ccna2 theory 105-120 Flashcards

1
Q

What are three techniques for mitigating VLAN attacks? (Choose three.)

A

Disable DTP.
Set the native VLAN to an unused VLAN.
Enable trunking manually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Match the DHCP message types to the order of the DHCPv4 process. (Not all options are used.)

A

s1 = discover
s2 = offer
s3 = request
s4 = pack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In which situation would a technician use the show interfaces switch command?

A

when packets are being dropped from a particular directly attached host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a drawback of the local database method of securing device access that can be solved by using AAA with centralized servers?

A

User accounts must be configured locally on each device, which is an unscalable authentication solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What action does a DHCPv4 client take if it receives more than one DHCPOFFER from multiple DHCP servers?

A

It sends a DHCPREQUEST that identifies which lease offer the client is accepting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Refer to the exhibit. The network administrator is configuring the port security feature on switch SWC. The administrator issued the command show port-security interface fa 0/2 to verify the configuration. What can be concluded from the output that is shown? (Choose three.)

A

This port is currently up.
Security violations will cause this port to shut down immediately.
The switch port mode for this interface is access mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What method of wireless authentication is dependent on a RADIUS authentication server?

A

WPA2 Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network administrator has found a user sending a double-tagged 802.1Q frame to a switch. What is the best solution to prevent this type of attack?

A

The VLANs for user access ports should be different VLANs than any native VLANs used on trunk ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Refer to the exhibit. Which two conclusions can be drawn from the output? (Choose two.)

A

The EtherChannel is down.
The port channel ID is 2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Match the step number to the sequence of stages that occur during the HSRP failover process. (Not all options are used.)

A

s1 = forward
s2 = router stop
s3 = router assumes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

On a Cisco 3504 WLC Summary page ( Advanced > Summary ), which tab allows a network administrator to configure a particular WLAN with a WPA2 policy?

A

WLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Refer to the exhibit. A network engineer is configuring IPv6 routing on the network. Which command issued on router HQ will configure a default route to the Internet to forward packets to an IPv6 destination network that is not listed in the routing table?​

A

ipv6 route ::/0 serial 0/1/1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Users are complaining of sporadic access to the internet every afternoon. What should be done or checked?

A

Check the statistics on the default route for oversaturation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What action takes place when the source MAC address of a frame entering a switch appears in the MAC address table associated with a different port?

A

The switch replaces the old entry and uses the more current port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network administrator is configuring a WLAN. Why would the administrator use a WLAN controller?

A

to facilitate group configuration and management of multiple WLANs through a WLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly