ciscooo

Upload: qwersad123

Post on 10-Oct-2015

30 views

Category:

Documents


0 download

DESCRIPTION

asd

TRANSCRIPT

  • TweetTweet 0 0

    CCNA 3 Scaling Networks Chapter 2 v5.0 Exam Answers 2014

    1 Which protocol provides up to 16 instances of RSTP, combines many VLANs with the same physical andlogical topology into a common RSTP instance, and provides support for PortFast, BPDU guard, BPDUlter, root guard, and loop guard?

    STP

    Rapid PVST+

    PVST+

    MST*

    2 Which two types of spanning tree protocols can cause suboptimal trac ows because they assumeonly one spanning-tree instance for the entire bridged network? (Choose two.)

    STP*

    RSTP*

    MSTP

    Rapid PVST+

    PVST+

    3

    Refer to the exhibit. Which protocol information is being displayed in the output?

    HSRP

    VRRP

    GLBP*

    FHRP

    4

    Business Admin Degreesonlinelearning101.com/Degree

    Search Results -Education Options. Articles On Business Admin Degrees.

    0LikeLike ShareShare

    Alternative ServerAlternative Server

    CCNA 1 v5.0 PDF

    CCNA 2 v5.0 PDF

    CCNA 3 v5.0 PDF

    CCNA 4 v5.0 PDF

    CCNA v5.0 Exam Answers PDFCCNA v5.0 Exam Answers PDF

    SearchSearch

    CCNA 1 v5.0 Routing and Switching

    CCNA 2 v5.0 Routing and Switching

    CCNA 200-120 Questions

    CCNA 200-120 Simulation

    CCNA 3 v5.0 Quiz

    CCNA 3 v5.0 Routing and Switching

    CCNA 4 v5.0 Routing and Switching

    CCNA v5.0 Final Exams

    CCNA v5.0 Final Exams Packet Tracer

    IT Essentials v4.1

    IT Essentials v5.0

    CategoriesCategories

    CCNA5.NET Sign InSign In RegisterRegisterHOMEHOME CCNA v5.0CCNA v5.0 CCNA SecurityCCNA Security IT-EssentialsIT-Essentials CoursesCourses

  • A network administrator is preparing the implementation of Rapid PVST+ on a production network.How are the Rapid PVST+ link types determined on the switch interfaces?

    Link types can only be congured on access ports congured with a single VLAN.

    Link types must be congured with specic port conguration commands.

    Link types are determined automatically.*

    Link types can only be determined if PortFast has been congured.

    5 Which RSTP ports are connected to end devices?

    root ports

    designated ports

    trunk ports

    edge ports*

    6 If no bridge priority is congured in PVST, which criteria is considered when electing the root bridge?

    highest IP address

    lowest MAC address*

    lowest IP address

    highest MAC address

    7 Which port state will switch ports immediately transition to when congured for PortFast?

    learning

    blocking

    forwarding*

    listening

    8 To obtain an overview of the spanning tree status of a switched network, a network engineer issuesthe show spanning-tree command on a switch. Which two items of information will this commanddisplay? (Choose two.)

    The role of the ports in all VLANs.*

    The IP address of the management VLAN interface.

    The number of broadcasts received on each root port.

    The status of native VLAN ports.

    The root bridge BID.*

    9

    Uncategorized

    CCNA Routers and Switches STP Cisco Network Module

    Cisco 12 Port Switch Bridge Cisco CCNA Network

    Find us on Facebook

    CCNA v5 Final Exams

    2,647 people like CCNA v5 Final Exams.

    Facebook social plugin

    LikeLike

    CCNA5.NET -> CISACAD.COM

    CCNA5 - CISACAD.COM @myccna

    Expand

    New Server CISACAD.COM

    CCNA5 - CISACAD.COM @myccna

    8 Jul

    27 Jun

    Tweets FollowFollow

    Tweet to @myccna

  • Launch PT Hide and Save PTOpen the PT Activity. Perform the tasks in the activity instructions and then answer the question.Which switch is the root bridge?

    Switch_1

    Switch_2

    Switch_4*

    Switch_3

    10 Fill in the blank. Do not use abbreviations.The spanning-tree mode rapid-pvst global conguration command is used to enable Rapid PVST+.

    11 Which STP priority conguration would ensure that a switch would always be the root switch?

    spanning-tree vlan 10 root primary

    spanning-tree vlan 10 priority 4096

    spanning-tree vlan 10 priority 0*

    spanning-tree vlan 10 priority 61440

    12 Which nonproprietary protocol provides router redundancy for a group of routers which support IPv4LANs?

    VRRPv2*

    SLB

    GLBP

    HSRP

    13 Fill in the blank.In FHRP operation, two or more routers are represented as a single virtual router.

    14 Which three components are combined to form a bridge ID?

    extended system ID*

    MAC address*

    port ID

    IP address

  • cost

    bridge priority*

    15 What is a characteristic of a Layer 2 loop?

    A switch is continually forwarding the same unicast frame.

