Sei sulla pagina 1di 10

Advanced Networking

Exam II - 5.15 - Attempt 1


Top of Form

Question1
Marks: 4

Which line from the output of the show ip interface command indicates a layer 1 problem? Choose one answer.
a. Serial0/1 is administratively down, line protocol is down

b. Serial0/1 is up, line protocol is up

c. Serial0/1 is up, line protocol is down

d. Serial0/1 is down, line protocol is down

Question2
Marks: 4

What is the effect of using the service password-encryption command? Choose one answer.
a. Only the enable secret password will be encrypted.

b. It will encrypt the secret password and remove the enable secret password from the configuration. c. Only the enable password will be encrypted

d. It will encrypt all current and future passwords

e. Only passwords configured after the command has been entered will be encrypted.

Question3
Marks: 4
The following line of output was taken from a show interfaces fa0/1 command:
Full-duplex, 100Mbps, media type is 10/100BaseTX

Which of the following is/are true about the interface?

Choose at least one answer.


a. The duplex may have been configured with the duplex full interface subcommand. b. The duplex was definitely configured with the duplex full interface subcommand. c. The speed was definitely configured with the speed 100 interface subcommand. d. The speed may have been configured with the speed 100 interface subcommand.

Question4
Marks: 4

Refer to the exhibit. A technician is investigating a problem with the network that is shown. The router is a 2800 model and all switches are 2950 models. These symptoms have been observed: - All of the user hosts can access the Internet. - None of the user hosts can access the server located in VLAN 9. - All of the hosts can ping each other. What could cause these symptoms?

Choose one answer.


a. Interface Fa0/4 on Switch3 is down.

b. Trunking is not enabled on the link between Switch3 and Switch1. c. Interface Fa1/0 on the Router1 is down.

d. Interface S0/0 on the Router1 is down.

Question5
Marks: 4

Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response. Choose one answer.
a. SNMPv1

b. SSH

c. WEP

d. ARP

e. SNMPv2

f. Telnet

Question6
Marks: 4

As the network administrator, you are troubleshooting network issues, which following commands will allow you to find the ip address associated with each MAC address? (Choose two) Choose at least one answer.
a. show arp

b. show interface

c. show hosts

d. show address

Question7
Marks: 4

Given the following syntax


myprompt(config-line)#password juice the following statements are true. (choose all that apply)

Choose at least one answer.


a. The syntax demonstrates a configuration subcommand

b. the syntax demonstrates a global command.

c. The password in encrypted

d. The password is in plain text

Question8
Marks: 4

A Catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased? (Choose three.) Choose at least one answer.
a. Erase the startup configuration.

b. Restart the switch.

c. Erase the running configuration.

d. Erase flash.

e. Modify the configuration register.

f. Delete the VLAN database.

Question9
Marks: 4

Refer to the exhibit. The two connected ports on the Switch3 are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem? (Choose three.)

Choose at least one answer.


a. Ensure the Switch3 has power.

b. Ensure that cables A and B are straight-through cables.

c. Ensure that the Ethernet encapsulations match on the interconnected Router2 and Switch3 d. Reseat all cables.

Question10
Marks: 4
login line vty 5 15 The above syntax sets the password for: password love

Choose one answer.


a. 16 vty lines

b. 9 vty lines

c. 5 vty lines

d. 15 vty lines

Question11
Marks: 4

Which three benefits are of VLANs? (Choose three.) Choose at least one answer.

a. They increase the number of broadcast domains while decreasing the size of the broadcast b. They can enhance network security.

c. They increase the size of collision domains.

d. They allow logical grouping of users by function.

Question12
Marks: 4
Which of the following statements best describes what a switch does with a frame destined for an unknown unicast address?

Choose one answer.


a. It compares the frames incoming interface to the source MAC entry in the MAC address table. b. It compares the destination IP address to the destination MAC address. c. It forwards out all interfaces in the same VLAN except for the incoming interface. face. d. It forwards the frame out the one interface identified by the matching entry in the MAC address table. MAC address table.

Question13
Marks: 4

Refer to the exhibit. What is the reason that the interface status is "administratively down, line protocol down"? Choose one answer.
a. There is a mismatch in encapsulation types

b. The wrong type of cable is connected to the interface.

c. There is no encapsulation type configured

d. The interface has been configured with the shutdown command

e. The interface needs to be configured as a DTE device.

f. The interface is not receiving any keepalives.

Question14
Marks: 4

The switches shown in the diagram, Core and Core2, are both Catalyst 2950s. The addressing scheme for each company site is as follows:

Router Ethernet port 1st usable address Core 2nd usable address Core2 3rd usable address Forthis network, which of the following commands must be configured on Core2 to allow it to be managed remotely from any subnet on the network? (Choose three.) Choose at least one answer.
a. Core2(config)# ip default gateway 192.168.1.9

b. Core2(config)# interface vlan 1 Core2(configif)#ip address 192.168.1.11 255.255.255.248 c. Core2(config)# line vty 0 4 Core2(configline)#password cisco

d. Core2(config)# interface f0/0 Core2(configif)#ip address 192.168.1.10 255.255.255.248 e. Core2(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.8

f. Core2(config)# line con 0 Core2(configline)#password cisco

Question15
Marks: 4

An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the

following are required in order for the switch to be configured from a remote location? (Choose two.) Choose at least one answer.
a. The switch management VLAN must be created and have a membership of at least one switch b. The switch must be connected to a router over a VLAN trunk.

c. The switch console port must be connected to the Ethernet LAN.

d. The switch must be configured with an IP address, subnet mask, and default gateway e. The switch must be fully configured as an SNMP agent

f. The switch must be reachable through a port connected to its management VLAN.

Question16
Marks: 4

Recently, associates have noticed extremely slow network performance, intermittent connectivity, and connection losses. After entering the "show interfaces" command, you notice that the Ethernet interface is configured as 100 Mbps full-duplex and that there is evidence of late collisions. What could be the cause of this problem? Choose one answer.
a. Improperly configured root bridge

b. Trunking mode mismatch

c. A routing loop

d. Duplex mismatch

Question17
Marks: 4

A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the

phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? (Choose two.) Choose at least one answer.
a. router

b. hub

c. subinterfaces

d. VLAN

e. switch

f. STP

Question18
Marks: 4
To reach enable mode from a vty (Telnet or SSH), the switch must be configured with: (choose all that apply)

Choose at least one answer.


a. A MAC address

b. Login security on the vty lines

c. An enable secret password

d. An IP address

e. AES security

f. An enable password

Question19
Marks: 4

You have finished physically installing an access point on the ceiling at your office. At a minimum, which parameter must be configured on the access point in order to allow a wireless client to operate on it? Choose one answer.
a. PSK

b. TKIP

c. SSID

d. AES

e. WEP

Question20
Marks: 4

As the network administrator, you are required to configure the network security policy, And the policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy? Select two. Choose at least one answer.
a. Switch1(config-if)# switchport port-security violation shutdown

b. Switch1(config)# access-list 10 permit ip host

Bottom of Form

Potrebbero piacerti anche