Q:121-140 Flashcards

1
Q
  1. Which three statements accurately describe duplex and speed settings on Cisco 2960 switches? (Choose three.)

An autonegotiation failure can result in connectivity issues.

When the speed is set to 1000 Mb/s, the switch ports will operate in full-duplex mode.

The duplex and speed settings of each switch port can be manually configured.

Enabling autonegotiation on a hub will prevent mismatched port speeds when connecting the hub to the switch.

By default, the speed is set to 100 Mb/s and the duplex mode is set to autonegotiation.

By default, the autonegotiation feature is disabled.

A

An autonegotiation failure can result in connectivity issues.

When the speed is set to 1000 Mb/s, the switch ports will operate in full-duplex mode.

The duplex and speed settings of each switch port can be manually configured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Refer to the exhibit. A network administrator configures R1 for inter-VLAN routing between VLAN 10 and VLAN 20. However, the devices in VLAN 10 and VLAN 20 cannot communicate. Based on the configuration in the exhibit, what is a possible cause for the problem?

A. The port Gi0/0 should be configured as trunk port.
B. The encapsulation is misconfigured on a subinterface.
C. A no shutdown command should be added in each subinterface configuration.
D. The command interface gigabitEthernet 0/0.1 is wrong.

A

D. The command interface gigabitEthernet 0/0.1 is wrong.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. A network administrator uses the spanning-tree portfast bpduguard default global configuration command to enable BPDU guard on a switch. However, BPDU guard is not activated on all access ports. What is the cause of the issue?

BPDU guard needs to be activated in the interface configuration command mode.

Access ports configured with root guard cannot be configured with BPDU guard.

Access ports belong to different VLANs.

PortFast is not configured on all access ports.

A

PortFast is not configured on all access ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which two types of spanning tree protocols can cause suboptimal traffic flows because they assume only one spanning-tree instance for the entire bridged network? (Choose two.)
MSTP
RSTP
Rapid PVST+
PVST+
STP
A

RSTP

STP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Refer to the exhibit. A network administrator is configuring the router R1 for IPv6 address assignment. Based on the partial configuration, which IPv6 global unicast address assignment scheme does the administrator intend to implement?

stateful
stateless
manual configuration
SLAAC

A

stateful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. A WLAN engineer deploys a WLC and five wireless APs using the CAPWAP protocol with the DTLS feature to secure the control plane of the network devices. While testing the wireless network, the WLAN engineer notices that data traffic is being exchanged between the WLC and the APs in plain-text and is not being encrypted. What is the most likely reason for this?

DTLS only provides data security through authentication and does not provide encryption for data moving between a wireless LAN controller (WLC) and an access point (AP).

Although DTLS is enabled by default to secure the CAPWAP control channel, it is disabled by default for the data channel.

DTLS is a protocol that only provides security between the access point (AP) and the wireless client.

Data encryption requires a DTLS license to be installed on each access point (AP) prior to being enabled on the wireless LAN controller (WLC).

A

Although DTLS is enabled by default to secure the CAPWAP control channel, it is disabled by default for the data channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. A new switch is to be added to an existing network in a remote office. The network administrator does not want the technicians in the remote office to be able to add new VLANs to the switch, but the switch should receive VLAN updates from the VTP domain. Which two steps must be performed to configure VTP on the new switch to meet these conditions? (Choose two.)

Configure the new switch as a VTP client.

Configure the existing VTP domain name on the new switch.

Configure an IP address on the new switch.

Configure all ports of both switches to access mode.

Enable VTP pruning.

A

Configure the new switch as a VTP client.

Configure the existing VTP domain name on the new switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Refer to the exhibit. Consider that the main power has just been restored. PC3 issues a broadcast IPv4 DHCP request. To which port will SW1 forward this request?​
to Fa0/1, Fa0/2, and Fa0/3 only
to Fa0/1, Fa0/2, Fa0/3, and Fa0/4
to Fa0/1 only​
to Fa0/1, Fa0/2, and Fa0/4 only​
to Fa0/1 and Fa0/2 only
A

to Fa0/1, Fa0/2, and Fa0/3 only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What action takes place when the source MAC address of a frame entering a switch is not in the MAC address table?

