- A.SWEzonexam1(config-if)# switchport port-security maximum 1
- B.SWEzonexam1(config)# mac-address-table secure
- C.SWEzonexam1(config)# access-list 10 permit ip host
- D.SWEzonexam1(config-if)# switchport port-security violation shutdown
- E.SWEzonexam1(config-if)# ip access-group 10
- A.Full-duplex Ethernet uses CSMA/CD to prevent collisions.
- B.Half-duplex Ethernet uses a loopback circuit to detect collisions.
- C.A full-duplex Ethernet card allows 20Mbps for data transmission.
- D.Full-duplex Ethernet makes use of two pairs of wires for data.
- E.An Ethernet hub can operate both half and full duplex simultaneously.
- A.A switch
- B.A router
- C.A network adapter card
- D.A hub
- E.A repeater
- 4
-
Why is full-duplex Ethernet superior to its single-duplex counterpart? (Select two answer choices.)
- A.It uses inexpensive hubs
- B.It operates without collisions
- C.It operates on switches
- D.It provides faster data transfer
- E.It utilizes fewer wiring pairs
- A switch has been configured for three different VLANs: VLAN 2, VLAN 3, and VLAN 4. For the purposes of communication between VLANs a router is to be added. Host from one VLAN should be able to reach the hosts in the other VLANs.
- Based on this requirement, what type of connection is acceptable between the router and switch? (Select all valid answers)
- A.10 Mbps Ethernet
- B.56 kbps serial
- C.100 Mbps Ethernet
- D.1,544 Mbps serial
- E.1000 Mbps Ethernet
- A.A device waits for an electronic signal before transmitting.
- B.A device listens and waits until the media is not busy before transmitting.
- C.All devices on an Ethernet segment see data that passes on the network medium.
- D.Only the sender and the receiver devices see data that passes on the network medium.
- E.Ethernet networks allow you to configured devises with higher transmission priority.
- A.Allowing simultaneous frame. transmissions
- B.Increasing the size of broadcast domains
- C.Increasing the maximum length of UTP cabling between devices
- D.Filtering frames based on MAC addresses
- E.Decreasing the number of collision domains
- A.The extended ping command is supported from user EXEC mode.
- B.The extended ping command is available from privileged EXEC mode.
- C.With the extended ping command you can specify the TCP and UDP port to be pinged.
- D.With the extended ping command you can specify the timeout value.
- E.With the extended ping command you can specify the datagram size.
- A.Each device on the Ethernet segment stops transmitting for a short time.
- B.A jam signal informs all devices that a collision occurred.
- C.When data transmission resumes, the devices that were involved in the collision have priority to transmit.
- D.The devices that are involved in the collision stops transmitting for a short time.
- E.The collision invokes a random back-off algorithm.
- A.255.255.255.192
- B.255.255.255.224
- C.255.255.255.240
- D.255.255.255.248
- E.None of the above
- A.Latency fluctuates regardless of frame. size.
- B.The switch receives the complete frame. before beginning to forward it.
- C.Latency through the switch varies with frame. length.
- D.The switch checks the destination address upon receipt of headers.
- A.Deleting unusable addresses through the creation of many subnets.
- B.Combining routes to multiple networks into one supernet.
- C.Reclaiming unused space by means of changing the subnet size.
- D.Calculating the available host addresses in the AS.
- E.None of the above
- A.To prevent unauthorized hosts from getting access to the LAN
- B.To limit the number of Layer 2 broadcasts on a particular switch port
- C.To prevent unauthorized Telnet or SSH access to a switch port
- D.To prevent the IP and MAC address of the switch and associated ports
- E.None of the above
- A.It is used to restart the router.
- B.It is used to bypass the configuration in NVRAM.
- C.It is used to enter ROM Monitor mode.
- D.It is used to view the lost password.
- E.It is used to save the changes to the configuration.
- A.To prevent routing loops
- B.To create a default route
- C.To provide multiple gateways for hosts
- D.To maintain a loop-free Layer 2 network topology
- E.To enhance the functions of SNMP
- A.IP address: 192.168.20.14 Subnet Mask: 255.255.255.248 Default Gateway: 192.168.20.9
- B.IP address: 192.168.20.254 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.20.1
- C.IP address: 192.168.20.30 Subnet Mask 255.255.255.248 Default Gateway: 192.168.20.25
- D.IP address: 192.168.20.30 Subnet Mask 255.255.255.240 Default Gateway: 192.168.20.17
- E.IP address: 192.168.20.30 Subnet Mask 255.255.255.240 Default Gateway: 192.168.20.25
- A.Hubs can have their ports be configured with VLANs
- B.Using hubs is costly with regard to bandwidth availability.
- C.Switches can not forward broadcasts.
- D.Switches are more efficient than hubs in processing frames.
- E.Switches increase the number of collision domains in the network.
- At which OSI layer is this problem associated with?
- A.The data link layer
- B.The application layer
- C.The access layer
- D.The session layer
- E.The network layer
- A.Echo request and Echo reply
- B.ICMP hold and ICMP send
- C.ICMP request and ICMP reply
- D.Echo off and Echo on
- E.None of the above
- A.ROM, TFTP server, Flash
- B.Flash, TFTP server, ROM
- C.Flash, NVRAM, TFTP server
- D.Flash, ROM, TFTP server
- E.Flash, TFTP server, RAM
- A.UDP will send an ICMP Information Request to the source host.
- B.UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
- C.UDP will drop the datagrams.
- D.UDP will use the sequence numbers in the datagram headers to reassemble the data in the correct order.
- E.UDP will not acknowledge the datagrams and wait for a retransmission of the datagrams.
- A.Transport
- B.Physical
- C.Application
- D.Data link
- E.Network
- A.VE1(config)# ip route 0.0.0.0 10.1.1.0 10.1.1.1
- B.VE1(config)# ip default-route 10.1.1.0
- C.VE1(config)# ip default-gateway 10.1.1.0
- D.VE1(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.1
- A.Switch(config)# switchport trunk encapsulation isl
- B.Switch(config)# switchport trunk encapsulation ietf
- C.Switch(config-if)# switchport trunk encapsulation isl
- D.Switch(config-if)# switchport trunk encapsulation ietf
- E.Switch(config-if)# switchport trunk encapsulation dot1q
- A.ROM Monitor mode
- B.SETUP mode
- C.Autoflash mode
- D.RXBOOT mode
- E.None of the above
- A.VTP will allow physically redundant links while preventing switching loops
- B.VTP will allow switches to share VLAN configuration information
- C.VTP will allow a single port to carry information to more than one VLAN
- D.VTP will allow for routing between VLANs
- E.None of the above
- A.225.225.224.0.
- B.225.225.240.0.
- C.225.225.255.0.
- D.255.255.255.224
- E.225.225.255.240
- A.The router lacks a routing table entry for the new host
- B.The host switch port is assigned to the incorrect VLAN
- C.The host MAC address is incorrectly configured
- D.A STP instance for the new host has not been initialized
- E.The switch does not have the MAC address hard coded in the CAM table.
- A.To provide local hosts with a default gateway address
- B.To allow remote management of the switch.
- C.To allow the switch to respond to ARP requests between two hosts
- D.To ensure that hosts on the same LAN can communicate with each other.
- E.None of the above
- A.Learn and save VTP configuration in the running configuration.
- B.Create and change VLANs.
- C.Forwards information about VTP configuration.
- D.VTP is disabled on this device.
- E.VTP is not saved to NVRAM.