You are on page 1of 42

What hash type does Cisco use to validate the integrity of downloaded images?

a.
Md1

b.
Sha2

c.
Sha1

d.
Md5

Feedback
Your answer is correct.

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text
In which circumstance are multiple copies of the same unicast frame likely to be
transmitted in a switched LAN?

a.
during high traffic periods
b.
in an improperly implemented redundant topology

c.
after broken links are re-established

d.
when upper-layer protocols require high reliability

Feedback
Your answer is correct.

Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text
How can you protect CDP from reconnaissance attacks?

a.
Disbale CDP on trunk ports.

b.
Enable dynamic ARP inspection on all untrusted ports.

c.
Enable dot1x on all ports that are connected to other switches.
d.
Disable CDP on ports connected to endpoints.

Feedback
Your answer is correct.

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A router has learned three possible routes that could be used to reach a destination
network. One route is from EIGRP and has a composite metric of 20514560. Another
route is from OSPF with a metric of 782. The last is from RIPv2 and has a metric of
4. Which route or routes will the router install in the routing table?

a.
the OSPF and RIPv2 routes

b.
the OSPF route

c.
the EIGRP route

d.
the RIPv2 route
Feedback
Your answer is correct.

Question 5
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which is an advantages of static routing when compared to dynamic routing?

a.
Routing tables adapt automatically to topology changes.

b.
Route summarization is computed automatically by the router.

c.
Security increases because only the network administrator may change the routing table.

d.
An efficient algorithm is used to build routing tables, using automatic updates.

Feedback
Your answer is correct.

Question 6
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Which command is needed to enable SSH support on a Cisco Router?

a.
crypto key unlock rsa

b.
crypto key generate rsa

c.
crypto key zeroize rsa

d.
crypto key lock rsa

Feedback
Your answer is correct.

Question 7
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A network administrator enters the following switch commands:
Switch(config)#interface range fa0/0-5 Switch(config-if-range)#switchport access vlan
2 What is the result of these commands?
a.
Six new vlans are created on six switch ports

b.
One new vlan is created on five switch ports

c.
One new vlan is created with the vlan number 2

d.
Two new vlans are created on six switch ports

Feedback
Your answer is correct.

Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A company's corporate policy has been updated to require that stateless, 1-to-1, and
IPv6 to IPv6 translations at the Internet edge are performed. What is the best
solution to ensure compliance with this new policy?

a.
NAT44
b.
NPTv4

c.
NAT64

d.
NPTv6

Feedback
Your answer is correct.

Question 9
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Cisco Catalyst switches CAT1 and CAT2 have a connection between them using ports
FA0/13. An 802.1Q trunk is configured between the two switches. On CAT1, VLAN 10 is
chosen as native, but on CAT2 the native VLAN is not specified. What will happen in
this scenario?

a.
A native VLAN mismatch error message will appear.

b.
VLAN 10 on CAT1 and VLAN 1 on CAT2 will send untagged frames.

c.
802.1Q giants frames could saturate the link.

d.
VLAN 10 on CAT1 and VLAN 1 on CAT2 will send tagged frames.

Feedback
Your answer is correct.

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is not a benefit of VLANs?

a.
They increase the size of collision domains.

b.
They allow logical grouping of users by function.

c.
They can enhance network security.

d.
They increase the number of broadcast domains while decreasing the size of the
broadcast domains.
Feedback
Your answer is correct.

Question 11
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What does a Layer 2 switch use to decide where to forward a received frame?

a.
destination IP address

b.
source MAC address

c.
destination MAC address

d.
source switch port

Feedback
Your answer is correct.

Question 12
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Which of these statements regarding 802.1Q trunking is wrong?

a.
802.1Q trunks should have native VLANs that are the same at both ends.

b.
802.1Q native VLAN frames are untagged by default.

c.
802.1Q trunks can use 10 Mb/s Ethernet interfaces.

d.
802.1Q trunking ports can also be secure ports.

Feedback
Your answer is correct.

Question 13
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Under what circumstances should an administrator prefer local VLANs over end-to-end
VLANs?
a.
Users are grouped into VLANs independent of physical location.

b.
Eighty percent of traffic on the network is destined for Internet sites.

c.
Eighty percent of a workgroup’s traffic is to the workgroup’s own local server.

d.
There are common sets of traffic filtering requirements for workgroups located in
multiple buildings.

Feedback
Your answer is correct.

