SWRE Final Exam 3 Flashcards

1
Q

A junior technician was adding a route to a LAN router. A traceroute to a device on the new network revealed a wrong path and unreachable status. What should be done or checked?

Verify that there is not a default route in any of the edge router routing tables.

Check the configuration on the floating static route and adjust the AD.

Create a floating static route to that network.

Check the configuration of the exit interface on the new static route.

A

Check the configuration of the exit interface on the new static route.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Select the three PAgP channel establishment modes. (Choose three.)

auto
default
passive
desirable
extended
on

A

auto
desirable
on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A static route has been configured on a router. However, the destination network no longer exists. What should an administrator do to remove the static route from the routing table?

Remove the route using the no ip route command.

Change the administrative distance for that route.

Change the routing metric for that route.

Nothing. The static route will go away on its own.

A

Remove the route using the no ip route command.

Explanation: When the destination network specified in a static route does not exist anymore, the static route stays in the routing table until it is manually removed by using the no ip route command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Refer to the exhibit. What can be concluded about the configuration shown on R1?

R1 is configured as a DHCPv4 relay agent.

R1 is operating as a DHCPv4 server.

R1 will broadcast DHCPv4 requests on behalf of local DHCPv4 clients.

R1 will send a message to a local DHCPv4 client to contact a DHCPv4 server at 10.10.10.8

A

R1 is configured as a DHCPv4 relay agent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Match the step to each switch boot sequence description. (Not all options are used.)
Explanation: The steps are:
execute POST
load the boot loader from ROM
CPU register initializations
flash file system initialization
load the IOS
transfer switch control to the IOS

A

Explanation: The steps are:
1. execute POST
2. load the boot loader from ROM
3. CPU register initializations
4. flash file system initialization
5. load the IOS
6. transfer switch control to the IOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Refer to the exhibit. R1 has been configured as shown. However, PC1 is not able to receive an IPv4 address. What is the problem?​

The ip helper-address command was applied on the wrong interface.

R1 is not configured as a DHCPv4 server.​

A DHCP server must be installed on the same LAN as the host that is receiving the IP address.

The ip address dhcp command was not issued on the interface Gi0/1.

A

The ip helper-address command was applied on the wrong interface.

Explanation: The ip helper-address command has to be applied on interface Gi0/0. This command must be present on the interface of the LAN that contains the DHCPv4 client PC1 and must be directed to the correct DHCPv4 server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What two default wireless router settings can affect network security? (Choose two.)

The SSID is broadcast.

MAC address filtering is enabled.

WEP encryption is enabled.
The wireless channel is automatically selected.

A well-known administrator password is set.

A

The SSID is broadcast.

A well-known administrator password is set.

Explanation: Default settings on wireless routers often include broadcasting the SSID and using a well-known administrative password. Both of these pose a security risk to wireless networks. WEP encryption and MAC address filtering are not set by default. The automatic selection of the wireless channel poses no security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the common term given to SNMP log messages that are generated by network devices and sent to the SNMP server?

traps

acknowledgments

auditing

warnings

A

traps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network administrator is adding a new WLAN on a Cisco 3500 series WLC. Which tab should the administrator use to create a new VLAN interface to be used for the new WLAN?

WIRELESS

MANAGEMENT

CONTROLLER

WLANs

A

CONTROLLER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network administrator is configuring a WLAN. Why would the administrator change the default DHCP IPv4 addresses on an AP?

to restrict access to the WLAN by authorized, authenticated users only

to monitor the operation of the wireless network

to reduce outsiders intercepting data or accessing the wireless network by using a well-known address range

to reduce the risk of interference by external devices such as microwave ovens

A

to reduce outsiders intercepting data or accessing the wireless network by using a well-known address range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which two functions are performed by a WLC when using split media access control (MAC)? (Choose two.)

packet acknowledgments and retransmissions

frame queuing and packet prioritization

beacons and probe responses

frame translation to other protocols

association and re-association of roaming clients

A

frame translation to other protocols

association and re-association of roaming clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

On what switch ports should BPDU guard be enabled to enhance STP stability?

all PortFast-enabled ports

only ports that are elected as designated ports

only ports that attach to a neighboring switch

all trunk ports that are not root ports

A

all PortFast-enabled ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which network attack is mitigated by enabling BPDU guard?

rogue switches on a network

CAM table overflow attacks

MAC address spoofing

rogue DHCP servers on a network

A

rogue switches on a network

Explanation: There are several recommended STP stability mechanisms to help mitigate STP manipulation attacks:
PortFast – used to immediately bring an interface configured as an access or trunk port to the forwarding state from a blocking state. Applied to all end-user ports.
BPDU guard – immediately error-disables a port that receives a BPDU. Applied to all end-user ports.The receipt of BPDUs may be part of an unauthorized attempt to add a switch to the network.
Root guard – prevents a switch from becoming the root switch. Applied to all ports where the root switch should not be located.
Loop guard – detects unidirectional links to prevent alternate or root ports from becoming designated ports. Applied to all ports that are or can become nondesignated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is DHCP snooping required when using the Dynamic ARP Inspection feature?

