Top Banner

of 27

4 Practico

Jun 02, 2018

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/10/2019 4 Practico

    1/27

  • 8/10/2019 4 Practico

    2/27

  • 8/10/2019 4 Practico

    3/27

    4. Using the command copy tftp:backup.cfg startup-config, an administratordownloaded a saved configuration from a TFTP server to a switch. Why does theadministrator not detect any changes in the switch configuration after the downloadcompletes?

    The command should have been copy startup-config tftp:backup.cfg.

    A backup configuration from a TFTP server cannot be copied directly into thestartup-config.

    The command copy running-config startup-config should be used to save thechanges on the switch.

    Downloading to the startup-config requires the switch to be reloaded in order fo

    rthe configuration to take effect.

    5.

  • 8/10/2019 4 Practico

    4/27

    6.

    7. Which statement regarding the service password-encryption command istrue?

    The service password-encryption command is entered at the privilegedEXEC mode prompt.

    The service password-encryption command encrypts only passwords forthe console and VTY ports.

    The service password-encryption command encrypts all previouslyunencrypted passwords in the running configuration.

    To see the passwords encrypted by the service password-encryptioncommand, enter the no service password-encryption command.

  • 8/10/2019 4 Practico

    5/27

    8. Which three statements are correct concerning the default configurationof a new switch? (Choose three.)

    Spanning Tree Protocol is disabled.

    Enable password is configured as cisco.

    All switch ports are assigned to VLAN1.

    The flash directory contains the IOS image.

    VLAN1 is configured with a management IP address.

    All interfaces are set to auto-negotiation of speed and duplex.

    9.

  • 8/10/2019 4 Practico

    6/27

    10.

    11. What three tasks should be performed before moving a Catalyst switch to anotherVTP management domain? (Choose three.)

    Select the correct VTP mode and version.

    Configure the switch with the name of the new management domain.

    Download the VTP database from the VTP server in the new domain.

    Configure the VTP server in the new domain to recognize the BID of the switch.

    Reset the VTP counters to allow the switch to synchronize with the other switches inthe new domain.

    Verify that the switch has a lower configuration revision number than the otherswitches in the new domain.

    12. How does Spanning Tree Protocol aid network architecture?

    allows for redundant links by eliminating loops

    provides greater scalability by eliminating collisions

    reduces switch processor load by reducing broadcast traffic on trunk links

    reduces administrative overhead by sharing VLAN databases between switchesacross the network

  • 8/10/2019 4 Practico

    7/27

  • 8/10/2019 4 Practico

    8/27

    13. Which type of frame contains information that is used in the election of thespanning tree root bridge?

    BID

    LSA

    LSU

    BPDU

    14.

    15.

  • 8/10/2019 4 Practico

    9/27

  • 8/10/2019 4 Practico

    10/27

    16. After unpacking a new Linksys WRT300N wireless multifunction device, a userneeds to change the default administrator password and make other configurationchanges. What must the user do to access the device in order to make these changes?

    Use a wireless client to associate with the WRT300N and then open aHyperTerminal session with the device.

    Establish a wired connection with the device and then reboot the attachedcomputer to launch the configuration software.

    Establish a wired connection from a computer in the same IP subnet as theWRT300N and enter the default IP address of the device into a web browser on

    the computer.

    Modify the TCP/IP properties of the computer that is connected to the WRT300Nso that the computer and the WRT300N exist on the same network. Then rebootthe computer to establish a connection.

    17.

  • 8/10/2019 4 Practico

    11/27

    18.

    19.

  • 8/10/2019 4 Practico

    12/27

    20.

    21.

  • 8/10/2019 4 Practico

    13/27

    22.

    23. Which parameter is a specific frequency at which a wireless access point willoperate?

    BSS

    WEP

    SSID

    ad hoc

    channel

    24. Which parameter is associated with wireless authentication?

    shared key

    SSID

    ad hoc

    channel

  • 8/10/2019 4 Practico

    14/27

  • 8/10/2019 4 Practico

    15/27

    25.

    26.

  • 8/10/2019 4 Practico

    16/27

    27.

    28. Which statement correctly describes the spanning-tree path cost?It is calculated based on the total number of switches connected in a loop.

    It is calculated based on the utilization of all the switches along a given path.It is calculated based on the bridge priority of the switches along a given path.It is calculated based on the sum of the port cost value, determined by link spe

    ed,for each switch port along a given path

  • 8/10/2019 4 Practico

    17/27

    29.

    30.

  • 8/10/2019 4 Practico

    18/27

    31.

    32. Which three actions are performed during the boot sequence of a Cisco switch?(Choose three.)The boot loader uses the self-contained switch operating system to boot theswitch.

    The boot loader retrieves diagnostics routines via TFTP

    The boot loader performs POST.

    The boot loader is loaded from RAM.

    The boot loader initializes the flash file system that is used to boot the system.The boot loader loads the default operating system if the flash-based operatingsystem is corrupt or missing.

    33.

  • 8/10/2019 4 Practico

    19/27

    34.

    35.

    36. Which statement is true about open authentication when it is enabled on an accesspoint?

    requires no authentication

    uses a 64-bit encryption algorithm

    requires the use of an authentication server

    requires a mutually agreed upon password

  • 8/10/2019 4 Practico

    20/27

    37. How are data frames identified and sent to the correct VLAN when exiting anEthernet trunk?Frames are forwarded to the correct VLAN based on the VLAN tag.

    Frames are always forwarded to the native VLAN when exiting a trunk.

    Frames are forwarded to the correct VLAN based on the source IP address.

    Frames are forwarded to the correct VLAN based on information in the MACaddress table.

    38.

  • 8/10/2019 4 Practico

    21/27

    39. When port security is used on a switch, which violation mode will cause anSNMP trap to be sent and traffic to be dropped when the number of secure MACaddresses for a port is reached?

    sticky

    protect

    restrict

    shutdown

    40. A wireless access point can function as which type of shared medium, wired LANdevice?

    hub

    switch

    router

    gateway

    41.

  • 8/10/2019 4 Practico

    22/27

    42.

    43. Which benefit is gained by designing a network with a small network diameter?

    lower latency

    improved security

    increased redundancy

    higher interface bandwidth

  • 8/10/2019 4 Practico

    23/27

    44.

    45.

  • 8/10/2019 4 Practico

    24/27

    46. Which security protocol or measure would provide the greatest protection forawireless LAN?

    WPA2

    cloaking SSIDs

    shared WEP key

    MAC address filtering

    47.

    48. Which two conditions would require a VTP client to send a request advertisement

    to a VTP server? (Choose two.)The switch has been reset.

    A VLAN has been created or deleted.

    A five minute time period has elapsed.

    The name of a VLAN has been changed.

    The VTP domain name has been changed.

  • 8/10/2019 4 Practico

    25/27

    49.

  • 8/10/2019 4 Practico

    26/27

    50.

    Good Luck

    Ahmed Farouk

  • 8/10/2019 4 Practico

    27/27