Random Topics Flashcards
A network administrator needs to configure port security on a switch. Which two statements are true? (Choose two.)
A. The network administrator can apply port security to dynamic access ports.
B. The network administrator can apply port security to EtherChannels.
C. The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
D. When dynamic MAC address learning is enabled on an interface, the switch can learn new addresses, up to the maximum defined.
E. The network administrator can configure static secure or sticky secure MAC addresses in the voice VLAN.
Correct Answer: CD
Which interface counter can you use to diagnose a duplex mismatch problem?
A. no carrier
B. late collisions
C. giants
D. CRC errors
E. deferred
F. runts
b
Which switching method duplicates the first six bytes of a frame before making a switching decision?
A. fragment-free switching
B. store-and-forward switching
C. cut-through switching
D. ASIC switching
C
Which logging command can enable administrators to correlate syslog messages with millisecond precision?
A. no logging console
B. logging buffered 4
C. no logging monitor
D. service timestamps log datetime mscec
E. logging host 10.2.0.21
D
Which two spanning-tree port states does RSTP combine to allow faster convergence? (Choose two.)
A. blocking
B. learning
C. forwarding
D. discarding
E. listening AE
Which feature can you implement to reserve bandwidth for VoIP calls across the call path?
A. PQ
B. CBWFQ
C. round robin
D. RSVP
D
Which three statements about link-state routing are true? (Choose three.)
A. OSPF is a link-state protocol.
B. Updates are sent to a broadcast address.
C. It uses split horizon.
D. Routes are updated when a change in topology occurs.
E. RIP is a link-state protocol.
F. Updates are sent to a multicast address by default.
ADF
Which command can you enter to determine whether a switch is operating in trunking mode?
A. show ip interface brief
B. show vlan
C. show interfaces
D. show interface switchport
D
What are three benefits of implementing VLANs? (Choose three.)
A. A higher level of network security can be reached by separating sensitive data traffic from other network traffic.
B. A more efficient use of bandwidth can be achieved allowing many physical groups to use the same network infrastructure.
C. A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure.
D. Broadcast storms can be mitigated by decreasing the number of broadcast domains, thus increasing their size.
E. Port-based VLANs increase switch-port use efficiency, thanks to 802.1Q trunks.
F. VLANs make it easier for IT staff to configure new logical groups, because the VLANs all belong to the same broadcast domain.
G. Broadcast storms can be mitigated by increasing the number of broadcast domains, thus reducing their size.
ACG
Which command can you enter to view the ports that are assigned to VLAN 20?
A. Switch#show ip interface vlan 20
B. Switch#show vlan id 20
C. Switch#show ip interface brief
D. Switch#show interface vlan 20
B
In which two formats can the IPv6 address fd15:0db8:0000:0000:0700:0003:400F:572B be written? (Choose two.)
A. fd15:0db8:0000:0000:700:3:400F:527B
B. fd15::db8::700:3:400F:527B
C. fd15:db8:0::700:3:4F:527B
D. fd15:0db8::7:3:4F:527B
E. fd15:db8::700:3:400F:572B
AE
When an interface is configured with PortFast BPDU guard, how does the interface respond when it receives a BPDU?
A. It continues operating normally.
B. It goes into a down/down state.
C. It becomes the root bridge for the configured VLAN.
D. It goes into an errdisable state.
D
What are three characteristics of the TCP protocol? (Choose three.)
A. It uses a single SYN-ACK message to establish a connection.
B. The connection is established before data is transmitted.
C. It ensures that all data is transmitted and received by the remote device.
D. It supports significantly higher transmission speeds than UDP.
E. It requires applications to determine when data packets must be retransmitted.
F. It uses separate SYN and ACK messages to establish a connection.
BCF
Scenario -
Refer to the topology. Your company has decided to connect the main office with three other remote branch offices using point-to-point serial links.
You are required to troubleshoot and resolve OSPF neighbor adjacency issues between the main office and the routers located in the remote branch offices.
