You are on page 1of 11

1/A network administrator is using the router-on-a-stick method to configure interVLAN routing.

Switch port Gi1/1 is used to connect to the router. Which command should be entered to prepare this port for the task? Switch(config)# interface gigabitethernet 1/1 Switch(config-if)# spanning-tree vlan 1 Switch(config)# interface gigabitethernet 1/1 Switch(config-if)# spanning-tree portfast Switch(config)# interface gigabitethernet 1/1 Switch(config-if)# switchport mode trunk Switch(config)# interface gigabitethernet 1/1 Switch(config-if)# switchport access vlan 1

2/Under which two occasions should an administrator disable DTP while managing a local area network? (Choose two.) on links that should not be trunking* when connecting a Cisco switch to a non-Cisco switch* on links that should dynamically attempt trunking when a neighbor switch uses a DTP mode of dynamic auto when a neighbor switch uses a DTP mode of dynamic desirable

3/What will be the result of adding the command ip dhcp excluded-address 10.10.4.1 10.10.4.5 to the configuration of a local router that has been configured as a DHCP server? Traffic that is destined for 10.10.4.1 and 10.10.4.5 will be dropped by the router. Traffic will not be routed from clients with addresses between 10.10.4.1 and 10.10.4.5. The DHCP server will not issue the addresses ranging from 10.10.4.1 to 10.10.4.5. The router will ignore all traffic that comes from the DHCP servers with addresses 10.10.4.1 and 10.10.4.5.

4/Users on an IEEE 801.11n network are complaining of slow speeds. The network administrator checks the AP and verifies it is operating properly. What can be done to improve the wireless performance in the network? Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.* Set the AP to mixed mode. Change the authentication method on the AP. Switch to an 802.11g AP. 5/Which statement is true regarding states of the IEEE 802.1D Spanning Tree Protocol? Ports are manually configured to be in the forwarding state. Ports listen and learn before going into the forwarding state. Ports must be blocked before they can be placed in the disabled state. It takes 15 seconds for a port to go from blocking to forwarding.
6/What method of wireless authentication is dependent on a RADIUS authentication server? WPA Personal WEP WPA2 Enterprise* WPA2 Personal 7/Which command, when issued in the interface configuration mode of a router, enables the interface to acquire an IPv4 address automatically from an ISP, when that link to the ISP is enabled? ip helper-address ip address dhcp ip dhcp pool service dhcp

8/What is the purpose of the Spanning Tree Protocol (STP)? prevents Layer 2 loops prevents routing loops on a router creates smaller collision domains creates smaller broadcast domains allows Cisco devices to exchange routing table updates
9/What are two requirements to be able to configure an EtherChannel between two switches? (Choose two.) All the interfaces need to work at the same speed.* All interfaces need to be assigned to different VLANs. The interfaces that are involved need to be contiguous on the switch.

All the interfaces need to be working in the same duplex mode.* Different allowed ranges of VLANs must exist on each end. 10/Refer to the exhibit. Which destination MAC address is used when frames are sent from the workstation to the default gateway? MAC addresses of both the forwarding and standby routers MAC address of the standby router MAC address of the virtual router* MAC address of the forwarding router 11/What two conditions have to be met in order to form a cluster that includes 5 access points? (Choose two.) The APs must use different cluster names. The APs must all be configured to use different radio modes. At least two controllers are needed to form the cluster. The APs have to be connected on the same network segment.* Clustering mode must be enabled on the APs.* 12/An STP instance has failed and frames are flooding the network. What action should be taken by the network administrator? Broadcast traffic should be investigated and eliminated from the network. Spanning tree should be disabled for that STP instance until the problem is located. Redundant links should be physically removed until the STP instance is repaired.* A response from the network administrator is not required because the TTL field will eventually stop the frames from flooding the network. 13/A network administrator has configured an EtherChannel between two switches that are connected via four trunk links. If the physical interface for one of the trunk links changes to a down state, what happens to the EtherChannel? Spanning Tree Protocol will recalculate the remaining trunk links. The EtherChannel will remain functional. The EtherChannel will transition to a down state.* Spanning Tree Protocol will transition the failed physical interface into forwarding mode. 14/Which wireless network topology is being configured by a technician who is installing a keyboard, a mouse, and headphones, each of which uses Bluetooth? ad hoc mode* hotspot mixed mode infrastructure mode 15/Refer to the exhibit. The partial configuration that is shown was used to configure router on a stick for VLANS 10, 30, and 50. However, testing shows that there are some connectivity problems between the VLANs. Which configuration error is causing this problem?

