Sei sulla pagina 1di 35

1

A network administrator is determining the best placement of VLAN trunk links. Which two types of point-to-point
connections utilize VLAN trunking? (Choose two.)
between two switches that share a common VLAN
between a switch and a server that has an 802.1Q NIC*
between a switch and a client PC
between a switch and a network printer
between two switches that utilize multiple VLANs*
2
What happens to a port that is associated with VLAN 10 when the administrator deletes VLAN 10 from the switch?
The port automatically associates itself with the native VLAN.
The port creates the VLAN again.
The port goes back to the default VLAN.
The port becomes inactive.*
3

Refer to the exhibit. Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to another switch. All other ports are unused.
Which security best practice did the administrator forget to configure?
Configure all unused ports to a black-hole VLAN that is not used for anything on the network.
Disable autonegotiation and set ports to either static access or static trunk.
Change the native VLAN to a fixed VLAN that is distinct from all user VLANs and to a VLAN number that is not VLAN 1.
All user ports are associated with VLANs distinct from VLAN 1 and distinct from the black-hole VLAN.*
4
Which command is used to remove only VLAN 20 from a switch?
no switchport access vlan 20
delete flash:vlan.dat
no vlan 20*
delete vlan.dat
5
A Cisco Catalyst switch has been added to support the use of multiple VLANs as part of an enterprise network. The network
technician finds it necessary to clear all VLAN information from the switch in order to incorporate a new network design.
What should the technician do to accomplish this task?
Erase the startup configuration and reboot the switch.
Erase the running configuration and reboot the switch.
Delete the startup configuration and the vlan.dat file in the flash memory of the switch and reboot the switch.*
Delete the IP address that is assigned to the management VLAN and reboot the switch.
6
What is the effect of issuing a switchport access vlan 20 command on the Fa0/18 port of a switch that does not have this
VLAN in the VLAN database?
VLAN 20 will be created automatically.*
The command will have no effect on the switch.
Port Fa0/18 will be shut down.

An error stating that VLAN 20 does not exist will be displayed and VLAN 20 is not created.
7
Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface?
show mac address-table interface Fa0/1
show interfaces Fa0/1 switchport*
show interfaces trunk
show vlan brief
8

Place the options in the following order:


not scored
dynamic auto
nonegotiate
dynamic desirable
trunk
9
Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport access vlan 30 is entered on the Fa0/11
interface, what will happen?
Port Fa0/11 will be returned to VLAN 1.*
VLAN 30 will be deleted.
An error message would be displayed.
Port Fa0/11 will be shutdown.
10
What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3?
Enter the no vlan 2 and the vlan 3 commands in global configuration mode.
Enter the switchport trunk native vlan 3 command in interface configuration mode.
Enter the switchport access vlan 3 command in interface configuration mode.*
Enter the no shutdown in interface configuration mode to return it to the default configuration and then configure the
port for VLAN 3.
11
Which two Layer 2 security best practices would help prevent VLAN hopping attacks? (Choose two.)
Disable DTP autonegotiation on end-user ports.*
Change the management VLAN to a distinct VLAN that is not accessible by regular users.
Statically configure all ports that connect to end-user host devices to be in trunk mode.
Change the native VLAN number to one that is distinct from all user VLANs and is not VLAN 1.*
Use SSH for all remote management access.
12
In a basic VLAN hopping attack, which switch feature do attackers take advantage of?
automatic encapsulation negotiation
the default automatic trunking configuration*
an open Telnet connection
forwarding of broadcasts
13
A Cisco switch currently allows traffic tagged with VLANs 10 and 20 across trunk port Fa0/5. What is the effect of issuing a
switchport trunk allowed vlan 30 command on Fa0/5?
It allows only VLAN 30 on Fa0/5.*
It allows a native VLAN of 30 to be implemented on Fa0/5.
It allows VLANs 1 to 30 on Fa0/5.
It allows VLANs 10, 20, and 30 on Fa0/5.

14

Refer to the exhibit. A frame is traveling between PC-A and PC-B through the switch. Which statement is true concerning
VLAN tagging of the frame?
No VLAN tag is added to the frame.*
A VLAN tag is added when the frame is accepted by the switch.
A VLAN tag is added when the frame is forwarded out the port to PC-B.
A VLAN tag is added when the frame leaves PC-A.
15

Refer to the exhibit. PC-A and PC-B are both in VLAN 60. PC-A is unable to communicate with PC-B. What is the problem?
The native VLAN is being pruned from the link.
The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk.*
The trunk has been configured with the switchport nonegotiate command.
The native VLAN should be VLAN 60.
16
What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?
All VLANs will be allowed across the trunk.*
Only the native VLAN will be allowed across the trunk.
The switches will negotiate via VTP which VLANs to allow across the trunk.
Only VLAN 1 will be allowed across the trunk.
17
Under which two occasions should an administrator disable DTP while managing a local area network? (Choose two.)
on links that should not be trunking*
when connecting a Cisco switch to a non-Cisco switch*
on links that should dynamically attempt trunking
when a neighbor switch uses a DTP mode of dynamic auto
when a neighbor switch uses a DTP mode of dynamic desirable
18

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
Which PCs will receive the broadcast sent by PC-C?
PC-D, PC-E*
PC-A, PC-B, PC-D, PC-E
PC-A, PC-B
PC-A, PC-B, PC-D, PC-E, PC-F
PC-A, PC-B, PC-E
19
Which two statements are true about VLAN implementation? (Choose two.)
The network load increases significantly because of added trunking information.
Devices in one VLAN do not hear the broadcasts from devices in another VLAN.*
The size of the collision domain is reduced.
VLANs logically group hosts, regardless of physical location.*
The number of required switches in a network decreases.
20

Refer to the exhibit. DLS1 is connected to another switch, DLS2, via a trunk link. A host that is connected to DLS1 is not able
to communicate to a host that is connected to DLS2, even though they are both in VLAN 99. Which command should be
added to Fa0/1 on DLS1 to correct the problem?
switchport trunk allowed vlan add 99
switchport trunk native vlan 66*
switchport mode dynamic auto
switchport nonegotiate
21
Which switch feature ensures that no unicast, multicast, or broadcast traffic is passed between ports that are configured
with this feature?
switch port security
PVLAN protected port*
ACL
VLAN
22
Fill in the blank. Use the full command syntax.
The show vlan brief command displays the VLAN assignment for all ports as well as the existing VLANs on the switch.
23
Which three statements accurately describe VLAN types? (Choose three).
An 802.1Q trunk port, with a native VLAN assigned, supports both tagged and untagged traffic.*
A management VLAN is any VLAN that is configured to access management features of the switch.*

A data VLAN is used to carry VLAN management data and user-generated traffic.
Voice VLANs are used to support user phone and e-mail traffic on a network.
VLAN 1 is always used as the management VLAN.
After the initial boot of an unconfigured switch, all ports are members of the default VLAN.*
24
Which command should the network administrator implement to prevent the transfer of DTP frames between a Cisco switch
and a non-Cisco switch?
S1(config-if)# switchport mode trunk
S1(config-if)# switchport mode access
S1(config-if)# switchport nonegotiate*
S1(config-if)# switchport mode dynamic desirable
S1(config-if)# switchport trunk allowed vlan none
NEW QUESTION
25 Which combination of DTP modes set on adjacent Cisco switches will cause the link to become an access link instead of a
trunk link?
dynamic auto dynamic auto*
dynamic desirable dynamic desirable
dynamic desirable trunk
dynamic desirable dynamic auto
1. Which statement is true when VTP is configured on a switched network that incorporates VLANs?
VTP is only compatible with the 802.1Q standard.
VTP adds to the complexity of managing a switched network.
VTP allows a switch to be configured to belong to more than one VTP domain.
VTP dynamically communicates VLAN changes to all switches in the same VTP domain.
2.

Refer to the exhibit. What information can be learned from the output provided?
It verifies the configured VTP password.
It verifies the VTP domain is configured to use VTP version 2.
It verifies VTP advertisements are being exchanged.
It verifies the VTP domain name is V1.
3.

Refer to the exhibit. Which two facts can be confirmed by this output? (Choose two.)
If this switch is added to an established network, the other VTP-enabled switches in the same VTP domain will consider
their own VLAN information to be more recent than the VLAN information advertised by this switch.

This switch shows no configuration revision errors.


This switch has established two-way communication with the neighboring devices.
This switch is configured to advertise its VLAN configuration to other VTP-enabled switches in the same VTP domain.
This switch is configured to allows the network manager to maximize bandwidth by restricting traffic to specific network
devices.
4. A network administrator is replacing a failed switch with a switch that was previously on the network. What
precautionary step should the administrator take on the replacement switch to avoid incorrect VLAN information from
propagating through the network?
Enable VTP pruning.
Change the VTP domain name.
Change the VTP mode to client.
Change all the interfaces on the switch to access ports.
5. Which two statements are true about VTP pruning? (Choose two.)
Pruning is enabled by default.
Pruning can only be configured on VTP servers.
Pruning must be configured on all VTP servers in the domain.
VLANs on VTP client-mode switches will not be pruned.
Pruning will prevent unnecessary flooding of broadcasts across trunks.
6. What are two features of VTP client mode operation? (Choose two.)
unable to add VLANs
can add VLANs of local significance
forward broadcasts out all ports with no respect to VLAN information
can only pass VLAN management information without adopting changes
can forward VLAN information to other switches in the same VTP domain
7. What does a client mode switch in a VTP management domain do when it receives a summary advertisement with a
revision number higher than its current revision number?
It suspends forwarding until a subset advertisement update arrives.
It issues an advertisement request for new VLAN information.
It increments the revision number and forwards it to other switches.
It deletes the VLANs not included in the summary advertisement.
It issues summary advertisements to advise other switches of status changes.
8.

Refer to the exhibit. Switch1 is not participating in the VTP management process with the other switches that are shown in
the exhibit. What are two possible explanations for this? (Choose two.)
Switch1 is in client mode.
Switch2 is in server mode.
Switch2 is in transparent mode.
Switch1 is in a different management domain.
Switch1 has end devices that are connected to the ports.
Switch1 is using VTP version 1, and Switch2 is using VTP version 2.
9.

Refer to the exhibit. All switches in the network participate in the same VTP domain. What happens when the new switch
SW2 with a default configuration and revision number of 0 is inserted in the existing VTP domain Lab_Network?
The switch operates as a VTP client.
The switch operates in VTP transparent mode.
The switch operates as a VTP server and deletes the existing VLAN configuration in the domain.
The switch operates as a VTP server, but does not impact the existing VLAN configuration in the domain.
The switch operates as a VTP server in the default VTP domain and does not affect the configuration in the existing VTP
domain.
10.

Refer to the exhibit. Switches SW1 and SW2 are interconnected via a trunk link but failed to exchange VLAN information.
The network administrator issued the show vtp status command to troubleshoot the problem. On the basis of the
provided command output, what could be done to correct the problem?
Switch SW2 must be configured as a VTP client.
The switches must be interconnected via an access link.
The switches must be configured with the same VTP domain name.
Both switches must be configured with the same VTP revision number.
11. Which two statements describe VTP transparent mode operation? (Choose two.)
Transparent mode switches can create VLAN management information.
Transparent mode switches can add VLANs of local significance only.
Transparent mode switches pass any VLAN management information that they receive to other switches.
Transparent mode switches can adopt VLAN management changes that are received from other switches.
Transparent mode switches originate updates about the status of their VLANS and inform other switches about that
status.
12.

Refer to the exhibit. All switches in the VTP domain are new. Switch SW1 is configured as a VTP server, switches SW2 and
SW4 are configured as VTP clients, and switch SW3 is configured in VTP transparent mode. Which switch or switches
receive VTP updates and synchronize their VLAN configuration based on those updates?
All switches receive updates and synchronize VLAN information.
Only switch SW2 receives updates and synchronizes VLAN information.
Only switches SW3 and SW4 receive updates and synchronize VLAN information.
SW3 and SW4 receive updates, but only switch SW4 synchronizes VLAN information.
13.

Refer to the exhibit. Switch S1 is in VTP server mode. Switches S2 and S3 are in client mode. An administrator accidentally
disconnects the cable from F0/1 on S2. What will the effect be on S2?
S2 will retain the VLANs as of the latest known revision.
S2 will automatically transition to VTP transparent mode.
S2 will remove all VLANs from the VLAN database until the cable is reconnected.
S2 will automatically send a VTP request advertisement to 172.17.99.11 when the cable is reconnected.
14. What causes a VTP configured switch to issue a summary advertisement?
A five-minute update timer has elapsed.
A port on the switch has been shutdown.
The switch is changed to the transparent mode.
A new host has been attached to a switch in the management domain.
15. How are VTP messages sent between switches in a domain?
Layer 2 broadcast
Layer 2 multicast
Layer 2 unicast
Layer 3 broadcast
Layer 3 multicast
Layer 3 unicast

16.

Refer to the exhibit. The switches in the exhibit are connected with trunks within the same VTP management domain.
Each switch is labeled with its VTP mode. A new VLAN is added to Switch3. This VLAN does not show up on the other
switches. What is the reason for this?
VLANs cannot be created on transparent mode switches.
Transparent mode switches do not forward VTP advertisements.
VLANs created on transparent mode switches are not included in VTP advertisements.
Server mode switches neither listen to nor forward VTP messages from transparent mode switches.
17. Which two statements are true about the implementation of VTP? (Choose two.)
Switches must be connected via trunks.
The VTP domain name is case sensitive.
Transparent mode switches cannot be configured with new VLANs.
The VTP password is mandatory and case sensitive.
Switches that use VTP must have the same switch name.
18. Which three VTP parameters must be identical on all switches to participate in the same VTP domain? (Choose three.)
revision number
domain name
pruning
mode
domain password
version number
19. What statement describes the default propagation of VLANs on a trunked link?
only the native VLAN
VLANs 1 to 1005
only VLAN 1
all VLANs
no VLANs
20.

Refer to the exhibit. S2 was previously used in a lab environment and has been added to the production network in server
mode. The lab and production networks use the same VTP domain name, so the network administrator made no
configuration changes to S2 before adding it to the production network. The lab domain has a higher revision number.
After S2 was added to the production network, many computers lost network connectivity. What will solve the problem?
Reset the revision number on S2 with either the delete VTP command or by changing the domain name and then changing
it back.
Re-enter all appropriate VLANs, except VLAN 1, manually on Switch1 so that they propagate throughout the network.
Change S1 to transparent VTP mode to reclaim all VLANs in vlan.dat and change back to server mode.
Change S2 to client mode so the VLANs will automatically propagate.
1.

Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2 and assigned hosts on the
IP addresses of the VLAN in the 10.1.50.0/24 subnet range. Computer A can communicate with computer B, but not with
computer C or computer D. What is the most likely cause of this problem?
There is a native VLAN mismatch.
The link between Switch1 and Switch2 is up but not trunked.
The router is not properly configured for inter-VLAN routing.
VLAN 50 is not allowed to entering the trunk between Switch1 and Switch2.
2.

Refer to the exhibit. The exhibited configurations do not allow the switches to form a trunk. What is the most likely cause
of this problem?
Cisco switches only support the ISL trunking protocol.
The trunk cannot be negotiated with both ends set to auto.
By default, Switch1 will only allow VLAN 5 across the link.
A common native VLAN should have been configured on the switches.
3.

Refer to the exhibit. Which two conclusions can be drawn regarding the switch that produced the output shown? (Choose
two.)
The network administrator configured VLANs 1002-1005.
The VLANs are in the active state and are in the process of negotiating configuration parameters.
A FDDI trunk has been configured on this switch.
The command switchport access vlan 20 was entered in interface configuration mode for Fast Ethernet interface 0/1.
Devices attached to ports fa0/5 through fa0/8 cannot communicate with devices attached to ports fa0/9 through fa0/12
without the use of a Layer 3 device.
4. What statements describe how hosts on VLANs communicate?
Hosts on different VLANs use VTP to negotiate a trunk.
Hosts on different VLANs communicate through routers.
Hosts on different VLANs should be in the same IP network.
Hosts on different VLANs examine VLAN ID in the frame tagging to determine if the frame for their network.
5. Switch port fa0/1 was manually configured as a trunk, but now it will be used to connect a host to the network. How
should the network administrator reconfigure switch port Fa0/1?
Disable DTP.
Delete any VLANs currently being trunked through port Fa0/1.
Administratively shut down and re-enable the interface to return it to default.
Enter the switchport mode access command in interface configuration mode.

6.

Refer to the exhibit. SW1 and SW2 are new switches being installed in the topology shown in the exhibit. Interface Fa0/1
on switch SW1 has been configured with trunk mode on. Which statement is true about forming a trunk link between
the switches SW1 and SW2?
Interface Fa0/2 on switch SW2 will negotiate to become a trunk link if it supports DTP.
Interface Fa0/2 on switch SW2 can only become a trunk link if statically configured as a trunk.
Interface Fa0/1 converts the neighboring link on the adjacent switch into a trunk link if the neighboring interface is
configured in nonegotiate mode.
Interface Fa0/1 converts the neighboring link on the adjacent switch into a trunk link automatically with no consideration
of the configuration on the neighboring interface.
7. The network administrator wants to separate hosts in Building A into two VLANs numbered 20 and 30. Which two
statements are true concerning VLAN configuration? (Choose two.)
The VLANs may be named.
VLAN information is saved in the startup configuration.
Non-default VLANs created manually must use the extended range VLAN numbers.
The network administrator may create the VLANs in either global configuration mode or VLAN database mode.
Both VLANs may be named BUILDING_A to distinguish them from other VLANs in different geographical locations.
8. What is a valid consideration for planning VLAN traffic across multiple switches?
Configuring interswitch connections as trunks will cause all hosts on any VLAN to receive broadcasts from the other
VLANs.
A trunk connection is affected by broadcast storms on any particular VLAN that is carried by that trunk.
Restricting trunk connections between switches to a single VLAN will improve efficiency of port usage.
Carrying all required VLANs on a single access port will ensure proper traffic separation.
9. What are two characteristics of VLAN1 in a default switch configuration? (Choose two.)
VLAN1 should renamed.
VLAN 1 is the management VLAN.
All switch ports are members of VLAN1.
Only switch port 0/1 is assigned to VLAN1.
Links between switches must be members of VLAN1.
10.

Refer to the exhibit. Which statement is true concerning interface Fa0/5?


The default native VLAN is being used.
The trunking mode is set to auto.
Trunking can occur with non-Cisco switches.
VLAN information about the interface encapsulates the Ethernet frames.
11. What statement about the 802.1q trunking protocol is true?
802.1q is Cisco proprietary.
802.1q frames are mapped to VLANs by MAC address.
802.1q does NOT require the FCS of the original frame to be recalculated.
802.1q will not perform operations on frames that are forwarded out access ports.
12. What is the effect of the switchport mode dynamic desirable command?
DTP cannot negotiate the trunk since the native VLAN is not the default VLAN.
The remote connected interface cannot negotiate a trunk unless it is also configured as dynamic desirable.
The connected devices dynamically determine when data for multiple VLANs must be transmitted across the link and bring
the trunk up as needed.
A trunk link is formed if the remote connected device is configured with the switchport mode dynamic auto or switchport
mode trunk commands.
13. A network administrator is removing several VLANs from a switch. When the administrator enters the no vlan 1
command, an error is received. Why did this command generate an error?
VLAN 1 can never be deleted.
VLAN 1 can only be deleted by deleting the vlan.dat file.
VLAN 1 can not be deleted until all ports have been removed from it.
VLAN 1 can not be deleted until another VLAN has been assigned its responsibilities.
14.

Refer to the exhibit. Company HR is adding PC4, a specialized application workstation, to a new company office. The
company will add a switch, S3, connected via a trunk link to S2, another switch. For security reasons the new PC will reside
in the HR VLAN, VLAN 10. The new office will use the 172.17.11.0/24 subnet. After installation, users on PC1 are unable to
access shares on PC4. What is the likely cause?
The switch to switch connection must be configured as an access port to permit access to VLAN 10 on S3.

The new PC is on a different subnet so Fa0/2 on S3 must be configured as a trunk port.


PC4 must use the same subnet as PC1.
A single VLAN cannot span multiple switches.
15.

Refer to the exhibit. Computer 1 sends a frame to computer 4. On which links along the path between computer 1 and
computer 4 will a VLAN ID tag be included with the frame?
A
A, B
A, B, D, G
A, D, F
C, E
C, E, F
16.

Refer to the exhibit. Computer B is unable to communicate with computer D. What is the most likely cause of this
problem?
The link between the switches is up but not trunked.
VLAN 3 is not an allowed VLAN to enter the trunk between the switches.
The router is not properly configured to route traffic between the VLANs.
Computer D does not have a proper address for the VLAN 3 address space.
17. What happens to the member ports of a VLAN when the VLAN is deleted?
The ports cannot communicate with other ports.
The ports default back to the management VLAN.
The ports automatically become a part of VLAN1.
The ports remain a part of that VLAN until the switch is rebooted. They then become members of the management VLAN.
18. Which two statements describe the benefits of VLANs? (Choose two.)
VLANs improve network performance by regulating flow control and window size.
VLANs enable switches to route packets to remote networks via VLAN ID filtering.
VLANs reduce network cost by reducing the number of physical ports required on switches.
VLANs improve network security by isolating users that have access to sensitive data and applications.
VLANs divide a network into smaller logical networks, resulting in lower susceptibility to broadcast storms.

19. What switch port modes will allow a switch to successfully form a trunking link if the neighboring switch port is in
"dynamic desirable" mode?
dynamic desirable mode
on or dynamic desirable mode
on, auto, or dynamic desirable mode
on, auto, dynamic desirable, or nonegotiate mode
20. What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3?
Enter the no vlan 2 and the vlan 3 commands in global configuration mode.
Enter the switchport access vlan 3 command in interface configuration mode.
Enter the switchport trunk native vlan 3 command in interface configuration mode.
Enter the no shutdown in interface configuration mode to return it to the default configuration and then configure the
port for VLAN 3.
21.

Refer to the exhibit. How far is a broadcast frame that is sent by computer A propagated in the LAN domain?
none of the computers will receive the broadcast frame
computer A, computer B, computer C
computer A, computer D, computer G
computer B, computer C
computer D, computer G
In a LAN, which of the following terms best equates to the term VLAN?
a. Collision domain
b. Broadcast domain
c. Subnet
d. Single switch
e. Trunk
B (Broadcast domain) . A VLAN is a set of devices in the same Layer 2 broadcast domain. A subnet often includes the exact
same set of devices, but it is a Layer 3 concept. A collision domain refers to a set of Ethernet devices, but with different
rules than VLAN rules for determining which devices are in the same collision domain.
Imagine a switch with three configured VLANs. How many IP subnets are required, assuming that all hosts in all VLANs
want to use TCP/IP?
a. 0
b. 1
c. 2
d. 3
e. You can't tell from the information provided.

D (3) . Although a subnet and a VLAN are not equivalent concepts, the devices in one VLAN are typically in the same IP
subnet and vice versa.
Switch SW1 sends a frame to switch SW2 using 802.1Q trunking. Which of the answers describes how SW1 changes or
adds to the Ethernet frame before forwarding the frame to SW2?
a. Inserts a 4-byte header and does change the MAC addresses
b. Inserts a 4-byte header and does not change the MAC addresses
c. Encapsulates the original frame behind an entirely-new Ethernet header
d. None of the other answers are correct
B (Inserts a 4-byte header and does not change the MAC addresses) . 802.1Q defines a 4-byte header, inserted after the
original frame's destination and source MAC address fields. The insertion of this header does not change the original
frame's source or destination address. The header itself holds a 12-bit VLAN ID field, which identifies the VLAN associated
with the frame.
For an 802.1Q trunk between two Ethernet switches, which answer most accurately defines which frames do not include
an 802.1Q header?
a. Frames in the native VLAN (only one)
b. Frames in extended VLANs
c. Frames in VLAN 1 (not configurable)
d. Frames in all native VLANs (multiple allowed)
A (Frames in the native VLAN (only one)) . 802.1Q defines the native VLAN as one designated VLAN on a trunk for which
the devices choose to not add an 802.1Q header for frames in that VLAN. The switches can set the native VLAN to any
VLAN ID, but the switches should agree. The default native VLAN is VLAN 1. Note that only one such native VLAN is
allowed on any one trunk; otherwise, that VLAN associated with untagged frames could not be discerned by the receiving
switch.
Imagine that you are told that switch 1 is configured with the dynamic auto parameter for trunking on its Fa0/5 interface,
which is connected to switch 2. You have to configure switch 2. Which of the following settings for trunking could allow
trunking to work? (Choose two answers.)
a. Trunking turned on
b. dynamic auto
c. dynamic desirable
d. access
e. None of the other answers are correct.
A (Trunking turned on) and C (dynamic desirable) . The dynamic auto setting means that the switch can negotiate trunking,
but it can only respond to negotiation messages, and it cannot initiate the negotiation process. So, the other switch must
be configured to trunk or to initiate the negotiation process (based on being configured with the dynamic desirable
option).
A switch has just arrived from Cisco. The switch has never been configured with any VLANs, but VTP has been disabled. An
engineer gets into configuration mode and issues the vlan 22 command, followed by the name Hannahs-VLAN command.
Which of the following are true? (Choose two answers.)
a. VLAN 22 is listed in the output of the show vlan brief command.
b. VLAN 22 is listed in the output of the show running-config command.
c. VLAN 22 is not created by this process.
d. VLAN 22 does not exist in that switch until at least one interface is assigned to that VLAN.
A (VLAN 22 is listed in the output of the show vlan brief command.) and B (VLAN 22 is listed in the output of the show
running-config command.)

Which of the following commands identify switch interfaces as being trunking interfaces: interfaces that currently operate
as VLAN trunks? (Choose two answers.)
a. show interfaces
b. show interfaces switchport

c. show interfaces trunk


d. show trunks
B (show interfaces switchport) and C (show interfaces trunk) .
QUESTION 261
Refer to the exhibit. The output that is shown is generated at a switch. Which three of these statements are true? (Choose
three.)

A.
B.
C.
D.
E.
F.

All ports will be in a state of discarding, learning or forwarding.


Thirty VLANs have been configured on this switch.
The bridge priority is lower than the default value for spanning tree.
All interfaces that are shown are on shared media.
All designated ports are in a forwarding state.
The switch must be the root bridge for all VLANs on this switch.

Correct Answer: ACE

QUESTION 262
Refer to the exhibit. Give this output for Switch3, what should the network administrators next action be?

A. Check the trunk encapsulation mode for Switch3s fa0/1 port.


B. Check the duplex mode for Switch3s fa0/1 port.

C. Check the duplex mode for Switch1s fa0/2 port.


D. Check the trunk encapsulation mode for Switch1s fa0/2 port.
Correct Answer: C

QUESTION 263
Refer to the exhibit. Which of these statements correctly describes the state of the switch once the boot process has been
completed?

A.
B.
C.
D.

As FastEthernet0/12 will be the last to come up, it will not be blocked by STP.
Remote access management of this switch will not be possible without configuration change.
More VLANs will need to be created for this switch.
The switch will need a different IOS code in order to support VLANs and STP.

Correct Answer: B

QUESTION 264
Refer to the exhibit. Three Cisco 2950 switches are set to their default priority settings. During the spanning-tree process,
which switch will be elected as the root bridge?

A.
B.
C.
D.

Switch3
Switch4
Switch2
Switch1

Correct Answer: D

QUESTION 265
Which two commands can be used to verify a trunk link configuration status on a Cisco switch? (Choose two)
A.
B.
C.
D.

show interfaces trunk


show interfaces switchport
show ip interface brief
show interfaces vlan

Correct Answer: AB

QUESTION 266
Which three statements accurately describe layer 2 Ethernet switches? (Choose three)
A.
Microsegmentation decreases the number of collisions on the network.
B.
If a switch receives a frame for an unknown destination, it uses ARP to resolve the address.
C.
Spanning Tree Protocol allows switches to automatically share vlan information.
D.
In a properly functioning network with redundant switched paths, each switched segment will contain one root
bridge with all its ports in the forwarding state. All other switches in that broadcast domain will have only one root port.
E.
Establishing vlans increases the number of broadcast domains.
F.
Switches that are configured with vlans make forwarding decisions based on both layer 2 and layer 3 address
information.
Correct Answer: ADE

QUESTION 267
Which two of these are characteristics of the 802.1Q protocol? (Choose two)
A.
It is a layer 2 messaging protocol which maintains vlan configurations across network.
B.
It includes an 8-bit field which specifies the priority of a frame.
C.
It is used exclusively for tagging vlan frames and does not address network reconvergence following switched
network topology changes.
D.
It modifies the 802.3 frame header, and thus requires that the FCS be recomputed.
E.
It is a trunking protocol capable of carrying untagged frames.
Correct Answer: DE

QUESTION 268
Which term describes a spanning-tree network that has all switch ports in either the blocking or forwarding state?
A.
B.
C.
D.

redundant
spanned
provisioned
converged

Correct Answer: D

QUESTION 269
Assuming the default switch configuration which vlan range can be added modified and removed on a cisco switch?
A.
B.
C.
D.

2 through 1001
1 through 1001
1 through 1002
2 through 1005

Correct Answer: A

QUESTION 270
A network administrator needs to configure port security on a switch. Which two statements are true? (Choose two)
A.
The network administrator can apply port security to dynamic access ports
B.
The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
C.
The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
D.
The network administrator can apply port security to EtherChannels.
E.
When dynamic mac address learning is enabled on an interface, the switch can learn new addresses, up to the
maximum defined.
Correct Answer: CE
QUESTION 291
A network administrator is explaining VTP configuration to a new technician. What should the network administrator tell
the new technician about VTP configuration? (Choose three.)
A.
A switch in the VTP client mode cannot update its local VLAN database.
B.
A trunk link must be configured between the switches to forward VTP updates.
C.
A switch in the VTP server mode can update a switch in the VTP transparent mode.
D.
A switch in the VTP transparent mode will forward updates that it receives to other switches.
E.
A switch in the VTP server mode only updates switches in the VTP client mode that have a higher VTP revision
number.
F.
A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP
domain membership.
Correct Answer: ABD

QUESTION 292
A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum
throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that
of the office computer data traffic. What is the best network device to which to directly connect the phones and
computers, and what technology should be implemented on this device? (Choose two.)
A.
B.
C.
D.
E.
F.

hub
router
switch
STP
subinterfaces
VLAN

Correct Answer: CF

QUESTION 293

Refer to the exhibit. A network associate needs to configure the switches and router in the graphic so that the hosts in
VLAN3 and VLAN4 can communicate with the enterprise server in VLAN2. Which two Ethernet segments would need to be
configured as trunk links? (Choose two.)

A.
B.
C.
D.
E.
F.

A
B
C
D
E
F

Correct Answer: CF

QUESTION 294
Refer to the exhibit. A network administrator is adding two new hosts to Switch A. Which three values could be used for
the configuration of these hosts? (Choose three.)

A.
B.
C.
D.
E.
F.

host A IP address: 192.168.1.79


host A IP address: 192.168.1.64
host A default gateway: 192.168.1.78
host B IP address: 192.168.1.128
host B default gateway: 192.168.1.129
host B IP address: 192.168.1.190

Correct Answer: ACF

QUESTION 295
Which three statements are typical characteristics of VLAN arrangements? (Choose three.)
A.
B.
C.
D.
E.
F.

A new switch has no VLANs configured.


Connectivity between VLANs requires a Layer 3 device.
VLANs typically decrease the number of collision domains.
Each VLAN uses a separate address space.
A switch maintains a separate bridging table for each VLAN.
VLANs cannot span multiple switches.

Correct Answer: BDE

QUESTION 296
Which three of these statements regarding 802.1Q trunking are correct? (Choose three.)
A.
B.
C.
D.
E.

802.1Q native VLAN frames are untagged by default.


802.1Q trunking ports can also be secure ports.
802.1Q trunks can use 10 Mb/s Ethernet interfaces.
802.1Q trunks require full-duplex, point-to-point connectivity.
802.1Q trunks should have native VLANs that are the same at both ends.

Correct Answer: ACE

QUESTION 297
By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid
unauthorized management access? (Choose two.)
A.
B.

Create an additional ACL to block the access to VLAN 1.


Move the management VLAN to something other than default.

C.
D.
E.
F.

Move all ports to another VLAN and deactivate the default VLAN.
Limit the access in the switch using port security configuration.
Use static VLAN in trunks and access ports to restrict connections.
Shutdown all unused ports in the Catalyst switch.

Correct Answer: BF

QUESTION 298
What is the name of the VTP mode of operation that enables a switch to forward only VTP advertisements while still
permitting the editing of local VLAN information?
A.
B.
C.
D.

server
client
tunnel
transparent

Correct Answer: D

QUESTION 299
Which two benefits are provided by creating VLANs? (Choose two.)
A.
B.
C.
D.
E.

added security
dedicated bandwidth
provides segmentation
allows switches to route traffic between subinterfaces
contains collisions

Correct Answer: AC

QUESTION 300
Which two link protocols are used to carry multiple VLANs over a single link? (Choose two.)
A.
B.
C.
D.
E.

VTP
802.1q
IGP
ISL
802.3u

Correct Answer: BD
QUESTION 301
Which VTP mode is capable of creating only local VLANs and does not synchronize with other switches in the VTP domain?
A.
B.
C.
D.
E.

client
dynamic
server
static
transparent

Correct Answer: E

QUESTION 302

A switch is configured with all ports assigned to vlan 2 with full duplex FastEthernet to segment existing departmental
traffic. What is the effect of adding switch ports to a new VLAN on the switch?
A.
B.
C.
D.

More collision domains will be created.


IP address utilization will be more efficient.
More bandwidth will be required than was needed previously.
An additional broadcast domain will be created.

Correct Answer: D

QUESTION 303
Which two statements about the use of VLANs to segment a network are true? (Choose two.)
A.
B.
C.
D.

VLANs increase the size of collision domains.


VLANs allow logical grouping of users by function.
VLANs simplify switch administration.
VLANs enhance network security.

Correct Answer: BD

QUESTION 304
On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate
with hosts on different VLANs. What is needed to allow communication between the VLANs?

A.
B.
C.
D.

a router with subinterfaces configured on the physical interface that is connected to the switch
a router with an IP address on the physical interface connected to the switch
a switch with an access link that is configured between the switches
a switch with a trunk link that is configured between the switches

Correct Answer: A

QUESTION 305
Which two statements describe the Cisco implementation of VLANs? (Choose two.)
A.
B.
C.
D.
E.

VLAN 1 is the default Ethernet VLAN.


CDP advertisements are only sent on VLAN 1002.
By default, the management VLAN is VLAN 1005.
By default, the switch IP address is in VLAN 1005.
VLAN 1002 through 1005 are automatically created and cannot be deleted.

Correct Answer: AE

QUESTION 306
What are three advantages of VLANs? (Choose three.)
A.
B.
C.
D.
E.
F.

VLANs establish broadcast domains in switched networks.


VLANs utilize packet filtering to enhance network security.
VLANs provide a method of conserving IP addresses in large networks.
VLANs provide a low-latency internetworking alternative to routed networks.
VLANs allow access to network services based on department, not physical location.
VLANs can greatly simplify adding, moving, or changing hosts on the network.

Correct Answer: AEF

QUESTION 307
Which of the following are benefits of VLANs? (Choose three.)
A.
B.
C.
D.
E.
F.

They increase the size of collision domains.


They allow logical grouping of users by function.
They can enhance network security.
They increase the size of broadcast domains while decreasing the number of collision domains.
They increase the number of broadcast domains while decreasing the size of the broadcast domains.
They simplify switch administration.

Correct Answer: BCE

QUESTION 308
An administrator is unsuccessful in adding VLAN 50 to a switch. While troubleshooting the problem, the administrator
views the output of the show vtp status command, which is displayed in the graphic. What commands must be issued on
this switch to add VLAN 50 to the database? (Choose two.)

A.
B.
C.
D.
E.
F.

Switch(config-if)# switchport access vlan 50


Switch(vlan)# vtp server
Switch(config)# config-revision 20
Switch(config)# vlan 50 name Tech
Switch(vlan)# vlan 50
Switch(vlan)# switchport trunk vlan 50

Correct Answer: BE

QUESTION 309
Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme
that is in use in the network? (Choose three.)

A.
B.
C.
D.
E.
F.

The subnet mask in use is 255.255.255.192.


The subnet mask in use is 255.255.255.128.
The IP address 172.16.1.25 can be assigned to hosts in VLAN1
The IP address 172.16.1.205 can be assigned to hosts in VLAN1
The LAN interface of the router is configured with one IP address.
The LAN interface of the router is configured with multiple IP addresses.

Correct Answer: BCF

QUESTION 310
Refer to the diagram. Which three statements describe the router port configuration and the switch port configuration as
shown in the topology? (Choose three.)

A.
B.
C.
D.
E.
F.

The Router1 WAN port is configured as a trunking port.


The Router1 port connected to Switch1 is configured using subinterfaces.
The Router1 port connected to Switch1 is configured as 10 Mbps.
The Switch1 port connected to Router1 is configured as a trunking port.
The Switch1 port connected to Host B is configured as an access port.
The Switch1 port connected to Hub1 is configured as full duplex.

Correct Answer: BDE


QUESTION 311
Refer to the exhibit. The network shown in the diagram is experiencing connectivity problems. Which of the following will
correct the problems? (Choose two.)

A.
B.
C.
D.
E.

Configure the gateway on Host A as 10.1.1.1.


Configure the gateway on Host B as 10.1.2.254.
Configure the IP address of Host A as 10.1.2.2.
Configure the IP address of Host B as 10.1.2.2.
Configure the masks on both hosts to be 255.255.255.224.

F.

Configure the masks on both hosts to be 255.255.255.240.

Correct Answer: BD

QUESTION 312
A network associate is trying to understand the operation of the FLD Corporation by studying the network in the exhibit.
The associate knows that the server in VLAN 4 provides the necessary resources to support the user hosts in the other
VLANs. The associate needs to determine which interfaces are access ports. Which interfaces are access ports? (Choose
three.)

A.
B.
C.
D.
E.
F.

Switch1 Fa 0/2
Switch1 Fa 0/9
Switch2 Fa 0/3
Switch2 Fa 0/4
Switch2 Fa 0/8
Router Fa 1/0

Correct Answer: ACD

QUESTION 313
What are three valid reasons to assign ports to VLANs on a switch? (Choose three.)
A.
B.
C.
D.
E.
F.

to make VTP easier to implement


to isolate broadcast traffic
to increase the size of the collision domain
to allow more devices to connect to the network
to logically group hosts according to function
to increase network security

Correct Answer: BEF

QUESTION 314
Which statements describe two of the benefits of VLAN Trunking Protocol? (Choose two.)
A.
B.
C.

VTP allows routing between VLANs.


VTP allows a single switch port to carry information to more than one VLAN.
VTP allows physically redundant links while preventing switching loops.

D.
E.
F.

VTP simplifies switch administration by allowing switches to automatically share VLAN configuration information.
VTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.
VTP enhances security by preventing unauthorized hosts from connecting to the VTP domain.

Correct Answer: DE

QUESTION 315
What are two results of entering the Switch(config)# vtp mode client command on a Catalyst switch? (Choose two.)
A.
B.
C.
D.
E.

The switch will ignore VTP summary advertisements.


The switch will forward VTP summary advertisements.
The switch will process VTP summary advertisements.
The switch will originate VTP summary advertisements.
The switch will create, modify and delete VLANs for the entire VTP domain.

Correct Answer: BC

QUESTION 316
Refer to the exhibit. What commands must be configured on the 2950 switch and the router to allow communication
between host 1 and host 2? (Choose two.)

A.
Router(config)# interface fastethernet 0/0
Router(config-if)# ip address 192.168.1.1 255.255.255.0
Router(config-if)# no shut down
B.
Router(config)# interface fastethernet 0/0
Router(config-if)# no shut down
Router(config)# interface fastethernet 0/0.1
Router(config-subif)# encapsulation dot1q 10
Router(config-subif)# ip address 192.168.10.1 255.255.255

Router(config-subif)# interface fastethernet 0/0.2


Router(config-subif)# encapsulation dot1q 20
Router(config-subif)# ip address 192.168.20.1 255.255.255.0
C.
Router(config)# router eigrp 100
Router(config-router)# network 192.168.10.0
Router(config-router)# network 192.168.20.0
D.
Switch1(config)# vlan database
Switch1(config-vlan)# vtp domain XYZ
Switch1(config-vlan)# vtp server
E.
Switch1(config)# interface fastethernet 0/1
Switch1(config-if)# switchport mode trunk
F.
Switch1(config)# interface vlan 1
Switch1(config-if)# ip default-gateway 192.168.1.1
Correct Answer: BE

QUESTION 317
Refer to the exhibit. Switch port FastEthernet 0/24 on AlSwitch1 will be used to create an IEEE 802.1Q-complaint trunk to
another switch. Based on the output shown, what is the reason the trunk does not form, even though the proper cabling
has been attached?

A.
B.
C.
D.
E.

VLANs have not been created yet.


An IP address must be configured for the port.
The port is currently configured for access mode.
The correct encapsulation type has not been configured.
The no shutdown command has not been entered for the port.

Correct Answer: C

QUESTION 318
Which statement is correct about the internetwork shown in the diagram?

A.
B.
C.
D.
E.
F.

Switch2 is the root bridge.


Spanning Tree is not running.
HostD and Server1 are in the same subnet.
No collision can occur in traffic between Host B and Host C.
If Fa0/0 is down on Router1, HostA cannot access Server1.
If Fa0/1 is down on Switch3, HostC cannot access Server 2.

Correct Answer: E

QUESTION 319
Refer to the exhibit. An organization connect two locations, supporting two VLANs, through two switches as shown. InterVLANs communicated is not required. The network is working properly and there is fully connectivity. The organization
needs to add additional VLANs, so it has been decided to implement VTP. Both switches are configured as VTP servers in
the same VTP domain. VLANs added to Switch1 are not learned by Switch2. Based on this information and partial
configuration is the exhibit, what is the problem?

A.
B.
C.
D.
E.

Switch2 should be configured as a VTP client.


VTP is Cisco proprietory and requires a different trunking encapsulation
A router is required to route VTP advertisements between the swtiches.
STP has blocked on of the links between the switches, limiting connectivity.
The links between the switches are access links.

Correct Answer: E

QUESTION 320
Refer to the exhibit. The network manager is evaluating the efficiency of the current network design. RIPv2 is enabled on
all Layer 3 devices in the network. What network devices participate in passing traffic from the PC at 10.10.1.7 to File
Server at 10.20.1.6 in the older that they will forward traffic from source to destination?

A.
B.
C.
D.

Switch1, Switch2
Switch1, Switch2, Switch2, Switch2
Switch1, Router1, Switch1, Switch2
Switch1, Router1, Router2, Switch2

Correct Answer: D
QUESTION 201
Which three statements about VTP features are true? (Choose three.)
A.
B.
C.
D.
E.
F.
G.

VTP works at Layer 3 of the OSI model and requires that a management VLAN IP address be configured.
When properly configured, VTP minimizes VLAN misconfigurations and configuration inconsistencies.
When properly configured, VTP maintains VLAN configuration consistency and accelerates trunk link negotiation.
Each broadcast domain on a switch can have its own unique VTP domain.
VTP pruning is used to increase available bandwidth in trunk links.
To configure a switch to be part of two VTP domains, each domain must have its own passwords.
Client, server, and transparent are valid VTP modes.

Correct Answer: BEG

QUESTION 202
Two switches are connected through a trunk link. Which two commands show that there is a native VLAN mismatch on
that link? (Choose two.)
A.
B.
C.
D.
E.
F.

show vlan brief


show interface trunk
show interface vlan
show interface switchport
show interface interface
show switchport trunk

Correct Answer: BD

QUESTION 203
Which two of these statements are true of IPv6 address representation? (Choose two.)
A.
B.
C.
D.
E.&n
bsp;

There are four types of IPv6 addresses: unicast, multicast, anycast, and broadcast.
A single interface may be assigned multiple IPv6 addresses of any type.
Every IPv6 interface contains at least one loopback address
The first 64 bits represent the dynamically created interface ID.
Leading zeros in an IPv6 16 bit hexadecimal field are mandatory.

Correct Answer: BC

QUESTION 204
Which statement about IPv6 is true?
A.
B.
C.
D.

Addresses are not hierarchical and are assigned at random.


Only one IPv6 address can exist on a given interface.
There are 2.7 billion addresses available.
Broadcasts have been eliminated and replaced with multicasts.

Correct Answer: D

QUESTION 205
Refer to the exhibit. The user at Workstation B reports that Server A cannot be reached. What is preventing Workstation B
from reaching Server A?

A.
B.
C.
D.

The IP address for Server A is a broadcast address.


The IP address for Workstation B is a subnet address.
The gateway for Workstation B is not on the same subnet.
The gateway for Server A is not on the same subnet.

Correct Answer: D

QUESTION 206
You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while
providing the maximum number of subnets. Which network address and subnet mask meet this requirement?
A.
B.
C.
D.
E.

< font face="Calibri">192.168.252.0 255.255.255.252


192.168.252.8 255.255.255.248
192.168.252.8 255.255.255.252
192.168.252.16 255.255.255.240
192.168.252.16 255.255.255.252

Correct Answer: B

QUESTION 207
Refer to the exhibit. Based on the exhibited routing table, how will packets from a host within the 192.168.10.192/26 LAN
be forwarded to 192.168.10.1?

A.
B.
C.
D.

The router will forward packets from R3 to R2 to R1.


The router will forward packets from R3 to R1 to R2.
The router will forward packets from R3 to R2 to R1 AND from R3 to R1.
The router will forward packets from R3 to R1.

Correct Answer: C

QUESTION 208
How does using the service password-encryption command on a router provide additional security?
A.
B.
C.
D.
E.

by encrypting all passwords passing through the router


by encrypting passwords in the plain text configuration file
by requiring entry of encrypted passwords for access to the device
by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges
by automatically suggesting encrypted passwords for use in configuring the router

Correct Answer: B

QUESTION 209
Refer to the exhibit. How will the router handle a packet destined for 192.0.2.156?

A.
B.
C.
D.

The router will drop the packet.


The router will return the packet to its source.
The router will forward the packet via Serial2.
The router will forward the packet via either Serial0 or Serial1.

Correct Answer: C

QUESTION 210
Refer to the exhibit. The show interfaces serial 0/1 command was issued on the R10-1 router. What can be concluded
from the output in the exhibit?

A.
The cable connected to the serial 0/1 interface of the R10-1 router is a DTE cable.
B.
The R10-1 router can ping the router interface connected to the serial 0/1 interface.
C.
The clock rate used for interface serial 0/1 of the R10-1 router is 1,544,000 bits per second.
D.
The CSU used with the serial 0/1 interface of the R10-1 router has lost connection to the service provider.
E.
The interface of the remote router connected to the serial 0/1 interface of the R10-1 router is using the default
serial interface encapsulation.
Correct Answer: E

Potrebbero piacerti anche