Parte 4
![]() |
![]() |
![]() |
Título del Test:![]() Parte 4 Descripción: Parte 4 Fecha de Creación: 2016/06/19 Categoría: Otros Número Preguntas: 77
|




Comentarios |
---|
NO HAY REGISTROS |
A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1? (Choose two.). Configure port Fa0/1 to accept connections only from the static IP address of the server. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors. Configure the MAC address of the server as a static entry associated with port Fa0/1. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1. The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy? (Choose two.). Switch1(config-if)# switchport port-security maximum 1. Switch1(config)# mac-address-table secure. Switch1(config)# access-list 10 permit ip host. Switch1(config-if)# switchport port-security violation shutdown. Switch1(config-if)# ip access-group 10. What are the possible trunking modes for a switch port? (Choose three.). transparent. auto. on. desirable. client. forwarding. Refer to the topology shown in the exhibit. Which ports will be STP designated ports if all the links are operating at the same bandwidth? (Choose three.). Switch A - Fa0/0. Switch A - Fa0/1. Switch B - Fa0/0. Switch B - Fa0/1. Switch C - Fa0/0. Switch C - Fa0/1. A Catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased? (Choose three.). Erase flash. Restart the switch. Delete the VLAN database. Erase the running configuration. Erase the startup configuration. Modify the configuration register. The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?. Lower the bridge priority number. Change the MAC address of the switch. Increase the VTP revision number for the domain. Lower the root path cost on the switch ports. Assign the switch an IP address with the lowest value. Refer to the exhibit. Why has this switch not been elected the root bridge for VLAN1?. It has more than one interface that is connected to the root network segment. It is running RSTP while the elected root bridge is running 802.1d spanning tree. It has a higher MAC address than the elected root bridge. It has a higher bridge ID than the elected root bridge. At the end of an RSTP election process, which port and on which Access Layer Switch will assume the discarding role?. Switch3, port fa0/1. Switch3, port fa0/12. Switch4, port fa0/11. Switch4, port fa0/2. Switch3, port Gi0/1. Switch3, port Gi0/2. Select the action that results from executing these commands: Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security mac-address sticky. A dynamically learned MAC address is saved in the startup-configuration file. A dynamically learned MAC address is saved in the running-configuration file. A dynamically learned MAC address is saved in the VLAN database. Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received. Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received. Refer to the exhibit. The following commands are executed on interface fa0/1 of 2950Switch. 2950Switch(config-if)# switchport port-security 2950Switch(config-if)# switchport port-security mac-address sticky 2950Switch(config-if)# switchport port-security maximum 1 The Ethernet frame that is shown arrives on interface fa0/1. What two functions will occur when this frame is received by 2950Switch? (Choose two.). The MAC address table will now have an additional entry of fa0/1 FFFF.FFFF.FFFF. Only host A will be allowed to transmit frames on fa0/1. This frame will be discarded when it is received by 2950Switch. All frames arriving on 2950Switch with a destination of 0000.00aa.aaaa will be forwarded out fa0/1. Hosts B and C may forward frames out fa0/1 but frames arriving from other switches will not be forwarded out fa0/1. Only frames from source 0000.00bb.bbbb, the first learned MAC address of 2950Switch, will be forwarded out fa0/1. Refer to the exhibit. Some 2950 series switches are connected to the conference area of the corporate headquarters network. The switches provide two to three jacks per conference room to host laptop connections for employees who visit the headquarters office. When large groups of employees come from other locations, the network administrator often finds that hubs have been connected to wall jacks in the conference area although the ports on the access layer switches were not intended to support multiple workstations. What action could the network administrator take to prevent access by multiple laptops through a single switch port and still leave the switch functional for its intended use?. Configure static entries in the switch MAC address table to include the range of addresses used by visiting employees. Configure an ACL to allow only a single MAC address to connect to the switch at one time. Use the mac-address-table 1 global configuration command to limit each port to one source MAC address. Implement Port Security on all interfaces and use the port-security maximum 1 command to limit port access to a single MAC address. Implement Port Security on all interfaces and use the port-security mac-address sticky command to limit access to a single MAC address. Implement Port Security at global configuration mode and use the port-security maximum 1 command to allow each switch only one attached hub. Refer to the exhibit. A network administrator wants Switch3 to be the root bridge. What could be done to ensure Switch3 will be the root?. Configure the IP address on Switch3 to be higher than the IP addresses of Switch1 and Switch2. Configure the priority value on Switch3 to be higher than the priority values of Switch 1 and Switch2. Configure the BID on Switch3 to be lower than the BIDs of Switch1 and Switch2. Configure the MAC address on Switch3 to be higher than the Switch1 and Switch2 MAC addresses. Configure a loopback interface on Switch3 with an IP address lower than any IP address on Switch1 and Switch2. Refer to the exhibit. What switch proves the spanning-tree designated port role for the network segment that services the printers?. Switch1. Switch2. Switch3. Switch4. What is valid reason for a switch to deny port access to new devices when port security is enabled?. The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN. The denied MAC address are statically configured on the port. The minimum MAC threshold has been reached. The absolute aging times for the denied MAC addresses have expired. Refer to the exhibit. The output that is shown is generated at a switch. Which three of these statements are true? (Choose three.). All ports will be in a state of discarding, learning or forwarding. Thirty VLANs have been configured on this switch. The bridge priority is lower than the default value for spanning tree. All interfaces that are shown are on shared media. All designated ports are in a forwarding state. The switch must be the root bridge for all VLANs on this switch. Refer to the exhibit. Give this output for Switch3, what should the network administrator's next action be?. Check the trunk encapsulation mode for Switch3's fa0/1 port. Check the duplex mode for Switch3's fa0/1 port. Check the duplex mode for Switch1's fa0/2 port. Check the trunk encapsulation mode for Switch1's fa0/2 port. Refer to the exhibit. Which of these statements correctly describes the state of the switch once the boot process has been completed?. As FastEthernet0/12 will be the last to come up, it will not be blocked by STP. Remote access management of this switch will not be possible without configuration change. More VLANs will need to be created for this switch. The switch will need a different IOS code in order to support VLANs and STP. Refer to the exhibit. Three Cisco 2950 switches are set to their default priority settings. During the spanning-tree process, which switch will be elected as the root bridge?. Switch3. Switch4. Switch2. Switch1. Which two commands can be used to verify a trunk link configuration status on a Cisco switch? (Choose two). show interfaces trunk. show interfaces switchport. show ip interface brief. show interfaces vlan. Which three statements accurately describe layer 2 Ethernet switches? (Choose three). Microsegmentation decreases the number of collisions on the network. If a switch receives a frame for an unknown destination, it uses ARP to resolve the address. Spanning Tree Protocol allows switches to automatically share vlan information. In a properly functioning network with redundant switched paths, each switched segment will contain one root bridge with all its ports in the forwarding state. All other switches in that broadcast domain will have only one root port. Establishing vlans increases the number of broadcast domains. Switches that are configured with vlans make forwarding decisions based on both layer 2 and layer 3 address information. Which two of these are characteristics of the 802.1Q protocol? (Choose two). It is a layer 2 messaging protocol which maintains vlan configurations across network. It includes an 8-bit field which specifies the priority of a frame. It is used exclusively for tagging vlan frames and does not address network reconvergence following switched network topology changes. It modifies the 802.3 frame header, and thus requires that the FCS be recomputed. It is a trunking protocol capable of carrying untagged frames. Which term describes a spanning-tree network that has all switch ports in either the blocking or forwarding state?. redundant. spanned. provisioned. converged. Assuming the default switch configuration which vlan range can be added modified and removed on a cisco switch?. 2 through 1001. 1 through 1001. 1 through 1002. 2 through 1005. A network administrator needs to configure port security on a switch. Which two statements are true? (Choose two). The network administrator can apply port security to dynamic access ports. The network administrator can configure static secure or sticky secure mac addresses in the voice vlan. The sticky learning feature allows the addition of dynamically learned addresses to the running configuration. The network administrator can apply port security to EtherChannels. When dynamic mac address learning is enabled on an interface, the switch can learn new addresses, up to the maximum defined. Which IEEE standard protocol is initiated as a result of successful DTP completion in a switch over FastEthernet?. 