Q:81-100 Flashcards

1
Q
  1. Which three pairs of trunking modes will establish a functional trunk link between two Cisco switches? (Choose three.)
dynamic desirable – dynamic desirable
dynamic desirable – trunk
dynamic auto – dynamic auto
access – dynamic auto
dynamic desirable – dynamic auto
access – trunk
A

dynamic desirable – dynamic desirable

dynamic desirable – trunk

dynamic desirable – dynamic auto

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. A technician is configuring a router for a small company with multiple WLANs and doesn’t need the complexity of a dynamic routing protocol. What should be done or checked?

Verify that there is not a default route in any of the edge router routing tables.

Create static routes to all internal networks and a default route to the internet.

Create extra static routes to the same location with an AD of 1.

Check the statistics on the default route for oversaturation.

A

Create static routes to all internal networks and a default route to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. A company is deploying a wireless network in the distribution facility in a Boston suburb. The warehouse is quite large and it requires multiple access points to be used. Because some of the company devices still operate at 2.4GHz, the network administrator decides to deploy the 802.11g standard. Which channel assignments on the multiple access points will make sure that the wireless channels are not overlapping?85. A network administrator of a small advertising company is configuring WLAN security by using the WPA2 PSK method. Which credential do office users need in order to connect their laptops to the WLAN?

channels 1, 5, and 9
channels 1, 6, and 11
channels 1, 7, and 13
channels 2, 6, and 10

A

channels 1, 6, and 11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. A network administrator of a small advertising company is configuring WLAN security by using the WPA2 PSK method. Which credential do office users need in order to connect their laptops to the WLAN?

the company username and password through Active Directory service

a key that matches the key on the AP

a user passphrase

a username and password configured on the AP

A

a user passphrase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Refer to the exhibit. What are the possible port roles for ports A, B, C, and D in this RSTP-enabled network?

alternate, designated, root, root
designated, alternate, root, root
alternate, root, designated, root
designated, root, alternate, root

A

alternate, designated, root, root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Refer to the exhibit. Which static route would an IT technician enter to create a backup route to the 172.16.1.0 network that is only used if the primary RIP learned route fails?

ip route 172.16.1.0 255.255.255.0 s0/0/0
ip route 172.16.1.0 255.255.255.0 s0/0/0 121
ip route 172.16.1.0 255.255.255.0 s0/0/0 111
ip route 172.16.1.0 255.255.255.0 s0/0/0 91

A

ip route 172.16.1.0 255.255.255.0 s0/0/0 121

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?

Disable DTP.
Disable STP.
Enable port security.
Place unused ports in an unused VLAN.

A

Enable port security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users access high bandwidth services such as streaming video, the wireless network performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve the wireless network performance for that type of service?

Requiring the users to switch to the 5 GHz band for streaming media is inconvenient and will result in fewer users accessing these services.

The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia.

The 5 GHz band has a greater range and is therefore likely to be interference-free.

The only users that can switch to the 5 GHz band will be those with the latest wireless NICs, which will reduce usage

A

The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server?

broadcast DHCPACK
broadcast DHCPREQUEST
unicast DHCPACK
unicast DHCPREQUEST

A

broadcast DHCPREQUEST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Refer to the exhibit. Which destination MAC address is used when frames are sent from the workstation to the default gateway?

MAC address of the virtual router

MAC address of the standby router

MAC addresses of both the forwarding and standby routers

MAC address of the forwarding router

A

MAC address of the virtual router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. After a host has generated an IPv6 address by using the DHCPv6 or SLAAC process, how does the host verify that the address is unique and therefore usable?

The host sends an ICMPv6 echo request message to the DHCPv6 or SLAAC-learned address and if no reply is returned, the address is considered unique.

The host sends an ICMPv6 neighbor solicitation message to the DHCP or SLAAC-learned address and if no neighbor advertisement is returned, the address is considered unique.

The host checks the local neighbor cache for the learned address and if the address is not cached, it it considered unique.

The host sends an ARP broadcast to the local link and if no hosts send a reply, the address is considered unique.

A

The host sends an ICMPv6 neighbor solicitation message to the DHCP or SLAAC-learned address and if no neighbor advertisement is returned, the address is considered unique.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Match the purpose with its DHCP message type. (Not all options are used.)
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Which protocol adds security to remote connections?
FTP
HTTP
NetBEUI
POP
SSH
A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Refer to the exhibit. A network administrator is verifying the configuration of inter-VLAN routing. Users complain that PC2 cannot communicate with PC1. Based on the output, what is the possible cause of the problem?

Gi0/0 is not configured as a trunk port.

The command interface GigabitEthernet0/0.5 was entered incorrectly.

There is no IP address configured on the interface Gi0/0.

The no shutdown command is not entered on subinterfaces.

The encapsulation dot1Q 5 command contains the wrong VLAN.

A

The encapsulation dot1Q 5 command contains the wrong VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Refer to the exhibit. A network administrator is configuring inter-VLAN routing on a network. For now, only one VLAN is being used, but more will be added soon. What is the missing parameter that is shown as the highlighted question mark in the graphic?

It identifies the subinterface.

It identifies the VLAN number.

It identifies the native VLAN number.

It identifies the type of encapsulation that is used.

It identifies the number of hosts that are allowed on the interface.

A

It identifies the VLAN number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Match each DHCP message type with its description. (Not all options are used.)
A
17
Q
  1. What network attack seeks to create a DoS for clients by preventing them from being able to obtain a DHCP lease?

IP address spoofing
DHCP starvation
CAM table attack
DHCP spoofing

A

DHCP starvation

18
Q
  1. Refer to the exhibit. If the IP addresses of the default gateway router and the DNS server are correct, what is the configuration problem?

The DNS server and the default gateway router should be in the same subnet.

The IP address of the default gateway router is not contained in the excluded address list.

The default-router and dns-server commands need to be configured with subnet masks.

The IP address of the DNS server is not contained in the excluded address list.

A

The IP address of the default gateway router is not contained in the excluded address list.

19
Q
  1. Refer to the exhibit. A network administrator has added a new subnet to the network and needs hosts on that subnet to receive IPv4 addresses from the DHCPv4 server.
    What two commands will allow hosts on the new subnet to receive addresses from the DHCP4 server? (Choose two.)

R1(config-if)# ip helper-address 10.2.0.250
R1(config)# interface G0/1
R1(config)# interface G0/0
R2(config-if)# ip helper-address 10.2.0.250
R2(config)# interface G0/0
R1(config-if)# ip helper-address 10.1.0.254

A

R1(config-if)# ip helper-address 10.2.0.250

R1(config)# interface G0/0

20
Q
  1. What protocol or technology uses source IP to destination IP as a load-balancing mechanism?

VTP
EtherChannel
DTP
STP

A

EtherChannel