Sunteți pe pagina 1din 7

Question: Which statements describe the characteristics of port security?

A. Sticky learning adds dynamically learned addresses to the running configuration


B. Ports configured with port security only accept frames from addresses that have been
learned or the ones that have been configured
C. Addresses must be manually added to the switch
D. It restricts port access using IP addresses
Correct answer: A B

Question: Which of the following describes the STP protocol?


A. Assumes one 802.1D spanning tree for the entire bridged network
B. Provides a separate 802.1D spanning tree for each virtual LAN, or VLAN,
configured
C. Provides fast conversion with a single instance of STP
D. Provides fast conversion with an instance of spanning tree per VLAN
Correct answer: A
Your answer: -

Question: Which features make IPv6 an improvement over IPv4 addressing?


A. Uses Time to Live, or TTL, values in the header
B. Security and mobility build into the standard
C. Larger address space
D. Offers approximately 4.3 billion addresses
Correct answer: B C
Your answer: -

Question: You are troubleshooting the components involved in IPv6 end-to-end


connectivity on a Mac computer. Please select the command you will use to check
whether an ACL is attached to an interface.
A. show ipv6 interface
B. show ipv6 route
C. show ipv6 access-list
D. ping
E. ipconfig
F. ifconfig
Correct answer: A
Your answer: -

uestion: Which problems can manifest in a redundant switched


topology?
A. Media Access Control, or MAC, database instability
B. Virtual LAN, or VLAN, mismatch errors
C. Broadcast storms
D. Multiple frame transmission
E. Trunk ports failing establishment
Correct answer: A C D
Question: Identify the statements that describe how ACLs function.
A. They use top-down processing
B. They always prevent users outside a network from gaining
access
C. A match results in immediate execution
D. The end of the ACL has an implicit allow any
Correct answer: A C
Question: What is needed to have multiple routers functioning as a
single virtual router?
A. IP routing must be disabled on the primary router
B. The default gateway must be configured on the routers
C. EtherChannel must be configured between the routers
D. The routers must have the same IP address and MAC
Correct answer: D
Question: How are PDUs handled during the peer-communication
process?
A. The Internet layer encapsulates data and attaches a header to
create a PDU known as a frame
B. Header information within a PDU is required and can include
information such as source and destination logical addressing
C. The link layer provides a service to the network layer by
encapsulating the network-layer packet into a PDU called a
segment

D. The application layer protocol begins the process by delivering


PDUs to the transport layer
Correct answer: B D
Question: Which of the following LSA types informs the OSPF
domain how to get to the ASBR?
A. Type 1
B. Type 2
C. Type 3
D. Type 4
E. Type 5
Correct answer: D
Question: Which of the following OSPF packet types sends a
missing information to the neighbors?
A. link-state acknowledgement, or LSAck
B. link-state update, or LSU
C. link-state request, or LSR
D. database description package, or DBD
Correct answer: B
Question: You are troubleshooting the components involved in IPv6
end-to-end connectivity on a Mac computer. Please select the
command you will use to check whether the Mac has the default
IPv6 gateway set.
A. show ipv6 interface
B. show ipv6 route
C. show ipv6 access-list
D. ping
E. ipconfig
F. ifconfig
Correct answer: F
Question: Which of the following is valid for Single-area OSPF
design type?

A. Using summarization results in smaller routing tables


B. A better solution for efficient routing
C. Every router is required to process many link-state
advertisements (LSAs)
D. Larger routing tables are required
Correct answer: C D
Question: What is the correct sequence of the following data deencapsulation steps in the order that they occur?
1. Layer 2 control information in the header is read and
interpreted.
2. The trailer, frame check sequence, or FCS, is checked to see
whether errors exist in the data.
3. The remaining data is passed to the next layer with its layer 2
header and trailer stripped.

A. 1, 2, 3
B. 3, 2, 1
C. 2, 1, 3
D. 2, 3, 1
E. 3, 1, 2
Correct answer: C

Question: Which of the following commands displays the enabled


OSPFv3 interfaces, along with the adjacent OSPF neighbors
connected to them?
A. show ipv6 ospf neighbor
B. show ipv6 ospf
C. show ipv6 route ospf
D. show ipv6 ospf interface
Correct answer: D

Question: Which statements describe how to secure remote access


to a network device?
A. Enable password checking
B. Prevent users from remaining connected to a virtual type
terminal, or vty, port
C. Disable unused ports
D. Restrict access using port security
Correct answer: A B
Question: What are the best practices to follow when disabling
unused services?
A. Disable the Cisco Discovery Protocol on interfaces where a
service may represent a risk
B. The Hypertext Transfer Protocol SSL, or HTTPS, service must be
disabled on the router
C. Use the AutoSecure function to disable Telnet
D. Finger, identification, TCP, and User Datagram Protocol, or UDP,
small servers should be disabled on all routers and switches
Correct answer: A D

Question: Examine the output provided. What statements are


accurate about the configuration of OSPFv3?

A. The [ipv6 ospf process-id area area-id] command enables


OSPFv3 on an interface
B. The [router-id router_id] command statically configures a name
for the router within the OSPFv3 process
C. The [ipv6 router ospf process-id] command assigns OSPF to a
specific area
D. 10.10.10.10 is the address of the interface participating in
OSPFv3 routing
Correct answer: A B
Question: Identify the statements that describe the purpose of
subnet masks in networking.
A. Distinguishes between bits composing the network and subnet
parts of an IP address
B. Used to classify destination IP addresses as either local or
remote
C. Required to support session multiplexing with an IP address
D. Used to determine router path on layer 3 devices
E. A subnet mask identifies the host-significant portion of an IP
Correct answer: A B D
Question: Which of the following describes a Private IPv6 address?
A. ::1
B. Starts with FE80::/10
C. Represented by ::
D. Starts with 2000::/3
Correct answer: B

Question: Which of the following characteristics belongs to the PPP


protocol?
A. Used by Cisco devices on serial lines, by default
B. Supports PAP and CHAP authentication
C. Has a link-quality feature to take down the link if too many errors
are detected
D. Used when connecting to a device that is not a Cisco device
Correct answer: B C D

S-ar putea să vă placă și