exam Flashcards
Which three components are combined to form a bridge ID?
- extended system ID
- cost
- IP address
- bridge priority
- MAC address
- port ID
- extended system ID
- bridge priority
- MAC address
While attending a conference, participants are using laptops for network connectivity. When a guest speaker attempts to connect to the network, the laptop fails to display any available wireless networks. The access point must be operating in which mode?
- mixed
- passive
- active
- open
- active
A PC has sent an RS message to an IPv6 router attached to the same network. Which two pieces of information will the router send to the client? (Choose two.)
- prefix length
- subnet mask in dotted decimal notation
- domain name
- administrative distance
- prefix
- DNS server IP address
- prefix length
- prefix
Which mitigation technique would prevent rogue servers from providing false IPv6 configuration parameters to clients?
- enabling DHCPv6 Guard
- enabling RA Guard
- implementing port security on edge ports
- disabling CDP on edge ports
- enabling DHCPv6 Guard
A technician is configuring a wireless network for a small business using a SOHO wireless router. Which two authentication methods are used, if the router is configured with WPA2? (Choose two.)
- personal
- AES
- TKIP
- WEP
- enterprise
- personal
- enterprise
What else is required when configuring an IPv6 static route using a next-hop link-local address?
- administrative distance
- ip address of the neighbor router
- network number and subnet mask on the interface of the neighbor router
- interface number and type
- interface number and type
What defines a host route on a Cisco router?
- The link-local address is added automatically to the routing table as an IPv6 host route.
- An IPv4 static host route configuration uses a destination IP address of a specific device and a /32 subnet mask.
- A host route is designated with a C in the routing table.
- A static IPv6 host route must include the interface type and the interface number of the next hop router.
- An IPv4 static host route configuration uses a destination IP address of a specific device and a /32 subnet mask.
A small publishing company has a network design such that when a broadcast is sent on the LAN, 200 devices receive the transmitted broadcast. How can the network administrator reduce the number of devices that receive broadcast traffic?
- Add more switches so that fewer devices are on a particular switch.
- Replace the switches with switches that have more ports per switch. This will allow more devices on a particular switch.
- Segment the LAN into smaller LANs and route between them.
Replace at least half of the switches with hubs to reduce the size of the broadcast domain.
- Segment the LAN into smaller LANs and route between them.
What action takes place when the source MAC address of a frame entering a switch is in the MAC address table?
- The switch forwards the frame out of the specified port.
- The switch updates the refresh timer for the entry.
- The switch replaces the old entry and uses the more current port.
- The switch adds a MAC address table entry for the destination MAC address and the egress port.
- The switch updates the refresh timer for the entry.
What is the effect of entering the show ip dhcp snooping binding configuration command on a switch?
- It switches a trunk port to access mode.
- It checks the source L2 address in the Ethernet header against the sender L2 address in the ARP body.
- It restricts the number of discovery messages, per second, to be received on the interface.
- It displays the IP-to-MAC address associations for switch interfaces.
- It displays the IP-to-MAC address associations for switch interfaces.
What protocol or technology uses a standby router to assume packet-forwarding responsibility if the active router fails?
- EtherChannel
- DTP
- HSRP
- VTP
- HSRP
What is an advantage of PVST+?
- PVST+ optimizes performance on the network through auto selection of the root bridge.
- PVST+ reduces bandwidth consumption compared to traditional implementations of STP that use CST.
- PVST+ requires fewer CPU cycles for all the switches in the network.
- PVST+ optimizes performance on the network through load sharing.
- PVST+ optimizes performance on the network through load sharing.
Which Cisco solution helps prevent ARP spoofing and ARP poisoning attacks?
- Dynamic ARP Inspection
- IP Source Guard
- DHCP Snooping
- Port Security
- Dynamic ARP Inspection
Which term describes the role of a Cisco switch in the 802.1X port-based access control?
- agent
- supplicant
- authenticator
- authentication server
- authenticator
What are two characteristics of Cisco Express Forwarding (CEF)? (Choose two.)
- When a packet arrives on a router interface, it is forwarded to the control plane where the CPU matches the destination address with a matching routing table entry.
- This is the fastest forwarding mechanism on Cisco routers and multilayer switches.
- With this switching method, flow information for a packet is stored in the fast-switching cache to forward future packets to the same destination without CPU intervention.
- Packets are forwarded based on information in the FIB and an adjacency table.
- When a packet arrives on a router interface, it is forwarded to the control plane where the CPU searches for a match in the fast-switching cache.
- This is the fastest forwarding mechanism on Cisco routers and multilayer switches.
- Packets are forwarded based on information in the FIB and an adjacency table.
What address and prefix length is used when configuring an IPv6 default static route?
- ::/0
- FF02::1/8
- 0.0.0.0/0
- ::1/128
- ::/0
What protocol or technology is a Cisco proprietary protocol that is automatically enabled on 2960 switches?
- DTP
- STP
- VTP
- EtherChannel
- DTP
What is the effect of entering the ip arp inspection validate src-mac configuration command on a switch?
- It checks the source L2 address in the Ethernet header against the sender L2 address in the ARP body.
- It disables all trunk ports.
- It displays the IP-to-MAC address associations for switch interfaces.
- It enables portfast on a specific switch interface.
- It checks the source L2 address in the Ethernet header against the sender L2 address in the ARP body.
A network administrator is configuring a WLAN. Why would the administrator change the default DHCP IPv4 addresses on an AP?
- to eliminate outsiders scanning for available SSIDs in the area
- to reduce the risk of unauthorized APs being added to the network
- to reduce outsiders intercepting data or accessing the wireless network by using a well-known address range
- to reduce the risk of interference by external devices such as microwave ovens
- to reduce outsiders intercepting data or accessing the wireless network by using a well-known address range
What is the effect of entering the [ip dhcp snooping limit rate 6] configuration command on a switch?
- It displays the IP-to-MAC address associations for switch interfaces.
- It enables port security globally on the switch.
- It restricts the number of discovery messages, per second, to be received on the interface.
- It dynamically learns the L2 address and copies it to the running configuration.
- It restricts the number of discovery messages, per second, to be received on the interface.
What IPv6 prefix is designed for link-local communication?
- 2001::/3
- ff00::/8
- fc::/07
- fe80::/10
- fe80::/10
Users on a LAN are unable to get to a company web server but are able to get elsewhere. What should be done or checked?
- Ensure that the old default route has been removed from the company edge routers.
- Verify that the static route to the server is present in the routing table.
- Check the configuration on the floating static route and adjust the AD.
- Create a floating static route to that network.
Verify that the static route to the server is present in the routing table.
A network administrator is configuring a WLAN. Why would the administrator apply WPA2 with AES to the WLAN?
- to reduce the risk of unauthorized APs being added to the network
- to centralize management of multiple WLANs
- to provide prioritized service for time-sensitive applications
- to provide privacy and integrity to wireless traffic by using encryption
to provide privacy and integrity to wireless traffic by using encryption
What protocol or technology manages trunk negotiations between switches?
- VTP
- EtherChannel
- DTP
- STP
- DTP