ccna2 theory 75-90 Flashcards
A network administrator is configuring a WLAN. Why would the administrator disable the broadcast feature for the SSID?
to eliminate outsiders scanning for available SSIDs in the area
Which mitigation technique would prevent rogue servers from providing false IP configuration parameters to clients?
turning on DHCP snooping
A network administrator configures the port security feature on a switch. The security policy specifies that each access port should allow up to two MAC addresses. When the maximum number of MAC addresses is reached, a frame with the unknown source MAC address is dropped and a notification is sent to the syslog server. Which security violation mode should be configured for each access port?
restrict
What protocol or technology defines a group of routers, one of them defined as active and another one as standby?
HSRP
Refer to the exhibit. After attempting to enter the configuration that is shown in router RTA, an administrator receives an error and users on VLAN 20 report that they are unable to reach users on VLAN 30. What is causing the problem?
RTA is using the same subnet for VLAN 20 and VLAN 30.
Which three pairs of trunking modes will establish a functional trunk link between two Cisco switches? (Choose three.)
dynamic desirable - trunk
dynamic desirable - dynamic desirable
dynamic desirable - dynamic auto
A technician is configuring a router for a small company with multiple WLANs and doesn’t need the complexity of a dynamic routing protocol. What should be done or checked?
Create static routes to all internal networks and a default route to the internet.
A company is deploying a wireless network in the distribution facility in a Boston suburb. The warehouse is quite large and it requires multiple access points to be used. Because some of the company devices still operate at 2.4GHz, the network administrator decides to deploy the 802.11g standard. Which channel assignments on the multiple access points will make sure that the wireless channels are not overlapping?
channels 1, 6, and 11
A network administrator of a small advertising company is configuring WLAN security by using the WPA2 PSK method. Which credential do office users need in order to connect their laptops to the WLAN?
a key that matches the key on the AP
Refer to the exhibit. What are the possible port roles for ports A, B, C, and D in this RSTP-enabled network?
alternate, designated, root, root
Refer to the exhibit. Which static route would an IT technician enter to create a backup route to the 172.16.1.0 network that is only used if the primary RIP learned route fails?
ip route 172.16.1.0 255.255.255.0 s0/0/0 121
What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?
Enable port security.
A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users access high bandwidth services such as streaming video, the wireless network performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve the wireless network performance for that type of service?
The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia.
Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server?
broadcast DHCPREQUEST
Refer to the exhibit. Which destination MAC address is used when frames are sent from the workstation to the default gateway?
MAC address of the virtual router