Site hosted by Angelfire.com: Build your free website today!

What are three characteristics of Gigabit Ethernet? (Choose three.)

support for half-duplex and full-duplex

support for full-duplex only

utilizes CSMA/CD

supports legacy IEEE 802.3 Ethernet frame format

supports minimum and maximum IEEE 802.3 frame size

Gigabit Ethernet architecture divides Layer 1 into which two sublayers?

TDM and DWDM

PDM and PHY

MAC and LLC

PMD and PCS

Utilizing wavelength multiplexing, how many individual wavelengths can one fiber ring support?

1 lambda at OC-48 speed

18 lambdas at OC-48 speed

36 lambdas at OC-192 speed

48 lambdas at OC-192 speed

What is true of DWDM and CWDM?

DWDM utilizes multiple light wavelengths over a single optical fiber, whereas CWDM utilizes single light wavelengths over multiple optical fibers.

CWDM utilizes multiple light wavelengths over a single optical fiber, whereas DWDM utilizes single light wavelengths over multiple optical fibers.

Both DWDM and CWDM utilize multiple light wavelengths over a single optical fiber.

Both DWDM and CWDM utilize single light wavelengths over multiple optical fibers.

Which service offered by a metro Ethernet service provider offers Gigabit connectivity over a shared multipoint metro LAN?

High-speed Internet access

High-speed Virtual Private Network (VPN) access

Transparent LAN services

Point-to-point LAN services

Which service offered by a metro Ethernet service provider offers Gigabit connectivity over a shared multipoint metro LAN?

High-speed Internet access

High-speed Virtual Private Network (VPN) access

Transparent LAN services

Point-to-point LAN services

Which technology provides strong QoS and statistical multiplexing of bursty data traffic through existing support in the IP protocol?

point-to-multipoint shared

point-to-point dedicated

QoS

IP+Optical

What are three characteristics of Dynamic Packet Transport? (Choose three.)

replaces the complexity of SONET/SDH with the simplicity of Ethernet

bandwidth allocation is fixed

can utilize legacy time-division multiplexing (TDM) nodes

reduces the configuration management requirements

utilizes statistical time-domain multiplexing

maps the logical topology into a physical topology

A metro network is segmented into which three areas? (Choose three.)

customer premises equipment (CPE)

central office equipment (COE)

aggregation point for forwarding

aggregation point for replying

POP used to interconnect to other networks

TLS used to interconnect to other networks

What three benefits does Transparent LAN Services provide for connecting customers requiring extended wide-area bandwidth? (Choose three.)

scalable

secure

established technology

economical

complete autonomy

TLS provides native VLAN services over the WAN without the need to implement which of the following?

DWDM

ATM

SONET

POS

Which technology allows customers to extend their logical network topology across wide geographic areas?

DWDM

IP+Optical

VLAN tunneling

SONET

ATM

What are two standards for interfacing Operating Telephone Company (OTC) optical networks? (Choose two.)

Sonet

SDH

POS

SRP

WDM

Which technology replaces the complexity of SONET/SDH with the simplicity of Ethernet, but retains the main benefits of SONET/SDH?

DPT

WDM

DLP

DWDM

Which two optical technologes employ multiple light wavelengths to transmit signals over a single optical fiber? (Choose two.)

Sonet

DWDM

POS

CWDM

ATM

10 Gigabit Ethernet shares which of the following IEEE 802.3 Ethernet characteristics?

Media Access Control (MAC) protocol

IEEE 802.3 CSMA/CD algorithm

Ethernet frame format

half/full duplex operation

minimum and maximum frame size.

Why would the implementation of QoS benefit customers using private shared bandwidth services to connect a distributed campus network? (Choose two.)

It allows the customer to extend their own QoS model across the WAN network to other sites.

It provides efficient transport of time-division multiplexing (TDM), packets, cells, and frames through the reduction of packet overheads.

QoS is used to prevent one shared bandwidth node from starving the bandwidth from others.

It allows customers to maintain existing Ethernet/IP technologies layered directly onto the optical layer.

Each customer is completely segmented from the others, allowing complete autonomy.

How does DWDM segment existing fiber infrastructures to allow multiple service offerings?

With VLAN tagging, a tunnel can separate customers over a single trunked fiber link.

Through wavelength multiplexing, a service provider can offer virtual dark fiber to customers.

Through multiplexed clocking, separate channels can be defined as subinterfaces for different customer networks.

