1. Which of the following is a layer 2 protocol used to maintain a loop-free network?

B. STP

 

2. What command will display the forward/filter table?

C. show mac address-table

 

3. What is the result of segmenting a network with a bridge (switch)? (Choose two options.)

A. It increases the number of collision domains.

E. It makes smaller collision domains.

 

4. Which statement describes a spanning-tree network that has converged?

C. All switch and bridge ports are in either the forwarding or blocking state.

 

5. What is the purpose of Spanning Tree Protocol in a switched LAN?

C. To prevent switching loops in networks with redundant switched paths

 

6. What are the three distinct functions of layer 2 switching that increase available bandwidth on the network? (Choose three.)

A. Address learning

C. Forwarding and filtering

E. Loop avoidance

 

7. Your switch has a port status LED that is alternating between green and amber. What could this indicate?

A. The port is experiencing errors.

 

8. Which of the following statements is true?

B. A switch creates separate collision domains but one broadcast domain. A router provides a separate broadcast domain.

 

9. You need to configure a Catalyst switch so it can be managed remotely. Which of the following would you use to accomplish this task?

C. Switch(configs)#ip default-gateway 192.168.10.254

Switch(configs)#int vlan 1

Switch(configs-if)#ip address 192.168.10.252 255.255.255.0

Switch(configs-if)#no shut

 

10. What does a switch do when a frame is received on an interface and the destination hardware address is unknown or not in the filter table?

C. Floods the network with the frame looking for the device

 

11. If a switch receives a frame and the source MAC address is not in the MAC address table but the destination address is, what will the switch do with the frame?

C. Add the source address and port to the MAC address table and forward the frame out the destination port

 

12. You want to run the new 802.1w on your switches. Which of the following would enable this protocol?

A. Switch(config)#spanning-tree mode rapid-pvst

13. In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN?

D. In an improperly implemented redundant topology

 

14. Which command was used to produce the following output: Vlan Mac Address Type Ports

---- ----------- -------- -----

1 0005.dccb.d74b DYNAMIC Fa0/1

1 000a.f467.9e80 DYNAMIC Fa0/3

1 000a.f467.9e8b DYNAMIC Fa0/4

1 000a.f467.9e8c DYNAMIC Fa0/3

1 0010.7b7f.c2b0 DYNAMIC Fa0/3

1 0030.80dc.460b DYNAMIC Fa0/3

C. show mac address-table

 

15. If you want to disable STP on a port connected to a server, which command would you use?

D. spanning-tree portfast

 

16. Refer to the Graphic. Why does the switch have two MAC addresses assigned to the Fast- Ethernet 0/1 port in the switch address table?

A. Data from HostC and HostD have been received by the switch port FastEthernet 0/1.

 

17. Layer 2 switching provides which of the following? (Choose four.)

A. Hardware-based bridging (ASIC)

B. Wire speed

C. Low latency

D. Low cost

 

18. You type show mac address-table and receive the following output:

Switch#sh mac address-table

Vlan Mac Address Type Ports

---- ----------- -------- -----

1 0005.dccb.d74b DYNAMIC Fa0/1

1 000a.f467.9e80 DYNAMIC Fa0/3

1 000a.f467.9e8b DYNAMIC Fa0/4

1 000a.f467.9e8c DYNAMIC Fa0/3

1 0010.7b7f.c2b0 DYNAMIC Fa0/3

1 0030.80dc.460b DYNAMIC Fa0/3

Suppose the above switch received a frame with the following MAC addresses:

_ Source MAC: 0005.dccb.d74b

_ Destination MAC: 000a.f467.9e8c

What will it do?

B. It will forward the frame out port Fa0/3 only.

 

19. You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy? (Choose two.)

B. Switch(config-if)#switchport port-security maximum 1

D. Switch(config-if)#switchport port-security violation shutdown

 

20. You have two switches connected together with two crossover cables for redundancy, and STP is disabled. Which of the following will happen between the switches?

C. Broadcast storms will occur on the switched network.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. Which of the following is true regarding VLANs?

D. VTP is used to send VLAN information to switches in a configured VTP domain.

 

2. According to the following diagram, which of the following describes the router port configuration and the switch port configuration as shown in the topology? (Choose three.)

B. The router port connected to the switch is configured using subinterfaces.

E. The switch port connected to the router is configured as a trunking port.

F. The switch ports connected to the hosts are configured as access ports.

 

3. A switch has been configured for three different VLANs: VLAN2, VLAN3, and VLAN4. A router has been added to provide communication etween the VLANs. What type of interface is necessary on the router if only one connection is to be made between the router and the switch?

C. 100Mbps Ethernet

 

4. You want to improve network performance by increasing the bandwidth available to hosts and limit the size of the broadcast domains. Which of the following options will achieve this goal?

D. Switches configured with VLANs

 

5. Which of the following protocols are used to configure trunking on a switch? (Choose two.)

C. 802.1Q

D. ISL

 

6. When a new trunk link is configured on an IOS-based switch, which VLANs are allowed over the link?

A. By default, all VLANs are allowed on the trunk.

 

7. Which switching technology reduces the size of a broadcast domain?

C. VLANs

 

8. What VTP mode allows you to change VLAN information on the switch?

C. Server

 

9. Which command will configure a switch port to use the IEEE standard method of inserting VLAN membership information into Ethernet frames?

