Professional Documents
Culture Documents
Refer to the exhibit. SW1 has recently been installed to replace a hub. Hosts 1 and 4 both transmit data at the same time. How will this event be handled by th
network devices? (Choose two.)
Based on information that is found in the switch MAC address table, the switch will forward the data to the appropriate ports.
Hosts 2 and 3 are assigned shorter backoff values to provide them priority to access the media.
To prevent future collisions, the switch will block the ports that are connected to host 2, host 3, and host 4 for a set time period.
2
Which statement correctly describes a function of a Layer 2 switch?
It performs switching and filtering based on the destination network layer address.
It drops a frame whose destination MAC address is not in the MAC address table.
3
Which two statements about a service set identifier (SSID) are true? (Choose two.)
all wireless devices on the same WLAN must have the same SSID
4
Which three statements are correct concerning the default configuration of a new switch? (Choose three.)
5
Refer to the exhibit. The hosts that are attached to SW2 can ping hosts on the Internet but cannot browse web sites on the Internet by the use of a web brows
What is most likely the problem?
Use a wireless client to associate with the WRT300N and then open a HyperTerminal session with the device.
Establish a wired connection with the device and then reboot the attached computer to launch the configuration software.
Establish a wired connection from a computer in the same IP subnet as the WRT300N and enter the default IP address of the device into a web browser on th
computer.
Modify the TCP/IP properties of the computer that is connected to the WRT300N so that the computer and the WRT300N exist on the same network. Then reb
the computer to establish a connection.
7
Refer to the exhibit. SW1 is a 2960 switch with default values assigned. Which two statements are true about what the cost value of 38 represents for SW1?
(Choose two.)
SW1 connects via two FastEthernet links to reach the root switch.
The cost represents the numeric value for the fastest path from SW1 to the root switch.
A cost of 38 is the value that is being advertised out port 26 on the upstream switch, which is closer to the root switch.
SW1 adds the cost of a FastEthernet link to 38 to determine the total cost that is required to reach the root switch.
The root switch is advertising a cost of 38, which is lower than any other switch that participates in the VLAN0001 spanning-tree domain.
SW1 connects via a FastEthernet link to an upstream switch that in turn is directly connected to the root switch via a Gigabit Ethernet link.
8
Refer to the exhibit. A network administrator needs to implement inter-VLAN routing on a hierarchical network. On which devices should the inter-VLAN routin
configured?
9
What advantage does WPA2 offer over WPA?
SSID cloaking
10
Refer to the exhibit. What does “LEARNING” mean as it relates to the Spanning Tree Protocol?
The switch is not receiving BPDUs, but is sending and receiving data.
The switch is participating in the election process by forwarding the BPDUs it receives.
The switch is receiving BPDUs and populating the MAC address table, but not sending data.
11
Refer to the exhibit. Router R-West and switch S-West1 are connected via a single ethernet cable between the router interface fa0/0 and the switch interface f
The router and switch have been configured with the commands that are displayed in the exhibit. The network administrator enters the show interfaces trunk
command and receives the output as shown. What is the cause of the "not-trunking" status for switch port Fa0/1?
The trunk is established, but no VLANs have been configured to use it.
The router is missing the dynamic trunking protocol statements necessary to form a trunk.
Because the router does not support Dynamic Trunking Protocol, the trunk has not been established.
The router, the switch, or both must be configured with the dynamic desirable option for Dynamic Trunking Protocol to establish a trunk.
12
Refer to the exhibit. The network administrator enters the configuration shown to allow both SSH and Telnet connections to the switch. The Telnet connections
What is the most likely cause of this problem?
13
Refer to the exhibit. What will happen when frames with a source address other than 0019.d2e4.d9f7 enters interface Fa0/24?
14
Which option represents a topology where no switching loops can occur if STP is disabled?
15
Refer to the exhibit. The switch VTY lines have been properly configured, but PC1 is unable to remotely manage the switch. How can this problem be resolved
16
What three tasks should be performed before moving a Catalyst switch to another VTP management domain? (Choose three.)
Configure the switch with the name of the new management domain.
Download the VTP database from the VTP server in the new domain.
Configure the VTP server in the new domain to recognize the BID of the switch.
