Professional Documents
Culture Documents
(Choose
three.)
1. A device listens and waits until the media is not busy
before transmitting.
2. All of the devices on a segment see data that passes on the
network medium.
3. After detecting a collision, hosts can attempt to resume
transmission after a random time delay has expired.
broadcast
512
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
8
Which three statements accurately describe duplex and speed settings on Cisco 2960 switches?
(Choose three.)
When the speed is set to 1000 Mb/s, the switch ports will operate in full-duplex mode.
An autonegotiation failure can result in connectivity issues.
By default, the autonegotiation feature is disabled.
Enabling autonegotiation on a hub will prevent mismatched port speeds when connecting the
hub to the switch.
The duplex and speed settings of each switch port can be manually configured.
By default, the speed is set to 100 Mb/s and the duplex mode is set to autonegotiation.
By default, autonegotiation is enabled on a Catalyst 2960 switch. However, the duplex and speed
settings can be manually configured for each switch port. If the speed is set to 1000 Mb/s, the
switch ports will operate in full-duplex mode. Switches, not hubs, can be configured for auto
negotiation.
_______________________________________________________________
_______________________________________________________________
10
When creating an IPv6 static route, when must a next-hop IPv6 address and an exit interface
both be specified?
when CEF is enabled
when the static route is a default route
when the next hop is a link-local address
when the exit interface is a point-to-point interface
Link-local addresses are only unique on a given link, and the same address could exist out
multiple interfaces. For that reason, any time a static route specifies a link-local address as the
next hop, it must also specify the exit interface. This is called a fully specified static route.
_______________________________________________________________
Refer to the exhibit. Which password will the administrator need to use on this device to enter
privileged EXEC mode?
Cisco
class
password
cisco
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
14
Refer to the exhibit. OSPFv2 has been configured on router R1, and the router-id command has
not been manually configured. When the network administrator reboots router R1, what will be
the value of the OSPF router ID?
172.16.1.1
192.168.2.254
10.15.15.1
10.0.10.2
If the router ID is not exactly specified by the router-id command, then the highest IPv4 address
on any configured loopback interface(s) would become the router ID.
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
18
A network administrator is using the router-on-a-stick model to configure a switch and a router
for inter-VLAN routing. What configuration should be made on the switch port that connects to
the router?
Configure the port as an access port and a member of VLAN1.
Configure the port as an 802.1q trunk port.
Configure the port as a trunk port and assign it to VLAN1.
Configure it as a trunk port and allow only untagged traffic.
The port on the switch that connects to the router interface should be configured as a trunk port.
Once it becomes a trunk port, it does not belong to any particular VLAN and will forward traffic
from various VLANs.
_______________________________________________________________
_______________________________________________________________
20
A network administrator is designing an IPv4 addressing scheme and requires these subnets.
1 subnet of 100 hosts
2 subnets of 80 hosts
2 subnets of 30 hosts
4 subnets of 20 hosts
Which combination of subnets and masks will provide the best addressing plan for these
requirements
Refer to the exhibit. Which two statements are based on the output as shown in the exhibit?
(Choose two.)
The output is the result of the show ip nat translations command.
The host with the address 209.165.200.235 will respond to requests by using a source
address of 192.168.10.10.
The host with the address 209.165.200.235 will respond to requests by using a source address
of 209.165.200.235.
Traffic with the destination address of a public web server will be sourced from the IP of
192.168.1.10.
The output is the result of the show ip nat statistics command.
The output displayed in the exhibit is the result of the show ip nat translations command. Static
NAT entries are always present in the NAT table, while dynamic entries will eventually time out.
_______________________________________________________________
_______________________________________________________________
26
Refer to the exhibit. Interfaces Fa0/5, Fa0/7, and Fa0/9 are the only connected ports on the
switch CiscoSwitch. All other ports are unused. Which security best practice did the administrator
forget to configure?
Change the native VLAN to a fixed VLAN other than VLAN 1.
All active user ports are associated with VLANs distinct from VLAN 1.
Delete VLAN 1 from the switch CiscoSwitch.
Configure all unused ports to a black-hole VLAN that is not used for anything on the
network.
All access ports are placed in VLAN 1 by default. This VLAN is the default VLAN and cannot be
deleted or renamed. Security best practices dictate that user ports should be changed to
something other than VLAN 1 with the command switchport access vlan ID.
_______________________________________________________________
27
Refer to the exhibit. Interfaces Fa0/2, Fa0/4, and Fa0/6 are connected to users on the data
network of a switch named CiscoSwitch. Interface Fa0/24 is connected to a file server on the
management network. All other ports are unused. Which security best practice did the
administrator forget to configure?
Configure all unused ports to a black-hole VLAN that is not used for anything on the network.
Change the native VLAN to a fixed VLAN other than VLAN 1.
Disable autonegotiation on interfaces that are not being utilized as a trunk.
Delete VLAN 1 from CiscoSwitch.
Cisco switches use DTP to autonegotiate between each other. It is recommended to disable
autonegotiation to prevent any malicious users from forming a trunk with the Cisco switch on
nontrunking interfaces.
_______________________________________________________________
_______________________________________________________________
29
A network engineer is configuring PAT on a router and has issued the command:
ip nat source list 1 interface serial 0/1/0 overload
Which additional command is required to specify addresses from the 192.168.128.0/18 network
as the inside local addresses?
access-list 1 permit 192.168.128.0 255.255.192.0
access-list 1 permit 192.168.128.0 0.0.127.255
access-list 1 permit 192.168.128.0 0.0.63.255
ip nat inside source list 1 pool INSIDE_NAT_POOL
ip nat inside source static 192.168.128.0 209.165.200.254
A standard access list with the appropriate wildcard mask specifies the inside local addresses to
be translated. The ip nat inside source list 1 pool NAT_POOL command configures NAT to use a
pool of outside global addresses, not a single outside interface address as required. The ip nat
inside source static 192.168.128.0 209.165.200.254 command configures one-to-one static NAT,
not PAT as the overload keyword specifies.
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
36
Which three statements describe a DHCP Discover message? (Choose three.)
The source MAC address is 48 ones (FF-FF-FF-FF-FF-FF).
The destination IP address is 255.255.255.255.
The message comes from a server offering an IP address.
The message comes from a client seeking an IP address.
All hosts receive the message, but only a DHCP server replies.
Only the DHCP server receives the message.
_______________________________________________________________
37
Which two issues might cause excessive runt and giant frames in an Ethernet network? (Choose
two.)
native VLAN mismatch
damaged cable connector
a malfunctioning NIC
excessive collisions
using the in cable type
inly configured auto-MDIX feature
In an Ethernet network, a runt is a frame that is shorter than 64 bytes and a giant is a frame
that is longer than the maximum allowed length. Both are often caused by NIC malfunctioning,
but can also be caused by excessive collisions. CRC errors usually indicate a media or cable error
caused by electrical interference, loose or damaged connections, or using the in cabling type.
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
40
_______________________________________________________________
_______________________________________________________________