802.3ad. 802.1w. 802.1Q. 802.1d. Which command enhances the 802.1D convergence time on ports that are connected to hosts?. spanning-tree backbonefast. spanning-tree uplinkfast. spanning-tree portfast. spanning-tree cost512. Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch? (Choose two). SW1# show swithport port-security interface FastEthernet 0/12. SW1# show swithport port-secure interface FastEthernet 0/12. SW1# show port-security interface FastEthernet 0/12. SW1# show running-config. Why will a switch never learn a broadcast address?. Broadcast frames are never sent to switches. Broadcast addresses use an incorrect format for the switching table. A broadcast address will never be the source address of a frame. Broadcasts only use network layer addressing. A broadcast frame is never forwarded by a switch. A technician has installed Switch B and needs to configure it for remote access from the management workstation connected Switch A. Which set of commands is required to accomplish this task?. SwitchB(config)#interface FastEthernet 0/1 SwitchB(config)#ip address 192.168.8.252 255.255.255.0 SwitchB(config)#no shutdown. SwitchB(config)#ip default-gateway 192.168.8.254 SwitchB(config)#interface vlan 1 SwitchB(config)#ip address 192.168.8.252 255.255.255.0 SwitchB(config)#no shutdown. SwitchB(config)#interface vlan 1 SwitchB(config)#ip address 192.168.8.252 255.255.255.0 SwitchB(config)#ip default-gateway 192.168.8.254 255.255.255.0 SwitchB(config)#no shutdown. SwitchB(config)#ip default-network 192.168.8.254 SwitchB(config)#interface vlan 1 SwitchB(config)#ip address 192.168.8.252 255.255.255.0 SwitchB(config)#no shutdown. Which three statements about RSTP are true?. RSTP significantly reduces topology reconverting time after link failure. RSTP expands the STP port roles by adding the alternate and backup roles. RSTP port states are blocking, discarding, learning and forwarding. RSTP also uses the STP proposal-agreement sequence. RSTP uses the same timer-based process as STP on point-to-point links. RSTP provides a faster transition to the forwarding state on point-to-point links than STP does. What value is primarily used to determine which port becomes the root port on each non-root switch in a spanning-tree topology?. lowest port MAC address. port priority number and MAC address. VTP revision number. highest port priority number. path cost. Which two states are the port states when RSTP has converged? (Choose two). blocking. learning. disabled. forwarding. listening. Which command enables RSTP on a switch?. spanning-tree mode rapid-pvst. spanning-tree uplinkfast. spanning-tree backbonefast. spanning-tree mode pvst. What is one benefit of PVST+?. PVST+ reduces the CPU cycles for all the switches in the network. PVST+ automatically selects the root bridge location, to provide optimization. PVST+ allows the root switch location to be optimized per vlan. PVST+ supports Layer 3 load balancing without loops. At which layer of the OSI model is RSTP used to prevent loops?. data link. network. physical. transport. Refer to the exhibit. A system administrator installed a new switch using a script to configure it. IP connectivity was tested using pings to Switch B. Later attempts to access NewSwitch using Telnet from Switch A failed. Which statement is true?. Executing password recovery is required. The virtual terminal lines are misconfigured. Use Telnet to connect to RouterA and then to NewSwitch to correct the error. Power cycle of NewSwitch will return it to a default configuration. In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN?. when a dual ring topology is in use. in an improperly implemented redundant topology. after broken links are re-established. when upper-layer protocols require high reliability. during high traffic periods. Refer to the exhibit. Which two statements are true of the interfaces on Switch1? (Choose two.). Interface FastEthernet0/2 has been disabled. Multiple devices are connected directly to FastEthernet0/1. FastEthernet0/1 is configured as a trunk link. FastEthernet0/1 is connected to a host with multiple network interface cards. FastEthernet0/5 has statically assigned MAC addresses. A hub is connected directly to FastEthernet0/5. What is the purpose of Spanning Tree Protocol?. to prevent routing loops. to create a default route. to provide multiple gateways for hosts. to maintain a loop-free Layer 2 network topology. Refer to the exhibit. The switches on a campus network have been interconnected as shown. All of the switches are running Spanning Tree Protocol with its default settings. Unusual traffic patterns are observed and it is discovered that