1/98
Semester 3 Final
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
A) Refer to the exhibit. Host A has sent a packet to host B. What will be the source
MAC and IP addresses on the packet when it arrives at host B?
A) Source MAC: 00E0.FE91.7799
B) Refer to the exhibit. Host A has sent a packet to host B. What will be the source
MAC and IP addresses on the packet when it arrives at host B?
B) Source IP: 10.1.1.10
Which option shows a correctly configured IPv4 default static route?
ip route 0.0.0.0 0.0.0.0 S0/0/0
Match the DHCP message types to the order of the DHCPv4 process.
Step 1:
DHCPDISCOVER
Match the DHCP message types to the order of the DHCPv4 process.
Step 2:
DHCPOFFER
Match the DHCP message types to the order of the DHCPv4 process.
Step 3:
DHCPREQUEST
Match the DHCP message types to the order of the DHCPv4 process.
Step 4:
DHCPACK
Match the description to the correct VLAN type. (Not all options are used.)
Data VLAN:
configured to carry user-generated traffic
Match the description to the correct VLAN type. (Not all options are used.)
Default VLAN:
where all switch ports belong after the initial boot up of a
switch loading the default configuration
Match the description to the correct VLAN type. (Not all options are used.)
Native VLAN:
assigned to an 802.1Q trunk port, and untagged traffic is placed on it
Match the description to the correct VLAN type. (Not all options are used.)
Management VLAN:
any VLAN that is configured to access the management
capabilities of a switch
Match the description to the correct VLAN type. (Not all options are used.)
? VLAN:
address and subnet mask are assigned to it, allowing the switch to be managed via
HTTP, Telnet, SSH, or SNMP
An administrator is trying to remove configurations from a switch. After using the
command erase startup-config and reloading the switch, the administrator finds that
VLANs 10 and 100 still exist on the switch. Why were these VLANs not removed?
Because these VLANs are stored in a file that is called vlan.dat that is located in flash
memory, this file must be manually deleted
Refer to the exhibit. What is the metric to forward a data packet with the IPv6
destination address 2001:DB8:ACAD:E:240:BFF:FED4:9DD2?
2682112
Refer to the exhibit. A network administrator is configuring inter-VLAN routing on a
network. For now, only one VLAN is being used, but more will be added soon. What is the
missing parameter that is shown as the highlighted question mark in the graphic?
It identifies the VLAN number
A) Refer to the exhibit. A Layer 3 switch routes for three VLANs and connects to a router
for Internet connectivity. Which two configurations would be applied to the switch?
(Choose two.)
A)
(config)# interface gigabitethernet 1/1
(config-if)# no switchport
(config-if)# ip address 192.168.1.2 255.255.255.252
B) Refer to the exhibit. A Layer 3 switch routes for three VLANs and connects to a router
for Internet connectivity. Which two configurations would be applied to the switch?
(Choose two.)
B) (config)# ip routing
Which information does a switch use to populate the MAC address table?
the source MAC address and the incoming port
Refer to the exhibit. In addition to static routes directing traffic to networks
10.10.0.0/16 and 10.20.0.0/16, Router HQ is also configured with the following command:
ip route 0.0.0.0 0.0.0.0 serial 0/1/1
What is the purpose of this command?
Packets with a destination network that is not 10.10.0.0/16 or is not 10.20.0.0/16 or is not
a directly connected network will be forwarded to the Internet.
Refer to the exhibit. How is a frame sent from PCA forwarded to PCC if the MAC
address table on switch SW1 is empty?
SW1 floods the frame on all ports on SW1, excluding the port through which the frame
entered the switch
A) What are two reasons a network administrator would segment a network with a Layer
2 switch? (Choose two.)
to enhance user bandwidth
B) What are two reasons a network administrator would segment a network with a Layer
2 switch? (Choose two.)
B) to isolate traffic between segments
Refer to the exhibit. A network administrator configures R1 for inter-VLAN routing
between VLAN 10 and VLAN 20. However, the devices in VLAN 10 and VLAN 20 cannot
communicate. Based on the configuration in the exhibit, what is a possible cause for the
problem?
The encapsulation is misconfigured on a subinterface.
Refer to the exhibit. If the IP addresses of the default gateway router and the DNS
server are correct, what is the configuration problem?
The IP address of the default gateway router is not contained in the excluded address list.
Refer to the exhibit. Which destination MAC address is used when frames are sent
from the workstation to the default gateway?
