Вы находитесь на странице: 1из 5

1. Which of the following is true regarding VLANs?

A. You must have at least two VLANs defined in every Cisco switched network.
B. All VLANs are configured at the fastest switch and, by default, propagate this information to all other
switches.
C. You should not have more than 10 switches in the same VTP domain.
D. VTP is used to send VLAN information to switches in a configured VTP domain.
2. Which protocol reduces administrative overhead in a switched network by allowing the configuration
of a new VLAN to be distributed to all the switches in a domain?
A. STP B. VTP C. DHCP D. ISL
3. Which of the following is true regarding VTP?
A. All switches are VTP servers by default.
B. All switches are VTP transparent by default.
C. VTP is on by default with a domain name of Cisco on all Cisco switches.
D. All switches are VTP clients by default.
4. Which of the following commands sets a trunk port on a 2960 switch?
A. trunk on B. trunk all C. switchport trunk on D. switchport mode trunk
5. Which command will configure a switch port to use the IEEE standard method of inserting VLAN
membership information into Ethernet frames?
A. Switch(config)# switchport trunk encapsulation isl
B. Switch(config)# switchport trunk encapsulation iet
C. Switch(config)# switchport trunk encapsulation dot1q
D. Switch(config-if)# switchport trunk encapsulation dot1q
6. When a new trunk link is configured on an IOS-based switch, which VLANs are allowed over the link?
A. By default, all VLANs are allowed on the trunk.
B. No VLAN's are allowed, you must configure each VLAN by hand.
C. Only configured VLAN's are allowed on the link.
D. Only extended VLAN's are allowed by default.
7. Which of the following modes are valid when a switch port is used as a VLAN trunk?
Blocking
Dynamic auto
Dynamic desirable
Nonegotiate
Access
Learning
A. 1, 2 and 6 B. 2, 3 and 4 C. 4, 5 and 6 D. 2, 4, and 5
8. To configure the VLAN trunking protocol to communicate VLAN information between two switches,
what two requirements must be met?

Each end of the trunk link must be set to the IEEE 802.1e encapsulation.
The VTP management domain name of both switches must be set the same.
All ports on both the switches must be set as access ports.
One of the two switches must be configured as a VTP server.
A rollover cable is required to connect the two switches together.
A router must be used to forward VTP traffic between VLANs.
A. 1, 2 and 4 B. 3, 5 and 6 C. 2 and 4 D. 1 and 6
9. You want to improve network performance by increasing the bandwidth available to hosts and limit
the size of the broadcast domains. Which of the following options will achieve this goal?
A. Managed hubs B. Bridges C. Switches D. Switches configured with VLANs
10. Which switching technology reduces the size of a broadcast domain?
A. ISL B. 802.1Q C. VLANs D. STP
11. Which of the following provide inter-switch VLAN communication?
ISL
VTP
802.1Q
802.3Z
A. 2 only B. 1 and 3 C. 2 and 4 D. 2, 3 and 4
12. A switch has been configured for three different VLANs: VLAN2, VLAN3, and VLAN4. A router has
been added to provide communication between the VLANs. What type of interface is necessary on the
router if only one connection is to be made between the router and the switch?
A. 10Mbps Ethernet B. 56Kbps Serial C. 100Mbps Ethernet D. 1Gbps Ethernet
13. Which of the following are benefits of VLANs?
They increase the size of collision domains.
They allow logical grouping of users by function.
They can enhance network security.
They increase the size of broadcast domains while decreasing the number of collision domains.
They simplify switch administration.
They increase the number of broadcast domains while decreasing the size of the broadcast domains.
A. 1 and 5 B. 2 and 4 C. 1, 3 and 5 D. 2, 3 and 6
14. Which of the following protocols are used to configure trunking on a switch?
