NTEN 137

Description

Okanagan College's Routing and Switching Course (Cisco CCNA prep part 2)
j.salvino
Quiz by j.salvino, updated more than 1 year ago
j.salvino
Created by j.salvino about 9 years ago
62
0

Resource summary

Question 1

Question
A network administrator has configured ​VLAN 99 as the management VLAN and has configured it with an IP address and subnet mask. The administrator issues the show interface vlan 99 command and notices that the line protocol is down. Which action can change the state of the line protocol to up?
Answer
  • Remove all access ports from VLAN 99.
  • Configure a default gateway.
  • Connect a host to an interface associated with VLAN 99.
  • Configure a transport input method on the vty lines.

Question 2

Question
Refer to the exhibit. The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link?
Answer
  • The switch will have priority for transmitting data.
  • No collisions will occur on this link.
  • Only one of the devices can transmit at a time.
  • The devices will default back to half duplex if excessive collisions occur.

Question 3

Question
How can DHCP packets be used to threaten a switched LAN?
Answer
  • A rogue DHCP packet that contains a virus is accepted by a host.
  • Numerous DHCP requests are sent to the DHCP server from spoofed hosts, causing the DHCP address pool to become depleted.
  • A DHCP request packet is disguised as a Telnet or SSH packet. While the device is denying access to the SSH or Telnet port, a rogue device posing as a DHCP server sends fake DHCP response packets.
  • ICMP ping packets are disguised as legitimate DHCP packets. These packets are numerous and deny bandwidth to critical network infrastructure devices.

Question 4

Question
A network administrator plugs a new PC into a switch port. The LED for that port changes to solid green. What statement best describes the current status of the port?
Answer
  • The flash memory is busy.
  • There is a duplex mismatch error.
  • The port is operational and ready to transmit packets.
  • There is a link fault error. This port is unable to forward frames.
  • This port has been disabled by management and is unable to forward frames.

Question 5

Question
What is the result of issuing the no switchport port-security mac-address sticky command on an interface with port security configured?​​
Answer
  • The sticky secure MAC addresses are removed from the address table and from the running configuration.
  • The sticky secure MAC addresses remain part of the address table but are removed from the running configuration.
  • The static secure MAC addresses remain part of the address table but are removed from the running configuration.
  • The static secure MAC addresses are removed from the address table and from the running configuration.

Question 6

Question
Refer to the exhibit. What can be determined from the partial output of the show running-config command?
Answer
  • This appears to be the default configuration of the switch.
  • Because the default gateway is not configured, connected hosts will have no connectivity to the Internet.
  • The switch was unable to find and load the complete IOS.
  • Remote management of the switch can occur on VLAN 1.

Question 7

Question
In an Ethernet network, frames smaller than 64 bytes are called [blank_start]runts[blank_end].
Answer
  • runts

Question 8

Question
The initialism [blank_start]ssh[blank_end] refers to a protocol that provides an encrypted connection. The protocol replaces the clear text Telnet protocol for Cisco device management.
Answer
  • ssh

Question 9

Question
What are two ways to make a switch less vulnerable to attacks like MAC address flooding, CDP attacks, and Telnet attacks? (Choose two.)
Answer
  • Use the enable password rather than the enable secret password.
  • Enable CDP on the switch.
  • Change passwords regularly.
  • Enable the HTTP server on the switch.
  • Turn off unnecessary services.

Question 10

Question
What is the first action in the boot sequence when a switch is powered on?
Answer
  • load boot loader software
  • low-level CPU initialization
  • load a power-on self-test program
  • load the default Cisco IOS software

Question 11

Question
A network technician wants to implement SSH as the means by which a router may be managed remotely. What are two procedures that the technician should use to successfully complete this task? (Choose two.)
Answer
  • Configure the login banner.
  • Define the asymmetrical keys.
  • Configure authentication.
  • Configure the console password.
  • Enter the service password-encryption command.

Question 12

Question
Which configuration must be in place for the auto-MDIX feature to function on a switch interface?
Answer
  • The interface must be in access mode.
  • The interface must be manually configured for full-duplex mode.
  • The speed and duplex of the interface must be configured for auto detect.
  • The interface must be assigned to VLAN 1.

