1 Which protocol provides up to 16 instances of RSTP, combines many VLANs with the same physical and logical topology into a common RSTP instance, and provides support for PortFast, BPDU guard, BPDU !lter, root guard, and loop guard? STP Rapid PVST+ PVST+ MST* 2 Which two types of spanning tree protocols can cause suboptimal tra"c #ows because they assume only one spanning-tree instance for the entire bridged network? (Choose two.) STP* RSTP* MSTP Rapid PVST+ PVST+ 3 Refer to the exhibit. Which protocol information is being displayed in the output? HSRP VRRP GLBP* FHRP 4 Business Admin Degrees onlinelearning101.com/Degree Search Results -Education Options. Articles On Business Admin Degrees. 0 Like Like Share Share Alternative Server Alternative Server CCNA 1 v5.0 PDF CCNA 2 v5.0 PDF CCNA 3 v5.0 PDF CCNA 4 v5.0 PDF CCNA v5.0 Exam Answers PDF CCNA v5.0 Exam Answers PDF Search Search CCNA 1 v5.0 Routing and Switching CCNA 2 v5.0 Routing and Switching CCNA 200-120 Questions CCNA 200-120 Simulation CCNA 3 v5.0 Quiz CCNA 3 v5.0 Routing and Switching CCNA 4 v5.0 Routing and Switching CCNA v5.0 Final Exams CCNA v5.0 Final Exams Packet Tracer IT Essentials v4.1 IT Essentials v5.0 Categories Categories CCNA5.NET Sign In Sign In Register Register HOME HOME CCNA v5.0 CCNA v5.0 CCNA Security CCNA Security IT-Essentials IT-Essentials Courses Courses A network administrator is preparing the implementation of Rapid PVST+ on a production network. How are the Rapid PVST+ link types determined on the switch interfaces? Link types can only be con!gured on access ports con!gured with a single VLAN. Link types must be con!gured with speci!c port con!guration commands. Link types are determined automatically.* Link types can only be determined if PortFast has been con!gured. 5 Which RSTP ports are connected to end devices? root ports designated ports trunk ports edge ports* 6 If no bridge priority is con!gured in PVST, which criteria is considered when electing the root bridge? highest IP address lowest MAC address* lowest IP address highest MAC address 7 Which port state will switch ports immediately transition to when con!gured for PortFast? learning blocking forwarding* listening 8 To obtain an overview of the spanning tree status of a switched network, a network engineer issues the show spanning-tree command on a switch. Which two items of information will this command display? (Choose two.) The role of the ports in all VLANs.* The IP address of the management VLAN interface. The number of broadcasts received on each root port. The status of native VLAN ports. The root bridge BID.* 9 Uncategorized ! CCNA Routers and Switches ! STP ! Cisco Network Module ! Cisco 12 Port Switch ! Bridge Cisco ! CCNA Network Find us on Facebook CCNA v5 Final Exams 2,647 people like CCNA v5 Final Exams. Facebook social plugin Like Like CCNA5.NET -> CISACAD.COM CCNA5 - CISACAD.COM @myccna Expand New Server CISACAD.COM CCNA5 - CISACAD.COM @myccna 8 Jul 27 Jun Tweets Follow Follow Tweet to @myccna Launch PT Hide and Save PT Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Which switch is the root bridge? Switch_1 Switch_2 Switch_4* Switch_3 10 Fill in the blank. Do not use abbreviations. The spanning-tree mode rapid-pvst global con!guration command is used to enable Rapid PVST+. 11 Which STP priority con!guration would ensure that a switch would always be the root switch? spanning-tree vlan 10 root primary spanning-tree vlan 10 priority 4096 spanning-tree vlan 10 priority 0* spanning-tree vlan 10 priority 61440 12 Which nonproprietary protocol provides router redundancy for a group of routers which support IPv4 LANs? VRRPv2* SLB GLBP HSRP 13 Fill in the blank. In FHRP operation, two or more routers are represented as a single virtual router. 14 Which three components are combined to form a bridge ID? extended system ID* MAC address* port ID IP address cost bridge priority* 15 What is a characteristic of a Layer 2 loop? A switch is continually forwarding the same unicast frame. Broadcast frames are forwarded back to the sending switch.