MAC address of the virtual router
A) To obtain an overview of the spanning-tree status of a switched network, a network
engineer issues the show spanning-tree command on a switch. Which two items of
information will this command display? (Choose two.)
A) The root bridge BID.
B) To obtain an overview of the spanning-tree status of a switched network, a network
engineer issues the show spanning-tree command on a switch. Which two items of
information will this command display? (Choose two.)
B) The role of the ports in all VLANs.
A) Refer to the exhibit. All the displayed switches are Cisco 2960 switches with the same
default priority and operating at the same bandwidth. Which three ports will be STP
designated ports? (Choose three.)
A) fa0/21
B) Refer to the exhibit. All the displayed switches are Cisco 2960 switches with the same
default priority and operating at the same bandwidth. Which three ports will be STP
designated ports? (Choose three.)
B) fa0/10
C) Refer to the exhibit. All the displayed switches are Cisco 2960 switches with the same
default priority and operating at the same bandwidth. Which three ports will be STP
designated ports? (Choose three.)
C) fa0/13
What method of wireless authentication is dependent on a RADIUS authentication
server?
WPA2 Enterprise
Which wireless encryption method is the most secure?
WPA2 with AES
A) Refer to the exhibit. Which two conclusions can be drawn from the output? (Choose
two.)
A) The EtherChannel is down.
B) Refer to the exhibit. Which two conclusions can be drawn from the output? (Choose
two.)
B) The port channel ID is 2.
A) Refer to the exhibit. What are the possible port roles for ports A, B, C, and D in this
RSTP-enabled network?
A) alternate
B) Refer to the exhibit. What are the possible port roles for ports A, B, C, and D in this
RSTP-enabled network?
B) designated
C) Refer to the exhibit. What are the possible port roles for ports A, B, C, and D in this
RSTP-enabled network?
C) root
D) Refer to the exhibit. What are the possible port roles for ports A, B, C, and D in this
RSTP-enabled network?
D) root
Refer to the exhibit. Which trunk link will not forward any traffic after the root bridge
election process is complete?
Trunk2
A) Match the forwarding characteristic to its type. (Not all options are used.)
Cut-Through:
A) Appropriate for high performance computing applications
B) Match the forwarding characteristic to its type. (Not all options are used.)
Cut-Through:
B) Forwarding process can begin after receiving the destination address
C) Match the forwarding characteristic to its type. (Not all options are used.)
Cut-Through:
C) May forward invalid frames
A) Match the forwarding characteristic to its type. (Not all options are used.)
Store-and-Forward:
Error checking before forwarding
B) Match the forwarding characteristic to its type. (Not all options are used.)
Store-and-Forward:
B) Forwarding process only begins after receiving the entire frame
C) Match the forwarding characteristic to its type. (Not all options are used.)
Store-and-Forward:
C) Only forwards valid frames
A) Compared with dynamic routes, what are two advantages of using static routes on a
router? (Choose two.)
A) They improve network security.
B) Compared with dynamic routes, what are two advantages of using static routes on a
router? (Choose two.)
B) They use fewer router resources.
Which command will create a static route on R2 in order to reach PC B?
R2(config)# ip route 172.16.2.0 255.255.255.0 172.16.3.1
Refer to the exhibit. R1 was configured with the static route command
ip route 209.165.200.224 255.255.255.224 S0/0/0
and consequently users on network 172.16.0.0/16 are unable to reach resources on the
Internet. How should this static route be changed to allow user traffic from the LAN to
reach the Internet?
Change the destination network and mask to 0.0.0.0 0.0.0.0
Refer to the exhibit. Router R1 has an OSPF neighbor relationship with the ISP router
over the 192.168.0.32 network. The 192.168.0.36 network link should serve as a backup
when the OSPF link goes down. The floating static route command ip route 0.0.0.0 0.0.0.0
S0/0/1 100 was issued on R1 and now traffic is using the backup link even when the OSPF
link is up and functioning. Which change should be made to the static route command so
that traffic will only use the OSPF link when it is up?
Change the administrative distance to 120.
What IPv6 prefix is designed for link-local communication?
fe80::/10
A) A network administrator is configuring a new Cisco switch for remote management
access. Which three items must be configured on the switch for the task? (Choose three.)
A) IP address
B) A network administrator is configuring a new Cisco switch for remote management
access. Which three items must be configured on the switch for the task? (Choose three.)