Use appropriate show commands to troubleshoot the issues and answer all four questions.
An OSPF neighbor adjacency is not formed between R3 in the main office and R4 in the Branch1 office. What is causing the problem?
A. There is an area ID mismatch.
B. There is a Layer 2 issue; an encapsulation mismatch on serial links.
C. There is an OSPF hello and dead interval mismatch.
D. The R3 router ID is configured on R4.
A
Scenario -
Refer to the topology. Your company has decided to connect the main office with three other remote branch offices using point-to-point serial links.
You are required to troubleshoot and resolve OSPF neighbor adjacency issues between the main office and the routers located in the remote branch offices.
Use appropriate show commands to troubleshoot the issues and answer all four questions.
An OSPF neighbor adjacency is not formed between R3 in the main office and R5 in the Branch2 office. What is causing the problem?
A. There is an area ID mismatch.
B. There is a PPP authentication issue; a password mismatch.
C. There is an OSPF hello and dead interval mismatch.
D. There is a missing network command in the OSPF process on R5. C
The only difference we can see here is the line “ip ospf hello-interval 50″ on R3. This command sets the number of seconds R3 waits before sending the next hello packet out this interface. In this case after configuring this command, R3 will send hello packets to R5 every 50 seconds. But the default value of hello-interval is
10 seconds and R5 is using it. Therefore we can think of a hello interval mismatch problem here. You can verify with the “show ip ospf interface <interface>" command on each router.</interface>
C
Scenario -
Refer to the topology. Your company has decided to connect the main office with three other remote branch offices using point-to-point serial links.
You are required to troubleshoot and resolve OSPF neighbor adjacency issues between the main office and the routers located in the remote branch offices.
Use appropriate show commands to troubleshoot the issues and answer all four questions.
R1 does not form an OSPF neighbor adjacency with R2. Which option would fix the issue?
A. R1 ethernet0/1 is shutdown. Configure no shutdown command.
B. R1 ethernet0/1 configured with a non-default OSPF hello interval of 25; configure no ip ospf hello-interval 25
C. R2 ethernet0/1 and R3 ethernet0/0 are configured with a non-default OSPF hello interval of 25; configure no ip ospf hello-interval 25
D. Enable OSPF for R1 ethernet0/1; configure ip ospf 1 area 0 command under ethernet0/1. B
Continue checking their connected interfaces with the “show running-config” command:
B
Scenario -
Refer to the topology. Your company has decided to connect the main office with three other remote branch offices using point-to-point serial links.
You are required to troubleshoot and resolve OSPF neighbor adjacency issues between the main office and the routers located in the remote branch offices.
Use appropriate show commands to troubleshoot the issues and answer all four questions.
An OSPF neighbor adjacency is not formed between R3 in the main office and R6 in the Branch3 office. What is causing the problem?
A. There is an area ID mismatch.
B. There is a PPP authentication issue; the username is not configured on R3 and R6.
C. There is an OSPF hello and dead interval mismatch.
D. The R3 router ID is configured on R6. D
We are not sure about the configuration of ppp authentication in this case. Some reports said that only one router has the “ppp authentication chap” command but it is just a trick and is not the problem here. The real problem here is R6 uses the same router-id of R3 (192.168.3.3) so OSPF neighborship cannot be established. In real life, such configuration error will be shown in the command line interface (CLI). So please check carefully for this question.
D
What are three advantages of VLANs? (Choose three.)
A. They establish broadcast domains in switched networks.
B. They provide a low-latency internetworking alternative to routed networks.
C. They utilize packet filtering to enhance network security.
D. They can simplify adding, moving, or changing hosts on the network.
E. They allow access to network services based on department, not physical location.
F. They provide a method of conserving IP addresses in large networks.
ADE
Which command can you enter to determine whether serial interface 0/2/0 has been configured using HDLC encapsulation?