With native quality of service (QoS) support, customers have the advantage of advanced traffic shaping and flexibility in physical network design.

A customer has a need for a large bandwidth connection between multiple geographically dispersed sites as shown in the figure. Which TLS solution will interconnect the two remote sites on the right with the central site on the left?

point-to-multipoint subinterfaces

point-to-point

point-to-multipoint shared

point-to-point shared

What technology is used to prevent one shared bandwidth node from starving the bandwidth from others?

point-to-multipoint shared

point-to-multipoint dedicated

point-to-point dedicated

point-to-point shared

QoS

IP+Optical

Which Transparent LAN Services Architecture offers guaranteed bandwidth to the customer?

IP+Optical

point-to-point dedicated

point-to-multipoint shared

SONET/SDH

What is the base level signal at 51.84 Mbps for SONET?

STS-1

STS-3

STS-3c

STM-1

What is the base level signal at 155.52 Mbps for SDH?

STS-1

STS-3

OC-1

STM-1

Which three elements are considered in-band security access risks? (Choose three.)

con0

HTTP

aux0

modems

TFTP

vty ports

Which three elements are considered out-of-band security access risks? (Choose three.)

con0

HTTP

aux0

modems

TFTP

vty ports

Which network area would be summarized as the layer that provides policy-based connectivity?

the core layer

the LAN

the distribution layer

the access layer

 

Top of Form

On a Catalyst 6500 series switch, what is the default bandwidth on the forwarding bus increased to after the SFM is installed?

30 Mbps

64 Gbps

210 Mbps

256 Gbps

Bottom of Form

On a Catalyst 6500 series switch, what is the default bandwidth on the forwarding bus?

8 Gbps

16 Gbps

32 Gbps

64 Gbps

How many SPAN sessions can be configured on a switch?

1

2

4

8

 

Top of Form

Which protocols can RSPAN monitor?

Layer 2 protocols and BPDUs

Layer 3 protocols and BPDUs

Layer 2 protocols

Layer 3 protocols

Bottom of Form

The network administrator configures a physical port that belongs to an EtherChannel group as a SPAN source port. Which state will the port reflect?

standby

up

static

down

offline

Which Cisco IOS release allows trunk ports to be configured as destination ports?

releases starting with 9.1

releases starting with 10.1

releases starting with 11

releases starting with 12.1

During authentication initiation, what happens if an 802.1X-enabled client does not receive an EAP-request/identity frame after three attempts to start authentication?

The client continues to send EAP-request/identity frames to the switch.

The client refuses any further frames.

The client sends frames as if the port is in the authorized state.

The client determines that the port is switched to the unauthorized state.

Which AAA accounting record type instructs RADIUS or TACACS+ to send a stop record accounting notice at the end of the requested user process?

none

wait-start

start-stop

stop-only

Which router commands can a user issue when granted privilege level 0? (Choose two.)

help

ping

configure

disable

show

How many port ACLs can be applied to a Layer 2 switch interface?

1

2

4

10

 

Top of Form

Which type of ACL should be used to filter 802.1Q encapsulated IP packets on an 802.1Q configured interface?

content-based ACL

reflexive ACL

MAC ACL

IP ACL

Bottom of Form

When running port security, what is the default maximum number of secure MAC addresses allowed before a port shuts down?

56

99

128

168

Which port security violation modes can be used on Cisco Catalyst switches 2950, 3550, and 6500? (Choose three.)

default

maximum

protect

restrict

shutdown

secure

Which Cisco IOS data encryption software images support SSH server and SSH client? (Choose two.)

RSA

DES

RTS

3DES

TFTP

What should be done to manage configuration settings efficiently on a large number of similar devices?

Enable service password-encryption on switches and routers.

Assign a single locally defined management user name and password.

Load all access layer configurations on a management laptop.

Use a TFTP server to store and load configuration scripts.

Which layer is used to enforce VLANs, access lists, filters, and also controls traffic by using port security?

access

core

distribution

enterprise edge

What are two outcomes of using the username name secret passwordcommand? (Choose two.)

A user is assigned only user-mode access.

The IOS stores a username and assigns an associated password.

A user will only have access from a defined IP host or subnet.

The password is automatically masked using strong encryption.

A user is assigned global-configuration mode access only.