B) vty lines
C) A network administrator is configuring a new Cisco switch for remote management
access. Which three items must be configured on the switch for the task? (Choose three.)
C) default gateway
After a host has generated an IPv6 address by using the DHCPv6 or SLAAC process,
how does the host verify that the address is unique and therefore usable?
The host sends an ICMPv6 neighbor solicitation message to the DHCP or SLAAC-
learned address and if no neighbor advertisement is returned, the address is considered
unique.
A network administrator configures the port security feature on a switch. The security
policy specifies that each access port should allow up to two MAC addresses. When the
maximum number of MAC addresses is reached, a frame with the unknown source MAC
address is dropped and a notification is sent to the syslog server. Which security violation
mode should be configured for each access port?
restrict
What is a secure configuration option for remote access to a network device?
Configure SSH.
Which network attack is mitigated by enabling BPDU guard?
rogue switches on a network
What is a drawback of the local database method of securing device access that can be
solved by using AAA with centralized servers?
User accounts must be configured locally on each device, which is an unscalable
authentication solution.
After attaching four PCs to the switch ports, configuring the SSID and setting
authentication properties for a small office network, a technician successfully tests the
connectivity of all PCs that are connected to the switch and WLAN. A firewall is then
configured on the device prior to connecting it to the Internet. What type of network device
includes all of the described features?
wireless router
Refer to the exhibit. Router R1 has an OSPF neighbor relationship with the ISP router
over the 192.168.0.32 network. The 192.168.0.36 network link should serve as a backup
when the OSPF link goes down. The floating static route command ip route 0.0.0.0 0.0.0.0
S0/0/1 100 was issued on R1 and now traffic is using the backup link even when the OSPF
link is up and functioning. Which change should be made to the static route command so
that traffic will only use the OSPF link when it is up?
Change the administrative distance to 120.
Refer to the exhibit. An administrator is attempting to install an IPv6 static route on
router R1 to reach the network attached to router R2. After the static route command is
entered, connectivity to the network is still failing. What error has been made in the static
route configuration?
The interface is incorrect.
Refer to the exhibit. What can be concluded about the configuration shown on R1?
R1 is configured as a DHCPv4 relay agent.
A) Refer to the exhibit. A network administrator has added a new subnet to the network
and needs hosts on that subnet to receive IPv4 addresses from the DHCPv4 server.
What two commands will allow hosts on the new subnet to receive addresses from the
DHCP4 server? (Choose two.)
A) R1(config)# interface G0/0
B) Refer to the exhibit. A network administrator has added a new subnet to the network
and needs hosts on that subnet to receive IPv4 addresses from the DHCPv4 server.
What two commands will allow hosts on the new subnet to receive addresses from the
DHCP4 server? (Choose two.)
B) R1(config-if)# ip helper-address 10.2.0.250
Refer to the exhibit. Which static route would an IT technician enter to create a backup
route to the 172.16.1.0 network that is only used if the primary RIP learned route fails?
ip route 172.16.1.0 255.255.255.0 s0/0/0 121
Match the link state to the interface and protocol status. (Not all options are used.)
Disabled:
administratively down
Match the link state to the interface and protocol status. (Not all options are used.)
Layer 1 problem:
down/down
Match the link state to the interface and protocol status. (Not all options are used.)
Layer 2 problem:
up/down
Match the link state to the interface and protocol status. (Not all options are used.)
Operational:
up/up
A) Refer to the exhibit. Which three hosts will receive ARP requests from host A, assuming
that port Fa0/4 on both switches is configured to carry traffic for multiple VLANs?
(Choose three.)
A) host C
B) Refer to the exhibit. Which three hosts will receive ARP requests from host A, assuming
that port Fa0/4 on both switches is configured to carry traffic for multiple VLANs?
(Choose three.)
B) host D
C) Refer to the exhibit. Which three hosts will receive ARP requests from host A, assuming
that port Fa0/4 on both switches is configured to carry traffic for multiple VLANs?
(Choose three.)
C) host F
Refer to the exhibit. A network administrator has connected two switches together
using EtherChannel technology. If STP is running, what will be the end result?
STP will block one of the redundant links.
Refer to the exhibit. A network administrator configured routers R1 and R2 as part of
HSRP group 1. After the routers have been reloaded, a user on Host1 complained of lack of
connectivity to the Internet The network administrator issued the show standby brief
command on both routers to verify the HSRP operations. In addition, the administrator
observed the ARP table on Host1. Which entry should be seen in the ARP table on Host1 in
order to gain connectivity to the Internet?
the virtual IP address and the virtual MAC address for the HSRP group 1
A) A new switch is to be added to an existing network in a remote office. The network
administrator does not want the technicians in the remote office to be able to add new
VLANs to the switch, but the switch should receive VLAN updates from the VTP domain.