Question 13

Question
What would be an ideal environment to carry out penetration tests?
Answer
  • on an off-line test bed network that mimics the actual production network
  • on a network environment simulated by software
  • on the production network during nonpeak times
  • under controlled conditions during business hours ​on the production network

Question 14

Question
An attacker has bypassed physical security and was able to connect a laptop to a Ethernet interface on a switch. If all the switch ports are configured with port security and the violation mode is set to factory-default, which action is taken against the attacker?
Answer
  • Packets with unknown source addresses are dropped and the interface becomes error-disabled and turns off the port LED.
  • Packets with unknown source addresses are forwarded and there is a notification to the syslog server.​
  • Packets with unknown source addresses are dropped and there is no notification that a security violation has occurred.
  • Packets with unknown source addresses are dropped and there is a notification that a security violation has occurred.

Question 15

Question
Which three options correctly associate a layer of the hierarchical design model with the function of that layer? (Choose three.)
Answer
  • Core - end device connectivity
  • Distribution - aggregation and traffic control
  • Access - end device connectivity
  • Distribution - high speed backbone
  • Access - aggregation of traffic
  • Core - high speed backbone

Question 16

Question
Which hierarchical network design goal is to provide a way for the network to always be accessible?
Answer
  • hierarchical
  • modularity
  • resiliency
  • flexibility

Question 17

Question
Which two layers of the hierarchical network design model are commonly combined into a single layer in a small-to-medium sized network architecture?
Answer
  • access
  • data link
  • network
  • distribution
  • application
  • core

Question 18

Question
What is convergence as it relates to network design?
Answer
  • Implementation of an access-distribution-core layer design model for all sites in a corporation
  • A centralized point in the network design where all traffic aggregates before transmission to the destination
  • The combining of voice and video with traditional network traffic
  • Designing a network in such a way that each tier has a specific function and upgrade path

Question 19

Question
A switch has just been powered on. PC1 connects to port 1; PC2 connects to port 2. If PC1 sends data to PC2, how will the switch process the frame?
Answer
  • The switch forwards the frame based on the MAC address of PC2.
  • The switch adds the MAC address of PC1 (that is received on the ingress port) to the switch MAC address table.
  • The switch forwards the frame to all switch ports including ports 1 and 2.
  • The switch adds the IP address of PC2 (that is sent through the egress port) to the switch MAC address table.

Question 20

Question
Use the abbreviated MAC addresses in the MAC address table to determine the correct answer. A PC connected to port Gi0/3 sends data to a PC connected to port Gi0/5. When the switch receives the data, what will the switch do to process the frame? Port MAC address Gi0/3 AA Gi0/7 AB
Answer
  • Add the destination MAC address to the switch MAC address table.
  • Forward the data out all ports except for port Gi0/3.
  • Forward the data to port Gi0/3.
  • Forward the data out all ports.
  • Add both the source and destination MAC addresses to the switch MAC address table.

Question 21

Question
Use the abbreviated MAC addresses in the MAC address table to determine the correct answer. A PC connected to port Gi0/4 sends data to a PC connected to port Gi0/3. When the switch receives the data, what will the switch do first to process the frame? Port MAC address Gi0/3 AA Gi0/7 AB
Answer
  • Add the source MAC address to the switch MAC address table.
  • Forward the data out all ports except for port 4.
  • Forward the data to port 5.
  • Forward the data out all ports.
  • Add both the source and destination MAC addresses to the switch MAC address table.
  • Add the destination MAC address to the switch MAC address table.

