Frage 1
Frage
A network administrator has configured VLAN 99 as the management VLAN and has configured it with an IP address and subnet mask. The administrator issues the show interface vlan 99 command and notices that the line protocol is down. Which action can change the state of the line protocol to up?
Antworten
-
Remove all access ports from VLAN 99.
-
Configure a default gateway.
-
Connect a host to an interface associated with VLAN 99.
-
Configure a transport input method on the vty lines.
Frage 2
Frage
Refer to the exhibit. The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link?
Antworten
-
The switch will have priority for transmitting data.
-
No collisions will occur on this link.
-
Only one of the devices can transmit at a time.
-
The devices will default back to half duplex if excessive collisions occur.
Frage 3
Frage
How can DHCP packets be used to threaten a switched LAN?
Antworten
-
A rogue DHCP packet that contains a virus is accepted by a host.
-
Numerous DHCP requests are sent to the DHCP server from spoofed hosts, causing the DHCP address pool to become depleted.
-
A DHCP request packet is disguised as a Telnet or SSH packet. While the device is denying access to the SSH or Telnet port, a rogue device posing as a DHCP server sends fake DHCP response packets.
-
ICMP ping packets are disguised as legitimate DHCP packets. These packets are numerous and deny bandwidth to critical network infrastructure devices.
Frage 4
Frage
A network administrator plugs a new PC into a switch port. The LED for that port changes to solid green. What statement best describes the current status of the port?
Antworten
-
The flash memory is busy.
-
There is a duplex mismatch error.
-
The port is operational and ready to transmit packets.
-
There is a link fault error. This port is unable to forward frames.
-
This port has been disabled by management and is unable to forward frames.
Frage 5
Frage
What is the result of issuing the no switchport port-security mac-address sticky command on an interface with port security configured?
Antworten
-
The sticky secure MAC addresses are removed from the address table and from the running configuration.
-
The sticky secure MAC addresses remain part of the address table but are removed from the running configuration.
-
The static secure MAC addresses remain part of the address table but are removed from the running configuration.
-
The static secure MAC addresses are removed from the address table and from the running configuration.
Frage 6
Frage
Refer to the exhibit. What can be determined from the partial output of the show running-config command?
Antworten
-
This appears to be the default configuration of the switch.
-
Because the default gateway is not configured, connected hosts will have no connectivity to the Internet.
-
The switch was unable to find and load the complete IOS.
-
Remote management of the switch can occur on VLAN 1.
Frage 7
Frage
In an Ethernet network, frames smaller than 64 bytes are called [blank_start]runts[blank_end].
Frage 8
Frage
The initialism [blank_start]ssh[blank_end] refers to a protocol that provides an encrypted connection. The protocol replaces the clear text Telnet protocol for Cisco device management.
Frage 9
Frage
What are two ways to make a switch less vulnerable to attacks like MAC address flooding, CDP attacks, and Telnet attacks? (Choose two.)
Antworten
-
Use the enable password rather than the enable secret password.
-
Enable CDP on the switch.
-
Change passwords regularly.
-
Enable the HTTP server on the switch.
-
Turn off unnecessary services.
Frage 10
Frage
What is the first action in the boot sequence when a switch is powered on?
Antworten
-
load boot loader software
-
low-level CPU initialization
-
load a power-on self-test program
-
load the default Cisco IOS software
Frage 11
Frage
A network technician wants to implement SSH as the means by which a router may be managed remotely. What are two procedures that the technician should use to successfully complete this task? (Choose two.)
Antworten
-
Configure the login banner.
-
Define the asymmetrical keys.
-
Configure authentication.
-
Configure the console password.
-
Enter the service password-encryption command.
Frage 12
Frage
Which configuration must be in place for the auto-MDIX feature to function on a switch interface?
Antworten
-
The interface must be in access mode.
-
The interface must be manually configured for full-duplex mode.
-
The speed and duplex of the interface must be configured for auto detect.
-
The interface must be assigned to VLAN 1.
Frage 13
Frage
What would be an ideal environment to carry out penetration tests?
Antworten
-
on an off-line test bed network that mimics the actual production network
-
on a network environment simulated by software
-
on the production network during nonpeak times
-
under controlled conditions during business hours on the production network
Frage 14
Frage
An attacker has bypassed physical security and was able to connect a laptop to a Ethernet interface on a switch. If all the switch ports are configured with port security and the violation mode is set to factory-default, which action is taken against the attacker?
Antworten
-
Packets with unknown source addresses are dropped and the interface becomes error-disabled and turns off the port LED.
-
Packets with unknown source addresses are forwarded and there is a notification to the syslog server.
-
Packets with unknown source addresses are dropped and there is no notification that a security violation has occurred.
-
Packets with unknown source addresses are dropped and there is a notification that a security violation has occurred.
Frage 15
Frage
Which three options correctly associate a layer of the hierarchical design model with the function of that layer? (Choose three.)
Antworten
-
Core - end device connectivity
-
Distribution - aggregation and traffic control
-
Access - end device connectivity
-
Distribution - high speed backbone
-
Access - aggregation of traffic
-
Core - high speed backbone
Frage 16
Frage
Which hierarchical network design goal is to provide a way for the network to always be accessible?
Antworten
-
hierarchical
-
modularity
-
resiliency
-
flexibility
Frage 17
Frage
Which two layers of the hierarchical network design model are commonly combined into a single layer in a small-to-medium sized network architecture?
Antworten
-
access
-
data link
-
network
-
distribution
-
application
-
core
Frage 18
Frage
What is convergence as it relates to network design?
