Q:61-80 Flashcards
- Which type of static route is configured with a greater administrative distance to provide a backup route to a route learned from a dynamic routing protocol?
floating static route
default static route
summary static route
standard static route
floating static route
- What action takes place when a frame entering a switch has a unicast destination MAC address appearing in the MAC address table?
The switch updates the refresh timer for the entry.
The switch forwards the frame out of the specified port.
The switch purges the entire MAC address table.
The switch replaces the old entry and uses the more current port.
The switch forwards the frame out of the specified port.
- The exhibit shows two PCs called PC A and PC B, two routes called R1 and R2, and two switches. PC A has the address 172.16.1.1/24 and is connected to a switch and into an interface on R1 that has the IP address 172.16.1.254. PC B has the address 172.16.2.1/24 and is connected to a switch that is connected to another interface on R1 with the IP address 172.16.2.254. The serial interface on R1 has the address 172.16.3.1 and is connected to the serial interface on R2 that has the address 172.16.3.2/24. R2 is connected to the internet cloud. Which command will create a static route on R2 in order to reach PC B?
R2(config)# ip route 172.16.2.1 255.255.255.0 172.16.3.1
R2(config)# ip route 172.16.2.0 255.255.255.0 172.16.2.254
R2(config)# ip route 172.16.2.0 255.255.255.0 172.16.3.1
R2(config)# ip route 172.16.3.0 255.255.255.0 172.16.2.254
R2(config)# ip route 172.16.2.0 255.255.255.0 172.16.3.1
- What protocol or technology allows data to transmit over redundant switch links?
EtherChannel
DTP
STP
VTP
STP
- Refer to the exhibit. Which three hosts will receive ARP requests from host A, assuming that port Fa0/4 on both switches is configured to carry traffic for multiple VLANs? (Choose three.)
host B host C host D host E host F host G
host C
host D
host F
- Refer to the exhibit. The network administrator configures both switches as displayed. However, host C is unable to ping host D and host E is unable to ping host F. What action should the administrator take to enable this communication?
Associate hosts A and B with VLAN 10 instead of VLAN 1.
Configure either trunk port in the dynamic desirable mode.
Include a router in the topology.
Remove the native VLAN from the trunk.
Add the switchport nonegotiate command to the configuration of SW2.
Configure either trunk port in the dynamic desirable mode.
- What is the effect of entering the shutdown configuration command on a switch?
It enables BPDU guard on a specific port.
It disables an unused port.
It enables portfast on a specific switch interface.
It disables DTP on a non-trunking interface.
It disables an unused port.
- What would be the primary reason an attacker would launch a MAC address overflow attack?
so that the switch stops forwarding traffic
so that legitimate hosts cannot obtain a MAC address
so that the attacker can see frames that are destined for other hosts
so that the attacker can execute arbitrary code on the switch
so that the attacker can see frames that are destined for other hosts
- During the AAA process, when will authorization be implemented?
Immediately after successful authentication against an AAA data source
Immediately after AAA accounting and auditing receives detailed reports
Immediately after an AAA client sends authentication information to a centralized server
Immediately after the determination of which resources a user can access
Immediately after successful authentication against an AAA data source
- A company security policy requires that all MAC addressing be dynamically learned and added to both the MAC address table and the running configuration on each switch. Which port security configuration will accomplish this?
auto secure MAC addresses
dynamic secure MAC addresses
static secure MAC addresses
sticky secure MAC addresses
sticky secure MAC addresses
- Which three Wi-Fi standards operate in the 2.4GHz range of frequencies? (Choose three.)
- 11a
- 11b
- 11g
- 11n
- 11ac
- 11b
- 11g
- 11n
- To obtain an overview of the spanning tree status of a switched network, a network engineer issues the show spanning-tree command on a switch. Which two items of information will this command display? (Choose two.)
The root bridge BID.
The role of the ports in all VLANs.
The status of native VLAN ports.
The number of broadcasts received on each root port.
The IP address of the management VLAN interface.
The root bridge BID.
The role of the ports in all VLANs.
- Refer to the exhibit. Which trunk link will not forward any traffic after the root bridge election process is complete?
Trunk1
Trunk2
Trunk3
Trunk4
Trunk2
- Which method of IPv6 prefix assignment relies on the prefix contained in RA messages?
EUI-64
SLAAC
static
stateful DHCPv6
SLAAC
- Which two protocols are used to provide server-based AAA authentication? (Choose two.)
802.1x SSH SNMP TACACS+ RADIUS
TACACS+
RADIUS
- A network administrator is configuring a WLAN. Why would the administrator disable the broadcast feature for the SSID?
to eliminate outsiders scanning for available SSIDs in the area
to reduce the risk of interference by external devices such as microwave ovens
to reduce the risk of unauthorized APs being added to the network
to provide privacy and integrity to wireless traffic by using encryption
to eliminate outsiders scanning for available SSIDs in the area
- Which mitigation technique would prevent rogue servers from providing false IP configuration parameters to clients?
implementing port security
turning on DHCP snooping
disabling CDP on edge ports
implementing port-security on edge ports
turning on DHCP snooping
- A network administrator configures the port security feature on a switch. The security policy specifies that each access port should allow up to two MAC addresses. When the maximum number of MAC addresses is reached, a frame with the unknown source MAC address is dropped and a notification is sent to the syslog server. Which security violation mode should be configured for each access port?
shutdown
restrict
warning
protect
restrict
- What protocol or technology defines a group of routers, one of them defined as active and another one as standby?
EtherChannel
VTP
HSRP
DTP
HSRP
- Refer to the exhibit. After attempting to enter the configuration that is shown in router RTA, an administrator receives an error and users on VLAN 20 report that they are unable to reach users on VLAN 30. What is causing the problem?
There is no address on Fa0/0 to use as a default gateway.
RTA is using the same subnet for VLAN 20 and VLAN 30.
Dot1q does not support subinterfaces.
The no shutdown command should have been issued on Fa0/0.20 and Fa0/0.30.
RTA is using the same subnet for VLAN 20 and VLAN 30.