Sie sind auf Seite 1von 15

Question 1

Answer saved
Marked out of 1.00

Flag question

Question text

This type of attack takes advantage of the way that hardware on most switches
operates. Most switches perform only one level of 802.1Q de- encapsulation, which
allows an attacker to embed a hidden 802.1Q tag inside the frame.

Select one:
a. Port Attack
b. Backdoor Attack
c. Switch boarding Attack
d. Double Tagging Attack
Clear my choice

Question 2
Answer saved
Marked out of 1.00

Flag question

Question text

TRUE or FALSE. Store-and-forward switching has two primary characteristics that


distinguish it from cut-through: error checking and automatic buffering.

Select one:
True
False

Question 3

Answer saved
Marked out of 1.00
Flag question

Question text

Which of the following is NOT a benefit of VLAN?

Select one:
a. Dividing Layer 1,2 and 3 networks into multiple physical workgroups reduces
unnecessary traffic on the network and boosts performance.
b. Groups that have sensitive data are separated from the rest of the network,
decreasing the chances of confidential information breaches.
c. Cost savings result from reduced need for expensive network upgrades and more
efficient use of existing bandwidth and uplinks.
d. VLANs make it easier to manage the network because users with similar network
requirements share the same VLAN.
Clear my choice

Question 4
Answer saved
Marked out of 1.00

Flag question

Question text

This is used between a network device and server or other device that is equipped with
an appropriate 802.1Q-capable NIC.

Select one:
a. Domain
b. Trunks
c. Tunneling
d. Access Point
Clear my choice

Question 5
Answer saved
Marked out of 1.00

Flag question

Question text

Configurations are stored within a VLAN database file, called

Select one:
a. cisco_vlan.dat
b. vlan.dat
c. cisco_vlan.ini
d. vlan.cfg
Clear my choice

Question 6

Answer saved
Marked out of 1.00

Remove flag

Question text

Which of the following describes Dynamic Trunking Protocol?

Select one:
a. Dynamic Trunking Protocol is enabled by default.
b. Dynamic Trunking Protocol is a proprietary networking protocol developed by Cisco
Systems.
c. Switches from other vendors do not support Dynamic Trunking Protocol.
d. All of the choices
Clear my choice

Question 7
Answer saved
Marked out of 1.00
Flag question

Question text

A switch forwarding method that makes a forwarding decision on a frame after it has
received the entire frame and then checked the frame for errors.

Select one:
a. Store-and-forward switching
b. Cut-through switch method
c. Rapid Frame forwarding
d. Automatic-forward switching
Clear my choice

Question 8
Answer saved
Marked out of 1.00

Flag question

Question text

Which command is used to configure an IPv6 address on a router interface so that the
router will combine a manually specified network prefix with an automatically generated
interface identifier?

Select one:
a. ipv6 address ipv6-address/prefix-length eui-64
b. ipv6 address ipv6-address/prefix-length
c. ipv6 enable
d. ipv6 address ipv6-address/prefix-length link-local
Clear my choice

Question 9
Answer saved
Marked out of 1.00
Remove flag

Question text

Which of the following describes a VLAN?

Select one:
a. VLANs allow an administrator to segment networks based on factors such as
function, project team, or application.
b. VLANs are based on logical connections, instead of physical connections.
c. VLANs provide a way to group devices within a LAN.
d. A group of devices within a VLAN communicate as if they were attached to the same
wire.
Clear my choice

Question 10

Answer saved
Marked out of 1.00

Flag question

Question text

A type of VLAN that is configured to carry user-generated traffic.

Select one:
a. Default VLAN
b. Data VLAN
c. Management VLAN
d. Native VLAN
Clear my choice

Question 11

Answer saved
Marked out of 1.00
Flag question

Question text

This is a conduit for multiple VLANs between switches and routers.

Select one:
a. Trunks
b. Tunneling
c. Access Point
d. None of the choices
Clear my choice

Question 12
Answer saved
Marked out of 1.00

Flag question

Question text

To troubleshoot issues when a trunk is not forming or when VLAN leaking is occurring,
what command to be used to check whether the local and peer native VLANs match?

Select one:
a. view trunk - match
b. show interfaces trunk
c. check vlan connection
d. check match vlan
Clear my choice

Question 13

Answer saved
Marked out of 1.00
Flag question

Question text

The primary functions of a router are the following?


1. Packet switching
2. Flow control
3. Domain name resolution
4. Path selection
5. Microsegmentation

Select one:
a. 3 & 4
b. 2 & 3
c. 1 & 4
d. 4 & 5
Clear my choice

Question 14
Answer saved
Marked out of 1.00

Flag question

Question text

The following are switch port modes that DTP offers EXCEPT

Select one:
a. Remote
b. None of the choices
c. Dynamic auto
d. Dynamic desirable
Clear my choice

Question 15
Answer saved
Marked out of 1.00

Flag question

Question text

The _____ switches typically come with different sized chassis that allow for the
installation of different numbers of line card.