Switch9 is the root bridge. Which change will ensure that Switch1 will be selected as the root bridge instead of Switch9?. Lower the bridge priority on Switch1. Raise the bridge priority on Switch1. Lower the bridge priority on Switch9. Raise the bridge priority on Switch9. Disable spanning tree on Switch9. Physically replace Switch9 with Switch1 in the topology. Refer to the exhibit. Switch-1 needs to send data to a host with a MAC address of 00b0.d056.efa4. What will Switch-1 do with this data?. Switch-1 will drop the data because it does not have an entry for that MAC address. Switch-1 will forward the data to its default gateway. Switch-1 will flood the data out all of its ports except the port from which the data originated. Switch-1 will send an ARP request out all its ports except the port from which the data originated. Refer to the exhibit. Given the output shown from this Cisco Catalyst 2950, what is the most likely reason that interface FastEthernet 0/10 is not the root port for VLAN 2?. This switch has more than one interface connected to the root network segment in VLAN 2. This switch is running RSTP while the elected designated switch is running 802.1d Spanning Tree. This switch interface has a higher path cost to the root bridge than another in the topology. This switch has a lower bridge ID for VLAN 2 than the elected designated switch. Refer to the exhibit. Switch1 has just been restarted and has passed the POST routine. Host A sends its initial frame to Host C. What is the first thing the switch will do as regards populating the switching table?. Switch1 will add 192.168.23.4 to the switching table. Switch1 will add 192.168.23.12 to the switching table. Switch1 will add 000A.8A47.E612 to the switching table. Switch1 will add 000B.DB95.2EE9 to the switching table. Refer to the exhibit. Which two statements are true about interVLAN routing in the topology that is shown in the exhibit? (Choose two.). Host E and host F use the same IP gateway address. Router1 and Switch2 should be connected via a crossover cable. Router1 will not play a role in communications between host A and host D. The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces. Router1 needs more LAN interfaces to accommodate the VLANs that are shown in the exhibit. The FastEthernet 0/0 interface on Router1 and Switch2 trunk ports must be configured using the same encapsulation type. A network administrator is explaining VTP configuration to a new technician. What should the network administrator tell the new technician about VTP configuration? (Choose three.). A switch in the VTP client mode cannot update its local VLAN database. A trunk link must be configured between the switches to forward VTP updates. A switch in the VTP server mode can update a switch in the VTP transparent mode. A switch in the VTP transparent mode will forward updates that it receives to other switches. A switch in the VTP server mode only updates switches in the VTP client mode that have a higher VTP revision number. A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership. A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? (Choose two.). hub. router. switch. STP. subinterfaces. VLAN. Refer to the exhibit. A network associate needs to configure the switches and router in the graphic so that the hosts in VLAN3 and VLAN4 can communicate with the enterprise server in VLAN2. Which two Ethernet segments would need to be configured as trunk links? (Choose two.). A. B. C. D. E. F. Refer to the exhibit. A network administrator is adding two new hosts to Switch A. Which three values could be used for the configuration of these hosts? (Choose three.). host A IP address: 192.168.1.79. host A IP address: 192.168.1.64. host A default gateway: 192.168.1.78. host B IP address: 192.168.1.128. host B default gateway: 192.168.1.129. host B IP address: 192.168.1.190. Which three statements are typical characteristics of VLAN arrangements? (Choose three.). A new switch has no VLANs configured. Connectivity between VLANs requires a Layer 3 device. VLANs typically decrease the number of collision domains. Each VLAN uses a separate address space. A switch maintains a separate bridging table for each VLAN. VLANs cannot span multiple switches. Which three of these statements regarding 802.1Q trunking are correct? (Choose three.). 802.1Q native VLAN frames are untagged by default. 802.1Q trunking ports can also be secure ports. 802.1Q trunks can use 10 Mb/s Ethernet interfaces. 802.1Q trunks require full-duplex, point-to-point connectivity. 