Cisco Networking Questions and Answers

What are the three true statements about the default of a new switch? (Choose two.)

  • All switch ports are assigned to VLAN1.
  • All interfaces are set to automatic.
  • The flash directory contains the IOS image.

Image

See illustration. The priorities for port spanning-tree are listed beneath each interface. The network administrator enters the command spanning-tree vlan 1 root primary in S4. What are the three port correct results? (Choose two.)

  • S1 Gi0 / 1 becomes a root port.
  • S4 Gi0 / 1 becomes a root port.
  • S2 Gi0 / 2 becomes a non-designated port.

Which method establishes an administrative connection to the wireless access point?

From a computer on the same IP subnet as the access point, enter the default IP address of the access point in a Web browser.

Image

See illustration. The network administrator enters the configuration shown to allow SSH and Telnet connections on the switch. Telnet connections fail. What is the most likely cause of this problem?

  • The transport input command is misconfigured.

Image

See illustration. The switches are configured for VTP as shown. What two statements correctly describe the operation of these switches? (Choose two.)

  • You can add a new VLAN to switch1 and that information will be added to Switch2 and Switch4.
  • You can delete an existing VLAN and Switch4 same VLAN will be deleted from Switch2 and switch1.

To which two types of devices enables Power over Ethernet (PoE) switch that provides energy? (Choose two.)

  • Wireless Access Points
  • IP phones

What are the two statements describe Spanning Tree Protocol? (Choose two.)

  • Eliminates Layer 2 loops in network topologies.
  • Can only be used in networks in which Layer 2 switching in use.

A network administrator has the task to select the hardware to support a switched network of a large company. The system requires redundant backplane interconnections between switches with eight ports of high density. What is the proper hardware solution for this company?

  • stackable switches

What are two benefits of IEEE 802.11n? (Choose two.)

  • enhanced range
  • high data rate

What are the three tasks to be performed before moving a Catalyst switch to a new VTP management domain? (Choose two.)

  • Verify that the new switch has a configuration revision number lower than that of the other switches in the domain.
  • Select the mode and VTP version.
  • configure the switch with the name of the new management domain.

What are the three benefits of a hierarchical model of network design? (Choose two.)

  • scalability
  • security
  • manageability

Image

See illustration. Which switch will be elected as the root bridge spanning tree topology?

  • Cat-A

Image

See illustration. All hosts are in listening mode. The Host 1 and Host 4 transmits data simultaneously. How do the hosts on the network? (Choose two.)

  • The hub will block the port connected to Host 4 to avoid a collision.
  • If a host has data to transmit after the period of postponement, the host checks before transferring to determine if the line is idle.

Image

See illustration. Two switches, SW1 and SW2 are interconnected via a trunk. The Host A is found in the native VLAN. How the trunk through the traffic that comes from labeling Host A?

  • Untagged traffic is sent as part of the native VLAN.

What are the two methods can be used to remove entries from the MAC address table of switch? (Choose two.)

  • Restart the switch to clear all dynamically learned addresses.
  • The command clear mac-address-table deletes table entries are configured statically and dynamically.

Image

See illustration. Which statement is true regarding the information displayed?

  • The interfaces gi0 / 1 and FA0 / 1 are data from multiple VLANs.

Image

See illustration. The switches C1, D1, D2 and S2 are configured with RSTP. S1 and S3 can not achieve rapid PVST + and are in the default configuration. What are three consequences that this poses to the Layer 2 network? (Choose two.)

  • As S1 and S3 are not links, they have no spanning-tree instance.
  • PortFast can be enabled on all ports in S1 and S3.
  • Gi0 / 1 on S1 and Gi0 / 1 on S3 become designated ports.

Image

See illustration. What is the consequence if the port F0 / 0 to SW1 is configured as an edge port?

  • The port F0 / 2 SW1 longer passes BPDUs to SW4.

Image

See illustration. The Host A sends a broadcast message. Which devices will see the broadcast?

  • Host C and the router

Why is it important that a network administrator consider the diameter of the spanning-tree when choosing a root bridge?

The BPDUs are discarded due to expiry timers

Image

See illustration. All devices in the network are interconnected via trunk links with debugging enabled VTP on the three switches. Which of the VLAN are purged from the switch SW3?

  • VLAN 10 and VLAN 20

Image

See illustration. What device is the authenticator?

  • access point

What happens when the zeroize crypto key rsa command is entered on a switch configured with the transport input ssh command on the vty lines?

  • The switch allows remote connections only after the creation of a new pair of RSA keys.

Image

See illustration. What does “FORWARDING” (forwarding) in the command output shown?

  • The switch sends and receives data frames.

A network administrator wants to add a new switch to existing VTP domain. The new switch will have a VLAN that the administrator does not want other switches displayed. All other VLANs should be visible on all switches and all the VLAN must be visible to the switch again. What solution fulfills the requirements with the least administrative effort?

  • Add the switch in client mode. After existing VLANs have propagated, change the switch to transparent mode. Add the private VLAN.