 

Top of Form

Which layer is responsible for providing boundary definition and policy-based connectivity and is also the layer at which packet manipulation should take place?

core

distribution

access

enterprise edge

Bottom of Form

 

Top of Form

Which hierarchical network layer should not perform any packet manipulation such as access lists or filtering?

distribution

access

core

enterprise edge

Bottom of Form

 

Top of Form

What should be done to a switch to increase security and prevent unwanted access to devices in a large network?

Configure an interface to allow out-of-band monitoring.

Enable in-band management to control remote monitoring.

Disable script assignments for Cisco IOS.

Disable control functions and remote monitoring from using HTTP.

Bottom of Form

Which mode is used to pass data traffic to or from non-fabric enabled modules and between fabric-enabled and non-fabric-enabled modules?

truncated mode

bus mode

compact mode

asymmetric mode

Which password is in the recommended format for a router configured for remote management using a modem?

T72%aR!3

ROUTER23

NannoPlankton

MANAGERTOM

With QoS, which two layers can support traffic classification? (Choose two.)

data link

physical

network

transport

application

session

What link speeds would cRTP be used on?

links higher than 1.544 Mbps

links lower than 768 Kbps

links higher than 768 Kbps

links that are dialup

Where should traffic be classified in order for QoS to be effective within the network?

at the ingress point of the network

at the egress point of the network

end-to-end within a network

at the core within a network

How should QoS be implemented to be effective?

on the input side within a network

on the output side within a network

end-to-end within a network

at the core within a network

Which command is used to attach a traffic policy to an interface?

class-map

policy-map

service-policy

access-group

Which elements are contained in a traffic policy? (Choose three.)

class-default

policy name

traffic class

bandwidth affected

QoS policies

the traffic map

Which function is central to Cisco's implementation of IOS based QoS solutions?

Class-map

Policy-map

MQC

COS

Which QoS values used for traffic marking cannot be used simultaneously? (Choose two.)

CoS

ToS

IP DSCP

ISL

IP Precedence

What is the maximum one-way latency QoS requirement for streaming video?

10-20ms

100-200ms

150-200ms

150-250ms

Which three QoS quality factors are directly affected by voice? (Choose three.)

duplex

loss

delay

bandwidth

delay variation

traffic shaping

Which class of traffic is the best-effort and default class for QoS data?

gold

silver

platinum

bronze

Which technologies are used to create high availability in a network design? (Choose three.)

HSRP

minimal jitter

redundancy

dynamic routing protocol

small delays

Which three services does QoS offer in order to provide an improved and more predictable network service? (Choose three.)

dedicated bandwidth

jitter reduction

prioritization of traffic

redundancy

traffic shaping

Which relative priority level suggests Guaranteed-Bandwidth for data transmission?

Gold

Silver

Bronze

Lead

Which type of delay is caused by encoding and serialization?

fixed delay

variable delay

bandwidth delay

round-trip delay

Why is the PBX platform considered adequate for voice only?

PBX is a wave-division multiplexed system built on 64 kbps time slots.

ISDN, the next high-speed desktop technology, is not well suited to be terminated on the PBX.

PBX supports variable 64 kbps bandwidth increments carried across a packet-switched infrastructure.

Data desktops are typically connected at speeds of 10 or 100 Mbps.

 

Top of Form

Which key area of security involves tracking physical, endpoint, application, and Layer 2 security issues?

internal network security

external network security

network identity

access security

Bottom of Form

Which protocol communicates between routers and ATM switch groups to detect device failures and initiates automatic reroutes within one second of failover time?

Hot Standby Router Protocol (HSRP)

Virtual Router Redundancy Protocol (VRRP)

Simple Server Redundancy Protocol (SSRP)

ATM Link Redundancy Protocol (ALRP)

Which standard enables videoconferencing over existing IP data networks?

H.230

H.322

H.320

H.323

Which Cisco AVVID Solution delivers intelligent call routing, network-to-desktop computer telephony integration (CTI), and multimedia contact management to contact center agents over an IP network?

IP Telephony

Content Networking

IP Contact Center

Storage Networking

Which type of traffic is transmitted from one sender and accepted by a select group of receivers simultaneously?

broadcast

unicast

multicast

directed broadcast

What is the default behavior of a router when dealing with multicast packets?

Floods multicast traffic within each broadcast domain.

Does not forward multicast traffic.

A multicast routing protocol is enabled by default, allowing routers to forward multicast traffic.

Forwards only public multicast traffic, such as the Network Time protocol.