Question 14
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which statement about VLAN operation on Cisco Catalyst switches is true?

a.
Ports between switches should be configured in access mode so that VLANs can span
across the ports.
b.
Unknown unicast frames are retransmitted only to the ports that belong to the same
VLAN.

c.
Broadcast and multicast frames are retransmitted to ports that are configured on
different VLAN.

d.
When a packet is received from an 802.1Q trunk, the VLAN ID can be determined from
the source MAC address and the MAC address table.

Feedback
Your answer is correct.

Question 15
Correct
Mark 1.00 out of 1.00

Flag question

Question text
After reloading a router, you issue the dir command to verify the installation and
observe that the image file appears to be missing. For what reason could the image
file fail to appear in the dir output?

a.
The reload command was issued from ROMMON

b.
The secure boot-comfit command is configured.
c.
The secure boot-image command is configured.

d.
The confreg 0x24 command is configured.

Feedback
Your answer is correct.

Question 16
Correct
Mark 1.00 out of 1.00

Flag question

Question text
In which type of attack does the attacker attempt to overload the CAM table on a
switch so that the switch acts as a hub?

a.
DoS

b.
gratuitous ARP

c.
MAC flooding
d.
MAC spoofing

Feedback
Your answer is correct.

Question 17
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is a potential drawback to leaving VLAN 1 as the native VLAN?

a.
The CAM might be overloaded, effectively turning the switch into a hub

b.
It may be susceptible to a VLAN hoping attack.

c.
VLAN 1 might be vulnerable to IP address spoofing

d.
Gratuitous ARPs might be able to conduct a man-in-the-middle attack

Feedback
Your answer is correct.

Question 18
Correct
Mark 1.00 out of 1.00

Flag question

Question text
VLAN 3 is not yet configured on your switch. What happens if you set the switchport
access vlan 3 command in interface configuration mode?

a.
The command is accepted and the respective VLAN is added to vlan.dat.

b.
The command is accepted and you must configure the VLAN manually.

c.
The port turns amber

d.
The command is rejected.

Feedback
Your answer is correct.

Question 19
Correct
Mark 1.00 out of 1.00

Flag question

Question text
You have just created a new VLAN on your network. What is one step that you should
include in your VLAN-based implementation and verification plan?

a.
Verify that different native VLANs exist between two switches for security purposes.

b.
Verify that the switch is configured to allow for trunking on the switch ports.

c.
Verify that the VLAN was added on all switches with the use of the show vlan command.

d.
Verify that each switch port has the correct IP address space assigned to it for the
new VLAN.

Feedback
Your answer is correct.

Question 20
Correct
Mark 1.00 out of 1.00

Flag question

Question text
If the native VLAN on a trunk is different on each end of the link, what is a
potential consequence?

a.
The interface with the lower native VLAN may shut down
b.
The switch with the higher native VLAN may shut down

c.
The interface on both switches may shut down

d.
STP loops may occur

Feedback
Your answer is correct.

Question 21
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A router has two Fast Ethernet interfaces and needs to connect to four VLANs in the
local network. How can you accomplish this task, using the fewest physical interfaces
and without decreasing network performance?

a.
Use a hub to connect the four VLANS with a Fast Ethernet interface on the router.

b.
Implement a router-on-a-stick configuration.
c.
Add two more Fast Ethernet interfaces.

d.
Add a second router to handle the VLAN traffic.

Feedback
Your answer is correct.

Question 22
Correct
Mark 1.00 out of 1.00

Flag question

Question text
On a corporate network, hosts on the same VLAN can communicate with each other, but
they are unable to communicate with hosts on different VLANs. What is needed to allow
communication between the VLANs?

a.
a router with subinterfaces configured on the physical interface that is connected to
the switch

b.
a switch with an access link that is configured between the switches

c.
a switch with a trunk link that is configured between the switches

d.
a router with an IP address on the physical interface connected to the switch
Feedback
Your answer is correct.

Question 23
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A switch is configured with all ports assigned to VLAN 2 with full duplex
FastEthernet to segment existing departmental traffic. What is the effect of adding
switch ports to a new VLAN on the switch?

a.
More collision domains will be created.

b.
More bandwidth will be required than was needed previously.

c.
An additional broadcast domain will be created.

d.
IP address utilization will be more efficient.

Feedback
Your answer is correct.

