Documente Academic
Documente Profesional
Documente Cultură
Question 1
Which two if the following statements are true regarding the DHCP relay agent? (Choose two.)
DHCP relay is required if the DHCP clients and the DHCP servers are located in the same
broadcast domain.
The DHCP server uses the ciaddr IP address to select an IP address pool from which to assign the
IP addresses to the DHCP client.
The primary function of a DHCP relay agent is to relay the DHCP messages from the local DHCP
clients to the remote DHCP servers.
DHCP discovery messages are broadcasted from the DHCP relay agent to the DHCP servers.
When the DHCP relay agent receives a broadcast packet from a connected client, it changes
the giaddr field from zero to the relay agent IP address, and forwards the message to the DHCP
server.
Question 2
Which one of the following options best describes the role of the DHCP relay agent in a network
infrastructure?
acts as a ”middle man” to forward DHCP requests to a designated remote DHCP server
adds DHCP options, such as preferred TFTP server (option 150) or WLC (option 43)
Question 3
Referring to the packet capture that is shown below, which two of the following statements are
true? (Choose two.)
The DHCP offer is broadcasted from the DHCP server to the client.
Question 4
When using DHCP with IP phones, what is option 150 used for?
Question 5
Which two of the following options are benefits of using VLSM when subnetting a block of IP
addresses? (Choose two.)
the ability to join Class B and Class C networks on the same broadcast domain
There are no benefits. Using VLSM wastes IP addresses, because all subnets must contain the
same quantity of usable IP addresses.
Question 6
Which two of the following statements are true regarding a network that uses subnetworks?
(Choose two.)
Referring to the packet capture that is shown below, which one of the following options is the
directed broadcast IP address where the DHCP clients and the DHCP server reside?
Question 8
Which one of the following best describes how a switch processes the traffic, if the switch does
not have the MAC address of an endpoint in the MAC address table, and it receives a frame that
is destined for that device?
It will flood the frame out all ports, except the one that it arrived on within the VLAN.
It will forward the frame back out the interface that it came in through.
It will drop the frame, because it does not know where to forward it.
It will be sent to all multicast listeners, hoping to find its destination host.
Question 9
Which two of the following statements are true regarding the hub? (Choose two.)
All ports on the hub are in the same single collision domain. Hubs use the MAC address
table to make its switching decisions.
Hubs function at the data link layer. Hubs can run only in half-
duplex mode.
Question 10
Match the Layer 2 switching process (from PC A to PC B) with the correct sequence of events.
2 The switch enters the source (PC A) MAC address and the switch port (port 1)
that received the frame into
3 The switch checks the MAC address table for the destination (PC B) MAC
address. Because the destination
address is not known, the switch floods the frame to all the ports except the
port on which it received the
frame.
4 The destination device (PC B) with the matching MAC address replies to the
unicast with a unicast frame
addressed to PC A.
5 The switch enters the source MAC address of PC B and the port number of the
switch port that received the
6 The switch can now forward frames between the source and destination
devices (PC A and PC B) without
flooding, because it has entries in the MAC address table that identify the
associated ports.
Question 11
If a switch receives a frame for an endpoint whose MAC address exists in the MAC address table,
how does it process the traffic?
It will forward the frame back out of the interface that it came in through.
It will drop the frame, as it does not know where to forward it.
It will be sent to all multicast listeners in hope of finding its destination host.
It will forward the frame out of the identified port in the table and filter transmission to all other
ports.
Question 12
Which one of the following best describes how VLANs improve network performance?
VLANs create one large virtual switch out of many physical switches.
VLANs place each switch port into its own collision domain.
Question 13
Which one of the following statements best describes how 802.1q incorporates VLAN
information onto an Ethernet frame?
It uses a special EtherType to identify the Ethernet payload that contains the 802.1Q tag.
It inserts a 4-byte header after the source MAC address in the original Ethernet frame, which
carries the VLAN information.
The VLAN information is identified in the Ethernet header Type/Length field.
It encapsulates the entire Ethernet frame and adds a 4-byte header before the destination MAC
address which carries the VLAN information.
Question 14
When using the 802.1Q frame tagging protocol, how much additional overhead does the
protocol add to the frame structure?
Question 15
Which one of the following options best describes the function of the root bridge in a spanning
tree protocol?
the device that facilitates the blocking or discarding port a redundant switch
Question 16
Which one of the following statements best describes the purpose of a default route?
A default route is an optional entry that is used when no explicit path to a destination is found
in the routing table.
A default route will flood the packet out of all connected ports.
A default route is just a placeholder in the route table until a new route is found.
Question 17
Match the router preference to the correct routing sequence (most preferred is 1; least
preferred is 3).
3 dynamic route
Question 18
Referring to the routing table that is shown below, a packet that is destined to the 172.17.25.100
host will be routed out of which router interface?
Gi 0/0
Gi 0/1
Question 19
Each router determines the best path on its own. link-state protocols
Routers are familiar with the direction and path to the destination. path-vector protocols
Question 20
Which one of the following options is the routing protocol that is used between the major ISPs?
BGP
OSPF
IS-IS
EIGRP
OSPF or IS-IS
Question 21
Which two of the following statements are true regarding the CAM and TCAM tables? (Choose
two.)
A TCAM table stores ACL, QoS, and other information that is generally associated with upper-
layer processing.
TCAM is a specialized CAM that enables a Layer 2 switch to perform wire speed switching.
The CAM and TCAM tables are populated using a routing protocol.
Question 22
Which one of the following options is most used by multilayer switches to allow for wire-speed
switching?
label switching
Question 23
Which three of the following statements are true regarding ACLs? (Choose three.)
ACLs provide packet filtering for routers and firewalls to protect internal networks from the
outside world.
ACLs are used to perform stateful packets inspections and filtering on routers and firewalls.
ACLs provide a basic level of security and control the packets that pass through the routers or
firewalls, preventing them from getting to the different parts of the network.
At a minimum, it is important to configure the ACLs on the network edge routers or firewalls.
ACLs can be applied only at the inbound direction and not at the outbound direction.
Question 24
Which one of the following options is the implicit ACL entry that is at the end of the ACL?
deny ip any any deny tcp any any permit ip any any
Question 25
Which one of the following options does the established keyword in an ACL entry indicate?
The established keyword function has been deprecated and no longer serves as a functional
configuration element.
Reply packets that belong to an established TCP connection will be permitted if the TCP packet
has the ACK or RST bit set.
Reply packets that belong to an established TCP connection will be permitted if the TCP packet
has the SYN or FIN bit set.
The device interface will modify the source IP address to that of the interface that it enters
through.
Question 26
Which one of the following statements best describes a lightweight access point (LWAP)?
An LWAP is an AP with low bandwidth and processing capability for small deployments.
An LWAP is part of a unified wireless access system where a centralized wireless LAN controller
manages the administrative functions of network access.
An LWAP weighs less than the autonomous AP, so it can be mounted safely on the drop ceiling of
a room.
Question 27
Which two of the following statements are true regarding an autonomous access point? (Choose
two.)
old technology that has no place in today’s networks, therefore it should not be used
can dynamically cover gaps in radio coverage in the event of a peer AP failure
Question 28
Which four of the following options are benefits of using LWAPs and a unified wireless solution?
(Choose four.)
standalone capability
security management
Question 29
Which one of the following options is the AP mode that a typical home Wi-Fi router operates in?