    Broadcast frames are forwarded back to the sending switch.*

    Routers continually forward packets to other routers.

    The Time-to-Live attribute of a frame is set to innity.

    16 Which two network design features require Spanning Tree Protocol (STP) to ensure correct networkoperation? (Choose two.)

    redundant links between Layer 2 switches*

    removing single points of failure with multiple Layer 2 switches*

    link-state dynamic routing that provides redundant routes

    static default routes

    implementing VLANs to contain broadcasts

    17 What additional information is contained in the 12-bit extended system ID of a BPDU?

    MAC address

    VLAN ID*

    port ID

    IP address

    18 What is an advantage of PVST+?

    PVST+ optimizes performance on the network through load sharing.*

    PVST+ requires fewer CPU cycles for all the switches in the network.

    PVST+ reduces bandwidth consumption compared to traditional implementations of STP that use CST.

    PVST+ optimizes performance on the network through autoselection of the root bridge.

    19 What is the purpose of HSRP?

    It prevents malicious hosts from connecting to trunk ports.

    It enables an access port to immediately transition to the forwarding state.

    It prevents a rogue switch from becoming the STP root.

    It provides a continuous network connection when a router fails.*

    20 In which two port states does a switch learn MAC addresses and process BPDUs in a PVST network?(Choose two.)

    listening

    learning*

    forwarding*

    disabled

    blocking

    21

  • Place the options in the following order: Step 4 not scored Step 3 Step 1 Step 2

    22

    Refer to the exhibit. A network engineer is troubleshooting host connectivity on a LAN that uses a rsthop redundancy protocol. Which IPv4 gateway address should be congured on the host?

    192.168.2.0

    192.168.2.1

    192.168.2.2

    192.168.2.100*

    23 What is the outcome of a Layer 2 broadcast storm?

    CSMA/CD will cause each host to continue transmitting frames.

    ARP broadcast requests are returned to the transmitting host.

    Routers will take over the forwarding of frames as switches become congested.

    New trac is discarded by the switch because it is unable to be processed.*

    3-Minute Chakra Testchakrahealing.com

    Take the Free Chakra Test to Find Out Which of Your Chakras Are Weak

    00 December 6, 2013 by CCNA5.NET

    in CCNA 3 v5.0 Routing and Switching

    answersanswers ccnaccna

    CCNA 3 R&S: Scaling Networks Exam AnswersCCNA 3 R&S: Scaling Networks Exam Answers

  • Comments

    ccna 3 v5.0ccna 3 v5.0 ccna exam answersccna exam answers

    ccna routing and switchingccna routing and switching ccna v5.0ccna v5.0

    ccna3 v5 examccna3 v5 exam ciscocisco Cisco v5.0Cisco v5.0 examexam

    Exam AnswersExam Answers exam ccna 3 version 5.0exam ccna 3 version 5.0

    examen nal ccna 3 v5.0examen nal ccna 3 v5.0

    CCNA Answers Exam Cisco CCNA Mac Address CCNA Full Form

    Name

    Email

    5 three =

    Comment

    Add CommentAdd Comment

    CCNA5.NETCCNA5.NET HOMEHOME CCNA v5.0CCNA v5.0 CCNA SecurityCCNA Security IT-EssentialsIT-Essentials CoursesCourses

  • TweetTweet 0 1

    CCNA 1 Chapter 2 v5.0 Exam Answers 2014

    1.

    Refer to the exhibit. A switch was congured as shown. A ping to the default gateway was issued, butthe ping was not successful. Other switches in the same network can ping this gateway. What is apossible reason for this?

    The default gateway address must be 192.168.10.1.The ip default-gateway command has to be issued in the VLAN interface conguration mode.The VLAN IP address and the default gateway IP address are not in the same network.The no shutdown command was not issued for VLAN 1.The local DNS server is not functioning correctly.

    2.While trying to solve a network issue, a technician made multiple changes to the current routerconguration le. The changes did not solve the problem and were not saved. What action can thetechnician take to discard the changes and work with the le in NVRAM?

    Issue the reload command without saving the running conguration.Close and reopen the terminal emulation software.Delete the vlan.dat le and reboot the device.Issue the copy startup-cong running-cong command.

    3.Why is it important to congure a hostname on a device?

    to allow local access to the device through the console porta Cisco router or switch only begins to operate when its hostname is setto identify the device during remote access (SSH or telnet)a hostname must be congured before any other parameters

    4.Which procedure is used to access a Cisco 2960 switch when performing an initial conguration in asecure environment?

