ccna2 theory 60-75 Flashcards
Which type of static route is configured with a greater administrative distance to provide a backup route to a route learned from a dynamic routing protocol?
floating static route
What action takes place when a frame entering a switch has a unicast destination MAC address appearing in the MAC address table?
The switch forwards the frame out of the specified port.
The exhibit shows two PCs called PC A and PC B, two routes called R1 and R2, and two switches. PC A has the address 172.16.1.1/24 and is connected to a switch and into an interface on R1 that has the IP address 172.16.1.254. PC B has the address 172.16.2.1/24 and is connected to a switch that is connected to another interface on R1 with the IP address 172.16.2.254. The serial interface on R1 has the address 172.16.3.1 and is connected to the serial interface on R2 that has the address 172.16.3.2/24. R2 is connected to the internet cloud. Which command will create a static route on R2 in order to reach PC B?
R2(config)# ip route 172.16.2.0 255.255.255.0 172.16.3.1
What protocol or technology allows data to transmit over redundant switch links?
etherChannel
Refer to the exhibit. Which three hosts will receive ARP requests from host A, assuming that port Fa0/4 on both switches is configured to carry traffic for multiple VLANs? (Choose three.)
host C
host D
host F
Refer to the exhibit. The network administrator configures both switches as displayed. However, host C is unable to ping host D and host E is unable to ping host F. What action should the administrator take to enable this communication?
Configure either trunk port in the dynamic desirable mode.
What is the effect of entering the shutdown configuration command on a switch?
It disables an unused port.
What would be the primary reason an attacker would launch a MAC address overflow attack?
so that the attacker can see frames that are destined for other hosts
During the AAA process, when will authorization be implemented?
Immediately after successful authentication against an AAA data source
A company security policy requires that all MAC addressing be dynamically learned and added to both the MAC address table and the running configuration on each switch. Which port security configuration will accomplish this?
sticky secure MAC addresses
Which three Wi-Fi standards operate in the 2.4GHz range of frequencies? (Choose three.)
802.11b
802.11g
802.11n
To obtain an overview of the spanning tree status of a switched network, a network engineer issues the show spanning-tree command on a switch. Which two items of information will this command display? (Choose two.)
The root bridge BID.
The role of the ports in all VLANs.
Refer to the exhibit. Which trunk link will not forward any traffic after the root bridge election process is complete?
trunk2
Which method of IPv6 prefix assignment relies on the prefix contained in RA messages?
SLAAC
Which two protocols are used to provide server-based AAA authentication? (Choose two.)
TACACS+
RADIUS