Reset the VTP counters to allow the switch to synchronize with the other switches in the new domain.
Verify that the switch has a lower configuration revision number than the other switches in the new domain.
17
Refer to the exhibit. A network administrator enters the displayed commands to configure VLAN 30. What is the result of running these commands?
VLAN 30 will be added to S1, S2, and S3, but not to S4.
VLAN 30 will be added to the VLAN database of S3 but will not be propagated to S4, S2 or S1.
VLAN 30 will not be added to the VLAN database of S3 and an error message will be displayed.
18
Refer to the exhibit. Both switches are configured as displayed and the native VLAN is the default. Which statement is true about the frames traveling between
A and host B?
20
Refer to the exhibit. What is the result of issuing these commands?
21
Refer to the exhibit. Which statement is true regarding the information shown?
The switch negotiated trunk links for interfaces Fa0/1 and Gi0/1.
Interfaces Gi0/1 and Fa0/1 are allowed to carry data from multiple VLANs.
22
Refer to the exhibit. The switch is used to allow connectivity for members within the departments that are shown in the exhibit, but there is no routing present.
who is connected to Fa0/22 should be able to communicate with users in the accounting VLAN. What change will allow the required communication to succee
23
Refer to the exhibit. Company A has recently added a Voice over IP telephone system to the Layer 2 network that is shown. All switch ports are in VLAN 1.
Whenever the data traffic is high, telephone users complain about poor voice quality. What would be an efficient and cost effective way to address the situatio
Replace the trunks between each switch with access links that are dedicated to voice and data.
24
Refer to the exhibit. A network administrator is reviewing the interface configurations on Switch1 and Switch2 prior to connecting a trunk link between them. To
possible interruption of traffic and to avoid security risks, which configuration setting will need to be changed before connecting the trunk link?
25
Refer to the exhibit. A user enters the show running-config command at the prompt with the results shown. What is the most likely cause of the invalid input e
26
Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?
Cat-A
Cat-B
Cat-C
Cat-D
27
Which statement correctly describes the spanning-tree path cost?
It is calculated based on the utilization of all the switches along a given path.
It is calculated based on the bridge priority of the switches along a given path.
It is calculated based on the sum of the port cost value, determined by link speed, for each switch port along a given path.
28 Which statement is true about open authentication when it is enabled on an access point?
requires no authentication
30
How are data frames identified and sent to the correct VLAN when exiting an Ethernet trunk?
Frames are forwarded to the correct VLAN based on the VLAN tag.
Frames are always forwarded to the native VLAN when exiting a trunk.
Frames are forwarded to the correct VLAN based on the source IP address.
Frames are forwarded to the correct VLAN based on information in the MAC address table.
31
Refer to the exhibit. How will Switch1 treat untagged frames that enter interface Fa0/1?
32
What happens when the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines?
The switch allows remote connections only after a new RSA key pair is generated.
33
Which two statements are correct about wireless infrastructure components? (Choose two.)
An AP converts the TCP/IP data packets from their 802.11 frame encapsulation format to the 802.3 Ethernet frame format on the wired Ethernet network.
A wireless AP does not require any physical connection to allow wireless clients to access the Internet.
An AP is a layer 2 device, similar to a switch, that provides dedicated bandwidth to each connected wireless host.
34
A new switch is to be added to an existing network in a remote office. The network administrator does not want the technicians in the remote office to be able
new VLANs to the switch, but the switch should receive VLAN updates from the VTP domain. Which two steps must be performed to configure VTP on the ne
switch to meet these conditions? (Choose two.)
35
Refer to the exhibit. All trunk links are operational and all VLANs are allowed on all trunk links. An ARP request is sent by computer 5. Which device or devices
receive this message?
only computer 4
Refer to the exhibit. The teacher host is connected to port Fa0/7 on switch STW. A student has decided to share access to the Internet by attaching a hub and
laptop to STW as shown. What will be the result of the student making this connection?
Both the teacher and student will be able to receive data but only the teacher will be able to send.
The frames from the laptop will be dropped, but the teacher host will maintain connectivity with the network.