    Use the console port to locally access the switch from a serial or USB interface of the PC.Use Secure Shell to remotely access the switch through the network.Use Telnet to remotely access the switch through the network.Use the AUX port to locally access the switch from a serial or USB interface of the PC.

    10LikeLike ShareShare

    Alternative ServerAlternative Server

    CCNA 1 v5.0 PDF

    CCNA 2 v5.0 PDF

    CCNA 3 v5.0 PDF

    CCNA 4 v5.0 PDF

    CCNA v5.0 Exam Answers PDFCCNA v5.0 Exam Answers PDF

    SearchSearch

    CCNA 1 v5.0 Routing and Switching

    CCNA 2 v5.0 Routing and Switching

    CCNA 200-120 Questions

    CCNA 200-120 Simulation

    CCNA 3 v5.0 Quiz

    CCNA 3 v5.0 Routing and Switching

    CCNA 4 v5.0 Routing and Switching

    CCNA v5.0 Final Exams

    CCNA v5.0 Final Exams Packet Tracer

    IT Essentials v4.1

    IT Essentials v5.0

    CategoriesCategories

    CCNA5.NET Sign InSign In RegisterRegisterHOMEHOME CCNA v5.0CCNA v5.0 CCNA SecurityCCNA Security IT-EssentialsIT-Essentials CoursesCourses

  • 5.What criterion must be followed in the design of an IPv4 addressing scheme for end devices?

    Each local host should be assigned an IP address with a unique network component.Each IP address must match the address that is assigned to the host by DNS.Each IP address must be unique within the local network.Each IP address needs to be compatible with the MAC address.

    6.A network administrator needs to keep the user ID, password, and session contents private whenestablishing remote CLI connectivity with a switch to manage it. Which access method should bechosen?

    AUXSSHConsoleTelnet

    7.Which interface allows remote management of a Layer 2 switch?

    the switch virtual interfacethe console port interfacethe AUX interfacethe rst Ethernet port interface

    8.What is a result of using the service password-encryption command on a Cisco network device?

    All passwords in the conguration are not shown in clear text when viewing the conguration.The command encrypts the banner message.The command encrypts the enable mode password.A network administrator who later logs into the device will be required to enter an administrator passwordin order to gain access to the Cisco device.

    9.Match the dinitions to their respective CLI hot keys and shortcuts.

    Tab -> Completes abbreviated commands and parametersCtrl-R -> returns directly to the privileged EXEC modeUp Arrow -> scrolls backwards through previously entered commandsCtrl-Z -> cancels any command currently being entered and returns directly to privileged EXEC modeCtrl-C -> Redisplays, on a new line, the command currently being typed

    10.A network administrator is planning an IOS upgrade on several of the head oce routers and switches.Which three questions must be answered before continuing with the IOS selection and upgrade?(Choose three.)

    What models of routers and switches require upgrades?Do the routers and switches have enough RAM and ash memory for the proposed IOS versions?What ports are installed on the routers and switches?Are the devices on the same LAN?What features are required for the devices?Do the devices have enough NVRAM to store the IOS image?

    Uncategorized

    Cisco Router Switch Router Setup Cisco Password Config

    Cisco Network Module Cisco Configuration Cisco Connect

    Find us on Facebook

    CCNA v5 Final Exams

    2,647 people like CCNA v5 Final Exams.

    Facebook social plugin

    LikeLike

    CCNA5.NET -> CISACAD.COM

    CCNA5 - CISACAD.COM @myccna

    Expand

    New Server CISACAD.COM

    CCNA5 - CISACAD.COM @myccna

    8 Jul

    27 Jun

    Tweets FollowFollow

    Tweet to @myccna

  • 11. What benet does DHCP provide to a network?

    Hosts can connect to the network and get an IP address without manual conguration.Duplicate addresses cannot occur on a network that issues dynamic addresses using DHCP and has staticassignments.DHCP allows users to refer to locations by a name rather than an IP address.Hosts always have the same IP address and are therefore always reachable.

    12.Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI?(Choose two.)

    providing an error message when a wrong command is submittedallowing the user to complete the remainder of an abbreviated command with the TAB keydisplaying a list of all available commands within the current modeselecting the best command to accomplish a taskdetermining which option, keyword, or argument is available for the entered command

    13.A router has a valid operating system and a conguration stored in NVRAM. When the router boots up,which mode will display?

    global conguration modeuser EXEC modesetup modeROM monitor mode

    14.Which two features are characteristics of ash memory? (Choose two.)

    Flash receives a copy of the IOS from RAM when a device is powered on.Flash provides nonvolatile storage.The contents of ash may be overwritten.Flash is a component in Cisco switches but not in Cisco routers.The contents of ash may be lost during a power cycle.