There is no IP address configured for the FastEthernet 0/0 interface. A configuration for the native VLAN is missing. The wrong VLAN has been configured on subinterface Fa0/0.50. The VLAN IP addresses should belong to the same subnet. 16/What are the two methods that are used by a wireless NIC to discover an AP? (Choose two.) receiving a broadcast beacon frame* delivering a broadcast frame transmitting a probe request* sending an ARP request initiating a three-way handshak 17/A set of switches is being connected in a LAN topology. Which STP bridge priority value will make it least likely for the switch to be selected as the root? 32768 4096 65535 61440* 18/Which technology is an open protocol standard that allows switches to automatically bundle physical ports into a single logical link? Multilink PPP PAgP DTP LACP* 19/Which two commands should be implemented to return a Cisco 3560 trunk port to its default
configuration? (Choose two.) S1(config-if)# switchport mode access S1(config-if)# switchport access vlan 1 S1(config-if)# no switchport trunk native vlan S1(config-if)# no switchport trunk allowed vlan S1(config-if)# switchport mode dynamic desirable

20/ What impact does the use of the mdix auto configuration

command have on an Ethernet interface on a switch? Answer:automatically

detects copper cable type

21/In which link aggregation mode does an interface initiate EtherChannel negotiation by sending LACP packets? desirable auto active* on

22/Which two statements are characteristics of routed ports on a multilayer


switch? (Choose two.)? They are not associated with a particular VLAN.* They support subinterfaces, like interfaces on the Cisco IOS routers. The interface vlan <vlan number> command has to be entered to create a VLAN on routed ports. They are used for point-to-multipoint links. In a switched network, they are mostly configured between switches at the core and distribution layers.

23/Using default settings, what is the next step in the switch boot sequence after the IOS loads from flash? Load the bootstrap program from ROM. Locate and load the startup-config file from NVRAM. Search for a backup IOS in ROM. Load the running-config file from RAM. Perform the POST routine. 24/Which attack allows the attacker to see all frames on a broadcast network by causing a switch to flood all incoming traffic? 802.1q double tagging STP manipulation LAN storm VLAN hopping MAC table overflow 25/ A DHCPREQUEST message has been sent from the client to the DHCP server. What information is included in the message? initial message to locate a DHCP server confirmation that the IP address has been allocated to the client denial message to reject the first offer from the DHCP server formal request for the offered IP address

26/Refer to the exhibit. A network administrator is implementing the stateless DHCPv6 operation for the company. Clients are configuring IPv6 addresses as expected. However, the clients are not getting the DNS server address and the domain name information configured in the DHCP pool. What could be the cause of the problem?
The router is configured for SLAAC operation. The DNS server address is not on the same network as the clients are on. The GigabitEthernet interface is not activated. The clients cannot communicate with the DHCPv6 server, evidenced by the number of active clients being 0

27/

An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation? rogue access point* spoofing cracking denial of service 28/Which two statements are true about VLAN implementation? (Choose two.) The network load increases significantly because of added trunking information. The size of the collision domain is reduced. The number of required switches in a network decreases. VLANs logically group hosts, regardless of physical location. Devices in one VLAN do not hear the broadcasts from devices in another VLAN.
29/

Refer to the exhibit. What is the purpose of the configuration commands that are shown? to make the port a member of VLAN 30 to add VLAN 30 to the trunk that is connected to port Fa0/10 to activate port Fa0/10 to activate port security on port Fa0/10 30/ Refer to the exhibit. A host connected to Fa0/0 is unable to acquire an IP address from this DHCP server. The output of the debug ip dhcp server command shows DHCPD: there is no address pool for 192.168.1.1. What is the problem? The 192.168.1.1 address has not been excluded from the DHCP pool. The default router for the 192Network pool is incorrect.

The 192.168.1.1 address is already configured on Fa0/0. The pool of addresses for the 192Network pool is incorrect. 31/ While attending a conference, participants are using laptops for network connectivity. When a guest speaker attempts to connect to the network, the laptop fails to display any available wireless networks. The access point must be operating in which mode? active passive mixed open

32/An administrator needs management access to a switch from a remote offsite location. Which three configurations are required on the switch to allow the administrator to have remote access using either SSH or Telnet? (Choose three.) default gateway banner message VLAN IP address vty line password encrypted passwords console line password 33/

An STP instance has failed and frames are flooding the network. What action should be taken by the network administrator?