37
Refer to the exhibit. Hosts A, B, and C have just been added to the switch. Host A sends a packet addressed to host C. Packet capture software on host B ind
that the packet was received at the NIC on host B. What caused host B to receive the packet addressed to host C?
New MAC addresses are sent as multicasts to help reduce broadcast storms.
Spanning Tree Protocol causes all new MAC addresses to be forwarded as broadcasts.
The switch will forward packets for all new MAC addresses out all ports except the port they were received on.
38
When a unicast frame is received on a switch with STP disabled and an empty MAC address table, how will the switch handle the frame?
It will send it out every port except the one on which the frame was received.
39 What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?
The switches will negotiate via VTP which VLANs to allow across the trunk.
A wireless access point can function as which type of shared medium, wired LAN device?
40
hub
switch
router
gateway
41
Refer to the exhibit. The switches are configured for VTP as shown. Which two statements correctly describe the operation of these switches? (Choose two.)
A new VLAN can be added to Switch1 and that information will be added only to Switch2.
A new VLAN can be added to Switch1 and that information will be added to Switch2 and Switch4.
An existing VLAN can be deleted from Switch4 and that VLAN will be deleted from Switch1 and Switch2.
An existing VLAN can be deleted from Switch2 and that VLAN will be deleted from Switch1 and Switch4.
A new VLAN can be added to Switch4 and that information will be added to Switch1, Switch2, and Switch3.
A new VLAN can be added to Switch3 and that information will be added to Switch1, Switch2, and Switch4.
42
A network administrator is tasked with implementing a small wireless network in an office to support only employees that use Wireless-N and Wireless-G devic
What is the best combination of SSID naming strategy, network mode, and beaconing options?
Set the network mode to Mixed, change the default SSID, and use the broadcast option.
Set the network mode to BG-Mixed, keep the default SSID, and use the broadcast option.
Set the network mode to Mixed, keep the default SSID, and prevent the SSID from being broadcast.
Set the network mode to Mixed, change the default SSID, and prevent the SSID from being broadcast.
43
Refer to the exhibit. The network administrator configures both switches as displayed. However, host C is unable to ping host D and host E is unable to ping h
What action should the administrator take to enable this communication?
The service password-encryption command is entered at the privileged EXEC mode prompt.
The service password-encryption command encrypts only passwords for the console and VTY ports.
The service password-encryption command encrypts all previously unencrypted passwords in the running configuration.
To see the passwords encrypted by the service password-encryption command, enter the no service password-encryption command.
45
Refer to the exhibit. Which two statements are true regarding what the cost value of 23 represents for Switch4? (Choose two.)
This cost represents the lowest cost path for Switch4 to the root switch.
A cost of 23 is the value being advertised out port 16 on the switch upstream (closer) to the root switch.
Switch4 adds the cost of a Fast Ethernet link to 23 to determine its total cost to reach the root switch.
Switch4 is connected via a Fast Ethernet link to an upstream switch that in turn is directly connected to the root switch via a Gigabit Ethernet link.
The root switch is advertising a cost of 23, which is lower than any other switch in the VLAN0001 spanning-tree domain.
46
Refer to the exhibit. What is the purpose of the configuration commands that are shown?
47
Which two statements describe Spanning Tree Protocol? (Choose two.)
It is configured on routers.
48
Refer to the exhibit. Which two facts can be confirmed by this output? (Choose two.)
This switch has established two-way communication with the neighboring devices.
This switch is configured to advertise its VLAN configuration to other VTP-enabled switches in the same VTP domain.
This switch will drop all VTP advertisements that come from the switches that are configured in the same VTP domain.
This switch will cause no disruption in the VTP domain operations if the rest of the switches in the same VTP domain have a higher configuration revision num
49
Refer to the exhibit. After the listed commands are entered into router R1 and switch S1, PC1 and PC2 cannot ping each other. The network administrator ent
the show interfaces trunk command and gets the results that are shown. What is the likely problem?
The trunk is established, but no VLANs have been configured to use it.
The trunk has not been established because the switch port has not been configured for trunking.
The switch, the router, or both must be configured with the dynamic desirable option for the Dynamic Trunking Protocol to establish a trunk.
50
What are two drawbacks to using WEP shared key encryption? (Choose two.)
No authentication is required.