Which two steps must be performed to configure VTP on the new switch to meet these
conditions? (Choose two.)
A) Configure the new switch as a VTP client.
B) A new switch is to be added to an existing network in a remote office. The network
administrator does not want the technicians in the remote office to be able to add new
VLANs to the switch, but the switch should receive VLAN updates from the VTP domain.
Which two steps must be performed to configure VTP on the new switch to meet these
conditions? (Choose two.)
B) Configure the existing VTP domain name on the new switch.
Refer to the exhibit. The network administrator configures both switches as displayed.
However, host C is unable to ping host D and host E is unable to ping host F. What action
should the administrator take to enable this communication?
Configure either trunk port in the dynamic desirable mode.
A) What are three techniques for mitigating VLAN attacks? (Choose three.)
A) Enable trunking manually.
B) What are three techniques for mitigating VLAN attacks? (Choose three.)
B) Disable DTP.
C) What are three techniques for mitigating VLAN attacks? (Choose three.)
C) Set the native VLAN to an unused VLAN.
A) A company is deploying a wireless network in the distribution facility in a Boston
suburb. The warehouse is quite large and it requires multiple access points to be used.
Because some of the company devices still operate at 2.4GHz, the network administrator
decides to deploy the 802.11g standard. Which channel assignments on the multiple access
points will make sure that the wireless channels are not overlapping?
A) channel 1
B) A company is deploying a wireless network in the distribution facility in a Boston
suburb. The warehouse is quite large and it requires multiple access points to be used.
Because some of the company devices still operate at 2.4GHz, the network administrator
decides to deploy the 802.11g standard. Which channel assignments on the multiple access
points will make sure that the wireless channels are not overlapping?
B) channel 6
C) A company is deploying a wireless network in the distribution facility in a Boston
suburb. The warehouse is quite large and it requires multiple access points to be used.
Because some of the company devices still operate at 2.4GHz, the network administrator
decides to deploy the 802.11g standard. Which channel assignments on the multiple access
points will make sure that the wireless channels are not overlapping?
C) channel 11
A cybersecurity analyst is using the macof tool to evaluate configurations of switches
deployed in the backbone network of an organization. Which type of LAN attack is the
analyst targeting during this evaluation?
MAC address table overflow
On a Cisco 3504 WLC Summary page ( Advanced > Summary ), which tab allows a
network administrator to access and configure a WLAN for a specific security option such
as WPA2?
WLANs
A network administrator of a small advertising company is configuring WLAN security
by using the WPA2 PSK method. Which credential do office users need in order to connect
their laptops to the WLAN?
a key that matches the key on the AP
What is the common term given to SNMP log messages that are generated by network
devices and sent to the SNMP server?
traps
What action takes place when a frame entering a switch has a unicast destination MAC
address appearing in the MAC address table?
The switch forwards the frame out of the specified port.
A) A new Layer 3 switch is connected to a router and is being configured for interVLAN
routing. What are three of the five steps required for the configuration? (Choose three.)
A) assigning ports to VLANs
B) A new Layer 3 switch is connected to a router and is being configured for interVLAN
routing. What are three of the five steps required for the configuration? (Choose three.)
B) creating SVI interfaces
C) A new Layer 3 switch is connected to a router and is being configured for interVLAN
routing. What are three of the five steps required for the configuration? (Choose three.)
C) creating VLANs
A) Select the three PAgP channel establishment modes. (Choose three.)
A) auto
B) Select the three PAgP channel establishment modes. (Choose three.)
B) desirable
C) Select the three PAgP channel establishment modes. (Choose three.)
C) on
What protocol or technology requires switches to be in server mode or client mode?
VTP
A network administrator is configuring a WLAN. Why would the administrator disable
the broadcast feature for the SSID?
to eliminate outsiders scanning for available SSIDs in the area
A company has just switched to a new ISP. The ISP has completed and checked the
connection from its site to the company. However, employees at the company are not able
to access the internet. What should be done or checked?
Ensure that the old default route has been removed from the company edge routers.
What is the effect of entering the show ip dhcp snooping binding configuration
command on a switch?
It displays the IP-to-MAC address associations for switch interfaces.