It relies on the settings of trusted and untrusted ports set by DHCP snooping.

It uses the MAC address table to verify the default gateway IP address.

It redirects ARP requests to the DHCP server for verification.

It uses the MAC-address-to-IP-address binding database to validate an ARP packet.

A

It uses the MAC-address-to-IP-address binding database to validate an ARP packet.

Explain: DAI relies on DHCP snooping. DHCP snooping listens to DHCP message exchanges and builds a bindings database of valid tuples (MAC address, IP address, VLAN interface).

When DAI is enabled, the switch drops ARP packet if the sender MAC address and sender IP address do not match an entry in the DHCP snooping bindings database. However, it can be overcome through static mappings. Static mappings are useful when hosts configure static IP addresses, DHCP snooping cannot be run, or other switches in the network do not run dynamic ARP inspection. A static mapping associates an IP address to a MAC address on a VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Refer to the exhibit. Router R1 has an OSPF neighbor relationship with the ISP router over the 192.168.0.32 network. The 192.168.0.36 network link should serve as a backup when the OSPF link goes down. The floating static route command ip route 0.0.0.0 0.0.0.0 S0/0/1 100 was issued on R1 and now traffic is using the backup link even when the OSPF link is up and functioning. Which change should be made to the static route command so that traffic will only use the OSPF link when it is up?​

Change the administrative distance to 120.

Add the next hop neighbor address of 192.168.0.36.

Change the destination network to 192.168.0.34.

Change the administrative distance to 1.

A

Change the administrative distance to 120.

Explain: The problem with the current floating static route is that the administrative distance is set too low. The administrative distance will need to be higher than that of OSPF, which is 110, so that the router will only use the OSPF link when it is up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Refer to the exhibit. What is the metric to forward a data packet with the IPv6 destination address 2001:DB8:ACAD:E:240:BFF:FED4:9DD2?

90

128

2170112

2681856

2682112

3193856

A

2682112

The IPv6 destination address 2001:DB8:ACAD:E:240:BFF:FED4:9DD2 belongs to the network of 2001:DB8:ACAD:E::/64. In the routing table, the route to forward the packet has Serial 0/0/1 as an exit interface and 2682112 as the cost.

17
Q

A network administrator is configuring a new Cisco switch for remote management access. Which three items must be configured on the switch for the task? (Choose three.)

IP address

VTP domain

vty lines

default VLAN

default gateway

loopback address

A

IP address

vty lines

default gateway

Explain: To enable the remote management access, the Cisco switch must be configured with an IP address and a default gateway. In addition, vty lines must configured to enable either Telnet or SSH connections. A loopback address, default VLAN, and VTP domain configurations are not necessary for the purpose of remote switch management.

18
Q

Refer to the exhibit. Which statement shown in the output allows router R1 to respond to stateless DHCPv6 requests?

ipv6 nd other-config-flag​

prefix-delegation 2001:DB8:8::/48 00030001000E84244E70​

ipv6 dhcp server LAN1​

ipv6 unicast-routing

dns-server 2001:DB8:8::8​

A

ipv6 nd other-config-flag​

Explain: The interface command ipv6 nd other-config-flag allows RA messages to be sent on this interface, indicating that additional information is available from a stateless DHCPv6 server.

19
Q
  1. Refer to the exhibit. A Layer 3 switch routes for three VLANs and connects to a router for Internet connectivity. Which two configurations would be applied to the switch? (Choose two.)

(config)# interface gigabitethernet1/1
(config-if)# switchport mode trunk

(config)# interface gigabitethernet 1/1
(config-if)# no switchport
(config-if)# ip address 192.168.1.2 255.255.255.252

(config)# interface vlan 1
(config-if)# ip address 192.168.1.2 255.255.255.0
(config-if)# no shutdown

(config)# ip routing

(config)# interface fastethernet0/4
(config-if)# switchport mode trunk

A

(config)# interface gigabitethernet 1/1
(config-if)# no switchport
(config-if)# ip address 192.168.1.2 255.255.255.252

(config)# ip routing

20
Q
  1. A technician is troubleshooting a slow WLAN and decides to use the split-the-traffic approach. Which two parameters would have to be configured to do this? (Choose two.)

Configure the 5 GHz band for streaming multimedia and time sensitive traffic.

Configure the security mode to WPA Personal TKIP/AES for one network and WPA2 Personal AES for the other network
Configure the 2.4 GHz band for basic internet traffic that is not time sensitive.

Configure the security mode to WPA Personal TKIP/AES for both networks.

Configure a common SSID for both split networks.