The switch adds a MAC address table entry for the destination MAC address and the egress port.

The switch adds the MAC address and incoming port number to the table.

The switch replaces the old entry and uses the more current port.

The switch updates the refresh timer for the entry.

A

The switch adds the MAC address and incoming port number to the table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Employees are unable to connect to servers on one of the internal networks. What should be done or checked?

Use the “show ip interface brief” command to see if an interface is down.

Verify that there is not a default route in any of the edge router routing tables.

Create static routes to all internal networks and a default route to the internet.

Check the statistics on the default route for oversaturation.

A

Use the “show ip interface brief” command to see if an interface is down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What is the effect of entering the ip dhcp snooping configuration command on a switch?

It enables DHCP snooping globally on a switch.

It enables PortFast globally on a switch.

It disables DTP negotiations on trunking ports.

It manually enables a trunk link.

A

It enables DHCP snooping globally on a switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. An administrator notices that large numbers of packets are being dropped on one of the branch routers. What should be done or checked?

Create static routes to all internal networks and a default route to the internet.

Create extra static routes to the same location with an AD of 1.

Check the statistics on the default route for oversaturation.

Check the routing table for a missing static route.

A

Check the routing table for a missing static route.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What are two switch characteristics that could help alleviate network congestion? (Choose two.)
fast internal switching
large frame buffers
store-and-forward switching
low port density
frame check sequence (FCS) check
A

fast internal switching

large frame buffers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What is a result of connecting two or more switches together?

The number of broadcast domains is increased.
The size of the broadcast domain is increased.
The number of collision domains is reduced.
The size of the collision domain is increased.

A

The size of the broadcast domain is increased.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Branch users were able to access a site in the morning but have had no connectivity with the site since lunch time. What should be done or checked?

Verify that the static route to the server is present in the routing table.

Use the “show ip interface brief” command to see if an interface is down.

Check the configuration on the floating static route and adjust the AD.

Create a floating static route to that network.

A

Use the “show ip interface brief” command to see if an interface is down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. What is the effect of entering the switchport port-security configuration command on a switch?

It dynamically learns the L2 address and copies it to the running configuration.

It enables port security on an interface.

It enables port security globally on the switch.

It restricts the number of discovery messages, per second, to be received on the interface.

A

It enables port security on an interface.

17
Q
  1. A network administrator is configuring a WLAN. Why would the administrator use multiple lightweight APs?

to centralize management of multiple WLANs

to monitor the operation of the wireless network

to provide prioritized service for time-sensitive applications

to facilitate group configuration and management of multiple WLANs through a WLC

A

to facilitate group configuration and management of multiple WLANs through a WLC

18
Q
  1. Refer to the exhibit. PC-A and PC-B are both in VLAN 60. PC-A is unable to communicate with PC-B. What is the problem?

The native VLAN should be VLAN 60.

The native VLAN is being pruned from the link.

The trunk has been configured with the switchport nonegotiate command.

The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk.

A

The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk

19
Q
  1. A network administrator is configuring a WLAN. Why would the administrator use RADIUS servers on the network?

to centralize management of multiple WLANs

to restrict access to the WLAN by authorized,
authenticated users only

to facilitate group configuration and management of multiple WLANs through a WLC

to monitor the operation of the wireless network

A

to restrict access to the WLAN by authorized, authenticated users only

20
Q
  1. What is the effect of entering the switchport mode access configuration command on a switch?

It enables BPDU guard on a specific port.
It manually enables a trunk link.
It disables an unused port.
It disables DTP on a non-trunking interface.

A

It disables DTP on a non-trunking interface.