Select one:
a. Fixed configuration
b. Stackable configuration
c. Modular configuration
d. Server side configuration
Clear my choice

Question 16

Answer saved
Marked out of 1.00

Flag question

Question text

A collection of interconnected switches forms a _______________________.

Select one:
a. Common domain
b. Broadcast domain
c. Shared domain
d. Collision domain
Clear my choice

Question 17
Answer saved
Marked out of 1.00
Remove flag

Question text

If the port is assigned to the wrong VLAN, what command to be command to change the
VLAN membership on a particular port?

Select one:
a. configure port vlan
b. Switchport access vlan
c. set port vlan
d. vlan port default
Clear my choice

Question 18
Answer saved
Marked out of 1.00

Flag question

Question text

A switch forwarding method that begins the forwarding process after the destination
MAC address of an incoming frame and the egress port has been determined.

Select one:
a. Store-and-forward switching
b. Rapid Frame forwarding
c. Automatic-forward switching
d. Cut-through switch method
Clear my choice

Question 19

Answer saved
Marked out of 1.00
Flag question

Question text

The following are VLAN best practices EXCEPT?

Select one:
a. Shut down unused switch ports to prevent unauthorized access
b. None of the choices
c. Configure all the ports on all switches to be associated with VLANs other than VLAN
1.
d. Separate management and user data traffic.
Clear my choice

Question 20
Answer saved
Marked out of 1.00

Flag question

Question text

In this attack, the attacker exploits a flaw in the Telnet server software running on the
switch that renders the Telnet service unavailable. This sort of attack prevents an
administrator from remotely accessing switch management functions. This can be
combined with other direct attacks on the network as part of a coordinated attempt to
prevent the network administrator from accessing core devices during the breach.

Select one:
a. Telnet DoS attack
b. Brute force password attack
c. Telnet password attack
d. Crack password attack
Clear my choice

Question 21
Answer saved
Marked out of 1.00

Remove flag

Question text

A protocol that provides an encrypted connection to a remote device.

Select one:
a. HTTP
b. SSH
c. FTP
d. TCP/IP
Clear my choice

Question 22

Answer saved
Marked out of 1.00

Flag question

Question text

Which of the statements describe characteristic of load balancing?

Select one:
a. Unequal cost load balancing is supported by OSPF.
b. If multiple paths with different metrics to a destinations exist, the router cannot
support load balancing.
c. Load balancing occurs when a router sends the same packet to different destination
networks.
d. Load balancing allows a router to forward packets over multiple paths to the same
destination network.
Clear my choice

Question 23
Answer saved
Marked out of 1.00

Flag question

Question text

The _____ switches typically come with different sized chassis that allow for the
installation of different numbers of line card.

Select one:
a. Fixed configuration
b. Modular configuration
c. Stackable configuration
d. Server side configuration
Clear my choice

Question 24

Answer saved
Marked out of 1.00

Flag question

Question text

SSH protocol by default uses Port ______.

Select one:
a. 22
b. 23
c. 8080
d. 80
Clear my choice

Question 25
Answer saved
Marked out of 1.00
Flag question

Question text

True or False.
The best way to prevent a basic switch spoofing attack is to turn off trunking on all ports,
except the ones that specifically require trunking.

Select one:
True
False

Question 26

Answer saved
Marked out of 1.00

Flag question

Question text

The ________________ switches do not support features or options beyond those that
originally came with the switch.

Select one:
a. Fixed configuration
b. Server side configuration
c. Remote configuration
d. Modular configuration
Clear my choice

Question 27
Answer saved
Marked out of 1.00

Remove flag
Question text

Which of the following describes Dynamic Trunking Protocol?

Select one:
a. Switches from other vendors do not support Dynamic Trunking Protocol.
b. Dynamic Trunking Protocol is a proprietary networking protocol developed by Cisco
Systems.
c. All of the choices
d. Dynamic Trunking Protocol is disable by default.
Clear my choice

Question 28

Answer saved
Marked out of 1.00

Flag question

Question text

Routers support three packet-forwarding mechanisms. These are

Select one:
a. Transmit, Receive, Store
b. Process, Fast, Cisco Express Forwarding
c. Cisco Forward, Receive, Cisco Process
d. Receive, Process, Transmit
e. Transmit, Receive, Distribute/Forward
Clear my choice

Question 29

Answer saved
Marked out of 1.00

Remove flag

Question text
This is used to connect a PC to the console port of a switch for configuration.

Select one:
a. Asynchronous link cable
b. Cross cable
c. Console cable
d. UTP Network cable
Clear my choice

Question 30
Answer saved
Marked out of 1.00

Flag question

Question text

This is the arrangement of the cables, network devices, and end systems. It describes
how the network devices are actually interconnected with wires and cables.

Select one:
a. physical topology
b. TCP/IP
c. logical topology
d. internet topology
Clear my choice

Das könnte Ihnen auch gefallen