* Routers continually forward packets to other routers. The Time-to-Live attribute of a frame is set to in!nity. 16 Which two network design features require Spanning Tree Protocol (STP) to ensure correct network operation? (Choose two.) redundant links between Layer 2 switches* removing single points of failure with multiple Layer 2 switches* link-state dynamic routing that provides redundant routes static default routes implementing VLANs to contain broadcasts 17 What additional information is contained in the 12-bit extended system ID of a BPDU? MAC address VLAN ID* port ID IP address 18 What is an advantage of PVST+? PVST+ optimizes performance on the network through load sharing.* PVST+ requires fewer CPU cycles for all the switches in the network. PVST+ reduces bandwidth consumption compared to traditional implementations of STP that use CST. PVST+ optimizes performance on the network through autoselection of the root bridge. 19 What is the purpose of HSRP? It prevents malicious hosts from connecting to trunk ports. It enables an access port to immediately transition to the forwarding state. It prevents a rogue switch from becoming the STP root. It provides a continuous network connection when a router fails.* 20 In which two port states does a switch learn MAC addresses and process BPDUs in a PVST network? (Choose two.) listening learning* forwarding* disabled blocking 21 Place the options in the following order: Step 4 not scored Step 3 Step 1 Step 2 22 Refer to the exhibit. A network engineer is troubleshooting host connectivity on a LAN that uses a !rst hop redundancy protocol. Which IPv4 gateway address should be con!gured on the host? 192.168.2.0 192.168.2.1 192.168.2.2 192.168.2.100* 23 What is the outcome of a Layer 2 broadcast storm? CSMA/CD will cause each host to continue transmitting frames. ARP broadcast requests are returned to the transmitting host. Routers will take over the forwarding of frames as switches become congested. New tra"c is discarded by the switch because it is unable to be processed.*
3-Minute Chakra Test chakrahealing.com Take the Free Chakra Test to Find Out Which of Your Chakras Are Weak 00 December 6, 2013 by CCNA5.NET in CCNA 3 v5.0 Routing and Switching answers answers ccna ccna CCNA 3 R&S: Scaling Networks Exam Answers CCNA 3 R&S: Scaling Networks Exam Answers Comments ccna 3 v5.0 ccna 3 v5.0 ccna exam answers ccna exam answers ccna routing and switching ccna routing and switching ccna v5.0 ccna v5.0 ccna3 v5 exam ccna3 v5 exam cisco cisco Cisco v5.0 Cisco v5.0 exam exam Exam Answers Exam Answers exam ccna 3 version 5.0 exam ccna 3 version 5.0 examen !nal ccna 3 v5.0 examen !nal ccna 3 v5.0 ! CCNA Answers ! Exam Cisco CCNA ! Mac Address ! CCNA Full Form Name Email 5 " three = Comment Add Comment Add Comment CCNA5.NET CCNA5.NET HOME HOME CCNA v5.0 CCNA v5.0 CCNA Security CCNA Security IT-Essentials IT-Essentials Courses Courses Tweet Tweet 0 1 CCNA 1 Chapter 2 v5.0 Exam Answers 2014 1. Refer to the exhibit. A switch was con!gured as shown. A ping to the default gateway was issued, but the ping was not successful. Other switches in the same network can ping this gateway. What is a possible reason for this? The default gateway address must be 192.168.10.1. The ip default-gateway command has to be issued in the VLAN interface con!guration mode. The VLAN IP address and the default gateway IP address are not in the same network. The no shutdown command was not issued for VLAN 1. The local DNS server is not functioning correctly. 2. While trying to solve a network issue, a technician made multiple changes to the current router con!guration !le. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the !le in NVRAM? Issue the reload command without saving the running con!guration. Close and reopen the terminal emulation software. Delete the vlan.dat !le and reboot the device. Issue the copy startup-con!g running-con!g command. 