VLAN Trunk Protocol
VLAN
802.1Q
ISL
A. 1 only B. 3 only C. 3 and 4 D. 1, 3 and 4
15. What VTP mode allows you to change VLAN information on the switch?
A. Client B. STP C. Server D. Transparent
16. You connect a host to a switch port, but the new host cannot log into the server that is plugged into
the same switch. What could the problem be?
A. The router is not configured for the new host.
B. The VTP configuration on the switch is not updated for the new host.
C. The host has an invalid MAC address.
D. The switch port the host is connected to is not configured to the correct VLAN membership.
17. Which of the following is an IEEE standard for frame tagging?
A. ISL B. 802.3Z C. 802.1Q D. 802.3U
18. What is the purpose of Spanning Tree Protocol in a switched LAN?
A. To provide a mechanism for network monitoring in switched environments
B. To prevent routing loops in networks with redundant paths.
C. To prevent switching loops in networks with redundant switched paths
D. To manage the VLAN database across multiple switches
19. Which statement describes a spanning-tree network that has converged?
A. All switch and bridge ports are in the forwarding state.
B. All switch and bridge ports are assigned as either root or designated ports.
C. All switch and bridge ports are in either the forwarding or blocking state.
D. All switch and bridge ports are either blocking or looping.
20. What does a switch do when a frame is received on an interface and the destination hardware
address is unknown or not in the filter table?
A. Forwards the switch to the first available link
B. Drops the frame
C. Floods the network with the frame looking for the device
D. Sends back a message to the originating station asking for a name resolution
21. In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a
switched LAN?
A. During high-traffic periods
B. After broken links are reestablished
C. When upper-layer protocols require high reliability
D. In an improperly implemented redundant topology
22. If you want to disable STP on a port connected to a server, which command would you use?
A. disable spanning-tree B. spanning-tree off
C. spanning-tree security D. spanning-tree portast
23. Which of the following statement is true?
A. A switch creates a single collision domain and a single broadcast domain. A router creates a single
collision domain.
B. A switch creates separate collision domains but one broadcast domain. A router provides a separate
broadcast domain.
C. A switch creates a single collision domain and separate broadcast domains. A router provides a
separate broadcast domain as well.
D. A switch creates separate collision domains and separate broadcast domains. A router provides
separate collision domains.
24. You have two switches connected together with two crossover cables for redundancy, and STP is
disabled. Which of the following will happen between the switches?
A. The routing tables on the switches will not update.
B. The MAC forward/filter table will not update on the switch.
C. Broadcast storms will occur on the switched network.
D. The switches will automatically load-balance between the two links.
25. Layer 2 switching provides which of the following?
Hardware-based bridging (ASIC)
Wire speed
Low latency
Low cost
A. 1 and 3 B. 2 and 4 C. 1, 2 and 4 D. All of the above
26. Your switch has a port status LED that is alternating between green and amber. What could this
indicate?
A. The port is experiencing errors. B. The port is shut down.
C. The port is in STP blocking mode. D. Nothing; this is normal.
27. You want to run the new 802.1w on your switches. Which of the following would enable this
protocol?
A. Switch(config)# spanning-tree mode rapid-pvst B. Switch# spanning-tree mode rapid-pvst
C. Switch(config)# spanning-tree mode 802.1w D. Switch# spanning-tree mode 802.1w

