compared with the Cisco router CLI?

logging synchronous

6. Which of the following line subcommands tells a switch to wait until a show commands output has completed before displaying log messages on the screen?

interface s0/0/0 is down

7. A network engineer configures the ip route 10.1.1.0 255.255.255.0 s0/0/0 command on a router, and then issues a show ip route command from enable mode. No routes for subnet 10.1.1.0/24 appear on the output. Which of the following could be true?

Look at the commands on the physical Ethernet interface

7. An enterprise uses Cisco IOS routers and DSL connections to local ISPs for their retail locations. The ISPs require the use of PPPoE. A network engineer connects to the console of one router at a retail office, issues the show pppoe session command, and the router just returns a command prompt, with no lines of output. If you knew the problem was related to the configuration on the local router , which one of the four following areas would be the best area to recommend your colleagues to investigate in their next troubleshooting step?

The feasible successor route (metric 350)

7. Router R1 has four routes to subnet 2. The one successor route has a metric of 100, and the one feasible successor route has a metric of 350. The other routes have metrics of 450 and 550. R1's EIGRP configuration includes the variance 5 command. Choose the answer that refers to the highest-metric route to subnet 2 that will be visible in the output of the show ip route eigrp command on R1.

PortFast

7. What STP feature causes an interface to be placed in the forwarding state as soon as the interface is physically active?

delay

7. Which of the following configuration settings on a router does not influence which IPv4 route a router chooses to add to its IPv4 routing table when using OSPFv2?


Related study sets

Chapter 21 - Mastering A&P Questions

View Set

STUDY GUIDE CHAPTER 34: HEART FAILURE

View Set

Maternity chapters 10,11,12 PrepU

View Set