Вы находитесь на странице: 1из 21
1 What are three benefits of a hierarchical network model? (Choose three.) mreduced contention for bandwidth Cireduced size of the physical layout increased fault tolerance of the network 1 elimination of the need for wiring closets 1 elimination of the need for layer three functionality simplification of management and troubleshooting 2. Insetting up a wireless infrastructure network, which device is used to associate a client computer to the network? an Ethemet switch @ a wireless access point another wareless computer a hard-wired computer on the network Hub-A After listening for the presence of a signal on the network media, hosts A and C transmit data at the same time. In what two ways do the hosts respond to this situation? (Choose two.) ™ The hosts transmit a jam signal to ensure that all hosts on the network are aware that a collision has occured. i Because they are operating in full-duplex mode, the hosts resume listening for traffic in preparation for sending future messages [Because the hub will temporarily block traffic from one of the hosts, that host will be allowed to transmit once the wire is clear Cl Hosts A and C are assigned shorter backoff values to provide them priority to access the media for retransmission After the backoff period ofa host, the host checks to determine if the line is idle before retransmitting, ‘Which three statements are correct concerning the default configuration ofa new switch? (Choose three.) 1 Spanning Tree Protocol is disabled. 1 Enable password is configured as cisco All switch ports are assigned to VLAN1. The flash directory contains the IOS image. 1 VLANI is configured with a management IP address All interfaces are set to auto-negotiation of speed and duplex. 17/11/2009 19-23 at hat Host A HostB HostC Host Host E © immediately after sending its jam signal Refer to the exhibit, Hosts A and Battempt to transmit a frame at the same time and a collision occurs. When will host D be able to transmit? after host A and host B have completed transmission after the jam signal clears and its backoff delay expires ‘trunk ‘trunk ‘trunk eH Fad a Fao Fad eZ Fania ey VIP Server VIP Server VIP Transparent VIP server ‘SUL? show running-contig vep domain IAB vep mode server vlan 10 ‘name VEANLO vlan 20 ‘naw2 VLANZO vlan 100 ‘pane HANGEKENT interface Fes tEthernet0/L switchport trunk native vlan Loo puitehpors mode trunk interface Fes tEthernett/2 suitchpor= trumk native vlan 100 suitehpore mod= trunk. ‘3W2e show rumniag-coatig utp donein LAB vip mode transperent vlan 4 rane VIANA vlan $0 rane VLANSO vlan 100 ane JANCEMENT interface FastEtheret0/3 switchport trunk native vlan 100 suitehport mode trunk interface Fastéthemet0/4 switchport trunk native vian 100 suitchport mode trunk output onitted ‘SW3—VLAN 10,20 Swv4 —VLAN 10,20 Refer to the exhibit. Switches SW3 and SW4 are brand new switches with default configurations. The links between the switches are configured as trunk links and all VLANsare allowed on the trunks. On the basis of the show running-config output that is provided, which VLANs will be available on SW3 and SW4? 17/11/2009 19-23 ‘SW3— VLAN 10, 20, 100 Sw4 - VLAN 10, 20,100 ‘SW3— VLAN 10, 20, 100 SW — VLAN 10, 20, 40,50, 100 ‘BW VLAN 10, 20, 40, 50, 100 SW4 - VLAN 10, 20, 40, 50, 100 Suitchi (contig) # ip oeh version 2 Suitchl (contig) # 4p domain-nane ciscocom Switchi (contig)# crypto Key generate rsa Suitchl (config)# line vty 0-19 Switchl (config-Line}# transport input. all Refer to the exhibit. The network administrator wants to configure Switch] to allow SSH connections and prohibit Tenet connections. How should the network administrator change the displayed configuration to satisfy the requirement? Use SSH version 1 Reconfigure the RSA key Configure SSH on a different line @ Modify the transport input command 8 Anetwork administrator needs to save the configuration file currently in RAM to NVRAM before rebooting the switch. Which command should the administrator issue? Switch1# copy startup-config flash: filename @ Switch1# copy running-config startup-config Switch 1# copy startup-config running-config Switch1# copy flash: config.txt running-config 9 Which statement regarding the service password-encryption command is true? ‘The service password-encryption command is entered at the privileged EXEC mode prompt. ‘The service password-encryption command encrypts only passwords for the console and VTY_ ports © The service password-encryption command encrypts all previously unencrypted passwords in the running configuration. To see the passwords encrypted by the service password-encryption command, enter the no service password-encryption command. 3 sw 21 17/11/2009 19-23

Вам также может понравиться