Time limit: 0
Quiz-summary
0 of 188 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
Information
Section II: LAN Switching Technologies - Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 188 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- Answered
- Review
-
Question 1 of 188
1. Question
1 pointsWhich statement about Cisco Discovery Protocol is true?Correct
Incorrect
-
Question 2 of 188
2. Question
1 pointsA network administrator needs to configure port security on a switch. Which two statements are true? (Choose two.)Correct
Incorrect
Hint
Follow these guidelines when configuring port security: + Port security can only be configured on static access ports, trunk ports, or 802.1Q tunnel ports. -> A is not correct. + A secure port cannot be a dynamic access port. + A secure port cannot be a destination port for Switched Port Analyzer (SPAN). + A secure port cannot belong to a Fast EtherChannel or Gigabit EtherChannel port group. -> D is not correct + You cannot configure static secure or sticky secure MAC addresses on a voice VLAN. -> B is not correct. + When you enable port security on an interface that is also configured with a voice VLAN, you must set the maximum allowed secure addresses on the port to at least two. + If any type of port security is enabled on the access VLAN, dynamic port security is automatically enabled on the voice VLAN. + When a voice VLAN is configured on a secure port that is also configured as a sticky secure port, all addresses seen on the voice VLAN are learned as dynamic secure addresses, and all addresses seen on the access VLAN (to which the port belongs) are learned as sticky secure addresses. + The switch does not support port security aging of sticky secure MAC addresses. + The protect and restrict options cannot be simultaneously enabled on an interface. (Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3550/software/release/12-1_19_ea1/configuration/guide/3550scg/swtrafc.html#wp1038546) Note: Dynamic access port or Dynamic port VLAN membership must be connected to an end station. This type of port can be configured with the “switchport access vlan dynamic” command in the interface configuration mode. Please read more about Dynamic access port here: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3550/software/release/12-1_19_ea1/configuration/guide/3550scg/swvlan.html#wp1103064 -
Question 3 of 188
3. Question
1 pointsWhich interface counter can you use to diagnose a duplex mismatch problem?Correct
Incorrect
Hint
A late collision is defined as any collision that occurs after the first 512 bits of the frame have been transmitted. The usual possible causes are full-duplex/half-duplex mismatch, exceeded Ethernet cable length limits, or defective hardware such as incorrect cabling, non-compliant number of hubs in the network, or a bad NIC. We can check the interface counter with the “show interface” command on a Cisco device. For example: On an Ethernet connection, a duplex mismatch is a condition where two connected devices operate in different duplex modes, that is, one operates in half duplex while the other one operates in full duplex. Note: + Runts are frames which do not meet the minimum frame size of 64 bytes. Runts are usually created by collisions. + Giants: frames that are larger than 1,518 bytes -
Question 4 of 188
4. Question
1 pointsWhich switching method duplicates the first six bytes of a frame before making a switching decision?Correct
Incorrect
Hint
In cut-through switching, the switch copies into its memory only the destination MAC address (first six bytes of the frame) of the frame. After processing these first six bytes, the switch had enough information to make a forwarding decision and move the frame to the appropriate switchport. This switching method is faster than store-and-forward switching method. In store-and-forward switching, the switch copies each complete Ethernet frame into the switch memory and computes a Cyclic Redundancy Check (CRC) for errors. If a CRC error is found, the Ethernet frame is dropped. If no CRC error is found then that frame is forwarded. -
Question 5 of 188
5. Question
1 pointsWhich command can you enter to determine whether a switch is operating in trunking mode?Correct
Incorrect
Hint
Below is an example of the output of this command. Interface Ethernet1/0 is operating in trunking mode. -
Question 6 of 188
6. Question
1 pointsWhat are three benefits of implementing VLANs? (Choose three.)Correct
Incorrect
-
Question 7 of 188
7. Question
1 pointsWhich command can you enter to view the ports that are assigned to VLAN 20?Correct
Incorrect
-
Question 8 of 188
8. Question
1 pointsWhen an interface is configured with PortFast BPDU guard, how does the interface respond when it receives a BPDU?Correct
Incorrect
Hint
PortFast BPDU guard prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port. When you enable BPDU guard on the switch, spanning tree shuts down PortFast-configured interfaces that receive BPDUs instead of putting them into the spanning tree blocking state. In a valid configuration, PortFast-configured interfaces do not receive BPDUs (because PortFast should only be configured on interfaces which are connected to hosts). If a PortFast-configured interface receives a BPDU, an invalid configuration exists. BPDU guard provides a secure response to invalid configurations because the administrator must manually put the interface back in service. Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4000/8-2glx/configuration/guide/stp_enha.html -
Question 9 of 188
9. Question
1 pointsWhat are three advantages of VLANs? (Choose three.)Correct
Incorrect
-
Question 10 of 188
10. Question
1 pointsRefer to the exhibit. Which of these statements correctly describes the state of the switch once the boot process has been completed?Correct
Incorrect
Hint
From the output we notice that the administrator has just shut down Interface Vlan1, which is the default VLAN so no one can access it remotely (like telnet) -> B is correct. Answer A is not correct as STP calculation does not depend on which port comes up first or last. STP recalculates when there is a change in the network. A normal switch can operate without VLAN -> C is not correct. This IOS does support VLAN because it has VLAN 1 on it -> D is not correct. -
Question 11 of 188
11. Question
1 pointsWhich condition does the err-disabled status indicate on an Ethernet interface?Correct
Incorrect
Hint
There are various reasons for the interface to go into errdisable. The reason can be: + Duplex mismatch + Port channel misconfiguration + BPDU guard violation + UniDirectional Link Detection (UDLD) condition + Late-collision detection + Link-flap detection + Security violation + Port Aggregation Protocol (PAgP) flap + Layer 2 Tunneling Protocol (L2TP) guard + DHCP snooping rate-limit + Incorrect GBIC / Small Form-Factor Pluggable (SFP) module or cable + Address Resolution Protocol (ARP) inspection + Inline power Reference: http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/69980-errdisable-recovery.html Therefore in fact there are two correct answers in this question, which are “There is a duplex mismatch” and “Port security has disabled the interface” but maybe you should choose the port security answer as it is the most popular reason. -
Question 12 of 188
12. Question
1 pointsWhich statement about LLDP is true?Correct
Incorrect
Hint
Link Layer Discovery Protocol (LLDP) is a industry standard protocol that allows devices to advertise, and discover connected devices, and there capabilities (same as CDP of Cisco). To enable it on Cisco devices, we have to use this command under global configuration mode: Sw(config)# lldp run -
Question 13 of 188
13. Question
1 pointsIf the primary root bridge experiences a power loss, which switch takes over?Correct
Incorrect
Hint
The switches compare their Bridge ID with each other to find out who will be the root bridge. The root bridge is the bridge with the lowest bridge ID. Bridge ID = Bridge Priority + MAC Address In this question the bridge priority was not mentioned so we suppose they are the same. Therefore the switch with lowest MAC address will become the new root bridge. -
Question 14 of 188
14. Question
1 pointsRefer to the exhibit. Each of these four switches has been configured with a hostname, as well as being configured to run RSTP.No other configuration changes have been made. Which three of these show the correct RSTP port roles for the indicated switches and interfaces? (Choose three.)Correct
Incorrect
Hint
The question says “no other configuration changes have been made” so we can understand these switches have the same bridge priority. Switch C has lowest MAC address so it will become root bridge and 2 of its ports (Fa0/1 & Fa0/2) will be designated ports -> E is incorrect. Because SwitchC is the root bridge so the 2 ports nearest SwitchC on SwitchA (Fa0/1) and SwitchD (Gi0/2) will be root ports -> B and F are correct. Now we come to the most difficult part of this question: SwitchB must have a root port so which port will it choose? To answer this question we need to know about STP cost and port cost. In general, “cost” is calculated based on bandwidth of the link. The higher the bandwidth on a link, the lower the value of its cost. Below are the cost values you should memorize: SwitchB will choose the interface with lower cost to the root bridge as the root port so we must calculate the cost on interface Gi0/1 & Gi0/2 of SwitchB to the root bridge. This can be calculated from the “cost to the root bridge” of each switch because a switch always advertises its cost to the root bridge in its BPDU. The receiving switch will add its local port cost value to the cost in the BPDU. In the exhibit you also we FastEthernet port is connecting to GigabitEthernet port. In this case GigabitEthernet port will operate as a FastEthernet port so the link can be considered as FastEthernet to FastEthernet connection. One more thing to notice is that a root bridge always advertises the cost to the root bridge (itself) with an initial value of 0. Now let’s have a look at the topology again SwitchC advertises its cost to the root bridge with a value of 0. Switch D adds 19 (the cost value of 100Mbps link although the port on Switch D is GigabitEthernet port) and advertises this value (19) to SwitchB. SwitchB adds 4 (the cost value of 1Gbps link) and learns that it can reach SwitchC via Gi0/1 port with a total cost of 23. The same process happens for SwitchA and SwitchB learns that it can reach SwitchC via Gi0/2 with a total cost of 38 -> Switch B chooses Gi0/1 as its root port -> D is not correct. Now our last task is to identify the port roles of the ports between SwitchA & SwitchB. It is rather easy as the MAC address of SwitchA is lower than that of SwitchB so Fa0/2 of SwitchA will be designated port while Gi0/2 of SwitchB will be alternative port -> A is correct but C is not correct. Below summaries all the port roles of these switches: + DP: Designated Port (forwarding state) + RP: Root Port (forwarding state) + AP: Alternative Port (blocking state) -
Question 15 of 188
15. Question
1 pointsWhich feature builds a FIB and an adjacency table to expedite packet forwarding?Correct
Incorrect
Hint
Cisco Express Forwarding (CEF) provides the ability to switch packets through a device in a very quick and efficient way while also keeping the load on the router’s processor low. CEF is made up of two different main components: the Forwarding Information Base (FIB) and the Adjacency Table. These are automatically updated at the same time as the routing table. The Forwarding Information Base (FIB) contains destination reachability information as well as next hop information. This information is then used by the router to make forwarding decisions. The FIB allows for very efficient and easy lookups. The adjacency table is tasked with maintaining the layer 2 next-hop information for the FIB. -
Question 16 of 188
16. Question
1 pointsWhat are two reasons that duplex mismatches can be difficult to diagnose? (Choose two.)Correct
Incorrect
-
Question 17 of 188
17. Question
1 pointsWhich command would you configure globally on a Cisco router that would allow you to view directly connected Cisco devices?Correct
Incorrect
Hint
CDP is enabled by default on all Cisco routers. If it is turned off by any reason, we can turn it on again with the following command on global configuration mode: Router(config)#cdp run Note: CDP can be turned on or turned off on each interface. For example to turn off CDP on an interface we use this command: Router(config-if)#no cdp enable -
Question 18 of 188
18. Question
1 pointsIf all switches are configured with default values, which switch will take over when the primary root bridge experiences a power loss?Correct
Incorrect
-
Question 19 of 188
19. Question
1 pointsWhich two protocols can detect native VLAN mismatch errors? (Choose two.)Correct
Incorrect
-
Question 20 of 188
20. Question
1 pointsWhich DTP switch port mode allows the port to create a trunk link if the neighboring port is in trunk mode, dynamic desirable mode, or desirable auto mode?Correct
Incorrect
Hint
The Dynamic Trunking Protocol (DTP) is a proprietary networking protocol developed by Cisco for the purpose of negotiating trunking on a link between two switches, and for negotiating the type of trunking encapsulation to be used. In dynamic auto mode, the interface is able to convert the link to a trunk link. The interface becomes a trunk interface if the neighboring interface is set to trunk or desirable mode. The default switchport mode for newer Cisco switch Ethernet interfaces is dynamic auto. Note that if two Cisco switches are left to the common default setting of auto, a trunk will never form. In dynamic desirable mode, the interface actively attempt to convert the link to a trunk link. The interface becomes a trunk interface if the neighboring interface is set to trunk, desirable, or auto mode. This is the default switchport mode on older switches, such as the Catalyst 2950 and 3550 Series switches -> This is the best answer in this question. Reference: http://www.ciscopress.com/articles/article.asp?p=2181837&seqNum=8 -
Question 21 of 188
21. Question
1 pointsWhich DTP switch port mode allows the port to create a trunk link if the neighboring port is in trunk mode, dynamic desirable mode, or desirable or auto mode?Correct
Incorrect
-
Question 22 of 188
22. Question
1 pointsWhich three statements about DWDM are true? (Choose three)Correct
Incorrect
Hint
A newer fiber-optic media development for long-range communications is called dense wavelength-division multiplexing (DWDM). DWDM multiplies the amount of bandwidth that a single strand of fiber can support. DWDM circuits are used in all modern submarine communications cable systems and other long-haul circuits. Specifically, DWDM: + Enables bidirectional communications over one strand of fiber -> Answer A is correct + Assigns incoming optical signals to specific wavelengths of light (i.e., frequencies) + Each channel is capable of carrying a 10-Gbps multiplexed signal -> Answer E is not correct + Can multiplex more than 80 different channels of data (i.e., wavelengths) onto a single fiber -> Answer C is not correct + Can amplify these wavelengths to boost the signal strength + Supports SONET and SDH standards Reference: http://www.ciscopress.com/articles/article.asp?p=2202411&seqNum=6 -
Question 23 of 188
23. Question
1 pointsWhich three statements about DTP are true? (Choose three.)Correct
Incorrect
-
Question 24 of 188
24. Question
1 pointsWhich three commands must you enter to create a trunk that allows VLAN 20? (Choose three.)Correct
Incorrect
-
Question 25 of 188
25. Question
1 pointsWhich feature facilitates the tagging of frames on a specific VLAN?Correct
Incorrect
-
Question 26 of 188
26. Question
1 pointsWhich statement about spanning-tree root-bridge election is true?Correct
Incorrect
Hint
Answer A is not correct as we can choose which switch to become root bridge by configuring bridge priority. The switch with lowest bridge priority (value) would become the root bridge. For answer B, this paragraph from Cisco confirms it is the correct answer: “When you implement a root bridge in a switching network, you usually refer to the root bridge as the root switch. Each VLAN must have its own root bridge because each VLAN is a separate broadcast domain. The roots for the different VLANs can all reside in a single switch or in various switches.” Reference: https://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/5234-5.html The meaning of answer C is not clear but maybe it means “every VLAN must use the same root bridge” which is not correct as Sw1 can be the root bridge for VLANs 1, 3, 5 but Sw2 can be the root bridge for VLAN 2, 4, 6… From the quote above we can say answer D is not correct. -
Question 27 of 188
27. Question
1 pointsWhich two statements about data VLANs on access ports are true? ( Choose two)Correct
Incorrect
-
Question 28 of 188
28. Question
1 pointsWhich three options are switchport configurations that can always avoid duplex mismatch errors between two switches? (Choose three.)Correct
Incorrect
Hint
http://www.pathsolutions.com/network-enemy-1-duplex-mismatch/ -
Question 29 of 188
29. Question
1 pointsUnder normal operations, cisco recommends that you configure switch ports on which vlan?Correct
Incorrect
Hint
http://www.cisco.com/c/en/us/support/docs/switches/catalyst-6500-series-switches/24330-185.html Note: There is a potential security consideration with dot1q that the implicit tagging of the native VLAN causes. The transmission of frames from one VLAN to another without a router can be possible. Refer to the Intrusion Detection FAQ leavingcisco.com for further details. The workaround is to use a VLAN ID for the native VLAN of the trunk that is not used for end-user access. In order to achieve this, the majority of Cisco customers simply leave VLAN 1 as the native VLAN on a trunk and assign access ports to VLANs other than VLAN 1. -
Question 30 of 188
30. Question
1 pointsWhich statement about VLAN operation on Cisco Catalyst switches is true?Correct
Incorrect
Hint
Each VLAN resides in its own broadcast domain, so incoming frames with unknown destinations are only transmitted to ports that reside in the same VLAN as the incoming frame. -
Question 31 of 188
31. Question
1 pointsWhich two options describe benefits of aggregated chassis technology (choose two)?Correct
Incorrect
Hint
Chassis aggregation is a Cisco technology to make multiple switches operate as a single switch. It is similar to stacking but meant for powerful switches (like the 6500 and 6800 series switches). Chassis aggregation is often used in the core layer and distribution layer (while switching stacking is used for access layer). The books do not mention about the benefits of chassis aggregation but they are the same as switch stacking. + The stack would have a single management IP address. + The engineer would connect with Telnet or SSH to one switch (with that one management IP address), not multiple switches. + One configuration file would include all interfaces in all physical switches. + STP, CDP, VTP would run on one switch, not multiple switches. + The switch ports would appear as if all are on the same switch. + There would be one MAC address table, and it would reference all ports on all physical switches. Reference: CCNA Routing and Switching ICND2 200-105 Official Cert Guide VSS is a chassis aggregation technology but it is dedicated for Cisco Catalyst 6500 Series Switches. VSS increases operational efficiency by simplifying the network, reducing switch management overhead by at least 50 percent -> A is correct Single point of management, IP address, and routing instance for the Cisco Catalyst 6500 virtual switch + Single configuration file and node to manage. Removes the need to configure redundant switches twice with identical policies. + Only one gateway IP address is required per VLAN, instead of the three IP addresses per VLAN used today -> C is correct while D is not correct. + Removes the need for Hot Standby Router Protocol (HSRP), Virtual Router Redundancy Protocol (VRRP), and Gateway Load Balancing Protocol (GLBP)-> so maybe E is not correct. Reference: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-virtual-switching-system-1440/prod_qas0900aecd806ed74b.html -
Question 32 of 188
32. Question
1 pointsRefer to the exhibit. Which switch provides the spanning-tree designated port role for the network segment that services the printers?Correct
Incorrect
Hint
First, the question asks what switch services the printers, so it can be Switch 3 or Switch 4 which is connected directly to the Printers. Next, by comparing the MAC address of Switch 3 and Switch 4 we found that the MAC of Switch 3 is smaller. Therefore the interface connected to the Printers of Switch 3 will become designated interface and the interface of Switch 4 will be blocked. The picture below shows the roles of all ports: DP: Designated Port RP: Root Port BP: Blocked Port (Please notice that Switch 1 will become the root bridge because of its lowest priority, not Switch 3) -
Question 33 of 188
33. Question
1 pointsWhich type of MAC address is aged automatically by the switch?Correct
Incorrect
-
Question 34 of 188
34. Question
1 pointsFor what two purposes does the Ethernet protocol use physical addresses? (Choose two.)Correct
Incorrect
Hint
Physical addresses or MAC addresses are used to identify devices at layer 2 -> A is correct. MAC addresses are only used to communicate on the same network. To communicate on different network we have to use Layer 3 addresses (IP addresses) -> B is not correct; E is correct. Layer 2 frame and Layer 3 packet can be recognized via headers. Layer 3 packet also contains physical address -> C is not correct. On Ethernet, each frame has the same priority to transmit by default -> D is not correct. All devices need a physical address to identify itself. If not, they can not communicate -> F is not correct. -
Question 35 of 188
35. Question
1 pointsWhen you enable PortFast on a switch port, the port immediately transitions to which state?Correct
Incorrect
Hint
PortFast causes a switch or trunk port to enter the spanning tree forwarding state immediately, bypassing the listening and learning states. You can use PortFast on switch or trunk ports that are connected to a single workstation, switch, or server to allow those devices to connect to the network immediately, instead of waiting for the port to transition from the listening and learning states to the forwarding state. -
Question 36 of 188
36. Question
1 pointsWhich two EtherChannel PAgP modes can you configure? (Choose two.)Correct
Incorrect
-
Question 37 of 188
37. Question
1 pointsWhich command sequence can you enter to create VLAN 20 and assign it to an interface on a switch?Correct
Incorrect
-
Question 38 of 188
38. Question
1 pointsWhich two statements about late collisions are true? (Choose two.)Correct
Incorrect
Hint
A late collision is defined as any collision that occurs after the first 512 bits of the frame have been transmitted. The usual possible causes are full-duplex/half-duplex mismatch, exceeded Ethernet cable length limits, or defective hardware such as incorrect cabling, non-compliant number of hubs in the network, or a bad NIC. Note: On an Ethernet connection, a duplex mismatch is a condition where two connected devices operate in different duplex modes, that is, one operates in half duplex while the other one operates in full duplex. -
Question 39 of 188
39. Question
1 pointsWhich command can you enter to re-enable Cisco Discovery Protocol on a local router after it has been disabled?Correct
Incorrect
-
Question 40 of 188
40. Question
1 pointsRefer to the exhibit. The output that is shown is generated at a switch. Which three of these statements are true? (Choose three.)Correct
Incorrect
Hint
From the output, we see that all ports are in Designated role (forwarding state) -> A and E are correct. The command “show spanning-tree vlan 30″ only shows us information about VLAN 30. We don’t know how many VLAN exists in this switch -> B is not correct. The bridge priority of this switch is 24606 which is lower than the default value bridge priority 32768 -> C is correct. All three interfaces on this switch have the connection type “p2p”, which means Point-to-point environment – not a shared media -> D is not correct. The only thing we can specify is this switch is the root bridge for VLAN 30 but we can not guarantee it is also the root bridge for other VLANs -> F is not correct. -
Question 41 of 188
41. Question
1 pointsWhich two commands can be used to verify a trunk link configuration status on a given Cisco switch interface? (Choose two.)Correct
Incorrect
Hint
The “show interfaces trunk” command and “show interfaces switchport” command can be used to verify the status of an interface (trunking or not). The outputs of these commands are shown below (port Ethernet 1/0 has been configured as trunk): The “show ip interface brief” command only gives us information about the IP address, the status (up/down) of an interface: The “show interfaces vlan” command only gives us information about that VLAN, not about which ports are the trunk links: -
Question 42 of 188
42. Question
1 pointsWhich two states are the port states when RSTP has converged? (Choose two.)Correct
Incorrect
Hint
RSTP only has 3 port states that are discarding, learning and forwarding. When RSTP has converged there are only 2 port states left: discarding and forwarding. -
Question 43 of 188
43. Question
1 pointsRefer to the exhibit. A technician has installed SwithchB and needs to configure it for remote access from the management workstation connected SwitchA. Which set of commands is required to accomplish this task?Correct
Incorrect
-
Question 44 of 188
44. Question
1 pointsA technician has installed SwitchB and needs to configure it for remote access from the management workstation connected SwitchA. Which set of commands is required to accomplish this task?Correct
Incorrect
Hint
To remote access to SwitchB, it must have a management IP address on a VLAN on that switch. Traditionally, we often use VLAN 1 as the management VLAN (but in fact it is not secure). In the exhibit, we can recognize that the Management Workstation is in a different subnet from the SwitchB. For intersubnetwork communication to occur, you must configure at least one default gateway. This default gateway is used to forward traffic originating from the switch only, not to forward traffic sent by devices connected to the switch. -
Question 45 of 188
45. Question
1 pointsWhich of the following are benefits of VLANs? (Choose three.)Correct
Incorrect
Hint
When using VLAN the number and size of collision domains remain the same -> A is not correct. VLANs allow to group users by function, not by location or geography -> B is correct. VLANs help minimize the incorrect configuration of VLANs so it enhances the security of the network -> C is correct. VLAN increases the size of broadcast domains but does not decrease the number of collision domains -> D is not correct. VLANs increase the number of broadcast domains while decreasing the size of the broadcast domains which increase the utilization of the links. It is also a big advantage of VLAN -> E is correct. VLANs are useful but they are more complex and need more administration -> F is not correct. -
Question 46 of 188
46. Question
1 pointsWhich three statements accurately describe Layer 2 Ethernet switches? (Choose three.)Correct
Incorrect
Hint
Microsegmentation is a network design (functionality) where each workstation or device on a network gets its own dedicated segment (collision domain) to the switch. Each network device gets the full bandwidth of the segment and does not have to share the segment with other devices. Microsegmentation reduces and can even eliminate collisions because each segment is its own collision domain Note: Microsegmentation decreases the number of collisions but it increases the number of collision domains. -
Question 47 of 188
47. Question
1 pointsWhat is the status of port-channel if LACP is misconfigured?Correct
Incorrect
Hint
EtherChannel misconfiguration occurs when the channel parameters do not match on both sides of the EtherChannel, resulting in the following message: %PM-SP-4-ERR_DISABLE: channel-misconfig error detected on Po3, putting E1/3 in err-disable state Therefore from the output above we can see that when miconfigured, the physical (member) interface is put into err-disable state. But this question asks above “the status of port-channel” (not the physical member interface) so answer “Disabled” is a better choice. -
Question 48 of 188
48. Question
1 pointsHow to create a trunk port and allow VLAN 20? (Choose Three.)Correct
Incorrect
Hint
In switches that support both InterSwitch Link (ISL) and 802.1Q trunking encapsulations, we need to specify an trunking protocol so we must use the command “switchport trunk encapsulation dot1q” command first to set the trunk mode to 802.1Q. Then we configure trunking interface with the “switchport mode trunk” command. Then we explicitly allow vlan 20 with the command “switchport trunk allowed vlan 20” command. By default all VLANs are allowed to pass but after entering this command, only VLAN 20 is allowed. -
Question 49 of 188
49. Question
1 pointsWhich mode is compatible with Trunk, Access, and desirable ports?Correct
Incorrect
Hint
Explanation from http://www.9tut.com/trunking-questions Maybe this question wanted to ask “if the other end is configured with trunk/access/desirable mode” then which mode is compatible so that the link can work. In that case both “dynamic auto” and “dynamic desirable” mode are correct. The difference between these two modes is “dynamic auto” is passively waiting for the other end to request to form a trunk while “dynamic desirable” will actively attempt to negotiate to convert the link into a trunk. -
Question 50 of 188
50. Question
1 pointsWhat parameter can be different on ports within an EtherChannel?Correct
Incorrect
Hint
All interfaces in an EtherChannel must be configured identically to form an EtherChannel. Specific settings that must be identical include: + Speed settings + Duplex settings + STP settings + VLAN membership (for access ports) + Native VLAN (for trunk ports) + Allowed VLANs (for trunk ports) + Trunking Encapsulation (ISL or 802.1Q, for trunk ports) -
Question 51 of 188
51. Question
1 pointsWhich spanning-tree protocol rides on top of another spanning-tree protocol?Correct
Incorrect
Hint
Multiple Spanning Tree (MST) rides on top of RSTP so it converges very fast. The idea behind MST is that some VLANs can be mapped to a single spanning tree instance because most networks do not need more than a few logical topologies. -
Question 52 of 188
52. Question
1 pointsWhich three statements about RSTP are true? (Choose three.)Correct
Incorrect
-
Question 53 of 188
53. Question
1 pointsWhich two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch? (Choose two.)Correct
Incorrect
Hint
We can verify whether port security has been configured by using the “show running-config” or “show port-security interface ” for more detail. An example of the output of “show port-security interface ” command is shown below: -
Question 54 of 188
54. Question
1 pointsRefer to the exhibit. Switch port FastEthernet 0/24 on ALSwitch1 will be used to create an IEEE 802.1Q-compliant trunk to another switch. Based on the output shown, what is the reason the trunk does not form, even though the proper cabling has been attached?Correct
Incorrect
Hint
According to the output shown the switchport (layer 2 Switching) is enabled and the port is in access mode. To make a trunk link the port should configured as a trunk port, not an access port, by using the following command: (Config-if)#switchport mode trunk -
Question 55 of 188
55. Question
1 pointsRefer to the exhibit. Switch-1 needs to send data to a host with a MAC address of 00b0.d056.efa4. What will Switch-1 do with this data?Correct
Incorrect
Hint
The MAC address of 00b0.d056.efa4 has not been learned in its MAC address table so Switch-1 will broadcast the frame out all of its ports except the port from which the data originated. -
Question 56 of 188
56. Question
1 pointsStandard industrialized protocol of etherchannel?Correct
Incorrect
-
Question 57 of 188
57. Question
1 pointsHow to enable vlans automatically across multiple switches?Correct
Incorrect
-
Question 58 of 188
58. Question
1 pointsWhat are contained in layer 2 ethernet frame? (Choose Three.)Correct
Incorrect
Hint
At the end of each frame there is a Frame Check Sequence (FCS) field. FCS can be analyzed to determine if errors have occurred. FCS uses cyclic redundancy check (CRC) algorithm to detect errors in the transmitted frames. Before sending data, the sending host generates a CRC based on the header and data of that frame. When this frame arrives, the receiving host uses the same algorithm to generate its own CRC and compare them. If they do not match then a CRC error will occur. Preamble is used to indicate the start of the frame by arranging the first 62 bits as alternating “1/0s” and the last two bits as “1”s. Like so, 010101010101010………………………10101011. Therefore when the receiving end sees the “11” it knows where the actual Ethernet header starts. The alternating 1s and 0s will also allow the two endpoints to sync their internal clocks. In summary, preamble is used for synchronization. The “Type/Length” field is used to indicate the “Type”of the payload (Layer 3 protocol) which is indicated as a Hexadecimal value. Note: Ethernet II uses “Type” while the old Ethernet version use “Length” -
Question 59 of 188
59. Question
1 pointsWhich two of these are characteristics of the 802.1Q protocol? (Choose two.)Correct
Incorrect
Hint
IEEE 802.1Q is the networking standard that supports Virtual LANs (VLANs) on an Ethernet network. It is a protocol that allows VLANs to communicate with one another using a router. 802.1Q trunks support tagged and untagged frames. If a switch receives untagged frames on a trunk port, it believes that frame is a part of the native VLAN. Also, frames from a native VLAN are not tagged when exiting the switch via a trunk port. The 802.1q frame format is same as 802.3. The only change is the addition of 4 bytes fields. That additional header includes a field with which to identify the VLAN number. Because inserting this header changes the frame, 802.1Q encapsulation forces a recalculation of the original FCS field in the Ethernet trailer. Note: Frame Check Sequence (FCS) is a four-octet field used to verify that the frame was received without loss or error. FCS is based on the contents of the entire frame. -
Question 60 of 188
60. Question
1 pointsWhich command is used to know the duplex speed of serial link?Correct
Incorrect
Hint
Nowadays all serial links are full-duplex (as serial interfaces have separate Rx & Tx pins) so maybe this question wants to ask about how to check the speed of the serial link. The “show interface” command gives us information about this. An example of this command is shown below: In this output the speed of S0/0 interface is 1544 Kbits. -
Question 61 of 188
61. Question
1 pointsA BPDU guard is configured on an interface that has PortFast enabled. Which state does the interface enter when it receives a BPDU?Correct
Incorrect
Hint
PortFast BPDU guard prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port.In a valid configuration, PortFast-configured interfaces do not receive BPDUs (because PortFast should only be configured on interfaces which are connected to hosts). If a PortFast-configured interface receives a BPDU, an invalid configuration exists. BPDU guard provides a secure response to invalid configurations because the administrator must manually put the interface back in service.Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4000/8-2glx/configuration/guide/stp_enha.html -
Question 62 of 188
62. Question
1 pointsWhich mode are in PAgP? (choose two)Correct
Incorrect
-
Question 63 of 188
63. Question
1 pointsIn an Ethernet network, under what two scenarios can devices transmit? (Choose two.)Correct
Incorrect
-
Question 64 of 188
64. Question
1 pointsAt the end of an RSTP election process, which access layer switch port will assume the discarding role?Correct
Incorrect
Hint
In this question, we only care about the Access Layer switches (Switch3 & 4). Switch 3 has a lower bridge ID than Switch 4 (because the MAC of Switch3 is smaller than that of Switch4) so both ports of Switch3 will be in forwarding state. The alternative port will surely belong to Switch4. Switch4 will need to block one of its ports to avoid a bridging loop between the two switches. But how does Switch4 select its blocked port? Well, the answer is based on the BPDUs it receives from Switch3. A BPDU is superior to another if it has: 1. A lower Root Bridge ID 2. A lower path cost to the Root 3. A lower Sending Bridge ID 4. A lower Sending Port ID These four parameters are examined in order. In this specific case, all the BPDUs sent by Switch3 have the same Root Bridge ID, the same path cost to the Root and the same Sending Bridge ID. The only parameter left to select the best one is the Sending Port ID (Port ID = port priority + port index). In this case the port priorities are equal because they use the default value, so Switch4 will compare port index values, which are unique to each port on the switch, and because Fa0/12 is inferior to Fa0/1, Switch4 will select the port connected with Fa0/1 (of Switch3) as its root port and block the other port -> Port fa0/11 of Switch4 will be blocked (discarding role). -
Question 65 of 188
65. Question
1 pointsWhich switch would STP choose to become the root bridge in the selection process?Correct
Incorrect
-
Question 66 of 188
66. Question
1 pointsRefer to the exhibit. What two results would occur if the hub were to be replaced with a switch that is configured with one Ethernet VLAN? (Choose two.)Correct
Incorrect
-
Question 67 of 188
67. Question
1 pointsFor which two protocols can PortFast alleviate potential host startup is-sues? (Choose two.)Correct
Incorrect
-
Question 68 of 188
68. Question
1 pointsWhich method does a connected trunk port use to tag VLAN traffic?Correct
Incorrect
Hint
IEEE 802.1Q is the networking standard that supports virtual LANs (VLANs) on an Ethernet network. When a frame enters the VLAN-aware portion of the network (a trunk link, for example), a VLAN ID tag is added to represent the VLAN membership of that frame. The picture below shows how VLAN tag is added and removed while going through the network. -
Question 69 of 188
69. Question
1 pointsConfiguration of which option is required on a Cisco switch for the Cisco IP phone to work?Correct
Incorrect
Hint
When you connect an IP phone to a switch using a trunk link, it can cause high CPU utilization in the switches. As all the VLANs for a particular interface are trunked to the phone, it increases the number of STP instances the switch has to manage. This increases the CPU utilization. Trunking also causes unnecessary broadcast / multicast / unknown unicast traffic to hit the phone link. In order to avoid this, remove the trunk configuration and keep the voice and access VLAN configured along with Quality of Service (QoS). Technically, it is still a trunk, but it is called a Multi-VLAN Access Port (MVAP). Because voice and data traffic can travel through the same port, you should specify a different VLAN for each type of traffic. You can configure a switch port to forward voice and data traffic on different VLANs. Configure IP phone ports with a voice VLAN configuration. This configuration creates a pseudo trunk, but does not require you to manually prune the unnecessary VLANs. The voice VLAN feature enables access ports to carry IP voice traffic from an IP phone. You can configure a voice VLAN with the “switchport voice vlan …” command under interface mode. The full configuration is shown below:Switch(config)#interface fastethernet0/1 Switch(config-if)#switchport mode access Switch(config-if)#switchport access vlan 10 Switch(config-if)#switchport voice vlan 20
Reference: http://www.cisco.com/c/en/us/support/docs/switches/catalyst-4500-series-switches/69632-configuring-cat-ip-phone.html -
Question 70 of 188
70. Question
1 pointsRefer to the exhibit. Which statement describes the effect of this configuration?Correct
Incorrect
Hint
With the configuration above, when we type “do show vlan” we would not see VLAN 10 in the VLAN database because it has not been created yet. VLAN 10 is only created when we exits VLAN configuration mode (with “exit” command). -
Question 71 of 188
71. Question
1 pointsWhich statement about native VLAN traffic is true?Correct
Incorrect
-
Question 72 of 188
72. Question
1 pointsWhich statement about unicast frame forwarding on a switch is true?Correct
Incorrect
-
Question 73 of 188
73. Question
1 pointsWhich type does a port become when it receives the best BPDU on a bridge?Correct
Incorrect
Hint
Root port is the port on non-root bridge which is closest to the root bridge (in term of cost). Therefore when a port receives the best BPDU on a non-root bridge it will become the root port. -
Question 74 of 188
74. Question
1 pointsWhich value can you modify to configure a specific interface as the preferred forwarding interface?Correct
Incorrect
Hint
We can configure the port priority to change the preferred forwarding interface as we wish. For example we can change the port priority of an interface for VLAN 20 to 64 as follows:Switch(config-if)#spanning-tree vlan 20 port-priority 64
-
Question 75 of 188
75. Question
1 pointsWhich statement about VLAN configuration is true?Correct
Incorrect
-
Question 76 of 188
76. Question
1 pointsWhich two protocols are used by bridges and/or switches to prevent loops in a layer 2 network? (Choose two.)Correct
Incorrect
-
Question 77 of 188
77. Question
1 pointsHow can you disable DTP on a switch port?Correct
Incorrect
Hint
Although some books and websites said DTP is disabled if the switch port is configured as trunk or access mode (via the command “switchport mode trunk” or “switchport mode access”) but in fact DTP is still running in these modes. Please read at http://packetlife.net/blog/2008/sep/30/disabling-dynamic-trunking-protocol-dtp/. The only way to disable DTP on a switch port is to use the “switchport nonegotiate” command. But notice this command can only be used after configuring that switch port in “trunk” or “access” mode. Therefore this is a question with no correct answer but if we have to choose an answer, we will choose answer A. At least it is correct in theory. -
Question 78 of 188
78. Question
1 pointsWhich command can you enter on a switch to display the IP addresses associated with connected devices?Correct
Incorrect
Hint
Only the “show cdp neighbor detail” gives us information about the IP address of the connected device. Below is an example of this command. -
Question 79 of 188
79. Question
1 pointsWhich protocol is a Cisco proprietary implementation of STP?Correct
Incorrect
-
Question 80 of 188
80. Question
1 pointsVLAN 3 is not yet configured on your switch. What happens if you set the switchport access vlan 3 command in interface configuration mode?Correct
Incorrect
Hint
The “switchport access vlan 3″will put that interface as belonging to VLAN 3 while also updated the VLAN database automatically to include VLAN 3. -
Question 81 of 188
81. Question
1 pointsThree switches are connected to one another via trunk ports. Assuming the default switch configuration, which switch is elected as the root bridge for the spanning-tree instance of VLAN 1?Correct
Incorrect
Hint
Each switch in your network will have a Bridge ID Priority value, more commonly referred to as a BID. This BID is a combination of a default priority value and the switch’s MAC address, with the priority value listed first. The lowest BID will win the election process. For example, if a Cisco switch has the default priority value of 32,768 and a MAC address of 11-22-33- 44-55-66, the BID would be 32768:11-22-33-44-55-66. Therefore, if the switch priority is left at the default, the MAC address is the deciding factor in the root bridge election. -
Question 82 of 188
82. Question
1 pointsWhich command enables RSTP on a switch?Correct
Incorrect
Hint
Rapid Spanning Tree Protocol (RSTP) is an enhancement of the original STP 802.1D protocol. The RSTP 802.1w protocol is an IEEE open implementation. Cisco has its own proprietary implementation of RSTP, that includes the benefits of its Per-VLAN spanning tree protocols, called Rapid-PVST+. To activate the Rapid-PVST+ protocol: switch(config)#spanning-tree mode rapid-pvst -
Question 83 of 188
83. Question
1 pointsCisco Catalyst switches CAT1 and CAT2 have a connection between them using ports FA0/13. An 802.1Q trunk is configured between the two switches. On CAT1, VLAN 10 is chosen as native, but on CAT2 the native VLAN is not specified. What will happen in this scenario?Correct
Incorrect
Hint
A “native VLAN mismatch” error will appear by CDP if there is a native VLAN mismatch on an 802.1Q link. “VLAN mismatch” can cause traffic from one vlan to leak into another vlan. -
Question 84 of 188
84. Question
1 pointsRefer to the exhibit All switch ports are assigned to the correct VLANs, but none of the hosts connected to SwitchA can communicate with hosts in the same VLAN connected to SwitchB. Based on the output shown, what is the most likely problem?Correct
Incorrect
Hint
In order to pass traffic from VLANs on different switches, the connections between the switches must be configured as trunk ports. -
Question 85 of 188
85. Question
1 pointsWhat is the function of the command switchport trunk native vlan 999 on a Cisco Catalyst switch?Correct
Incorrect
Hint
Configuring the Native VLAN for Untagged Traffic A trunk port configured with 802.1Q tagging can receive both tagged and untagged traffic. By default, the switch forwards untagged traffic in the native VLAN configured for the port. The native VLAN is VLAN 1 by default. -
Question 86 of 188
86. Question
1 pointsRefer to the exhibit. A frame on VLAN 1 on switch S1 is sent to switch S2 where the frame is received on VLAN 2. What causes this behavior?Correct
Incorrect
-
Question 87 of 188
87. Question
1 pointsWhy will a switch never learn a broadcast address?Correct
Incorrect
-
Question 88 of 188
88. Question
1 pointsWhat can you change to select switch as root bridge?Correct
Incorrect
-
Question 89 of 188
89. Question
1 pointsWhich two types of information are held in the MAC address table? (Choose two)Correct
Incorrect
Hint
We can check the MAC address table with the command “show mac address-table”: As we can see here, the “MAC address” field is the source MAC address and the “Ports” field are the ports of the switch from which the frames (with corresponding source MAC address) were received. -
Question 90 of 188
90. Question
1 pointsWhich three are valid modes for a switch port used as a VLAN trunk? (choose three)Correct
Incorrect
-
Question 91 of 188
91. Question
1 pointsWhich type of attack can be mitigated by configuring the default native VLAN to be unused?Correct
Incorrect
-
Question 92 of 188
92. Question
1 pointsWhich process is associated with spanning-tree convergence?Correct
Incorrect
Hint
SPT must performs three steps to provide a loop-free network topology: 1. Elects one root bridge 2. Select one root port per nonroot bridge 3. Select one designated port on each network segment -> Answer B is correct. -
Question 93 of 188
93. Question
1 pointsWhich option is a benefit of switch stacking?Correct
Incorrect
Hint
Switch stacking technology allows the network engineer to make that stack of physical switches act like one switch. The stacking cables together make a ring between the switches. That is, the switches connect in series, with the last switch connecting again to the first. Answer B is not correct as switch stacking is about connecting switches together so that they act as one switch, not about adding and removing hosts. Answer C is not correct because switch stacking has nothing to do with performance of high-needs applications. Surely switch stacking provides redundancy as stacking creates a ring of connection with two opposite paths. Whenever a frame is ready for transmission onto the path, a calculation is made to see which path has the most available bandwidth. The entire frame is then copied onto this half of the path. With switch stacking, STP, CDP and VTP would run on one switch, not multiple switches. Also there would be one MAC address table, and it would reference all ports on all physical switches so we may say switch stacking has better resource usage. Also if we consider all stacking switches as one logical switch then surely the port density is increase very much. Therefore answer D is the most suitable one. Reference: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-3750-series-switches/prod_white_paper09186a00801b096a.html -
Question 94 of 188
94. Question
1 pointsWhich port state is introduced by Rapid-PVST?Correct
Incorrect
Hint
PVST+ is based on IEEE802.1D Spanning Tree Protocol (STP). But PVST+ has only 3 port states (discarding, learning and forwarding) while STP has 5 port states (blocking, listening, learning, forwarding and disabled). So discarding is a new port state in PVST+. -
Question 95 of 188
95. Question
1 pointsWhat are the possible trunking modes for a switch port? (Choose three.)Correct
Incorrect
-
Question 96 of 188
96. Question
1 pointsRefer to the exhibit. What set of commands was configured on interface Fa0/3 to produce the given the output?Correct
Incorrect
-
Question 97 of 188
97. Question
1 pointsWhich type of secure MAC address must be configured manually?Correct
Incorrect
-
Question 98 of 188
98. Question
1 pointsWhich two elements are fields in an Ethernet frame? (Choose two.)Correct
Incorrect
-
Question 99 of 188
99. Question
1 pointsWhat is one benefit of PVST+?Correct
Incorrect
Hint
The PVST+ provides Layer 2 load-balancing for the VLAN on which it runs. You can create different logical topologies by using the VLANs on your network to ensure that all of your links are used but that no one link is oversubscribed. Each instance of PVST+ on a VLAN has a single root switch. This root switch propagates the spanning-tree information associated with that VLAN to all other switches in the network. Because each switch has the same information about the network, this process ensures that the network topology is maintained and optimized per VLAN. -
Question 100 of 188
100. Question
1 pointsWhich three of these statements regarding 802.1Q trunking are correct? (Choose three.)Correct
Incorrect
-
Question 101 of 188
101. Question
1 pointsWhich IEEE standard protocol is initiated as a result of successful DTP completion in a switch over FastEthernet?Correct
Incorrect
Hint
Dynamic Trunking Protocol (DTP) is a Cisco proprietary protocol for negotiating trunking on a link between two devices and for negotiating the type of trunking encapsulation (802.1Q) to be used. -
Question 102 of 188
102. Question
1 pointsWhich of the port is not part of STP protocol.Correct
Incorrect
-
Question 103 of 188
103. Question
1 pointsAssuming the default switch configuration which vlan range can be added modified and removed on a cisco switch?Correct
Incorrect
-
Question 104 of 188
104. Question
1 pointsBased on the output below, which two statements are true of the interfaces on Switch1? (Choose two.)Correct
Incorrect
Hint
From the “show mac address-table” output, we see FastEthernet0/1 can receive traffic from multiple VLANs -> it is configured as a trunk. Also from the “show cdp neighbors” output, we see Fa0/1 of this switch is connecting to Switch2 so it is configured as a trunk. There are two MAC addresses learned from FastEthernet0/5 while FastEthernet0/5 is not configured as trunk (only Fa0/2 & Fa0/3 are configured as trunk links) -> a hub is used on this port. -
Question 105 of 188
105. Question
1 pointsRefer to the exhibit. How should the FastEthernet0/1 port on the 2950 model switches that are shown in the exhibit be configured to allow connectivity between all devices?Correct
Incorrect
-
Question 106 of 188
106. Question
1 pointsWhich RPVST+ port state is excluded from all STP operations?Correct
Incorrect
-
Question 107 of 188
107. Question
1 pointsWhich option is the industry-standard protocol for EtherChannel?Correct
Incorrect
Hint
LACP is the IEEE Standard (IEEE 802.3ad) and is the most common dynamic Etherchannel protocol, whereas PAgP is a Cisco proprietary protocol and works only between supported vendors and Cisco devices. -
Question 108 of 188
108. Question
1 pointsWhich two pieces of information can be shared with LLDP TLVs? (Choose two)Correct
Incorrect
-
Question 109 of 188
109. Question
1 pointsWhich two statements about stacking Cisco switches are true ?(choose two)Correct
Incorrect
-
Question 110 of 188
110. Question
1 pointsRefer to the exhibit.If the devices produced the given output, what is the cause of the EtherChannel problem?Correct
Incorrect
-
Question 111 of 188
111. Question
1 pointsFor which two reasons might be you choose chassis aggregation instead of stacking switches? (Choose two.)Correct
Incorrect
-
Question 112 of 188
112. Question
1 pointsRefer to the exhibit. The two exhibited devices are the only Cisco devices on the network. The serial network between the two devices has a mask of 255.255.255.252. Given the output that is shown, what three statements are true of these devices? (Choose three.)Correct
Incorrect
-
Question 113 of 188
113. Question
1 pointsRefer to the exhibit. Based on the information given, which switch will be elected root bridge and why?Correct
Incorrect
-
Question 114 of 188
114. Question
1 pointsA network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port?Correct
Incorrect
Hint
Modern Ethernet networks built with switches and full-duplex connections no longer utilize CSMA/CD. CSMA/CD is only used in obsolete shared media Ethernet (which uses repeater or hub). -
Question 115 of 188
115. Question
1 pointsRefer to the exhibit. Given the output shown from this Cisco Catalyst 2950, what is the reason that interface FastEthernet 0/10 is not the root port for VLAN 2?Correct
Incorrect
Hint
Since the port is in the blocked status, we must assume that there is a shorter path to the root bridge elsewhere. -
Question 116 of 188
116. Question
1 pointsRefer to the exhibit. Why has this switch not been elected the root bridge for VLAN1?Correct
Incorrect
Hint
The root bridge is determined by the lowest bridge ID, and this switch has a bridge ID priority of 32768, which is higher than the roots priority of 20481. -
Question 117 of 188
117. Question
1 pointsWhich two link protocols are used to carry multiple VLANs over a single link? (Choose two.)Correct
Incorrect
Hint
Cisco switches can use two different encapsulation types for trunks, the industry standard 802.1q or the Cisco proprietary ISL. Generally, most network engineers prefer to use 802.1q since it is standards based and will interoperate with other vendors. -
Question 118 of 188
118. Question
1 pointsAssuming the default switch configuration, which VLAN range can be added, modified, and removed on a Cisco switch?Correct
Incorrect
Hint
VLAN 1 is the default VLAN on Cisco switch. It always exists and cannot be added, modified or removed. VLANs 1002-1005 are default VLANs for FDDI & Token Ring and they can’t be deleted or used for Ethernet. -
Question 119 of 188
119. Question
1 pointsRefer to the topology shown in the exhibit. Which ports will be STP designated ports if all the links are operating at the same bandwidth? (Choose three.)Correct
Incorrect
Hint
This question is to check the spanning tree election problem. 1. First, select the root bridge, which can be accomplished by comparing the bridge ID, the smallest will be selected. Bridge-id= bridge priority + MAC address. The three switches in the figure all have the default priority, so we should compare the MAC address, it is easy to find that SwitchB is the root bridge. 2. Select the root port on the non-root bridge, which can be completed through comparing root path cost. The smallest will be selected as the root port. 3. Next, select the Designated Port. First, compare the path cost, if the costs happen to be the same, then compare the BID, still the smallest will be selected. Each link has a DP. Based on the exhibit above, we can find DP on each link. The DP on the link between SwitchA and SwitchC is SwitchA’Fa0/1, because it has the smallest MAC address. -
Question 120 of 188
120. Question
1 pointsRefer to the exhibit. Which statement is true?Correct
Incorrect
Hint
Only non-root bridge can have root port. Fa0/11 is the root port so we can confirm this switch is not the root bridge -> A is not correct. From the output we learn this switch is running Rapid STP, not PVST -> B is not correct. 0017.596d.1580 is the MAC address of this switch, not of the root bridge. The MAC address of the root bridge is 0017.596d.2a00 -> C is not correct. All of the interface roles of the root bridge are designated. SwitchA has one Root port and 1 Alternative port so it is not the root bridge -> D is correct. -
Question 121 of 188
121. Question
1 pointsWhich two benefits are provided by creating VLANs? (Choose two.)Correct
Incorrect
Hint
A VLAN is a switched network that is logically segmented on an organizational basis, by functions, project teams, or applications rather than on a physical or geographical basis. Security: VLANs also improve security by isolating groups. High-security users can be grouped into a VLAN, possible on the same physical segment, and no users outside that VLAN can communicate with them LAN Segmentation VLANs allow logical network topologies to overlay the physical switched infrastructure such that any arbitrary collection of LAN ports can be combined into an autonomous user group or community of interest. The technology logically segments the network into separate Layer 2 broadcast domains whereby packets are switched between ports designated to be within the same VLAN. By containing traffic originating on a particular LAN only to other LANs in the same VLAN, switched virtual networks avoid wasting bandwidth. -
Question 122 of 188
122. Question
1 pointsHow many broadcast domains are shown in the graphic assuming only the default VLAN is confgured on the switches?Correct
Incorrect
Hint
Only router can break up broadcast domains but in this exhibit no router is used so there is only 1 broadcast domain. For your information, there are 7 collision domains in this exhibit (6 collision domains between hubs & switches + 1 collision between the two switches). -
Question 123 of 188
123. Question