Question 24
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which commands correctly verify whether port security has been configured on port
FastEthernet 0/12 on a switch?

a.
SW1#show port-secure interface FastEthernet 0/12

b.
SW1#show switchport port-security interface FastEthernet 0/12

c.
SW1#show port-security interface FastEthernet 0/12

d.
SW1#show switchport port-secure interface FastEthernet 0/12

Feedback
Your answer is correct.

Question 25
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of these statements is not an advantage of VLANs?
a.
VLANs allow access to network services based on department, not physical location.

b.
VLANs can greatly simplify adding, moving, or changing hosts on the network.

c.
VLANs establish broadcast domains in switched networks.

d.
VLANs utilize packet filtering to enhance network security.

Feedback
Your answer is correct.

Question 26
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Three switches are connected to one another via trunk ports. Assuming the default
switch configuration, which switch is elected as the root bridge for the spanning-
tree instance of VLAN 1?

a.
the switch with the highest IP address
b.
the switch with the lowest MAC address

c.
the switch with the highest MAC address

d.
the switch with the lowest IP address

Feedback
Your answer is correct.

Question 27
Correct
Mark 1.00 out of 1.00

Flag question

Question text
In which situation should you use in-band management?

a.
when management applications need concurrent access to the device

b.
when you require ROMMON access

c.
when a network device fails to forward packets
d.
when the control plane fails to respond

Feedback
Your answer is correct.

Question 28
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which link protocols is used to carry multiple VLANs over a single link?

a.
802.3u

b.
802.1q

c.
VTP

d.
IGP

Feedback
Your answer is correct.
Question 29
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which set of commands is recommended to prevent the use of a hub in the access layer?

a.
switch(config-if)#switchport mode access switch(config-if)#switchport port-security
maximum 1

b.
switch(config-if)#switchport mode access switch(config-if)#switchport port-security
mac-address 1

c.
switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security
maximum 1

d.
switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security
mac-address 1

Feedback
Your answer is correct.

Question 30
Correct
Mark 1.00 out of 1.00
Flag question

Question text
In a switched environment, what does the IEEE 802.1Q standard describe?

a.
the operation of VTP

b.
an approach to wireless LAN communication

c.
a method of VLAN trunking

d.
the process for root bridge selection

Feedback
Your answer is correct.

Question 31
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is the Cisco preferred countermeasure to mitigate CAM overflows?
a.
Port security

b.
Dynamic port security

c.
IP source guard

d.
Root guard

Feedback
Your answer is correct.

Question 32
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which is not a valid mode for a switch port used as a VLAN trunk?

a.
forwarding

b.
desirable

c.
auto

d.
on

Feedback
Your answer is correct.

Question 33
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
What is the actual IOS privilege level of User Exec mode?

a.
15

b.
1

c.
5

d.
0
Feedback
Your answer is incorrect.
Question 34
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
Which command can be used from a PC to verify the connectivity between hosts that
connect through a switch in the same LAN?

a.
traceroute address

b.
arp address

c.
ping address

d.
tracert address

Feedback
Your answer is incorrect.

Question 35
Correct
Mark 1.00 out of 1.00

Flag question
Question text
Which IEEE standard protocol is initiated as a result of successful DTP completion in
a switch over Fast Ethernet?

a.
802.1D

b.
802.3ad

c.
802.1Q

d.
802.1w

Feedback
Your answer is correct.

Question 36
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
When a VLAN port configured as a trunk receives an untagged frame, what will happen?

a.
The frame will first be tagged, then processed as a native VLAN frame.
b.
The frame will be dropped.

c.
The frame will cause an error message to be sent.

d.
The frame will be processed as a native VLAN frame

Feedback
Your answer is incorrect.

Question 37
Correct
Mark 1.00 out of 1.00

Flag question

Question text
You want to allow all of your company's users to access the Internet without allowing
other Web servers to collect the IP addresses of individual users. What solutions can
you use?

a.
Configure a proxy server to hide users' local IP addresses

b.
Assign unique IP addresses to all users.
c.
Assign the same IP address to all users.

d.
Install a Web content filter to hide users' local IP addresses.

Feedback
Your answer is correct.

Question 38
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is the function of the command switchport trunk native vlan 999 on a Cisco
Catalyst switch?

a.
It designates VLAN 999 as the default for all unknown tagged traffic.

b.
It designates VLAN 999 for untagged traffic.

c.
It creates a VLAN 999 interface

d.
It blocks VLAN 999 traffic from passing on the trunk.
Feedback
Your answer is correct.