3. Why is it important to con!gure a hostname on a device? to allow local access to the device through the console port a Cisco router or switch only begins to operate when its hostname is set to identify the device during remote access (SSH or telnet) a hostname must be con!gured before any other parameters 4. Which procedure is used to access a Cisco 2960 switch when performing an initial con!guration in a secure environment? Use the console port to locally access the switch from a serial or USB interface of the PC. Use Secure Shell to remotely access the switch through the network. Use Telnet to remotely access the switch through the network. Use the AUX port to locally access the switch from a serial or USB interface of the PC. 10 Like Like Share Share Alternative Server Alternative Server CCNA 1 v5.0 PDF CCNA 2 v5.0 PDF CCNA 3 v5.0 PDF CCNA 4 v5.0 PDF CCNA v5.0 Exam Answers PDF CCNA v5.0 Exam Answers PDF Search Search CCNA 1 v5.0 Routing and Switching CCNA 2 v5.0 Routing and Switching CCNA 200-120 Questions CCNA 200-120 Simulation CCNA 3 v5.0 Quiz CCNA 3 v5.0 Routing and Switching CCNA 4 v5.0 Routing and Switching CCNA v5.0 Final Exams CCNA v5.0 Final Exams Packet Tracer IT Essentials v4.1 IT Essentials v5.0 Categories Categories CCNA5.NET Sign In Sign In Register Register HOME HOME CCNA v5.0 CCNA v5.0 CCNA Security CCNA Security IT-Essentials IT-Essentials Courses Courses 5. What criterion must be followed in the design of an IPv4 addressing scheme for end devices? Each local host should be assigned an IP address with a unique network component. Each IP address must match the address that is assigned to the host by DNS. Each IP address must be unique within the local network. Each IP address needs to be compatible with the MAC address. 6. A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen? AUX SSH Console Telnet 7. Which interface allows remote management of a Layer 2 switch? the switch virtual interface the console port interface the AUX interface the !rst Ethernet port interface 8. What is a result of using the service password-encryption command on a Cisco network device? All passwords in the con!guration are not shown in clear text when viewing the con!guration. The command encrypts the banner message. The command encrypts the enable mode password. A network administrator who later logs into the device will be required to enter an administrator password in order to gain access to the Cisco device. 9. Match the di!nitions to their respective CLI hot keys and shortcuts. Tab -> Completes abbreviated commands and parameters Ctrl-R -> returns directly to the privileged EXEC mode Up Arrow -> scrolls backwards through previously entered commands Ctrl-Z -> cancels any command currently being entered and returns directly to privileged EXEC mode Ctrl-C -> Redisplays, on a new line, the command currently being typed 10. A network administrator is planning an IOS upgrade on several of the head o"ce routers and switches. Which three questions must be answered before continuing with the IOS selection and upgrade? (Choose three.) What models of routers and switches require upgrades? Do the routers and switches have enough RAM and #ash memory for the proposed IOS versions? What ports are installed on the routers and switches? Are the devices on the same LAN? What features are required for the devices? Do the devices have enough NVRAM to store the IOS image? Uncategorized " Cisco Router Switch " Router Setup " Cisco Password Config " Cisco Network Module " Cisco Configuration " Cisco Connect Find us on Facebook CCNA v5 Final Exams 2,647 people like CCNA v5 Final Exams. Facebook social plugin Like Like CCNA5.NET -> CISACAD.COM CCNA5 - CISACAD.COM @myccna Expand New Server CISACAD.COM CCNA5 - CISACAD.COM @myccna 8 Jul 27 Jun Tweets Follow Follow Tweet to @myccna 11. What bene!t does DHCP provide to a network? Hosts can connect to the network and get an IP address without manual con!guration. Duplicate addresses cannot occur on a network that issues dynamic addresses using DHCP and has static assignments. DHCP allows users to refer to locations by a name rather than an IP address. Hosts always have the same IP address and are therefore always reachable. 12. Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.) providing an error message when a wrong command is submitted allowing the user to complete the remainder of an abbreviated command with the TAB key displaying a list of all available commands within the current mode selecting the best command to accomplish a task determining which option, keyword, or argument is available for the entered command 13. A router has a valid operating system and a con!guration stored in NVRAM. When the router boots up, which mode will display? global con!guration mode user EXEC mode setup mode ROM monitor mode 14. Which two features are characteristics of #ash memory? (Choose two.) Flash receives a copy of the IOS from RAM when a device is powered on. Flash provides nonvolatile storage. The contents of #ash may be overwritten. Flash is a component in Cisco switches but not in Cisco routers. The contents of "ash may be lost during a power cycle. 15. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.) boot IOS mode Ethernet interface privileged EXEC mode VTY interface console interface router con!guration mode 16. Why would a Layer 2 switch need an IP address? to enable the switch to send broadcast frames to attached PCs to enable the switch to function as a default gateway to enable the switch to receive frames from attached PCs to enable the switch to be managed remotely 17. What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC? if there is connectivity with the destination device what type of device is at the destination if the TCP/IP stack is functioning on the PC without putting tra#c on the wire the path that tra#c will take to reach the destination 18. What command can be used on a Windows PC to see the IP con!guration of that computer? ping show interfaces show ip interface brief ipcon!g 19. Which statement is true about the running con!guration !le in a Cisco IOS device? Manam January 30, 2014 Reply Answer 9 is wrong. Correct aswer for 9. Match the di!nitions to their respective CLI hot keys and shortcuts. is: The shortcuts with their functions are as follows: It should be deleted using the erase running-con!g command. It is automatically saved when the router reboots. It a$ects the operation of the device immediately when modi!ed. It is stored in NVRAM. 20. Match the description to the common IOS CLI access method. 21. Which two characters are allowed as part of the hostname of a Cisco device? (Choose two.) tab space question mark numbers underline 22. A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly con!gured? Power cycle the device. Enter CTRL-Z at the privileged mode prompt. Exit global con!guration mode. Exit enable mode and press Enter. Reboot the device.
Comments wireless gateway moxa.com The easiest way to access private IP devices. Try it NOW! 55 November 4, 2013 by CCNA5.NET in CCNA 1 v5.0 Routing and Switching ccna 1 chapter 2 exam answers ccna 1 chapter 2 exam answers ccna routing and switching ccna routing and switching ccna v5.0 ccna v5.0 " Router Password " Cisco Exam CCNA " Test Exam " Cisco IOS - Tab Completes the remainder of a partially typed command or keyword - Ctrl-R Redisplays, on a new line, the command currently being typed - Ctrl-Z Exits con!guration mode and returns to the EXEC - Up Arrow Allows user to scroll backward through former commands - Ctrl-C cancels any command currently being entered and returns directly to privileged EXEC mode - Ctrl-Shift-6 Allows the user to interrupt an IOS process such as ping or traceroute Dexter February 3, 2014 Reply There is a mistake at question no.9. Here is the correct di!nitions: Ctrl-R -> Redisplays, on a new line, the command currently being typed Ctrl-Z -> returns directly to the privileged EXEC mode Ctrl-C -> cancels any command currently being entered and returns directly to privileged EXEC mode Chaka April 21, 2014 Reply A network administrator is planning an IOS upgrade on several of the head o#ce routers and switches. Which three questions must be answered before continuing with the IOS selection and upgrade? (Choose three.)Correct Response Your Response Are the devices on the same LAN?Do the devices have enough NVRAM to store the IOS image?What models of routers and switches require upgrades?What ports are installed on the routers and switches?Do the routers and switches have enough RAM and "ash memory for the proposed IOS versions?What features are required for the devices? Nick April 24, 2014 Reply Question 21: Underline aint the right answer. Choose dash instead. Surya Bumi May 5, 2014 Reply thanks for shared this exam.. i had !nish this.. i get excellent score.. Name Email four + 1 = Comment Add Comment Add Comment CCNA5.NET CCNA5.NET HOME HOME CCNA v5.0 CCNA v5.0 CCNA Security CCNA Security IT-Essentials IT-Essentials Courses Courses CCNA5.NET CCNA5.NET HOME HOME CCNA v5.0 CCNA v5.0 CCNA Security CCNA Security IT-Essentials IT-Essentials Courses Courses 1. Where ls lL necessary Lo use half duplex Lransmlsslon? Cn a shared medlum where CSMA/Cu ls used
2. WhaL ls necessary for a swlLch Lo forward a frame only Lo Lhe lnLended desLlnaLlon? 1he desLlnaLlon MAC address musL be ln Lhe swlLch's MAC address Lable
3. A hub ln an LLherneL neLwork ls replaced wlLh a swlLch. 1hls wlll:. lncrease Lhe number of colllslon domalns
4. Whlch funcLlon ls carrled ouL by a layer 3 swlLch buL noL by a layer 2 swlLch? uslng l addresses Lo rouLe packeLs Lo Lhelr desLlnaLlons
3. Why ls shared memory bufferlng preferred Lo porL based bufferlng? All of Lhe above
6. ln Lhe CLl, presslng Lhe up arrow key wlll: Show Lhe mosL recenL enLry ln Lhe command hlsLory
7. WhaL ls sLored ln nv8AM? SLarLup conflguraLlon
8. Whlch command speclfles LhaL access Lo Lhe web based lnLerface uses Lhe same password as prlvlleged exec mode lp hLLp auLhenLlcaLlon enable
9. Where should a swlLch l address and subneL mask be conflgured? Cn a vLAn lnLerface
10. WhaL ls sLored ln nv8AM ln a Clsco rouLer SLarLup conflg
11. WhaL happens Lo Lhe conLenL of nv8AM when a Clsco rouLer ls Lurned off ConLenLs remaln
12. ls 8CM monlLor mode and whaL ls lL commonly used for Allows access Lo Lhe 8CM sLarLup code whlch provldes a slmple LexL lnLerface and very llmlLed funcLlonallLy used mosL ofLen for password recovery
13. lf Lhe lCS does noL flnd a conflg flle ln nv8AM where does lL look. lf no lCS flle can be locaLed whaL does lL do. 1he lCS searches for a 1l1 server. lf no 1l1 server found Lhe seLup dlalog ls lnlLlaLed
14. WhaL command can be used Lo verlfy Lhe conflguraLlon reglsLer value Show verslon
13. ln Lhe command lCS fllename c3600-d-mz.122-16a.bln, whaL does Lhe 122-16a represenL lCS verslon number
16. WhaL command would be used Lo download a sLarLup conflg flle Lo a LfLp server Copy SLarL LfLp
17. WhaL rouLer conflguraLlon command ls equlvalenL Lo cLrl-z Lnd
18. WhaL are Lhe dlfferences beLween dynamlc rouLlng and sLaLlc rouLlng !"#$%&' )*+,&#- lnformaLlon ls learned from oLher rouLers 8ouLlng proLocols ad[usL rouLes auLomaLlcally (dynamlcally).
.,$,&' )*+,&#- neLwork admlnlsLraLor conflgures lnformaLlon abouL remoLe neLworks manually. 1hey are used Lo reduce overhead and for securlLy 8ecause of exLra admlnlsLraLlve requlremenLs, sLaLlc rouLlng do noL have Lhe scalablllLy of dynamlc rouLlng.
19. WhaL are Lhe Lwo ways Lo speclfy Lhe nexL hop ln an lp rouLe command 1he ouLgolng lnLerface, or 1he nexL hop l address of Lhe ad[acenL rouLer
20. lf Lwo rouLlng proLocol updaLes have been recelved and have Lhe same meLrlc, whaL may make Lhe rouLlng proLocol selecL one updaLe over Lhe oLher. A lower admlnlsLraLlve dlsLance
21. WhaL command ls used Lo vlew Lhe rouLlng Lable Show lp rouLe
22. WhaL are Lhe feaLures of a dlsLance vecLor rouLlng proLocol LhaL make lL dlsLlncL from llnk sLaLe rouLlng proLocols 1yplcally malnLaln only nexL hop and hop counL Lo a desLlnaLlon and do noL sLore lnLermedlaLe nodes and llnk sLaLe asses compleLe rouLlng Lables Lo nelghbours 8ouLlng Lables are exchanged perlodlcally
23. Where ls a border gaLeway proLocol such as 8C used 1yplcally used beLween lSs or beLween a company and an lS Lo rouLe beLween auLonomous sysLems
24. lf you saw Lhe show command response - Serlal0 ls up, llne proLocol ls down - whaL would be Lhe mosL llkely problem Layer 2 problem such as mlsmaLched layer 2 WAn proLocol
23. 1he plng command operaLes aL whlch layer of Lhe CSl model Layer 3
26. WhaL ls a show command uslng a proprleLary Clsco proLocol LhaL can be used Lo faulL flnd aL layer 2 Show Cu nelghbours
27. WhaL ls Lhe counL Lo lnflnlLy problem and whaL mechanlsms do rouLlng proLocols employ Lo address lL 1he rouLlng proLocol permlLs Lhe rouLlng updaLe Lo propagaLe (loop) unLll Lhe meLrlc exceeds lLs maxlmum allowed value. lL ls addressed by seLLlng a flnlLe llmlL for lnflnlLy l.e Lhe 11L or by uslng holddown Llmers
28. WhaL ls spllL horlzon used for and how does lL work. WhaL Lype of rouLlng proLocols use spllL horlzon. Pelps prevenL rouLlng loops rohlblLs a rouLer from adverLlslng a rouLe back onLo Lhe lnLerface from whlch lL was learned Lo ensure LhaL a rouLlng loop does noL occur. used by dlsLance vecLor rouLlng proLocols
29. WhaL ls Lhe updaLe Llme and maxlmum hops for 8l 30 sec 13 hops
30. ln Lhe above rouLer response above whaL does 192.168.3.0/24 refer Lo uesLlnaLlon neLwork
31. ln Lhe command - rouLer lgrp 101 - whaL does Lhe 101 refer Lo AuLonomous sysLem number
32. WhaL are Lwo funcLlons of an ACL ACLs enable managemenL of Lrafflc Secure access Lo and from a neLwork
33. WhaL ls Lhe dlfference beLween a sLandard and exLended ACL SLandard ACL speclfles only Lhe source l address LxLended ACLs can fllLer Lrafflc based on source l, desLlnaLlon l, proLocol (l, 1C, uu and lCM) and porL number
34. ln whaL order are ACL sLaLemenLs checked ACL sLaLemenLs operaLe ln sequenLlal, loglcal order, from Lop Lo boLLom.
33. WhaL musL be done lf addlLlonal condlLlon sLaLemenLs are needed ln an access llsL LhaL ls noL a named access llsL 1he enLlre ACL musL be deleLed and recreaLed wlLh Lhe new condlLlon sLaLemenLs
36. WhaL ls Lhe effecL of servlce password-encrypLlon command? lL applles weak encrypLlon Lo passwords LhaL are plaln LexL by defaulL.
37. Whlch of Lhese wlll noL produce Lhe message AuLhorlsed users Cnly ? 8anner moLd lAuLhorlsed users Cnlyl
38. A swlLch porL ls noL ln use. Why should you conflgure lL wlLh Lhe shuLdown command? lor securlLy
39. Why ls SSP a beLLer opLlon Lhan 1elneL for remoLe access Lo a swlLch? Messages are senL ln encrypLed form.
40. Whlch command would allow you Lo use elLher SSP or 1elneL? 1ransporL lnpuL all on Lhe vLy llnes
41. Whlch ls Lrue of Lhe password recovery process? lL can be dlfferenL on dlfferenL models of swlLch
42. Whlch Lype of secure addresses are losL when a swlLch rebooLs? uynamlc
43. 8y defaulL, whaL happens lf Lhere ls a swlLch porL securlLy vlolaLlon? 1he porL shuLs down and sends a syslog message 44. Whlch command ls needed before securlLy ls seL on a swlLch porL? SwlLchporL mode access
.+/#0,,&#- Conslder Lhe neLwork above wlLh branch offlces aL each locaLlon wlLh Lhe number of hosLs as speclfled. SelecL a "#$%&' '%()) * +,-./01 (220,)) and subneL Lhe neLwork for all LAns and WAn connecLlons assumlng Lhe use of subneL 0. CalculaLe Lhe LAn subneLs wlLh subneL masks and allocaLe a subneL Lo each slLe CalculaLe Lhe WAn subneLs wlLh subneL masks LlsL Lhe spare subneLs wlLh subneL masks.
4ROUTING CCNA 1 v5, CCNA 2 v5, CCNA 3 v5, CCNA 4 v5 Routing and Switching Exams Answers v5 2013- 2014, IT Essentials v5 Exam Answers CCNA 2 Chapter 2 v5 Routing and Switching Essentials Exam CCNA 2 Chapter 2 v5.0 Exam Answers Routing and Switching Essentials Basic Switching Concepts and Conguration 2013/2014 CISCO CCNA Questions and Answers v5 Quiz TEST (Version 5.0) Chapter 2 Exam This exam will cover material from Chapter 2 of the CCNA R&S Routing and Switching Essentials curriculum. 1. Which interface is the default location that would contain the IP address used to manage a 24-port Ethernet switch? interface connected to the default gateway Fa0/1 VLAN 99 Fa0/0 VLAN 1 _______________________________________________________________ 2. Which three statements are true about using full-duplex Fast Ethernet? (Choose three.) Performance is improved because the collision detect function is disabled on the device. Performance is improved because the NIC is able to detect collisions. Full- duplex Fast Ethernet oers 100 percent eciency in both directions. Nodes operate in full-duplex with unidirectional data ow. Performance is improved with bidirectional data ow. Latency is reduced because the NIC processes frames faster. _______________________________________________________________ 3 What impact does the use of the mdix auto conguration command have on an Ethernet interface on a switch? automatically detects interface speed automatically assigns the rst detected MAC address to an interface automatically detects duplex settings automatically detects copper cable type _______________________________________________________________ 4. Which type of cable does a network administrator need to connect a PC to a switch to recover it after the Cisco IOS software fails to load? a coaxial cable a crossover cable a console cable a straight-through cable _______________________________________________________________ 5 While troubleshooting a connectivity problem, a network administrator notices that a switch port status LED is alternating between green and amber. What could this LED indicate? The port has an active link with normal trac activity. The port is administratively down. The port is experiencing errors. The port has no link. A PC is using the wrong cable to connect to the port. ________________________________________________________________ 6 A production switch is reloaded and nishes with a Switch> prompt. What two facts can be determined? (Choose two.) The boot process was interrupted. There is not enough RAM or ash on this router. A full version of the Cisco IOS was located and loaded. POST occurred normally. The switch did not locate the Cisco IOS in ash, so it defaulted to ROM. _________________________________________________________________ 7 Which command displays information about the auto-MDIX setting for a specic interface?? show running-cong show controllers show processes show interfaces ________________________________________________________________ 8. Refer to the exhibit. What media issue might exist on the link connected to Fa0/1 based on the show interface command? The interface might be congured as half-duplex. There could be too much electrical interference and noise on the link. There could be an issue with a faulty NIC. The cable attaching the host to port Fa0/1 might be too long. The bandwidth parameter on the interface might be too high. _________________________________________________________________ 9. Refer to the exhibit. The network administrator wants to congure Switch1 to allow SSH connections and prohibit Telnet connections. How should the network administrator change the displayed conguration to satisfy the requirement? Use SSH version 1. Recongure the RSA key. Congure SSH on a dierent line. Modify the transport input command. ____________________________________________________________________ 10 Which protocol or service sends broadcasts containing the Cisco IOS software version of the sending device, and the packets of which can be captured by malicious hosts on the network? DHCP SSH DNS CDP ____________________________________________________________________ 11 In which type of attack does a malicious node request all available IP addresses in the address pool of a DHCP server in order to prevent legitimate hosts from obtaining network access?? DHCP snooping MAC address ooding CAM table overow DHCP starvation _________________________________________________________________ 12 Which method would mitigate a MAC address ooding attack? using ACLs to lter broadcast trac on the switch? increasing the speed of switch ports increasing the size of the CAM table conguring port security _____________________________________ 13 Which two basic functions are performed by network security tools? (Choose two.) simulating attacks against the production network to determine any existing vulnerabilities writing a security policy document for protecting networks educating employees about social engineering attacks revealing the type of information an attacker is able to gather from monitoring network trac controlling physical access to user devices _______________________________________ 14 Which action will bring an error-disabled