Broadcast traffic should be investigated and eliminated from the network.

Spanning tree should be disabled for that STP instance until the problem is located.

Redundant links should be physically removed until the STP instance is repaired.*

A response from the network administrator is not required because the TTL field will eventually stop the frames from flooding the network.

34/

Refer to the exhibit. Which commands are needed to complete the switch configuration so that SSH can be used to telnet from host A to SW_1? (Choose two.)

SW_1(config)# username david password class SW_1(config)# line vty 0 15 SW_1(config-line)# login SW_1(config-line)# password cisco SW_1(config)# line vty 0 15 SW_1(config-line)# login local SW_1(config-line)# transport input ssh SW_1(config)# login ssh SW_1(config)# password class SW_1(config)# login key rsa SW_1(config)# password cisco SW_1(config)# password encrypted cisco

35/Refer to the exhibit. A network administrator is verifying the bridge ID and the status
of this switch in the STP election. Which statement is correct based on the command output? The bridge priority of Switch_2 has been lowered to a predefined value to become the root bridge. The bridge priority of Switch_2 has been lowered to a predefined value to become the backup root bridge. The STP instance on Switch_2 is using the default STP priority and the election is based on Switch_2 MAC address. The STP instance on Switch_2 is failing due to no ports being blocked and all switches believing they are the root.

36/When would a network engineer configure an access point with channel bonding?
when trunking is enabled between the access point and switch when security is an issue when older wireless NICs are being used when more throughput is needed

37/What two STP features are incorporated into Rapid PVST+? (Choose two.)
loop guard BPDU guard BPDU filter

UplinkFast BackboneFast PortFast


38/

Refer to the exhibit. The partial configuration that is shown was used to configure router on a stick for VLANS 10, 30, and 50. However, testing shows that there are some connectivity problems between the VLANs. Which configuration error is causing this problem? There is no IP address configured for the FastEthernet 0/0 interface. A configuration for the native VLAN is missing. The wrong VLAN has been configured on subinterface Fa0/0.50. The VLAN IP addresses should belong to the same subnet.

39/Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161. What will the router do with this packet? The router will drop the packet. The router will forward the packet out interface FastEthernet 0/1.1. The router will forward the packet out interface FastEthernet 0/1.2. The router will forward the packet out interface FastEthernet 0/1.3. The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3. 40/What are the two methods that are used by a wireless NIC to discover an AP? (Choose two.)
receiving a broadcast beacon frame* delivering a broadcast frame transmitting a probe request* sending an ARP request initiating a three-way handshak.

41/Where in the Cisco Borderless Architecture is the forwarding rate crucial?


at all layers

42/ An administrator was troubleshooting a router-on-a-stick topology and concluded that the problem was related to the configuration of VLANs on the router subinterfaces. Which two commands can the administrator use in the router to identify the problem? (Choose two.) show ip interface show vlan show ip protocols show running-config show controllers 43/When the show spanning-tree vlan 33 command is issued on a switch, three ports are shown in the forwarding state. In which two port roles could these interfaces function while in the forwarding state? (Choose two.)

blocked designated alternate disabled root


44/ Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.Why can PC0 not communicate with Server0 by using the IP address as the target? When would a network engineer configure an access point with channel bonding? when more throughput is needed 45/ Which factor can limit the implementation of a converged network infrastructure?

QoS implementation 46/What term is used to describe a hierarchical model in which three layers are not needed? dual-core model 47/ A network administrator is using the router-on-a-stick method to configure inter-VLAN routing. Switch port Gi1/1 is used to connect to the router. Which command should be entered to prepare this port for the task?
Switch(config)# interface gigabitethernet 1/1 Switch(config-if)# switchport mode trunk 48/ Which two methods can be used to provide secure management access to a Cisco switch?

(Choose two.)
Configure SSH for remote management. 49/ A network administrator has configured an EtherChannel between two switches that are

connected via four trunk links. If the physical interface for one of the trunk links changes to a down state, what happens to the EtherChannel?
A The EtherChannel will remain functional.

50/

A WLAN user wants to allocate an optimal amount of bandwidth to a specific online game. What is a Lin Smart Wi-Fi tool that will allow the user to do this?

Users on an IEEE 801.11n network are complaining of slow speeds. The network administrator checks th verifies it is operating properly. What can be done to improve the wireless performance in the network?
A Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band. 51/Which switching method results in the lowest latency when forwarding frames?

Symmetric