    15.Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes andinterfaces that can be protected with passwords. (Choose three.)

    boot IOS modeEthernet interfaceprivileged EXEC modeVTY interfaceconsole interfacerouter conguration mode

    16.Why would a Layer 2 switch need an IP address?

    to enable the switch to send broadcast frames to attached PCsto enable the switch to function as a default gatewayto enable the switch to receive frames from attached PCsto enable the switch to be managed remotely

    17.What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?if there is connectivity with the destination devicewhat type of device is at the destinationif the TCP/IP stack is functioning on the PC without putting trac on the wirethe path that trac will take to reach the destination

    18.What command can be used on a Windows PC to see the IP conguration of that computer?pingshow interfacesshow ip interface briefipcong

    19.Which statement is true about the running conguration le in a Cisco IOS device?

  • Manam January 30, 2014 Reply

    Answer 9 is wrong. Correct aswer for 9. Match the dinitions to their respective CLI hot keysand shortcuts. is:

    The shortcuts with their functions are as follows:

    It should be deleted using the erase running-cong command.It is automatically saved when the router reboots.It aects the operation of the device immediately when modied.It is stored in NVRAM.

    20.Match the description to the common IOS CLI access method.

    21.Which two characters are allowed as part of the hostname of a Cisco device? (Choose two.)tabspacequestion marknumbersunderline

    22.A new network administrator has been asked to enter a banner message on a Cisco device. What is thefastest way a network administrator could test whether the banner is properly congured?Power cycle the device.Enter CTRL-Z at the privileged mode prompt.Exit global conguration mode.Exit enable mode and press Enter.Reboot the device.

    Comments

    wireless gatewaymoxa.com

    The easiest way to access private IP devices. Try it NOW!

    55 November 4, 2013 by CCNA5.NET

    in CCNA 1 v5.0 Routing and Switching

    ccna 1 chapter 2 exam answersccna 1 chapter 2 exam answers

    ccna routing and switchingccna routing and switching ccna v5.0ccna v5.0

    Router Password Cisco Exam CCNA Test Exam Cisco IOS

  • - Tab Completes the remainder of a partially typed command or keyword- Ctrl-R Redisplays, on a new line, the command currently being typed- Ctrl-Z Exits conguration mode and returns to the EXEC- Up Arrow Allows user to scroll backward through former commands- Ctrl-C cancels any command currently being entered and returns directly to privilegedEXEC mode- Ctrl-Shift-6 Allows the user to interrupt an IOS process such as ping or traceroute

    Dexter February 3, 2014 Reply

    There is a mistake at question no.9. Here is the correct dinitions:

    Ctrl-R -> Redisplays, on a new line, the command currently being typedCtrl-Z -> returns directly to the privileged EXEC modeCtrl-C -> cancels any command currently being entered and returns directly to privilegedEXEC mode

    Chaka April 21, 2014 Reply

    A network administrator is planning an IOS upgrade on several of the head oce routersand switches. Which three questions must be answered before continuing with the IOSselection and upgrade? (Choose three.)CorrectResponseYourResponseAre the devices on the same LAN?Do the devices have enough NVRAM to store the IOSimage?What models of routers and switches require upgrades?What ports are installed onthe routers and switches?Do the routers and switches have enough RAM and ash memoryfor the proposed IOS versions?What features are required for the devices?

    Nick April 24, 2014 Reply

    Question 21:Underline aint the right answer. Choose dash instead.

    Surya Bumi May 5, 2014 Reply

    thanks for shared this exam.. i had nish this.. i get excellent score..

    Name

    Email

    four + 1 =

    Comment

    Add CommentAdd Comment

    CCNA5.NETCCNA5.NET HOMEHOME CCNA v5.0CCNA v5.0 CCNA SecurityCCNA Security IT-EssentialsIT-Essentials CoursesCourses

  • CCNA5.NETCCNA5.NET HOMEHOME CCNA v5.0CCNA v5.0 CCNA SecurityCCNA Security IT-EssentialsIT-Essentials CoursesCourses

  • 1. Where is it necessary to use half duplex transmission? x On a shared medium where CSMA/CD is used

    2. What is necessary for a switch to forward a frame only to the intended destination?

    x The destination MAC address must be in the switch's MAC address table

    3. A hub in an Ethernet network is replaced with a switch. This will:. x Increase the number of collision domains

    4. Which function is carried out by a layer 3 switch but not by a layer 2 switch?

    x Using IP addresses to route packets to their destinations

    5. Why is shared memory buffering preferred to port based buffering? x All of the above

    6. In the CLI, pressing the up arrow key will:

    x Show the most recent entry in the command history

    7. What is stored in NVRAM? x Startup configuration

    8. Which command specifies that access to the web based interface uses the same password as privileged exec

    mode x ip http authentication enable

    9. Where should a switch IP address and subnet mask be configured?

    x On a VLAN interface

    10. What is stored in NVRAM in a Cisco router x Startup config

    11. What happens to the content of NVRAM when a Cisco router is turned off

    x Contents remain

    12. is ROM monitor mode and what is it commonly used for x Allows access to the ROM startup code which provides a simple text interface and very limited functionality x Used most often for password recovery

    13. If the IOS does not find a config file in NVRAM where does it look. If no IOS file can be located what does it do.

    x The IOS searches for a TFTP server. x If no TFTP server found the setup dialog is initiated

    14. What command can be used to verify the configuration register value

    x Show version

    15. In the command IOS filename c3600-d-mz.122-16a.bin, what does the 122-16a represent x IOS version number

    16. What command would be used to download a startup config file to a tftp server

    x Copy Start tftp

  • 17. What router configuration command is equivalent to ctrl-z

    x End

    18. What are the differences between dynamic routing and static routing Dynamic routing

    x Information is learned from other routers x Routing protocols adjust routes automatically (dynamically).

    Static routing

    x Network administrator configures information about remote networks manually. x They are used to reduce overhead and for security x Because of extra administrative requirements, static routing do not have the scalability of dynamic routing.

    19. What are the two ways to specify the next hop in an ip route command

    x The outgoing interface, or x The next hop IP address of the adjacent router

    20. If two routing protocol updates have been received and have the same metric, what may make the routing

    protocol select one update over the other. x A lower administrative distance

    21. What command is used to view the routing table

    x Show ip route

    22. What are the features of a distance vector routing protocol that make it distinct from link state routing protocols x Typically maintain only next hop and hop count to a destination and do not store intermediate nodes and

    link state x Passes complete routing tables to neighbours x Routing tables are exchanged periodically

    23. Where is a border gateway protocol such as BGP used

    x Typically used between ISPs or between a company and an ISP to route between autonomous systems

    24. If you saw the show command response - Serial0 is up, line protocol is down - what would be the most likely problem x Layer 2 problem such as mismatched layer 2 WAN protocol

    25. The ping command operates at which layer of the OSI model

    x Layer 3

    26. What is a show command using a proprietary Cisco protocol that can be used to fault find at layer 2 x Show CDP neighbours

    27. What is the count to infinity problem and what mechanisms do routing protocols employ to address it

    x The routing protocol permits the routing update to propagate (loop) until the metric exceeds its maximum allowed value.

    x It is addressed by setting a finite limit for infinity i.e the TTL or by using holddown timers

    28. What is split horizon used for and how does it work. What type of routing protocols use split horizon. x Helps prevent routing loops

  • x Prohibits a router from advertising a route back onto the interface from which it was learned to ensure that a routing loop does not occur.

    x Used by distance vector routing protocols

    29. What is the update time and maximum hops for RIP x 30 sec x 15 hops

    30. In the above router response above what does 192.168.3.0/24 refer to

    x Destination network

    31. In the command - router igrp 101 - what does the 101 refer to x Autonomous system number

    32. What are two functions of an ACL

    x ACLs enable management of traffic x Secure access to and from a network

    33. What is the difference between a standard and extended ACL

    x Standard ACL specifies only the source IP address x Extended ACLs can filter traffic based on source IP, destination IP, protocol (IP, TCP, UDP and ICMP) and port

    number

    34. In what order are ACL statements checked x ACL statements operate in sequential, logical order, from top to bottom.

    35. What must be done if additional condition statements are needed in an access list that is not a named access list

    x The entire ACL must be deleted and recreated with the new condition statements

    36. What is the effect of service password-encryption command? x It applies weak encryption to passwords that are plain text by default.

    37. Which of these will not produce the message Authorised Users Only ?

    x Banner motd iAuthorised Users Onlyi

    38. A switch port is not in use. Why should you configure it with the shutdown command? x For security

    39. Why is SSH a better option than Telnet for remote access to a switch?

    x Messages are sent in encrypted form.

    40. Which command would allow you to use either SSH or Telnet? x Transport input all on the vty lines

    41. Which is true of the password recovery process?

    x It can be different on different models of switch

    42. Which type of secure addresses are lost when a switch reboots? x Dynamic

    43. By default, what happens if there is a switch port security violation?

    x The port shuts down and sends a syslog message

  • 44. Which command is needed before security is set on a switch port? x Switchport mode access

    Subnetting Consider the network above with branch offices at each location with the number of hosts as specified. Select a public class C network address and subnet the network for all LANs and WAN connections assuming the use of subnet 0. Calculate the LAN subnets with subnet masks and allocate a subnet to each site Calculate the WAN subnets with subnet masks List the spare subnets with subnet masks.

  • 4ROUTING CCNA 1 v5, CCNA 2 v5, CCNA 3 v5, CCNA 4 v5 Routing and Switc hing Exams Answers v5 2013- 2014, IT Essentials v5 Exam

    Answers

    CCNA 2 Chapter 2 v5 Routing and Switching EssentialsExam

    CCNA 2 Chapter 2 v5.0 Exam Answers Routing and Switching Essentials Basic

    Switching Concepts and Conguration 2013/2014

    CISCO CCNA Questions and Answers v5 Quiz TEST (Version 5.0) Chapter 2 Exam

    This exam will cover material from Chapter 2 of the CCNA R&S Routing and Switching

    Essentials curriculum.

    1. Which interface is the default location that would contain the IP address used to manage

    a 24-port Ethernet switch?

    interface connected to the default gateway

    Fa0/1

    VLAN 99

    Fa0/0

    VLAN 1

    _______________________________________________________________

    2. Which three statements are true about using full-duplex Fast Ethernet? (Choose three.)

    Performance is improved because the collision detect function is disabled on the

    device.

    Performance is improved because the NIC is able to detect collisions.

    Full- duplex Fast Ethernet oers 100 percent eciency in both directions.

    Nodes operate in full-duplex with unidirectional data ow.

    Performance is improved with bidirectional data ow.

    Latency is reduced because the NIC processes frames faster.

    _______________________________________________________________

    3

    What impact does the use of the mdix auto conguration command have on an Ethernet

    interface on a switch?

    automatically detects interface speed

    automatically assigns the rst detected MAC address to an interface

    automatically detects duplex settings

  • automatically detects copper cable type

    _______________________________________________________________

    4. Which type of cable does a network administrator need to connect a PC to a switch to recover it after the Cisco

    IOS software fails to load?

    a coaxial cable

    a crossover cable

    a console cable

    a straight-through cable

    _______________________________________________________________

    5

    While troubleshooting a connectivity problem, a network administrator notices that a switch port status LED is

    alternating between green and amber. What could this LED indicate?

    The port has an active link with normal trac activity.

    The port is administratively down.

    The port is experiencing errors.

    The port has no link.

    A PC is using the wrong cable to connect to the port.

    ________________________________________________________________

    6

    A production switch is reloaded and nishes with a Switch> prompt. What two facts can be determined? (Choose two.)

    The boot process was interrupted.

    There is not enough RAM or ash on this router.

    A full version of the Cisco IOS was located and loaded.

    POST occurred normally.

    The switch did not locate the Cisco IOS in ash, so it defaulted to ROM.

    _________________________________________________________________

    7

    Which command displays information about the auto-MDIX setting for a specic interface??

    show running-cong

    show controllers

    show processes

    show interfaces

    ________________________________________________________________

    8.

  • Refer to the exhibit. What media issue might exist on the link connected to Fa0/1 based on the show interface

    command?

    The interface might be congured as half-duplex.

    There could be too much electrical interference and noise on the link.

    There could be an issue with a faulty NIC.

    The cable attaching the host to port Fa0/1 might be too long.

    The bandwidth parameter on the interface might be too high.

    _________________________________________________________________

    9.

    Refer to the exhibit. The network administrator wants to congure Switch1 to allow SSH connections and prohibit

    Telnet connections. How should the network administrator change the displayed conguration to satisfy the

    requirement?

    Use SSH version 1.

    Recongure the RSA key.

    Congure SSH on a dierent line.

    Modify the transport input command.

    ____________________________________________________________________

    10

    Which protocol or service sends broadcasts containing the Cisco IOS software version of the sending device, and the

  • packets of which can be captured by malicious hosts on the network?

    DHCP

    SSH

    DNS

    CDP

    ____________________________________________________________________

    11

    In which type of attack does a malicious node request all available IP addresses in the address pool of a DHCP server

    in order to prevent legitimate hosts from obtaining network access??

    DHCP snooping

    MAC address ooding

    CAM table overow

    DHCP starvation

    _________________________________________________________________

    12

    Which method would mitigate a MAC address ooding attack?

    using ACLs to lter broadcast trac on the switch?

    increasing the speed of switch ports

    increasing the size of the CAM table

    conguring port security

    _____________________________________

    13

    Which two basic functions are performed by network security tools? (Choose two.)

    simulating attacks against the production network to determine any existing vulnerabilities

    writing a security policy document for protecting networks

    educating employees about social engineering attacks

    revealing the type of information an attacker is able to gather from monitoring network trac

    controlling physical access to user devices

    _______________________________________

    14

    Which action will bring an error-disabled switch port back to an operational state?

    Issue the switchport mode access command on the interface.

    Issue the shutdown and then no shutdown interface commands.

    Remove and recongure port security on the interface.

    Clear the MAC address table on the switch.

    __________________________________________________________________

    15.

  • Refer to the exhibit. Which S1 switch port interface or interfaces should be congured with the ip dhcp snooping

    trust command if best practices are implemented?

    only the G0/2, G0/3, and G0/4 ports

    only the G0/1 and G0/24 ports

    only the G0/1, G0/2, G0/3, and G0/4 ports

    only unused ports

    only the G0/1 port

    _____________________________________

    16.

    Refer to the exhibit. Port Fa0/2 has already been congured appropriately. The IP phone and PC work properly. Which

    switch conguration would be most appropriate for port Fa0/2 if the network administrator has the following goals?

    No one is allowed to disconnect the IP phone or the PC and connect some other wired device.

    If a dierent device is connected, port Fa0/2 is shut down.

    The switch should automatically detect the MAC address of the IP phone and the PC and add those addresses to the

    running conguration.

    SWA(cong-if)# switchport port-security mac-address sticky

    SWA(cong-if)# switchport port-security maximum 2

    SWA(cong-if)# switchport port-security

    SWA(cong-if)# switchport port-security maximum 2

    SWA(cong-if)# switchport port-security mac-address sticky

    SWA(cong-if)# switchport port-security violation restrict

  • SWA(cong-if)# switchport port-security

    SWA(cong-if)# switchport port-security mac-address sticky

    SWA(cong- if)# switchport port- security

    SWA(cong- if)# switchport port- security maximum 2

    SWA(cong- if)# switchport port- security mac- address sticky

    _______________________________________________________________

    17.

    Refer to the exhibit. What can be determined about port security from the information that is shown?

    The port has been shut down.

    The port has the maximum number of MAC addresses that is supported by a Layer 2 switch port which is congured

    for port security.

    The port violation mode is the default for any port that has port security enabled.

    The port has two attached devices.

    _______________________________________________________________

    18.

    Refer to the exhibit. Which event will take place if there is a port security violation on switch S1 interface Fa0/1?

    The interface will go into error-disabled state.

    Packets with unknown source addresses will be dropped.

    A syslog message is logged.

    A notication is sent.

    _______________________________________________________________

  • 19

    The network administrator enters the following commands on a Cisco switch:

    Switch(cong)# interface vlan1

    Switch(cong-if)# ip address 192.168.1.2 255.255.255.0

    Switch(cong-if)# no shutdown

    What is the eect of entering these commands?

    All devices attached to this switch must be in the 192.168.1.0/24 subnet to communicate.

    The address of the default gateway for this LAN is 192.168.1.2/24.

    Users on the 192.168.1.0/24 subnet are able to ping the switch at IP address 192.168.1.2.

    The switch is able to forward frames to remote networks.

    ________________________________________

    20

    Which two statements are true regarding switch port security? (Choose two.)

    The three congurable violation modes all require user intervention to re-enable ports.

    The three congurable violation modes all log violations via SNMP.

    After entering the sticky parameter, only MAC addresses subsequently learned are converted to secure MAC

    addresses.

    If fewer than the maximum number of MAC addresses for a port are congured statically, dynamically learned

    addresses are added to CAM until the maximum number is reached.

    Dynamically learned secure MAC addresses are lost when the switch reboots.

    _______________________________________________________________

    21

    Fill in the blank.

    Full- duplex communication allows both ends of a connection to transmit and receive data simultaneously.

    _______________________________

    22

    Fill in the blank.

    When port security is enabled, a switch port uses the default violation mode of shutdown until specically

    congured to use a dierent violation mode.

    ________________________________

    23

  • MATCHING

    Step 1. Execute POST

    Step 2. Load the boot loader from ROM

    Step 3. CPU register initilizations

    Step 4. ash le system initialization

    Step 5. Load the IOS

    Step 6. Transfer switch control to the IOS

    _______________________________________

    24.

    Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

    Fill in the blank.

    Do not use abbreviations.What is the missing command on S1?

    ip address 192.168.99.2 255.255.255.0

    25.

    Fill in the blank.

    When port security is enabled, a switch port uses the default violation mode of until

    specically congured to use a dierent violation mode.

    shutdown

    If no violation mode is specied when port security is enabled on a switch port, then the security violation mode

    defaults to shutdown.

    CCNA 2 Chapter 2 v5 Routing and Switching Essentials Exam answers, CCNA 2 RSE answers 2014

    Category: CCNA 2 Routing and Switching Essentials v5 Tags: ccna 2 ch 2 v5 answers , ccna 2 ch 2 v5 exam answers ,

