CCNA 2 - SRWE Practice Final Exam Flashcards
A network administrator is using the router-on-a-stick method to configure inter-VLAN routing. Switch port Gi1/1 is used to connect to the router. Which command should be entered to prepare this port for the task?
Switch(config)# interface gigabitethernet 1/1
Switch(config-if)# spanning-tree vlan 1
Switch(config)# interface gigabitethernet 1/1
Switch(config-if)# spanning-tree portfast
Switch(config)# interface gigabitethernet 1/1
Switch(config-if)# switchport mode trunk
Switch(config)# interface gigabitethernet 1/1
Switch(config-if)# switchport access vlan 1
Switch(config)# interface gigabitethernet 1/1
Switch(config-if)# switchport mode trunk
Refer to the exhibit. The configuration shows commands entered by a network administrator for inter-VLAN routing. However, host H1 cannot communicate with H2. Which part of the inter-VLAN configuration causes the problem?
CCNA 2 (Version 7.00) SRWE Practice Final Exam Answers 1
trunking
port mode on the two switch FastEthernet ports
VLAN configuration
router port configuration
VLAN configuration
Refer to the exhibit. Inter-VLAN communication between VLAN 10, VLAN 20, and VLAN 30 is not successful. What is the problem?
CCNA 2 (Version 7.00) SRWE Practice Final Exam Answers 2
The access interfaces do not have IP addresses and each should be configured with an IP address.
The switch interface FastEthernet0/1 is configured as an access interface and should be configured as a trunk interface.
The switch interface FastEthernet0/1 is configured to not negotiate and should be configured to negotiate.
The switch interfaces FastEthernet0/2, FastEthernet0/3, and FastEthernet0/4 are configured to not negotiate and should be configured to negotiate.
The switch interface FastEthernet0/1 is configured as an access interface and should be configured as a trunk interface.
An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation?
cracking
denial of service
rogue access point
spoofing
rogue access point
Which combination of WLAN authentication and encryption is recommended as a best practice for home users?
WPA2 and AES
WEP and RC4
WPA and PSK
EAP and AES
WEP and TKIP
WPA2 and AES
What are the two methods that a wireless NIC can use to discover an AP? (Choose two.)
transmitting a probe request
sending an ARP request broadcast
receiving a broadcast beacon frame
initiating a three-way handshake
sending a multicast frame
transmitting a probe request
receiving a broadcast beacon frame
What address and prefix length is used when configuring an IPv6 default static route?
::/0
::1/128
0.0.0.0/0
FF02::1/8
::/0
Refer to the exhibit. Match the description with the routing table entries. (Not all options are used.)
CCNA 2 (Version 7.00) SRWE Practice Final Exam Answers 3
Graphic contains output of show ip route as follows:
R3# show ip route 172.16.0.0/24 is subnetted, 3 subnets
C 172.16.0.0 is directly connected, Serial0/1/0
D 172.16.1.0 [90/21024000] via 172.16.0.1, 00:22:15, Serial0/1/0
C 172.16.2.0 is directly connected, Serial0/1/0
10.0.0.0/24 is subnetted, 1 subnets
S 10.2.0.0/24 [1/0] via 172.16.2.2
C 10.3.0.0 is directly connected, FastEthernet0/0
Explanation:
route source protocol = D (which is EIGRP)
destination network = 10.3.0.0
metric = 21024000
administrative distance = 1
next hop = 172.16.2.2
route timestamp = 00:22:15
Refer to the exhibit. Which interface will be the exit interface to forward a data packet that has the destination IP address 172.18.109.152?
Gateway of last resort is not set.
172.18.109.0/26 is variously subnetted, 7 subnets, 3 masks
O 172.18.109.0/26 [110/10] via 172.18.32.1, 00:00:24, Serial0/0/0
O 172.18.109.64/26 [110/20] via 172.18.32.6, 00:00:56, Serial 0/0/1
O 172.18.109.128/26 [110/10] via 172.18.32.1, 00:00:24, Serial 0/0/0
C 172.18.109.192/27 is directly connected, GigabitEthernet0/0
L 172.18.109.193/27 is directly connected, GigabitEthernet0/0
C 172.18.109.224/27 is directly connected, GigabitEthernet0/1
L 172.18.109.225/27 is directly connected, GigabitEthernet0/1
172.18.32.0/24 is variably subnetted, 4 subnets, 2 masks
C 172.18.32.0/30 is directly connected, Serial0/0/0
L 172.18.32.2/32 is directly connected, Serial0/0/0
C 172.18.32.4/30 is directly connected, Serial0/0/1
L 172.18.32.5/32 is directly connected, Serial0/0/1
S 172.18.33.0/26 [1/0] via 172.18.32.1, 00:00:24, Serial0/0/0
R1#
GigabitEthernet0/0
GigabitEthernet0/1
Serial0/0/0
None, the packet will be dropped.