A

Configure the 5 GHz band for streaming multimedia and time sensitive

Configure the 2.4 GHz band for basic internet traffic that is not time sensitive.

21
Q

A company has just switched to a new ISP. The ISP has completed and checked the connection from its site to the company. However, employees at the company are not able to access the internet. What should be done or checked?

Verify that the static route to the server is present in the routing table.

Check the configuration on the floating static route and adjust the AD.

Ensure that the old default route has been removed from the company edge routers.

Create a floating static route to that network.

A

Ensure that the old default route has been removed from the company edge routers.

22
Q

Which information does a switch use to populate the MAC address table?

the destination MAC address and the incoming port

the destination MAC address and the outgoing port

the source and destination MAC addresses and the incoming port

the source and destination MAC addresses and the outgoing port

the source MAC address and the incoming port

the source MAC address and the outgoing port

A

the source MAC address and the incoming port

Explain: To maintain the MAC address table, the switch uses the source MAC address of the incoming packets and the port that the packets enter. The destination address is used to select the outgoing port

23
Q

Refer to the exhibit. A network administrator is reviewing the configuration of switch S1. Which protocol has been implemented to group multiple physical ports into one logical link?

PAgP

DTP

LACP

STP

A

PAgP

24
Q

Which type of static route is configured with a greater administrative distance to provide a backup route to a route learned from a dynamic routing protocol?

floating static route

default static route

summary static route

standard static route

A

floating static route

Explain: There are four basic types of static routes. Floating static routes are backup routes that are placed into the routing table if a primary route is lost. A summary static route aggregates several routes into one, reducing the of the routing table. Standard static routes are manually entered routes into the routing table. Default static routes create a gateway of last resort.

25
Q

What action takes place when a frame entering a switch has a unicast destination MAC address appearing in the MAC address table?

The switch updates the refresh timer for the entry.

The switch forwards the frame out of the specified port.

The switch purges the entire MAC address table.

The switch replaces the old entry and uses the more current port.

A

The switch forwards the frame out of the specified port.

26
Q

The exhibit shows two PCs called PC A and PC B, two routes called R1 and R2, and two switches. PC A has the address 172.16.1.1/24 and is connected to a switch and into an interface on R1 that has the IP address 172.16.1.254. PC B has the address 172.16.2.1/24 and is connected to a switch that is connected to another interface on R1 with the IP address 172.16.2.254. The serial interface on R1 has the address 172.16.3.1 and is connected to the serial interface on R2 that has the address 172.16.3.2/24. R2 is connected to the internet cloud. Which command will create a static route on R2 in order to reach PC B?

R2(config)# ip route 172.16.2.1 255.255.255.0 172.16.3.1

R2(config)# ip route 172.16.2.0 255.255.255.0 172.16.2.254

R2(config)# ip route 172.16.2.0 255.255.255.0 172.16.3.1

R2(config)# ip route 172.16.3.0 255.255.255.0 172.16.2.254

A

R2(config)# ip route 172.16.2.0 255.255.255.0 172.16.3.1

The correct syntax is:
router(config)# ip route destination-network destination-mask {next-hop-ip-address | exit-interface}
If the local exit interface instead of the next-hop IP address is used then the route will be displayed as a directly connected route instead of a static route in the routing table. Because the network to be reached is 172.16.2.0 and the next-hop IP address is 172.16.3.1, the command is R2(config)# ip route 172.16.2.0 255.255.255.0 172.16.3.1

27
Q

What protocol or technology allows data to transmit over redundant switch links?

EtherChannel

DTP

STP

VTP

A

EtherChannel

28
Q

Refer to the exhibit. Which three hosts will receive ARP requests from host A, assuming that port Fa0/4 on both switches is configured to carry traffic for multiple VLANs? (Choose three.)

host B
host C
host D
host E
host F
host G

A

host C

host D

host F

Explain: ARP requests are sent out as broadcasts. That means the ARP request is sent only throughout a specific VLAN. VLAN 1 hosts will only hear ARP requests from hosts on VLAN 1. VLAN 2 hosts will only hear ARP requests from hosts on VLAN 2.

29
Q

Refer to the exhibit. The network administrator configures both switches as displayed. However, host C is unable to ping host D and host E is unable to ping host F. What action should the administrator take to enable this communication?

Associate hosts A and B with VLAN 10 instead of VLAN 1.

Configure either trunk port in the dynamic desirable mode.

Include a router in the topology.

Remove the native VLAN from the trunk.

Add the switchport nonegotiate command to the configuration of SW2.

A

Configure either trunk port in the dynamic desirable mode.

30
Q

What is the effect of entering the shutdown configuration command on a switch?

It enables BPDU guard on a specific port.

It disables an unused port.

It enables portfast on a specific switch interface.

It disables DTP on a non-trunking interface.

A

It disables an unused port.