Question 22

Question
What are the three layers of the switch hierarchical design model? (Choose three.)
Answer
  • access
  • data link
  • core
  • network access
  • enterprise
  • distribution

Question 23

Question
When the appropriate switch form factor for a network is being determined, what type of switch should be selected when future expansion is important and cost is not a limiting factor?
Answer
  • stackable switch
  • 1 rack unit switch
  • fixed configuration switch
  • modular switch

Question 24

Question
Which switching method describes a switch that transfers a frame as soon as the destination MAC address is read?
Answer
  • fragment-free
  • cut-through
  • store-and-forward
  • latency forwarding

Question 25

Question
Which service is provided by an automated attendant feature on a converged network?
Answer
  • point-to-point video
  • call routing
  • IT management interface
  • video conferencing

Question 26

Question
Which cost-effective physical network topology design is recommended when building a three-tier campus network that connects three buildings?​
Answer
  • bus
  • mesh
  • extended star
  • dual ring

Question 27

Question
Which two statements about Layer 2 Ethernet switches are true? (Choose two.)
Answer
  • Layer 2 switches prevent broadcasts.
  • Layer 2 switches have multiple collision domains.
  • Layer 2 switches route traffic between different networks.
  • Layer 2 switches decrease the number of broadcast domains.
  • Layer 2 switches can send traffic based on the destination MAC address.

Question 28

Question
Which statement is true about broadcast and collision domains?
Answer
  • Adding a router to a network will increase the size of the collision domain.
  • The size of the collision domain can be reduced by adding hubs to a network.
  • The more interfaces a router has the larger the resulting broadcast domain.
  • Adding a switch to a network will increase the size of the broadcast domain.

Question 29

Question
Refer to the exhibit. A switch receives a Layer 2 frame that contains a source MAC address of 000b.a023.c501 and a destination MAC address of 0050.0fae.75aa. Which of the options below occur? (Choose two).
Answer
  • The switch drops the frame
  • The switch adds the source MAC address to the MAC address table
  • because the destination is not known, the switch forwards out of all ports except through which the frame arrived.
  • because the source MAC address is not known, the switch broadcasts the frame out all ports except the port through which the frame arrived.

Question 30

Question
When an appropriate switch form factor for a network is being determined, what should be selected when fault tolerance and bandwidth availability are desired but the budget is limited?
Answer
  • stackable switch
  • non-stackable switch
  • fixed configuration switch
  • modular switch

Question 31

Question
Which function is supplied by the access layer in a three-layer network design?
Answer
  • high-speed connectivity
  • routing
  • application of policies
  • network access
  • backbone connectivity

Question 32

Question
Refer to the exhibit. The PC that is attached to port Fa0/1 is sending a packet that has the destination MAC address of 0050.0fae.299c. Based on the current S1 MAC address table, what will S1 do first when the packet arrives at the switch?
Answer
  • forward the data to S2
  • broadcast an ARP request to all S1 ports except port Fa0/1
  • add the MAC address of the PC that is attached to Fa0/1 to the MAC address table
  • broadcast the data to all S1 ports and all S2 ports that have attached end devices
  • broadcast the data to all S1 ports that have attached end devices, except the Fa0/1 port

Question 33

Question
Which two characteristics describe a converged network? (Choose two.)
Answer
  • decreased service calls
  • support of voice and video both using the same switch
  • separate wiring infrastructure for voice and video traffic
  • affordability for small and medium businesses
  • cheaper equipment cost

Question 34

Question
Which option correctly describes a switching method?
Answer
  • cut-through: makes a forwarding decision after receiving the entire frame
  • store-and-forward: forwards the frame immediately after examining its destination MAC address
  • cut-through: provides the flexibility to support any mix of Ethernet speeds
  • store-and-forward: ensures that the frame is free of physical and data-link errors

Question 35

Question
Refer to the exhibit. What protocol should be configured on SW-A FastEthernet 0/1 if it is to send traffic from multiple VLANs to switch SW-B?
Answer
  • Spanning Tree
  • RIP v2
  • IEEE 802.1Q
  • ARP
  • Rapid Spanning Tree
Show full summary Hide full summary

Similar

CCNA Security 210-260 IINS - Exam 3
Mike M
CCNA Security 210-260 IINS - Exam 1
Mike M
CCNA Security 210-260 IINS - Exam 2
Mike M
CCNA Part 1
Axiom42
CCNA Answers – CCNA Exam
Abdul Demir
CCNA Part 2
Axiom42
Hálózat 5
Cougar
CCNA Security Chapter 1 Exam
d94829 d94829
CCNA Security HW 3 & 4 (also exam review)
Anthony Schulmeister
Hálózat 10
Cougar
CCNA Security Chapter 4 Exam
d94829 d94829