Serial0/0/0
Match the dynamic routing protocol component to the characteristic. (Not all options are used.)
data structures
tables or databases that are stored in RAM
routing protocol messages
exchanges routing information and maintains accurate information about networks
algorithm
a finite list of steps used to determine the best path
Which statement describes the behavior of a switch when the MAC address table is full?
It treats frames as unknown unicast and floods all incoming frames to all ports on the switch.
It treats frames as unknown unicast and floods all incoming frames to all ports across multiple switches.
It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN.
It treats frames as unknown unicast and floods all incoming frames to all ports within the collision domain.
It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN.
Which term describes the role of a Cisco switch in the 802.1X port-based access control?
agent
supplicant
authenticator
authentication server
authenticator
What is a result of connecting two or more switches together?
The number of broadcast domains is increased.
The size of the broadcast domain is increased.
The number of collision domains is reduced.
The size of the collision domain is increased.
The size of the broadcast domain is increased.
A small publishing company has a network design such that when a broadcast is sent on the LAN, 200 devices receive the transmitted broadcast. How can the network administrator reduce the number of devices that receive broadcast traffic?
Add more switches so that fewer devices are on a particular switch.
Replace the switches with switches that have more ports per switch. This will allow more devices on a particular switch.
Segment the LAN into smaller LANs and route between them.
Replace at least half of the switches with hubs to reduce the size of the broadcast domain.
Segment the LAN into smaller LANs and route between them.
Refer to the exhibit. How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty?
CCNA 2 (Version 7.00) SRWE Practice Final Exam Answers 6
SW1 forwards the frame directly to SW2. SW2 floods the frame to all ports connected to SW2, excluding the port through which the frame entered the switch.
SW1 floods the frame on all ports on the switch, excluding the interconnected port to switch SW2 and the port through which the frame entered the switch.
SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch.
SW1 drops the frame because it does not know the destination MAC address.
SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch.
What are two switch characteristics that could help alleviate network congestion? (Choose two.)
fast internal switching
large frame buffers
store-and-forward switching
low port density
frame check sequence (FCS) check
fast internal switching
large frame buffers
A network engineer is configuring a LAN with a redundant first hop to make better use of the available network resources. Which protocol should the engineer implement?
FHRP
GLBP
HSRP
VRRP
GLBP
Match the FHRP protocols to the appropriate description. (Not all options are used.)
Explanation: GLBP, A Cisco proprietary FHRP that provides load sharing in addition to redundancy. HSRP A Cisco proprietary FHRP that provides redundancy through use of an active device and standby device. VRRP, An open standard FHRP that provides redundancy through use of a virtual routers master and one or more backups. Distractor, A legacy open standard FHRP that allows IPv4 hosts to discover gateway routers.
After sticky learning of MAC addresses is enabled, what action is needed to prevent dynamically learned MAC addresses from being lost in the event that an associated interface goes down?
Reboot the switch.
Copy the running configuration to the startup configuration.
Shut down the interface then enable it again with the no shutdown command.
Configure port security for violation protect mode.
Copy the running configuration to the startup configuration.
A small coffee shop is offering free Wi-Fi to customers. The network includes a wireless router and a DSL modem that is connected to the local phone company. What method is typically used to configure the connection to the phone company?
Set the WAN connection in the wireless router as a DHCP client.
Set the connection between the wireless router and the DSL modem as a private IP network.
Set the DSL modem as a DHCP client to get a public IP address from the wireless router.
Set the DSL modem as a DHCP client to the phone company and a DHCP server for the internal connection.
Set the WAN connection in the wireless router as a DHCP client.
Match the purpose with its DHCP message type. (Not all options are used.)
Explanation: The DHCPDISCOVER message is used to identify any DHCP servers on a network. The DHCPOFFER message is used by a server to offer a lease to a client. The DHCPREQUEST message is used to identify both the specific DHCP server and the lease that the client is accepting.
The DHCPACK message is used by a server to finalize a successful lease with a client.
The DHCPNAK message is used when an offered lease is no longer valid.
Match the spanning-tree feature with the protocol type. (Not all options are used.)
Explanation: MST is the Cisco implementation of MSTP (IEEE 802.1s).