    CCNA 2 Chapter 2 v5 RSE 2014 , ccna 2 v5 chapter 2 , cisco ccna answers v5

  • !CCNA3%Chapter%2%Practice%Test%Answers%!An!Ethernet!network!is!using!CSMA/CD!and!a!collision!has!occurred.!Which!host!will!be!the!next!to!transmit!data?!!A!host!that!has!data!to!transmit!and!whose!backoff!period!expires!first.!!What!is!necessary!for!an!Ethernet!network!to!be!free!of!collisions?!The%network%must%use%full%duplex%transmission%and%be%fully!switched.!!Which%frames%are%flooded%by%a%switch%through%all%ports%except%the%incoming!port?!!Broadcast)frames,)multicast)frames)and)frames)where)the!destination&MAC&address&is&not&in&the&MAC&address&table.!!Where%does%a%switch%get%the%data%to%build%up%its%MAC%address%table?!!From%the%source%MAC%addresses%of%incoming%frames.!!!How$does$the$default$behaviour$of$a$switch$differ$from$the$default$behaviour$of!a"router&when&a&broadcast&message&arrives?!!The$switch$forwards$the$message$through$all$ports$except$the!incoming'port,'while'the'router'drops'it.!!Another(name(for(the(MAC(address(table(of(a(switch(is(the:!!CAM$table!!!!!!!!!!!!!!How$many$collision$domains?!!9!!And$how$many$broadcast$domains?!!2!!!!Why$are$routers$still$required$for$Ethernet$networks$in$some$cases$even!though"multilayer*switches*are*available'that'operate'at'layer'3?!!Routers(are(generally(better(at(making(connections(to(WANs.!!Which%is"true"of"port"based"buffering"but"not"of"shared"buffering"in"a"switch?!!A"frame"may"be"delayed"if"the"frame"ahead"of"it"in"the"queue"is!waiting'for'its'exit'port'to'become'available.!!Which%mode%of%switching%reads%the%whole%frame%and%carries%out%a%cyclic!redundancy)check?!

  • !Store&and&forward!!!If#you#type#in#a#switch#command,#leave#a#space#and#then#type#?,#what#do#you!get?!!A"list"of"parameters"that"can"follow"the"command.!!If#you#have#used#the#up#arrow#key#or#Ctrl#+#P#to#show#several#previous!commands(from$the$command$history,)you)can)work)back)and)show)the)later!commands(by(pressing(the(down(arrow(key(or:!!Ctrl%+%N!!!Where%is%the%running%configuration%held?!!RAM!!!Which%command%needs%to%be%in%a%switch%configuration%in%order%for%an!administrator*to*use!its$web$based$interface?!!ip#http#server!!!Which%command%is%needed%if%the%web%based!interface)of)a)switch)is)to)be)accessed&by&a&username&and&password(specified(in(the(command:!userid'tech'password'cisco.!!ip#http#authentication#local!!!Why$is$it$advisable$to$put$a$switch$IP$address$on$some$interface$other$than!VLAN%1?!!It#is#more#secure#to#use#a#different#VLAN#interface#for!management'purposes!!Which%command%needs%to%be%in%a%switch%configuration%in%order%for%an!administrator*to*use*its*web*based*interface?!!ip#http#server!!!Which%command%is%needed%if%the%web%based%interface%of%a%switch%is%to%be!accessed&by&a&username&and&password&specified&in&the&command:!userid'tech'password'cisco.!!ip#http#authentication#local!!!Why$is$it$advisable$to$put$a$switch$IP$address$on$some$interface$other$than!VLAN%1?!!It#is#more#secure#to#use#a#different#VLAN#interface#for!management'purposes.!!Which%is%the%correct%option%for%configuring%a%switch%with%the%address%of%its%local!router&so&that&it&can&be&accessed&from&a&remote&network?!!SW1(config)#*defaultCgateway'172.16.0.1!255.255.255.0!!!You$capture$a$running$configuration$that$includes$the$line:!enable&secret&5!859D23N4BA56!What%will%happen%if%you%put%this%configuration%back%on%a%router%without%making!any$changes$in$this$line?!!You$will$need$to$enter$859D23N4BA56!in#order#to#reach#privileged!!exec$mode!!You$configure$both$a$login$banner$and$a$message$of$the$day$banner$on$a!switch.(What(do(you(see(when(you(make(a(console"connection"to"the"switch?!!The$motd$banner,$then$the$login$banner,$then$the$prompt$for$a!!password.!!

  • What%is%the%effect%of%entering%the%commands:!SW1(config)#line,vty,0!15!SW1(configCline)#transport-input-SSH!!You$will$not$be$able$to$Telnet$to$the$switch.!!A"port"has"been"configured"to"learn"a"dynamic!secure&address.&How&can&you!ensure&that&this&address&is&still%known%after%the%switch%reboots?!!Enable'sticky'learning'then'save'the'running'configuration.!!By#default,#how#many#secure#addresses#can#a#switch#port#learn?!!1!!Why$do$you$give$the$command$switchport$mode$access$before$setting!security)on)a)port?!!The$default$switchport$mode$is$dynamic$desirable,$which$does!not$allow$security$to$be$configured.!!Which%type%of%switchport#security#is#being#configured#by#the#command:!SW1(configCif)#switchport-portCsecurity)macCaddress&000c.7612.3b82!!Static!!!!!! !