SWRE Final Exam 7 Flashcards

1
Q

Which two types of spanning tree protocols can cause suboptimal traffic flows because they assume only one spanning-tree instance for the entire bridged network? (Choose two.)

MSTP
RSTP
Rapid PVST+
PVST+
STP

A

RSTP
STP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Refer to the exhibit. A network administrator is configuring the router R1 for IPv6 address assignment. Based on the partial configuration, which IPv6 global unicast address assignment scheme does the administrator intend to implement?

stateful

stateless

manual configuration

SLAAC

A

stateful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A WLAN engineer deploys a WLC and five wireless APs using the CAPWAP protocol with the DTLS feature to secure the control plane of the network devices. While testing the wireless network, the WLAN engineer notices that data traffic is being exchanged between the WLC and the APs in plain-text and is not being encrypted. What is the most likely reason for this?

DTLS only provides data security through authentication and does not provide encryption for data moving between a wireless LAN controller (WLC) and an access point (AP).

Although DTLS is enabled by default to secure the CAPWAP control channel, it is disabled by default for the data channel.

DTLS is a protocol that only provides security between the access point (AP) and the wireless client.

Data encryption requires a DTLS license to be installed on each access point (AP) prior to being enabled on the wireless LAN controller (WLC).

A

Although DTLS is enabled by default to secure the CAPWAP control channel, it is disabled by default for the data channel.

DTLS is a protocol which provides security between the AP and the WLC. It allows them to communicate using encryption and prevents eavesdropping or tampering.
DTLS is enabled by default to secure the CAPWAP control channel but is disabled by default for the data channel. All CAPWAP management and control traffic exchanged between an AP and WLC is encrypted and secured by default to provide control plane privacy and prevent Man-In-the-Middle (MITM) attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A new switch is to be added to an existing network in a remote office. The network administrator does not want the technicians in the remote office to be able to add new VLANs to the switch, but the switch should receive VLAN updates from the VTP domain. Which two steps must be performed to configure VTP on the new switch to meet these conditions? (Choose two.)

Configure the new switch as a VTP client.

Configure the existing VTP domain name on the new switch.

Configure an IP address on the new switch.

Configure all ports of both switches to access mode.

Enable VTP pruning.

A

Configure the new switch as a VTP client.

Configure the existing VTP domain name on the new switch.

Before the switch is put in the correct VTP domain and in client mode, the switch must be connected to any other switch in the VTP domain through a trunk in order to receive/transmit VTP information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Refer to the exhibit. Consider that the main power has just been restored. PC3 issues a broadcast IPv4 DHCP request. To which port will SW1 forward this request?​

to Fa0/1, Fa0/2, and Fa0/3 only

to Fa0/1, Fa0/2, Fa0/3, and Fa0/4
to Fa0/1 only​

to Fa0/1, Fa0/2, and Fa0/4 only​

to Fa0/1 and Fa0/2 only

A

to Fa0/1, Fa0/2, and Fa0/3 only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What action takes place when the source MAC address of a frame entering a switch is not in the MAC address table?

The switch adds a MAC address table entry for the destination MAC address and the egress port.

The switch adds the MAC address and incoming port number to the table.

The switch replaces the old entry and uses the more current port.

The switch updates the refresh timer for the entry.

A

The switch adds the MAC address and incoming port number to the table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Employees are unable to connect to servers on one of the internal networks. What should be done or checked?

Use the “show ip interface brief” command to see if an interface is down.

Verify that there is not a default route in any of the edge router routing tables.

Create static routes to all internal networks and a default route to the internet.

Check the statistics on the default route for oversaturation.

A

Use the “show ip interface brief” command to see if an interface is down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the effect of entering the ip dhcp snooping configuration command on a switch?

It enables DHCP snooping globally on a switch.

It enables PortFast globally on a switch.

It disables DTP negotiations on trunking ports.

It manually enables a trunk link.

A

It enables DHCP snooping globally on a switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An administrator notices that large numbers of packets are being dropped on one of the branch routers. What should be done or checked?

Create static routes to all internal networks and a default route to the internet.

Create extra static routes to the same location with an AD of 1.

Check the statistics on the default route for oversaturation.

Check the routing table for a missing static route.

A

Check the routing table for a missing static route.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are two switch characteristics that could help alleviate network congestion? (Choose two.)

fast internal switching

large frame buffers

store-and-forward switching

low port density

frame check sequence (FCS) check

A

fast internal switching

large frame buffers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a result of connecting two or more switches together?

The number of broadcast domains is increased.

The size of the broadcast domain is increased.

The number of collision domains is reduced.

The size of the collision domain is increased.

A

The size of the broadcast domain is increased.

Explanation:: When two or more switches are connected together, the size of the broadcast domain is increased and so is the number of collision domains. The number of broadcast domains is increased only when routers are added.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Branch users were able to access a site in the morning but have had no connectivity with the site since lunch time. What should be done or checked?

Verify that the static route to the server is present in the routing table.

Use the “show ip interface brief” command to see if an interface is down.

Check the configuration on the floating static route and adjust the AD.

Create a floating static route to that network.

A

Use the “show ip interface brief” command to see if an interface is down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the effect of entering the switchport port-security configuration command on a switch?

It dynamically learns the L2 address and copies it to the running configuration.

It enables port security on an interface.

It enables port security globally on the switch.

It restricts the number of discovery messages, per second, to be received on the interface.

A

It enables port security on an interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network administrator is configuring a WLAN. Why would the administrator use multiple lightweight APs?

to centralize management of multiple WLANs

to monitor the operation of the wireless network

to provide prioritized service for time-sensitive applications

to facilitate group configuration and management of multiple WLANs through a WLC

A

to facilitate group configuration and management of multiple WLANs through a WLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Refer to the exhibit. PC-A and PC-B are both in VLAN 60. PC-A is unable to communicate with PC-B. What is the problem?

The native VLAN should be VLAN 60.

The native VLAN is being pruned from the link.

The trunk has been configured with the switchport nonegotiate command.

The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk.

A

The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk.

Because PC-A and PC-B are connected to different switches, traffic between them must flow over the trunk link. Trunks can be configured so that they only allow traffic for particular VLANs to cross the link. In this scenario, VLAN 60, the VLAN that is associated with PC-A and PC-B, has not been allowed across the link, as shown by the output of show interfaces trunk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly