Sei sulla pagina 1di 8

Refer to the exhibit. A router is configured to connect to a trunked uplink of a switch.

A packet is
received on the FastEthernet 0/1 physical interface from VLAN 10 with a destination address of
192.168.1.120. What will the router do with this packet?
forward the packet out interface FastEthernet 0/1.1 tagged for VLAN 10
forward the packet out interface FastEthernet 0/1.2 tagged for VLAN 60
forward the packet out interface FastEthernet 0/1.3 tagged for VLAN 120
not process the packet (because the source and destination are on the same subnet)
drop the packet (because no network that includes the source address is attached to the
router)

2
Refer to the exhibit. A network administrator noticed that the VLAN configuration changes at
SW2 did not propagate to SW3. On the basis of the partial output of the show vtp
status command, what is the possible cause of the problem?
VTP V2 mode is disabled.
SW3 is configured as transparent mode.
The number of existing VLANs does not match.
The configuration revision number does not match.

3 Which Catalyst switch feature causes an access port to enter the spanning-tree forwarding
state immediately?
backbonefast
uplinkfast
portfast
rapid spanning tree

4 In an enterprise network, why would voice traffic typically require a dedicated VLAN?
It guarantees end-to-end delivery for voice traffic.
It guarantees higher bandwidth for voice traffic.
It separates voice traffic from data traffic so data traffic does not impact voice traffic.
It provides backup support for voice traffic because voice traffic is more critical than data
traffic.

Refer to the exhibit. What is the effect of the commands in the exhibit?
There will be no effect unless the command switchport port-security mac-
address mac-addr is added.
The first device that is connected to port fa0/6 will be allowed to transmit data. Any other
devices that connect to it will shut down the port.
The first device that is connected to port fa0/6 will be allowed to transmit data. The
learned MAC will be kept even after the switch is restarted.
The first device that is connected to port fa0/6 will be allowed to transmit data. Any other
devices that connect to it will be allowed to transmit data and a warning will be sent to
the syslog server.

6 Which two items will prevent broadcasts from being sent throughout the network? (Choose two.)
bridges
routers
switches
VLANs
hubs

7 In which STP state does a switch port transmit user data and learn MAC addresses?
blocking
learning
disabling
listening
forwarding

8 Which two criteria are used by STP to select a root bridge? (Choose two.)
memory size
bridge priority
switching speed
number of ports
base MAC address
switch location

9 Which statement is true about the port security feature in a Cisco switch?
It disables unused ports.
It filters network traffic based on host MAC addresses.
It executes a shutdown on the port, based on Layer 4 port numbers.
It disables Telnet traffic because the username and password are transmitted in plain text.

10 What is the purpose of VTP?


maintaining consistency in VLAN configuration across the network
routing frames from one VLAN to another
routing the frames along the best path between switches
tagging user data frames with VLAN membership information
distributing BPDUs to maintain loop-free switched paths

11 What is the first step in the process of convergence in a spanning tree topology?
election of the root bridge
determination of the designated port for each segment
blocking of the non-designated ports
selection of the designated trunk port
activation of the root port for each segment

12 When are MAC addresses removed from the CAM table?


at regular 30 second intervals
when a broadcast packet is received
when the IP Address of a host is changed
after they have been idle for a certain period of time

13 A router has two serial interfaces and two Fast Ethernet interfaces. This router must be
connected to a WAN link and to a switch that supports four VLANs. How can this be
accomplished in the most efficient and cost-effective manner to support inter-VLAN routing
between the four VLANs?
Connect a smaller router to the serial interface to handle the inter-VLAN traffic.
Add two additional Fast Ethernet interfaces to the router to allow one VLAN per interface.
Connect a trunked uplink from the switch to one Fast Ethernet interface on the router and
create logical subinterfaces for each VLAN.
Use serial-to-Fast Ethernet transceivers to connect two of the VLANs to the serial ports on
the router. Support the other two VLANs directly to the available FastEthernet ports.

14 Using STP, how long does it take for a switch port to go from the blocking state to the forwarding
state?
2 seconds
15 seconds
20 seconds
50 seconds

15
Refer to the exhibit. The switches are connected with trunks within the same VTP
management domain. Each switch is labeled with its VTP mode. A new VLAN is added to
Switch3. This VLAN does not show up on the other switches. What is the reason for this?
VLANs cannot be created on transparent mode switches.
Server mode switches neither listen to nor forward VTP messages from transparent
mode switches.
VLANs created on transparent mode switches are not included in VTP
advertisements.
There are no ports assigned to the new VLAN on the other switches.
Transparent mode switches do not forward VTP advertisements.

16

Refer to the exhibit. The switches are interconnected by trunked links and are configured for
VTP as shown. A new VLAN is added to Switch1. Which three actions will occur? (Choose
three.)
Switch1 will not add the VLAN to its database and will pass the update to Switch 2.
Switch2 will add the VLAN to its database and pass the update to Switch3.
Switch3 will pass the VTP update to Switch4.
Switch3 will add the VLAN to its database.
Switch4 will add the VLAN to its database.
Switch4 will not receive the update.

17
Refer to the exhibit. What two conclusions can be drawn from the information that is shown in
the exhibit? (Choose two.)
All ports that are listed in the exhibit are access ports.
ARP requests from Host1 will be forwarded to Host2.
Attaching Host1 to port 11 will automatically allow communication between both hosts.
The default gateway for each host must be changed to 192.168.3.250/28 to allow
communication between both hosts.
A router connected to the switch is needed to forward traffic between the hosts.

18 Which statement best describes adaptive cut-through switching?


The switch initially forwards all traffic using cut-through switching and then changes to
store-and-forward switching if errors exceed a threshold value.
The switch initially forwards all traffic using cut-through switching and then changes to fast-
forward switching if errors exceed a threshold value.
The switch initially forwards all traffic using cut-through switching and then temporarily
disables the port if errors exceed a threshold value.
The switch initially forwards all traffic using store-and-forward switching and then changes
to cut-through switching if errors exceed a threshold value.

19 Which three must be used when a router interface is configured for VLAN trunking? (Choose
three.)
one subinterface per VLAN
one physical interface for each subinterface
one IP network or subnetwork for each subinterface
one trunked link per VLAN
a management domain for each subinterface
a compatible trunking protocol encapsulation for each subinterface

20 Which two items are contained within a BPDU? (Choose two.)


identity of the default gateway
number of ports blocked by STP
identity of the root bridge
identity of the source port
VTP domain name

21 Which statement describes the function of a VLAN Management Policy Server (VMPS)?
VMPS provides easy organization of static VLAN membership.
VMPS provides flexible dynamic assignments of VLAN membership.
VMPS provides a backup service for static VLAN membership configuration.
VMPS provides the easiest deployment of VLANs regardless of the number of
switches involved.

22 Which two characteristics describe a port in the STP blocking state? (Choose two.)
receives BPDUs
provides port security
displays a steady green light
learns MAC addresses as BPDUs are processed
discards data frames received from the attached segment

23

Refer to the exhibit. Which statement is true about the network traffic flow on this switch?
All PCs that are connected to this switch will be able to communicate with each other as
long as they belong to the same IP network.
A PC that is connected to port Fa0/2 can communicate with another PC that is
connected to Port Fa0/22 if the PCs belong to the same IP network.
A PC that is connected to port Fa0/11 can communicate with another PC that is
connected to Port Fa0/20 if the PCs belong to the same IP network.
A PC that is connected to port Fa0/15 can communicate with another PC that is
connected to Port Fa0/24 regardless of the IP network to which the PCs belong.
24

Refer to the exhibit. Switch1 is not participating in the VTP management process with the other
switches. Which two are possible reasons for this? (Choose two.)
Switch2 is in transparent mode.
Switch1 is in client mode.
Switch1 is using VTP version 1 and Switch2 is using VTP version 2.
Switch2 is in server mode.
Switch1 is in a different management domain.
Switch1 has no VLANs.

25 Which statement describes a difference between STP and RSTP?


RSTP is proprietary while STP is defined by IEEE.
RSTP defines four port states while STP defines five port states.
When a topology changes, RSTP reconfigures the spanning tree in less than 1 second.
STP is more commonly used in large switched enterprise networks that require faster
recovery.

Potrebbero piacerti anche