Question 39
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Why will a switch never learn a broadcast address?

a.
Broadcast frames are never sent to switches.

b.
Broadcasts only use network layer addressing.

c.
A broadcast address will never be the source address of a frame.

d.
A broadcast frame is never forwarded by a switch.

Feedback
Your answer is correct.

Question 40
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Which is a benefit provided by creating VLANs?

a.
allows switches to route traffic between subinterfaces

b.
provides segmentation

c.
dedicated bandwidth

d.
contains collisions

Feedback
Your answer is correct.

Question 41
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
When you create a network implementation for a VLAN solution, what is one procedure
that you should include in your plan?
a.
Implement the entire solution and then test end-to-end to make sure that it is
performing as designed.

b.
Implement trunking of all VLANs to ensure that traffic is crossing the network as
needed before performing any pruning of VLANs.

c.
Perform an incremental implementation of components.

d.
Test the solution on the production network in off hours.

Feedback
Your answer is incorrect.

Question 42
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which statement about IOS privilege levels is true?

a.
Each privilege level supports the commands at its own level and all levels above it.
b.
Privilege-level commands are set explicitly for each user.

c.
Each privilege level is independent of all other privilege levels

d.
Each privilege level supports the commands at its own level and all levels below it

Feedback
Your answer is correct.

Question 43
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which command can be used to verify a trunk link configuration status on a given
Cisco switch interface?

a.
show ip interface brief

b.
show interface interface

c.
show interface switchport
d.
show interface vlan

Feedback
Your answer is correct.

Question 44
Correct
Mark 1.00 out of 1.00

Flag question

Question text
By default, which statement is correct when an IEEE 802.1Q trunk port receives an
untagged frame?

a.
The frame is broadcast on all ports regardless of VLAN association.

b.
The frame is considered in the native VLAN and forwarded to the ports associated with
that VLAN.

c.
The frame is encapsulated and tagged as in the native VLAN.

d.
The frame is dropped.
Feedback
Your answer is correct.

Question 45
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which is a characteristics of the 802.1Q protocol?

a.
It is a trunking protocol capable of carrying untagged frames.

b.
It includes an 8-bit field which specifies the priority of a frame.

c.
It is used exclusively for tagging VLAN frames and does not address network
reconvergence following switched network topology changes.

d.
It modifies the 802.3 frame header, and thus requires that the FCS be recomputed.

Feedback
Your answer is correct.

Question 46
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Assuming the default switch configuration, which VLAN range can be added, modified,
and removed on a Cisco switch?

a.
2 through 1005

b.
1 through 1002

c.
1 through 1001

d.
2 through 1001

Feedback
Your answer is correct.

Question 47
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is not a benefit of implementing VLANs?

a.
A higher level of network security can be reached by separating sensitive data
traffic from other network traffic.

b.
A more efficient use of bandwidth can be achieved allowing many physical groups to
use the same network infrastructure.

c.
A more efficient use of bandwidth can be achieved allowing many logical networks to
use the same network infrastructure.

d.
Broadcast storms can be mitigated by increasing the number of broadcast domains, thus
reducing their size.

Feedback
Your answer is correct.

Question 48
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which statement is wrong at describing Layer 2 Ethernet switches?
a.
Microsegmentation decreases the number of collisions on the network

b.
Switches that are configured with VLANs make forwarding decisions based on both Layer
2 and Layer 3 address information.

c.
Establishing VLANs increases the number of broadcast domains

d.
In a properly functioning network with redundant switched paths, each switched
segment will contain one root bridge with all its ports in the forwarding state. All
other switches in that broadcast domain will have only one root port

Feedback
Your answer is correct.

Question 49
Correct
Mark 1.00 out of 1.00

Flag question

Question text
If you change the native VLAN on the trunk port to an unused VLAN, what happens if an
attacker attempts a double-tagging attack?

a.
A VLAN hopping attack would be successful

b.
The attacked VLAN will be pruned.

c.
A VLAN hopping attack would be prevented

d.
The trunk port would go into an error-disabled state

Feedback
Your answer is correct.

Question 50
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
Which command causes a Layer 2 switch interface to operate as a Layer 3 interface?

a.
no switchport

b.
no switchport mode dynamic auto

c.
switchport
d.
no switchport nonnegotiate

Feedback
Your answer is incorrect.

You might also like