Antworten
-
Implementation of an access-distribution-core layer design model for all sites in a corporation
-
A centralized point in the network design where all traffic aggregates before transmission to the destination
-
The combining of voice and video with traditional network traffic
-
Designing a network in such a way that each tier has a specific function and upgrade path
Frage 19
Frage
A switch has just been powered on. PC1 connects to port 1; PC2 connects to port 2. If PC1 sends data to PC2, how will the switch process the frame?
Antworten
-
The switch forwards the frame based on the MAC address of PC2.
-
The switch adds the MAC address of PC1 (that is received on the ingress port) to the switch MAC address table.
-
The switch forwards the frame to all switch ports including ports 1 and 2.
-
The switch adds the IP address of PC2 (that is sent through the egress port) to the switch MAC address table.
Frage 20
Frage
Use the abbreviated MAC addresses in the MAC address table to determine the correct answer. A PC connected to port Gi0/3 sends data to a PC connected to port Gi0/5. When the switch receives the data, what will the switch do to process the frame?
Port MAC address
Gi0/3 AA
Gi0/7 AB
Antworten
-
Add the destination MAC address to the switch MAC address table.
-
Forward the data out all ports except for port Gi0/3.
-
Forward the data to port Gi0/3.
-
Forward the data out all ports.
-
Add both the source and destination MAC addresses to the switch MAC address table.
Frage 21
Frage
Use the abbreviated MAC addresses in the MAC address table to determine the correct answer. A PC connected to port Gi0/4 sends data to a PC connected to port Gi0/3. When the switch receives the data, what will the switch do first to process the frame?
Port MAC address
Gi0/3 AA
Gi0/7 AB
Antworten
-
Add the source MAC address to the switch MAC address table.
-
Forward the data out all ports except for port 4.
-
Forward the data to port 5.
-
Forward the data out all ports.
-
Add both the source and destination MAC addresses to the switch MAC address table.
-
Add the destination MAC address to the switch MAC address table.
Frage 22
Frage
What are the three layers of the switch hierarchical design model? (Choose three.)
Antworten
-
access
-
data link
-
core
-
network access
-
enterprise
-
distribution
Frage 23
Frage
When the appropriate switch form factor for a network is being determined, what type of switch should be selected when future expansion is important and cost is not a limiting factor?
Frage 24
Frage
Which switching method describes a switch that transfers a frame as soon as the destination MAC address is read?
Antworten
-
fragment-free
-
cut-through
-
store-and-forward
-
latency forwarding
Frage 25
Frage
Which service is provided by an automated attendant feature on a converged network?
Antworten
-
point-to-point video
-
call routing
-
IT management interface
-
video conferencing
Frage 26
Frage
Which cost-effective physical network topology design is recommended when building a three-tier campus network that connects three buildings?
Antworten
-
bus
-
mesh
-
extended star
-
dual ring
Frage 27
Frage
Which two statements about Layer 2 Ethernet switches are true? (Choose two.)
Antworten
-
Layer 2 switches prevent broadcasts.
-
Layer 2 switches have multiple collision domains.
-
Layer 2 switches route traffic between different networks.
-
Layer 2 switches decrease the number of broadcast domains.
-
Layer 2 switches can send traffic based on the destination MAC address.
Frage 28
Frage
Which statement is true about broadcast and collision domains?
Antworten
-
Adding a router to a network will increase the size of the collision domain.
-
The size of the collision domain can be reduced by adding hubs to a network.
-
The more interfaces a router has the larger the resulting broadcast domain.
-
Adding a switch to a network will increase the size of the broadcast domain.
Frage 29
Frage
Refer to the exhibit. A switch receives a Layer 2 frame that contains a source MAC address of 000b.a023.c501 and a destination MAC address of 0050.0fae.75aa. Which of the options below occur? (Choose two).
Antworten
-
The switch drops the frame
-
The switch adds the source MAC address to the MAC address table
-
because the destination is not known, the switch forwards out of all ports except through which the frame arrived.
-
because the source MAC address is not known, the switch broadcasts the frame out all ports except the port through which the frame arrived.
Frage 30
Frage
When an appropriate switch form factor for a network is being determined, what should be selected when fault tolerance and bandwidth availability are desired but the budget is limited?
Frage 31
Frage
Which function is supplied by the access layer in a three-layer network design?
Antworten
-
high-speed connectivity
-
routing
-
application of policies
-
network access
-
backbone connectivity
Frage 32
Frage
Refer to the exhibit. The PC that is attached to port Fa0/1 is sending a packet that has the destination MAC address of 0050.0fae.299c. Based on the current S1 MAC address table, what will S1 do first when the packet arrives at the switch?
Antworten
-
forward the data to S2
-
broadcast an ARP request to all S1 ports except port Fa0/1
-
add the MAC address of the PC that is attached to Fa0/1 to the MAC address table
-
broadcast the data to all S1 ports and all S2 ports that have attached end devices
-
broadcast the data to all S1 ports that have attached end devices, except the Fa0/1 port
Frage 33
Frage
Which two characteristics describe a converged network? (Choose two.)
Antworten
-
decreased service calls
-
support of voice and video both using the same switch
-
separate wiring infrastructure for voice and video traffic
-
affordability for small and medium businesses
-
cheaper equipment cost
Frage 34
Frage
Which option correctly describes a switching method?
Antworten
-
cut-through: makes a forwarding decision after receiving the entire frame
-
store-and-forward: forwards the frame immediately after examining its destination MAC address
-
cut-through: provides the flexibility to support any mix of Ethernet speeds
-
store-and-forward: ensures that the frame is free of physical and data-link errors
Frage 35
Frage
Refer to the exhibit. What protocol should be configured on SW-A FastEthernet 0/1 if it is to send traffic from multiple VLANs to switch SW-B?
Antworten
-
Spanning Tree
-
RIP v2
-
IEEE 802.1Q
-
ARP
-
Rapid Spanning Tree