switch port back to an operational state? Issue the switchport mode access command on the interface. Issue the shutdown and then no shutdown interface commands. Remove and recongure port security on the interface. Clear the MAC address table on the switch. __________________________________________________________________ 15. Refer to the exhibit. Which S1 switch port interface or interfaces should be congured with the ip dhcp snooping trust command if best practices are implemented? only the G0/2, G0/3, and G0/4 ports only the G0/1 and G0/24 ports only the G0/1, G0/2, G0/3, and G0/4 ports only unused ports only the G0/1 port _____________________________________ 16. Refer to the exhibit. Port Fa0/2 has already been congured appropriately. The IP phone and PC work properly. Which switch conguration would be most appropriate for port Fa0/2 if the network administrator has the following goals? No one is allowed to disconnect the IP phone or the PC and connect some other wired device. If a dierent device is connected, port Fa0/2 is shut down. The switch should automatically detect the MAC address of the IP phone and the PC and add those addresses to the running conguration. SWA(cong-if)# switchport port-security mac-address sticky SWA(cong-if)# switchport port-security maximum 2 SWA(cong-if)# switchport port-security SWA(cong-if)# switchport port-security maximum 2 SWA(cong-if)# switchport port-security mac-address sticky SWA(cong-if)# switchport port-security violation restrict SWA(cong-if)# switchport port-security SWA(cong-if)# switchport port-security mac-address sticky SWA(cong- if)# switchport port- security SWA(cong- if)# switchport port- security maximum 2 SWA(cong- if)# switchport port- security mac- address sticky _______________________________________________________________ 17. Refer to the exhibit. What can be determined about port security from the information that is shown? The port has been shut down. The port has the maximum number of MAC addresses that is supported by a Layer 2 switch port which is congured for port security. The port violation mode is the default for any port that has port security enabled. The port has two attached devices. _______________________________________________________________ 18. Refer to the exhibit. Which event will take place if there is a port security violation on switch S1 interface Fa0/1? The interface will go into error-disabled state. Packets with unknown source addresses will be dropped. A syslog message is logged. A notication is sent. _______________________________________________________________ 19 The network administrator enters the following commands on a Cisco switch: Switch(cong)# interface vlan1 Switch(cong-if)# ip address 192.168.1.2 255.255.255.0 Switch(cong-if)# no shutdown What is the eect of entering these commands? All devices attached to this switch must be in the 192.168.1.0/24 subnet to communicate. The address of the default gateway for this LAN is 192.168.1.2/24. Users on the 192.168.1.0/24 subnet are able to ping the switch at IP address 192.168.1.2. The switch is able to forward frames to remote networks. ________________________________________ 20 Which two statements are true regarding switch port security? (Choose two.) The three congurable violation modes all require user intervention to re-enable ports. The three congurable violation modes all log violations via SNMP. After entering the sticky parameter, only MAC addresses subsequently learned are converted to secure MAC addresses. If fewer than the maximum number of MAC addresses for a port are congured statically, dynamically learned addresses are added to CAM until the maximum number is reached. Dynamically learned secure MAC addresses are lost when the switch reboots. _______________________________________________________________ 21 Fill in the blank. Full- duplex communication allows both ends of a connection to transmit and receive data simultaneously. _______________________________ 22 Fill in the blank. When port security is enabled, a switch port uses the default violation mode of shutdown until specically congured to use a dierent violation mode. ________________________________ 23 MATCHING Step 1. Execute POST Step 2. Load the boot loader from ROM Step 3. CPU register initilizations Step 4. ash le system initialization Step 5. Load the IOS Step 6. Transfer switch control to the IOS _______________________________________ 24. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Fill in the blank. Do not use abbreviations.What is the missing command on S1? ip address 192.168.99.2 255.255.255.0 25. Fill in the blank. When port security is enabled, a switch port uses the default violation mode of until specically congured to use a dierent violation mode. shutdown If no violation mode is specied when port security is enabled on a switch port, then the security violation mode defaults to shutdown. CCNA 2 Chapter 2 v5 Routing and Switching Essentials Exam answers, CCNA 2 RSE answers 2014 Category: CCNA 2 Routing and Switching Essentials v5 Tags: ccna 2 ch 2 v5 answers , ccna 2 ch 2 v5 exam answers , CCNA 2 Chapter 2 v5 RSE 2014, ccna 2 v5 chapter 2, cisco ccna answers v5 !!"#$ !&'()*+ , -+'.)/.* 0*1) #213*+1