802.1Q trunks should have native VLANs that are the same at both ends. By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access? (Choose two.). Create an additional ACL to block the access to VLAN 1. Move the management VLAN to something other than default. Move all ports to another VLAN and deactivate the default VLAN. Limit the access in the switch using port security configuration. Use static VLAN in trunks and access ports to restrict connections. Shutdown all unused ports in the Catalyst switch. What is the name of the VTP mode of operation that enables a switch to forward only VTP advertisements while still permitting the editing of local VLAN information?. server. client. tunnel. transparent. Which two benefits are provided by creating VLANs? (Choose two.). added security. dedicated bandwidth. provides segmentation. allows switches to route traffic between subinterfaces. contains collisions. Which two link protocols are used to carry multiple VLANs over a single link? (Choose two.). VTP. 802.1q. IGP. ISL. 802.3u. Which VTP mode is capable of creating only local VLANs and does not synchronize with other switches in the VTP domain?. client. dynamic. server. static. transparent. A switch is configured with all ports assigned to vlan 2 with full duplex FastEthernet to segment existing departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch?. More collision domains will be created. IP address utilization will be more efficient. More bandwidth will be required than was needed previously. An additional broadcast domain will be created. Which two statements about the use of VLANs to segment a network are true? (Choose two.). VLANs increase the size of collision domains. VLANs allow logical grouping of users by function. VLANs simplify switch administration. VLANs enhance network security. On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?. a router with subinterfaces configured on the physical interface that is connected to the switch. a router with an IP address on the physical interface connected to the switch. a switch with an access link that is configured between the switches. a switch with a trunk link that is configured between the switches. Which two statements describe the Cisco implementation of VLANs? (Choose two.). VLAN 1 is the default Ethernet VLAN. CDP advertisements are only sent on VLAN 1002. By default, the management VLAN is VLAN 1005. By default, the switch IP address is in VLAN 1005. VLAN 1002 through 1005 are automatically created and cannot be deleted. What are three advantages of VLANs? (Choose three.). VLANs establish broadcast domains in switched networks. VLANs utilize packet filtering to enhance network security. VLANs provide a method of conserving IP addresses in large networks. VLANs provide a low-latency internetworking alternative to routed networks. VLANs allow access to network services based on department, not physical location. VLANs can greatly simplify adding, moving, or changing hosts on the network. Which of the following are benefits of VLANs? (Choose three.). They increase the size of collision domains. They allow logical grouping of users by function. They can enhance network security. They increase the size of broadcast domains while decreasing the number of collision domains. They increase the number of broadcast domains while decreasing the size of the broadcast domains. They simplify switch administration. An administrator is unsuccessful in adding VLAN 50 to a switch. While troubleshooting the problem, the administrator views the output of the show vtp status command, which is displayed in the graphic. What commands must be issued on this switch to add VLAN 50 to the database? (Choose two.). Switch(config-if)# switchport access vlan 50. Switch(vlan)# vtp server. Switch(config)# config-revision 20. Switch(config)# vlan 50 name Tech. Switch(vlan)# vlan 50. Switch(vlan)# switchport trunk vlan 50. Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network? (Choose three.). The subnet mask in use is 255.255.255.192. The subnet mask in use is 255.255.255.128. The IP address 172.16.1.25 can be assigned to hosts in VLAN1. The IP address 172.16.1.205 can be assigned to hosts in VLAN1. The LAN interface of the router is configured with one IP address. The LAN interface of the router is configured with multiple IP addresses. Refer to the diagram. Which three statements describe the router port configuration and the switch port configuration as shown in the topology? (Choose three.). The Router1 WAN port is configured as a trunking port. The Router1 port connected to Switch1 is configured using subinterfaces. The Router1 port connected to Switch1 is configured as 10 Mbps. The Switch1 port connected to Router1 is configured as a trunking port. The Switch1 port connected to Host B is configured as an access port. The Switch1 port connected to Hub1 is configured as full duplex. Refer to the exhibit. The network shown in the diagram is experiencing connectivity problems. Which of the following will correct the problems? (Choose two.). Configure the gateway on Host A as 10.1.1.1. Configure the gateway on Host B as 10.1.2.254. Configure the IP address of Host A as 10.1.2.2. Configure the IP address of Host B as 10.1.2.2. Configure the masks on both hosts to be 255.255.255.224. Configure the masks on both hosts to be 255.255.255.240. A network associate is trying to understand the operation of the