28. Which of the following is a layer 2 protocol used to maintain a loop-free network?
A. VTP B. STP C. RIP D. CDP
29. You need to allow one host to be permitted to attach dynamically to each switch interface. Which
two commands must you configure on your catalyst switch to meet this policy?
Switch(config-if)# ip access-group 10
Switch(config-if)# switchport port-security maximum 1
Switch(config)# access-list 10 permit ip host 1
Switch(config-if)# switchport port-security violation shutdown
Switch(config)# mac-address-table secure
A. 1 and 3 B. 2 and 4 C. 2, 3 and 5 D. 4 and 5
30. What command will display the forward/filter table?
A. show mac filter B. show run C. show mac address-table D. show mac filter-table
31. If a switch receives a frame and the source MAC address is not in the MAC address table but the
destination address is, what will the switch do with the frame?
A. Discard it and send an error message back to the originating host
B. Flood the network with the frame
C. Add the source address and port to the MAC address table and forward the frame out the destination
port
D. Add the destination to the MAC address table and then forward the frame
32. What is the result of segmenting a network with a bridge (switch)?
It increases the number of collision domains.
It decreases the number of collision domains.
It increases the number of broadcast domains.
It decreases the number of broadcast domains.
It makes smaller collision domains.
It makes larger collision domains.
A. 1 and 5 B. 2, 3 and 5 C. 3, 4 and 6 D. 1, 3 and 6
33. What are the distinct functions of layer 2 switching that increase available bandwidth on the
network?
Address learning
Routing
Forwarding and filtering
Creating network loops
Loop avoidance
IP addressing
A. 1, 3 and 5 B. 2, 4 and 6 C. 2 and 6 D. 3 and 5
34. Which of the following is true regarding access lists applied to an interface?
A. You can place as many access lists as you want on any interface until you run out of memory.
B. You can apply only one access list on any interface.
C. One access list may be configured, per direction, for each layer 3 protocol configured on an interface.
D. You can apply two access lists to any interface.
35. Which command would you use to apply an access list to a router interface?
A. ip access-list 101 out B. access-list ip 101 in
C. ip access-group 101 in D. access-group ip 101 in
36. Which of the following is an example of a standard IP access list?
A. access-list 110 permit host 1.1.1.1 B. access-list 1 deny 172.16.10.1 0.0.0.0
C. access-list 1 permit 172.16.10.1 255.255.0.0 D. access-list standard 1.1.1.1
37. You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to
192.168.191.0. Which of the following lists will you use?
A. access-list 10 deny 192.168.160.0 255.255.224.0
B. access-list 10 deny 192.168.160.0 0.0.191.255
C. access-list 10 deny 192.168.160.0 0.0.31.255
D. access-list 10 deny 192.168.0.0 0.0.31.255
38. You are working on a router that has established privilege levels that restrict access to certain
functions. You discover that you are not able to execute the command show running-configuration. How
can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your
router?
A. show access-lists B. show interface Ethernet 0
C. show ip access-lists D. show ip interface Ethernet 0
39. What command will permit SMTP mail to only host 1.1.1.1?
A. access-list 10 permit smtp host 1.1.1.1
B. access-list 110 permit ip smtp host 1.1.1.1
C. access-list 10 permit tcp any host 1.1.1.1 eq smtp
D. access-list 110 permit tcp any host 1.1.1.1 eq smtp
40. You want to create a standard access list that denies the subnet of the following host:
172.16.50.172/20. Which of the following would you start your list with?
A. access-list 10 deny 172.16.48.0 255.255.240.0
B. access-list 10 deny 172.16.0.0 0.0.255.255
C. access-list 10 deny 172.16.64.0 0.0.31.255
D. access-list 10 deny 172.16.48.0 0.0.15.255
41. What router command allows you to determine whether an IP access list is enabled on a particular
interface?
A. show ip port B. show access-lists C. show ip interface D. show access-lists interface
42. You have created a named access list called Blocksales. Which of the following is a valid command for
applying this to packets trying to enter interface s0 of your router?
A. (config)# ip access-group 110 in B. (config-if)# ip access-group 110 in
C. (config-if)# ip access-group Blocksales in D. (config-if)# blocksales ip access-list in
43. You want to create a standard access list that denies the subnet of the following host:
172.16.144.17/21. Which of the following would you start your list with?
A. access-list 10 deny 172.16.48.0 255.255.240.0
B. access-list 10 deny 172.16.144.0 0.0.7.255
C. access-list 10 deny 172.16.64.0 0.0.31.255
D. access-list 10 deny 172.16.136.0 0.0.15.255
44. You configure the following access list:
access-list 110 deny tcp 10.1.1.128 0.0.0.63 any eq smtp
access-list 110 deny tcp any eq 23
int ethernet 0
ip access-group 110 out
What will the result of this access list be?
A. Email and Telnet will be allowed out E0.
B. Email and Telnet will be allowed in E0.
C. Everything but email and Telnet will be allowed out E0.
D. No IP traffic will be allowed out E0.
45. You want to create a standard access list that denies the subnet of the following host:
172.16.198.94/19. Which of the following would you start your list with?
A. access-list 10 deny 172.16.192.0 0.0.31.255 B. access-list 10 deny 172.16.0.0 0.0.255.255
C. access-list 10 deny 172.16.172.0 0.0.31.255 D. access-list 10 deny 172.16.188.0 0.0.15.255
46. If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could
you use?
A. access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet
B. access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet
C. access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23
D. access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23
47. Which router command allows you to view the entire contents of all access lists?
A. Router# show interface B. Router> show ip interface
C. Router# show access-lists D. Router> show all access-lists
48. Which of the following access lists will allow only HTTP traffic into network 196.15.7.0?
A. access-list 100 permit tcp any 196.15.7.0 0.0.0.255 eq www
B. access-list 10 deny tcp any 196.15.7.0 eq www
C. access-list 100 permit 196.15.7.0 0.0.0.255 eq www
D. access-list 110 permit ip any 196.15.7.0 0.0.0.255
49. Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list?
172.16.30.55 0.0.0.255
172.16.30.55 0.0.0.0
any 172.16.30.55
host 172.16.30.55
0.0.0.0 172.16.30.55
ip any 172.16.30.55
A. 1 and 4 B. 2 and 4 C. 1, 4 and 6 D. 3 and 5
50. Which of the following commands connect access list 110 inbound to interface ethernet0?
A. Router(config)# ip access-group 110 in B. Router(config)# ip access-list 110 in
C. Router(config-if)# ip access-group 110 in D. Router(config-if)# ip access-list 110 in

Вам также может понравиться