A. router#show platform
B. router#show interfaces Serial 0/2/0
C. router#show ip interface s0/2/0
D. router#show ip interface brief
B
Which function of the IP SLAs ICMP jitter operation can you use to determine whether a VoIP issue is caused by excessive end-to-end time?
A. packet loss
B. jitter
C. successive packet loss
D. round-trip time latency
D
Which of these statements correctly describes the state of the switch once the boot process has been completed?
A. The switch will need a different IOS code in order to support VLANs and STР.
B. Remote access management of this switch will not be possible without configuration change.
C. As FastEthernet0/12 will be the last to come up, it will be blocked by STP.
D. More VLANs will need to be created for this switch.
B
The network administrator normally establishes a Telnet session with the switch from host A. However, host A is unavailable. The administrator’s attempt to telnet to the switch from host fails, but pings to the other two hosts are successful. What is the issue?
A. The switch interfaces need the appropriate IP addresses assigned.
B. Host В and the switch need to be in the same subnet.
C. The switch needs an appropriate default gateway assigned.
D. The switch interface connected to the router is down.
E. Host В needs to be assigned an IP address in VLAN 1.
C
Which condition does the err-disabled status indicate on an Ethernet interface?
A. There is a duplex mismatch.
B. The device at the other end of the connection is powered off.
C. The serial interface is disabled.
D. The interface is configured with the shutdown command.
E. Port security has disabled the interface.
F. The interface is fully functioning.
E
Which statement about RADIUS security is true?
A. It supports EAP authentication for connecting to wireless networks.
B. It provides encrypted multiprotocol support.
C. Device-administration packets are encrypted in their entirety.
D. It ensures that user activity is fully anonymous.
A
A router has learned three possible routes that could be used to reach a destination network. One route is from EIGRP and has a composite metric of 20514560.
Another route is from OSPF with a metric of 782. The last is from RIPv2 and has a metric of 4. Which route or routes will the router install in the routing table?
A. the RIPv2 route
B. all three routes
C. the OSPF and RIPv2 routes
D. the OSPF route
E. the EIGRP route
E
Which two correctly describe steps in the OSI data encapsulation process? (Choose two.)
A. The presentation layer translates bits into voltages for transmission across the physical link.
B. The data link layer adds physical source and destination addresses and an FCS to the segment.
C. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
D. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.
E. The transport layer divides a data stream into segments and may add reliability and flow control information.
CE
Which two statements about IPv4 multicast traffic are true? (Choose two.)
A. It burdens the source host without affecting remote hosts.
B. It uses a minimum amount of network bandwidth.
C. It is bandwidth-intensive.
D. It simultaneously delivers multiple streams of data.
E. It is the most efficient way to deliver data to multiple receivers.
DE
All of the routers in the network are configured with the ip subnet-zero command. Which network addresses should be used for Link A and Network A? (Choose two.)
A. Link A – 172.16.3.0/30
B. Link A – 172.16.3.112/30
C. Network A – 172.16.3.48/26
D. Network A – 172.16.3.128/25
E. Link A – 172.16.3.40/30
F. Network A – 172.16.3.192/26
AD
Which type of device can be replaced by the use of subinterfaces for VLAN routing?
A. Layer 2 bridge
B. Layer 2 switch
C. Layer 3 switch
D. router
C
Which Layer 2 protocol encapsulation type supports synchronous and asynchronous circuits and has built-in security mechanisms?
A. X.25
B. HDLC
C. PPP
D. Frame Relay
C
Which statement about LLDP is true?
A. It is a Cisco proprietary protocol.
B. It is configured in global configuration mode.
C. The LLDP update frequency is a fixed value.
D. It runs over the transport layer.
B
What are two benefits of private IPv4 IP addresses? (Choose two.)
A. They are routed to the Internet the same as public IP addresses.
B. They are less costly than public IP addresses.
C. They can be assigned to devices without Internet connections.
D. They eliminate the necessity for NAT policies.
E. They eliminate duplicate IP conflicts.
BC