Sunteți pe pagina 1din 12

CHAPTER 2

Question 1

Which two if the following statements are true regarding the DHCP relay agent? (Choose two.)

DHCP relay is required if the DHCP clients and the DHCP servers are located in the same
broadcast domain.

The DHCP server uses the ciaddr IP address to select an IP address pool from which to assign the
IP addresses to the DHCP client.

The primary function of a DHCP relay agent is to relay the DHCP messages from the local DHCP
clients to the remote DHCP servers.

DHCP discovery messages are broadcasted from the DHCP relay agent to the DHCP servers.

When the DHCP relay agent receives a broadcast packet from a connected client, it changes
the giaddr field from zero to the relay agent IP address, and forwards the message to the DHCP
server.

Question 2

Which one of the following options best describes the role of the DHCP relay agent in a network
infrastructure?

acts as a ”middle man” to forward DHCP requests to a designated remote DHCP server

provides an IP address from a local pool of addresses

adds the default gateway option to the DHCP reply

adds DHCP options, such as preferred TFTP server (option 150) or WLC (option 43)
Question 3

Referring to the packet capture that is shown below, which two of the following statements are
true? (Choose two.)

The DHCP offer is broadcasted from the DHCP server to the client.

The DHCP server IP address is 10.20.20.20.


The client assigned IP address will be 10.20.20.4.

The giaddr is 0.0.0.0.

10.20.20.4 is the DHCP relay agent IP address.

The client will use 10.20.20.1 as its DNS server IP address.

Question 4

When using DHCP with IP phones, what is option 150 used for?

to identify the preferred name server

to supply the TFTP server IP address for image download

to identify the default gateway

to assign a fallbback IP address

Question 5

Which two of the following options are benefits of using VLSM when subnetting a block of IP
addresses? (Choose two.)

the ability to join Class B and Class C networks on the same broadcast domain

more efficient use of IP addresses.

Better-defined network hierarchical levels

There are no benefits. Using VLSM wastes IP addresses, because all subnets must contain the
same quantity of usable IP addresses.

Question 6

Which two of the following statements are true regarding a network that uses subnetworks?
(Choose two.)

It is more complex to apply network security policies.

Smaller networks are easier to manage.

Overall traffic is increased.

Overall traffic is reduced.


Question 7

Referring to the packet capture that is shown below, which one of the following options is the
directed broadcast IP address where the DHCP clients and the DHCP server reside?

255.255.255.255 255.255.255.0 0.0.0.255 10.255.255.255


10.20.20.255

Question 8

Which one of the following best describes how a switch processes the traffic, if the switch does
not have the MAC address of an endpoint in the MAC address table, and it receives a frame that
is destined for that device?

It will flood the frame out all ports, except the one that it arrived on within the VLAN.

It will forward the frame back out the interface that it came in through.
It will drop the frame, because it does not know where to forward it.

It will be sent to all multicast listeners, hoping to find its destination host.

Question 9

Which two of the following statements are true regarding the hub? (Choose two.)

All ports on the hub are in the same single collision domain. Hubs use the MAC address
table to make its switching decisions.

Hubs function at the data link layer. Hubs can run only in half-
duplex mode.

Question 10

Match the Layer 2 switching process (from PC A to PC B) with the correct sequence of events.

1 The switch receives a frame from PC A on port 1.

2 The switch enters the source (PC A) MAC address and the switch port (port 1)
that received the frame into

the MAC address table.

3 The switch checks the MAC address table for the destination (PC B) MAC
address. Because the destination

address is not known, the switch floods the frame to all the ports except the
port on which it received the

frame.

4 The destination device (PC B) with the matching MAC address replies to the
unicast with a unicast frame

addressed to PC A.

5 The switch enters the source MAC address of PC B and the port number of the
switch port that received the

frame into the MAC address table.

6 The switch can now forward frames between the source and destination
devices (PC A and PC B) without
flooding, because it has entries in the MAC address table that identify the
associated ports.

Question 11

If a switch receives a frame for an endpoint whose MAC address exists in the MAC address table,
how does it process the traffic?

It will forward the frame back out of the interface that it came in through.

It will drop the frame, as it does not know where to forward it.

It will be sent to all multicast listeners in hope of finding its destination host.

It will forward the frame out of the identified port in the table and filter transmission to all other
ports.

Question 12

Which one of the following best describes how VLANs improve network performance?

VLANs separate a large broadcast domain into smaller broadcast domains.

VLANs enable rate limiting of the broadcast traffic.

VLANs create one large virtual switch out of many physical switches.

VLANs place each switch port into its own collision domain.

Question 13

Which one of the following statements best describes how 802.1q incorporates VLAN
information onto an Ethernet frame?

It uses a special EtherType to identify the Ethernet payload that contains the 802.1Q tag.