How can I check the SSID for a wireless network connection?

From the Network Connections menu, choose View wireless network.

What are the three true statements regarding router-on-a-stick inter VLAN routing? (Choose two.)

  • requires the use of subinterfaces on the router
  • can impact performance if many VLANs compete for bandwidth in a single router interface
  • is more cost effective and scalable than using multiple physical interfaces

How does VTP switch operating if it has been configured to only forward VTP publications?

transparent

Image

See illustration. The port Fa0 / 1 Fast Ethernet switch is configured to auto negotiate speed settings / duplex also the NIC in the machine is set to 100 Mbps, full duplex. He has received the error log message that appears. Which two solutions can fix the problem? (Choose two.)

  • Set both sides of the settings link auto-negotiates speed / duplex.
  • Manually configure both sides of the link to 100 Mbps, full duplex.

Image

See illustration. Every VLAN configured on S2 are present in S1 but not S3. All switches are set to VTP server mode and have configured VTP domain names are identical. What problem can arise?

  • S3 joined the network with a revision number lower than that of S1.

Image

See illustration. Recently acquired the switch SW2 and added to the network. What settings should be applied to SW2 to participate in the same VTP domain the switch SW1, receives VLAN information from SW1 and synchronize VLAN information?

  • Configure SW2 as a VTP client.

How does an Ethernet switch to handle the traffic if the shared memory buffers and memory port are full?

The switch discards the traffic.

Image

See illustration. PC_B hosts PC_A and simultaneously send traffic and patterns of transmission stations collide. How far it spreads the collision?

  • switch SW1

Image

See illustration. The hosts connected to switch SW1 can not communicate with hosts on the same VLAN connected to switch SW2. What should be done to solve the problem?

  • Reconfigure the trunk port on a switch SW2 with static trunk configuration.

Image

See illustration. An Ethernet switch has developed the CAM table below. What you should do the switch when it receives the frame that appears at the bottom of the picture?

  • send the frame from all interfaces except the Interface3

Image

See illustration. Two Catalyst switches are connected and both have ports configured for VLANs 40 and 50 as shown. What will allow hosts on the same VLAN to communicate with each other through different switches?

  • trunking

What are the two tasks to be performed when deleting an entire VLAN? (Choose two.)

  • Delete the file flash vlan.dat.
  • Restart the switch for the changes to take effect.

Image

See illustration. Each switch is shown with its MAC address. Which switch will be elected as the spanning-tree root bridge if the switches are configured with their default priority values?

  • switch F

Image

See illustration. What are the three statements describe why host1 and host2 can not communicate? (Choose two.)

  • You need a router to send traffic between hosts.
  • The switch ports are located on different VLANs.
  • The hosts are configured on different logical networks.

Image

See illustration. What encryption algorithm uses the 802.11i standard for data encryption?

  • AES

Image

See illustration. The switch SW2 was examined in a laboratory environment and then inserted into a production network without reloading its configuration. After the trunk link between SW1 and SW2 is activated, all users lost connectivity to the network. What could be causing the problem?

  • The newly inserted switch has a revision number higher VTP server, causing the VLAN information in VTP domain were eliminated.

Image

See illustration. What are the three options correctly identify the information that can be associated with this outcome? (Choose two.)

  • It uses the standard trunking protocol.
  • The setting is appropriate for a network design router-on-a-stick.
  • The interface is divided into FastEthernet3/0/0 subinterfaces.

Image

See illustration. All switches are configured with rapid PVST +. The port Gi0 / 2 on S2 is the root port. A network administrator runs the command spanning-tree link-type point-to-point on port Gi0 / 1 to the switch S2. What is the output of this command?

  • If the link between D1 and C1 fails, the port Gi0 / 2 on S2 passes quickly shipping status.

Image

See illustration. What are the two true statements about what is the cost value of 23 for Switch4? (Choose two.)

  • This cost represents the lowest cost route for the switch to the root switch4.
  • Switch4 add the cost of a Fast Ethernet link to 23 to determine the total cost to reach the root switch.

Image

See illustration. A new host needs to connect to VLAN 1. What IP address should be assigned to this new host?

  • 192.168.1.22 / 28

Image

See illustration. After the command listed are entered into the router R1 and switch S1, the administrator enters the show interface trunk FA0 / 1 and obtains the results shown. What problem can arise?

  • The trunk was not established because the router does not tolerate the dynamic link protocol.

Which statement is true regarding the command service password-encryption?

To view the encrypted password for the service password-encryption command in plain text, run the command no service password-encryption.

What command finds the next available parameter for the command SwitchX # clock with the least amount of keystrokes?

SwitchX # clock then Tab

What three configurations are required to allow remote access to a switch using the telnet command? (Choose two.)

  • default gateway
  • vty line password
  • Switch IP address in the management VLAN

Image

See illustration. You receive a package in the physical interface FastEthernet 0 / 1 from VLAN 1. The packet’s destination address is 192.168.1.85. What will the router with this package?

The router ignores the packet because the source and destination are in the same broadcast domain.