FLD Corporation by studying the network in the exhibit. The associate knows that the server in VLAN 4 provides the necessary resources to support the user hosts in the other VLANs. The associate needs to determine which interfaces are access ports. Which interfaces are access ports? (Choose three.). Switch1 - Fa 0/2. Switch1 - Fa 0/9. Switch2 - Fa 0/3. Switch2 - Fa 0/4. Switch2 - Fa 0/8. Router - Fa 1/0. What are three valid reasons to assign ports to VLANs on a switch? (Choose three.). to make VTP easier to implement. to isolate broadcast traffic. to increase the size of the collision domain. to allow more devices to connect to the network. to logically group hosts according to function. to increase network security. Which statements describe two of the benefits of VLAN Trunking Protocol? (Choose two.). VTP allows routing between VLANs. VTP allows a single switch port to carry information to more than one VLAN. VTP allows physically redundant links while preventing switching loops. VTP simplifies switch administration by allowing switches to automatically share VLAN configuration information. VTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain. VTP enhances security by preventing unauthorized hosts from connecting to the VTP domain. What are two results of entering the Switch(config)# vtp mode client command on a Catalyst switch? (Choose two.). The switch will ignore VTP summary advertisements. The switch will forward VTP summary advertisements. The switch will process VTP summary advertisements. The switch will originate VTP summary advertisements. The switch will create, modify and delete VLANs for the entire VTP domain. Refer to the exhibit. What commands must be configured on the 2950 switch and the router to allow communication between host 1 and host 2? (Choose two.). Router(config)# interface fastethernet 0/0 Router(config-if)# ip address 192.168.1.1 255.255.255.0 Router(config-if)# no shut down. Router(config)# interface fastethernet 0/0 Router(config-if)# no shut down Router(config)# interface fastethernet 0/0.1 Router(config-subif)# encapsulation dot1q 10 Router(config-subif)# ip address 192.168.10.1 255.255.255.0 Router(config-subif)# interface fastethernet 0/0.2 Router(config-subif)# encapsulation dot1q 20 Router(config-subif)# ip address 192.168.20.1 255.255.255.0. Router(config)# router eigrp 100 Router(config-router)# network 192.168.10.0 Router(config-router)# network 192.168.20.0. Switch1(config)# vlan database Switch1(config-vlan)# vtp domain XYZ Switch1(config-vlan)# vtp server. Switch1(config)# interface fastethernet 0/1 Switch1(config-if)# switchport mode trunk. Switch1(config)# interface vlan 1 Switch1(config-if)# ip default-gateway 192.168.1.1. Which two of these are used by bridges and switches to prevent loops in a layer 2 network? (Choose two.). 802.1D. VTP. 802.1Q. STP. SAP. Which switch would STP choose to become the root bridge in the selection process?. 32768: 11-22-33-44-55-66. 32768: 22-33-44-55-66-77. 32769: 11-22-33-44-55-65. 32769: 22-33-44-55-66-78. A company implements video conferencing over IP on their Ethernet LAN. The users notice that the network slows down, and the video either stutters or fails completely. What is the most likely reason for this?. minimum cell rate (MCR). quality of service (QoS). modulation. packet switching exchange (PSE). reliable transport protocol (RTP). A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?. Visually verify the MAC addresses and then telnet to the switches to enter the switchportport security mac-address command. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security. An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? (Choose two.). The switch must be configured with an IP address, subnet mask, and default gateway. The switch must be connected to a router over a VLAN trunk. The switch must be reachable through a port connected to its management VLAN. The switch console port must be connected to the Ethernet LAN. The switch management VLAN must be created and have a membership of at least one switch port. The switch must be fully configured as an SNMP agent. Which of the following are true regarding bridges and switches? (Choose two.). Bridges are faster than switches because they have fewer ports. A switch is a multiport bridge. Bridges and switches learn MAC addresses by examining the source MAC address of each frame received. A bridge will forward a broadcast but a switch will not. Bridges and switches increase the size of a collision domain. Which of the following statements are true regarding bridges and switches? (Choose three). Switches are primarily software based while bridges are hardware based. Both bridges and switches forward Layer 2 broadcasts. Bridges are frequently faster than switches. Switches have a higher number of ports than most bridges. Bridges define broadcast domains while switches define collision domains. Both bridges and switches make forwarding decisions based on Layer 2 addresses. |