F. Switch(config-if)#switchport trunk encapsulation dot1q

 

10. Which of the following is true regarding VTP?

A. All switches are VTP servers by default.

 

11. Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?

B. VTP

 

12. Which of the following commands sets a trunk port on a 2960 switch?

D. switchport mode trunk

 

13. Which of the following is an IEEE standard for frame tagging?

C. 802.1Q

 

14. You connect a host to a switch port, but the new host cannot log into the server that is plugged into the same switch. What could the problem be? (Choose the most likely answer.)

D. The switch port the host is connected to is not configured to the correct VLAN membership.

 

15. According to the diagram, which three commands can be used to establish a link with therouter’s Fast Ethernet interface using the IEEE version of frame tagging? (Choose three.)

A. Switch(config)#interface fastethernet 0/1

C. Switch(config-if)#switchport mode trunk

F. Switch(config-if)#switchport trunk encapsulation dot1q

 

16. These two switches are not sharing VLAN information. From the following output, what is the

reason these switches are not sharing VTP messages?

SwitchA#sh vtp status

VTP Version : 2

Configuration Revision : 0

Maximum VLANs supported locally : 64

Number of existing VLANs : 7

VTP Operating Mode : Server

VTP Domain Name : RouterSim

VTP Pruning Mode : Disabled

SwitchB#sh vtp status

VTP Version : 2

Configuration Revision : 1

Maximum VLANs supported locally : 64

Number of existing VLANs : 7

VTP Operating Mode : Server

VTP Domain Name : GlobalNet

VTP Pruning Mode : Disabled

C. The VTP domain names are not configured correctly.

 

17. Which of the following provide inter-switch VLAN communication? (Choose two.)

A. ISL

C. 802.1Q

 

18. To configure the VLAN trunking protocol to communicate VLAN information between two switches, what two requirements must be met? (Choose two.)

B. The VTP management domain name of both switches must be set the same.

D. One of the two switches must be configured as a VTP server.

 

19. Which of the following are benefits of VLANs? (Choose three.)

B. They allow logical grouping of users by function.

C. They can enhance network security.

F. They increase the number of broadcast domains while decreasing the size of the broadcast domains.

 

20. Which of the following modes are valid when a switch port is used as a VLAN trunk? (Choose three.)

B. Dynamic auto

C. Dynamic desirable

D. Nonegotiate

----------------------------------------------------------------------------------------------------------------------------------------

1. Which of the following is an example of a standard IP access list?

B. access-list 1 deny 172.16.10.1 0.0.0.0

 

2. You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?

C. access-list 10 deny 192.168.160.0 0.0.31.255

 

3. You have created a named access list called Blocksales. Which of the following is a valid command for applying this to packets trying to enter interface s0 of your router?

C. (config-if)#ip access-group Blocksales in

 

4. Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list? (Choose two.)

B. 172.16.30.55 0.0.0.0

D. host 172.16.30.55

 

5. Which of the following access lists will allow only HTTP traffic into network 196.15.7.0?

A. access-list 100 permit tcp any 196.15.7.0 0.0.0.255 eq www

 

6. What router command allows you to determine whether an IP access list is enabled on a particular interface?

C. show ip interface

 

7. Which router command allows you to view the entire contents of all access lists?

C. Router#show access-lists

 

8. If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use?

C. access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23

 

9. If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid?

D. access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp access-list 198 permit ip any 0.0.0.0 255.255.255.255

 

10. You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with?

D. access-list 10 deny 172.16.48.0 0.0.15.255

 

11. Which command would you use to apply an access list to a router interface?

C. ip access-group 101 in

 

12. You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with?

A. access-list 10 deny 172.16.192.0 0.0.31.255

 

13. You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with?

B. access-list 10 deny 172.16.144.0 0.0.7.255

 

14. Which of the following commands connect access list 110 inbound to interface ethernet0?

C. Router(config-if)#ip access-group 110 in

 

15. What command will permit SMTP mail to only host 1.1.1.1?

D. access-list 110 permit tcp any host 1.1.1.1 eq smtp

 

16. You configure the following access list:

access-list 110 deny tcp 10.1.1.128 0.0.0.63 any eq smtp

access-list 110 deny tcp any eq 23

int ethernet 0

ip access-group 110 out

What will the result of this access list be?

D. No IP traffic will be allowed out E0.

 

17. Which of the following series of commands will restrict Telnet access to the router?

C. Lab_A(config)#access-list 10 permit 172.16.1.1
Lab_A(config)#line vty 0 4
Lab_A(config-line)#access-class 10 in

 

18. Which of the following is true regarding access lists applied to an interface?

C. One access list may be configured, per direction, for each layer 3 protocol configured on an interface.

 

19. You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show runningconfiguration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router?

D. show ip interface Ethernet 0

 

20. You want users from the accounting LAN to not have access to the Human Resources server.

The following access list has been created:

Access-list 10 deny 192.168.10.128 0.0.0.31

Access-list 10 permit any

According to the following diagram, which interface of which router, and in which direction,

should the access list be placed to prevent accounting users from accessing the network

attached to the E0 interface of Lab_B?

E. Lab_B, E0 out

----------------------------------------------------------------------------------------------------------------------------------------

arrow
arrow
    全站熱搜

    aboy0421 發表在 痞客邦 留言(0) 人氣()