Q:61-80 Flashcards

1
Q
  1. Which type of static route is configured with a greater administrative distance to provide a backup route to a route learned from a dynamic routing protocol?

floating static route
default static route
summary static route
standard static route

A

floating static route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. What action takes place when a frame entering a switch has a unicast destination MAC address appearing in the MAC address table?

The switch updates the refresh timer for the entry.

The switch forwards the frame out of the specified port.

The switch purges the entire MAC address table.

The switch replaces the old entry and uses the more current port.

A

The switch forwards the frame out of the specified port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. The exhibit shows two PCs called PC A and PC B, two routes called R1 and R2, and two switches. PC A has the address 172.16.1.1/24 and is connected to a switch and into an interface on R1 that has the IP address 172.16.1.254. PC B has the address 172.16.2.1/24 and is connected to a switch that is connected to another interface on R1 with the IP address 172.16.2.254. The serial interface on R1 has the address 172.16.3.1 and is connected to the serial interface on R2 that has the address 172.16.3.2/24. R2 is connected to the internet cloud. Which command will create a static route on R2 in order to reach PC B?

R2(config)# ip route 172.16.2.1 255.255.255.0 172.16.3.1

R2(config)# ip route 172.16.2.0 255.255.255.0 172.16.2.254

R2(config)# ip route 172.16.2.0 255.255.255.0 172.16.3.1

R2(config)# ip route 172.16.3.0 255.255.255.0 172.16.2.254

A

R2(config)# ip route 172.16.2.0 255.255.255.0 172.16.3.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. What protocol or technology allows data to transmit over redundant switch links?

EtherChannel
DTP
STP
VTP

A

STP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Refer to the exhibit. Which three hosts will receive ARP requests from host A, assuming that port Fa0/4 on both switches is configured to carry traffic for multiple VLANs? (Choose three.)
host B
host C
host D
host E
host F
host G
A

host C
host D
host F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Refer to the exhibit. The network administrator configures both switches as displayed. However, host C is unable to ping host D and host E is unable to ping host F. What action should the administrator take to enable this communication?

Associate hosts A and B with VLAN 10 instead of VLAN 1.

Configure either trunk port in the dynamic desirable mode.

Include a router in the topology.

Remove the native VLAN from the trunk.

Add the switchport nonegotiate command to the configuration of SW2.

A

Configure either trunk port in the dynamic desirable mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What is the effect of entering the shutdown configuration command on a switch?

It enables BPDU guard on a specific port.
It disables an unused port.
It enables portfast on a specific switch interface.
It disables DTP on a non-trunking interface.

A

It disables an unused port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. What would be the primary reason an attacker would launch a MAC address overflow attack?

so that the switch stops forwarding traffic

so that legitimate hosts cannot obtain a MAC address

so that the attacker can see frames that are destined for other hosts

so that the attacker can execute arbitrary code on the switch

A

so that the attacker can see frames that are destined for other hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. During the AAA process, when will authorization be implemented?

Immediately after successful authentication against an AAA data source

Immediately after AAA accounting and auditing receives detailed reports

Immediately after an AAA client sends authentication information to a centralized server

Immediately after the determination of which resources a user can access

A

Immediately after successful authentication against an AAA data source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. A company security policy requires that all MAC addressing be dynamically learned and added to both the MAC address table and the running configuration on each switch. Which port security configuration will accomplish this?

auto secure MAC addresses
dynamic secure MAC addresses
static secure MAC addresses
sticky secure MAC addresses

A

sticky secure MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Which three Wi-Fi standards operate in the 2.4GHz range of frequencies? (Choose three.)
  2. 11a
  3. 11b
  4. 11g
  5. 11n
  6. 11ac
A
  1. 11b
  2. 11g
  3. 11n
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. To obtain an overview of the spanning tree status of a switched network, a network engineer issues the show spanning-tree command on a switch. Which two items of information will this command display? (Choose two.)

The root bridge BID.
The role of the ports in all VLANs.
The status of native VLAN ports.
The number of broadcasts received on each root port.
The IP address of the management VLAN interface.

A

The root bridge BID.

The role of the ports in all VLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Refer to the exhibit. Which trunk link will not forward any traffic after the root bridge election process is complete?

Trunk1
Trunk2
Trunk3
Trunk4

A

Trunk2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Which method of IPv6 prefix assignment relies on the prefix contained in RA messages?

EUI-64
SLAAC
static
stateful DHCPv6

A

SLAAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Which two protocols are used to provide server-based AAA authentication? (Choose two.)
802.1x
SSH
SNMP
TACACS+
RADIUS
A

TACACS+

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. A network administrator is configuring a WLAN. Why would the administrator disable the broadcast feature for the SSID?

to eliminate outsiders scanning for available SSIDs in the area

to reduce the risk of interference by external devices such as microwave ovens

to reduce the risk of unauthorized APs being added to the network

to provide privacy and integrity to wireless traffic by using encryption

A

to eliminate outsiders scanning for available SSIDs in the area

17
Q
  1. Which mitigation technique would prevent rogue servers from providing false IP configuration parameters to clients?

implementing port security
turning on DHCP snooping
disabling CDP on edge ports
implementing port-security on edge ports

A

turning on DHCP snooping

18
Q
  1. A network administrator configures the port security feature on a switch. The security policy specifies that each access port should allow up to two MAC addresses. When the maximum number of MAC addresses is reached, a frame with the unknown source MAC address is dropped and a notification is sent to the syslog server. Which security violation mode should be configured for each access port?

shutdown
restrict
warning
protect

19
Q
  1. What protocol or technology defines a group of routers, one of them defined as active and another one as standby?

EtherChannel
VTP
HSRP
DTP

20
Q
  1. Refer to the exhibit. After attempting to enter the configuration that is shown in router RTA, an administrator receives an error and users on VLAN 20 report that they are unable to reach users on VLAN 30. What is causing the problem?

There is no address on Fa0/0 to use as a default gateway.
RTA is using the same subnet for VLAN 20 and VLAN 30.
Dot1q does not support subinterfaces.
The no shutdown command should have been issued on Fa0/0.20 and Fa0/0.30.

A

RTA is using the same subnet for VLAN 20 and VLAN 30.