It inserts a 4-byte header after the source MAC address in the original Ethernet frame, which
carries the VLAN information.
The VLAN information is identified in the Ethernet header Type/Length field.

It encapsulates the entire Ethernet frame and adds a 4-byte header before the destination MAC
address which carries the VLAN information.

Question 14

When using the 802.1Q frame tagging protocol, how much additional overhead does the
protocol add to the frame structure?

8 bytes 4 bytes 2 bytes 16 bytes no impact to frame


overhead

Question 15

Which one of the following options best describes the function of the root bridge in a spanning
tree protocol?

the farthest reachable point a reference point, the


logical center

the device that facilitates the blocking or discarding port a redundant switch

Question 16

Which one of the following statements best describes the purpose of a default route?

A default route sets the preferred path for multicast packets.

A default route is an optional entry that is used when no explicit path to a destination is found
in the routing table.

A default route will flood the packet out of all connected ports.

A default route is just a placeholder in the route table until a new route is found.

Question 17

Match the router preference to the correct routing sequence (most preferred is 1; least
preferred is 3).

1 directly connected route


2 static route with default administrative distance

3 dynamic route

Question 18

Referring to the routing table that is shown below, a packet that is destined to the 172.17.25.100
host will be routed out of which router interface?

Gi 0/0

Gi 0/1

load balanced between Gi 0/0 and Gi 0/1


cannot be determined based on the routing table that is shown above.

Question 19

Match the routing protocol to its characteristic.

operates within an autonomous system IGP

operates between autonomous systems EGP

does not have an actual map of the network topology distance-vector


protocols

Each router determines the best path on its own. link-state protocols

Routers are familiar with the direction and path to the destination. path-vector protocols

Question 20

Which one of the following options is the routing protocol that is used between the major ISPs?

BGP

OSPF

IS-IS

EIGRP

OSPF or IS-IS

Question 21

Which two of the following statements are true regarding the CAM and TCAM tables? (Choose
two.)

A CAM table is primarily used to make Layer 2 forwarding decisions.

A CAM table contains the MAC-to-IP address mappings.

A TCAM table stores ACL, QoS, and other information that is generally associated with upper-
layer processing.

TCAM is a specialized CAM that enables a Layer 2 switch to perform wire speed switching.

The CAM and TCAM tables are populated using a routing protocol.

Question 22

Which one of the following options is most used by multilayer switches to allow for wire-speed
switching?

label switching

high-speed CPU and huge amount of memory

specialized ASIC hardware

distributed switching using multiple MAC address table

Question 23

Which three of the following statements are true regarding ACLs? (Choose three.)

ACLs provide packet filtering for routers and firewalls to protect internal networks from the
outside world.

ACLs are used to perform stateful packets inspections and filtering on routers and firewalls.

ACLs provide a basic level of security and control the packets that pass through the routers or
firewalls, preventing them from getting to the different parts of the network.

At a minimum, it is important to configure the ACLs on the network edge routers or firewalls.

ACLs can be applied only at the inbound direction and not at the outbound direction.

Question 24
Which one of the following options is the implicit ACL entry that is at the end of the ACL?

deny ip any any deny tcp any any permit ip any any

permit tcp any any There is no implicit ACL entry.

Question 25

Which one of the following options does the established keyword in an ACL entry indicate?

The established keyword function has been deprecated and no longer serves as a functional
configuration element.

Reply packets that belong to an established TCP connection will be permitted if the TCP packet
has the ACK or RST bit set.

Reply packets that belong to an established TCP connection will be permitted if the TCP packet
has the SYN or FIN bit set.

The device interface will modify the source IP address to that of the interface that it enters
through.

Question 26

Which one of the following statements best describes a lightweight access point (LWAP)?

An LWAP is an AP with low bandwidth and processing capability for small deployments.

An LWAP is part of a unified wireless access system where a centralized wireless LAN controller
manages the administrative functions of network access.

An LWAP weighs less than the autonomous AP, so it can be mounted safely on the drop ceiling of
a room.

Each LWAP handles its own

Question 27

Which two of the following statements are true regarding an autonomous access point? (Choose
two.)
old technology that has no place in today’s networks, therefore it should not be used

self-contained and offer one or more fully functional standalone BSSs

can operate without the use of a centralized controller

can dynamically cover gaps in radio coverage in the event of a peer AP failure

Question 28

Which four of the following options are benefits of using LWAPs and a unified wireless solution?
(Choose four.)

flexible client roaming

standalone capability

dynamic client load balancing

security management

simplicity in network design

wireless intrusion protection system

Question 29

Which one of the following options is the AP mode that a typical home Wi-Fi router operates in?

lightweight standalone CAPWAP hybrid

S-ar putea să vă placă și