Why is it that bridges and switches cannot dynamically learn where to foward multicast traffic?

Multicast addressing occurs at Layer 2 only.

Multicast addressing occurs at Layer 3 only.

A multicast address never appears as a source address.

A multicast address never appears as a destination address.

How is a Layer 2 multicast address assigned to an application?

A network administrator assigns the Layer 2 multicast address.

The Layer 2 multicast address is calculated from the Layer 3 multicast address.

Each device associates its Layer 2 MAC address with the Layer 3 multicast address.

For multicast traffic, the Layer 2 address is all Fs.

Which range of multicast addresses is reserved for network protocols on a local network segment?

224.0.0.0 through 224.0.0.255

224.0.0.0 through 224.255.255.255

224.0.0.0 through 239.255.255.255

239.0.0.0 through 239.0.0.255

Which type of multicast packets should never be forwarded by a router?

Reserved Link Local Addresses

Globally Scoped Address

Limited Scope Addresses

GLOP Addressing

Under which two conditions will a device issue an IGMP membership report? (Choose two.)

as an unsolicited report to the router when the device first intends to receive a multicast stream

as a solicited report to the multicast group when the device first intends to receive a multicast stream

in response to a membership query from the router

in response to a membership query from another host within the multicast group

as an unsolicited report to the router periodically to ensure multicast streams will continue to be forwarded

What is one message type added in IGMP Version 2 that is not found in IGMP Version 1?

0x11-Membership query

0x12-Version 2 add member

0x16-Version 1 membership report

0x17-Leave group

What keyword(s) enable a switch to remove a port from the IP multicast group instantly when it detects an IGMPv2 leave message on that port?

igmp snooping

immediate-leave

learn cgmp

leave-message

What must be configured in order for CGMP to operate correctly on a switch?

ip igmp snooping must be enabled on the connected router interface

ip cgmp must be enabled on the connected router interface

ip igmp snooping vlan vlan-id must be enabled on the switch

ip cgmp enable must be enabled on the switch

What will occur if an incoming packet has a TTL of 24 and the outgoing port is configured with a TTL of 16?

The packet is discarded.

The packet is forwarded.

The packet is unencapsulated and reencapsulated to support the outgoing interface TTL

The packet is decremented to 16 by normal router IP packet processing.

Delays caused by codecs are considered what type of delay?

propagation delay

jitter

handling delay

What are the main components of HSRP? (Choose three.)

active router

standby router

secondary router

BVI router

virtual router

middle router

output delay

Which design model maintains the Cisco CallManager or Cisco CallManager cluster at each site, supports a maximum of 10,000 IP phones per cluster, and utilizes PSTN for networking multiple sites and for all external calls?

multiple sites with Distributed Call Processing

multiple sites with Independent Call Processing

multi-site IP WAN with Centralized Call Processing

single-site model

Which command will enable multicast routing?

Router(config)# routing multicast

Router(config-if)# ip mroute-cache

Router(config-if)# enable ip multicast boundary

Router(config)# ip multicast-routing

Which multicast routing protocol, supported by Cisco, is protocol independent and utilizes existing unicast routing tables to perform RPF instead of maintaining a separate multicast route table?

PIMDM

DVMRP

MOSPF

CBT

Which IP multicast routing protocols rely on periodic flooding of the network with multicast traffic, utilize only shortest-path trees, and employ a push principle to construct multicast spanning trees and to forward packets?

sparse-mode

dense-mode

distance vector

link-state

Where should traffic classification be performed?

as close to the source as possible

as close to the destination as possible

at the core layer

at the default gateway

Which command is used to instruct the switch port to use 802.1P priority tagging for voice traffic and to use the default native VLAN to carry all traffic?

Switch(config-if)# switchport voice vlan vlan 0

Switch(config-if)# switchport voice vlan dot1p

Switch(config-if)# switchport voice vlan tagged

Switch(config-if)# switchport voice vlan 802.1P

 

Top of Form

Which command is used to display the virtual IP and MAC address of the virtual router?

show hsrp detail

show virtual router

show virtual

show standby

Bottom of Form

What are the states in which an HSRP enabled router can exist?

initial, listen, learn, block, and forward

initial, learn, listen, speak, standby, and active

initial, learn, listen, forward, standby, and speak

initial, learn, speak, standby, and active

Which three components make up the HSRP virtual router MAC address? (Choose three.)

vendor ID

group ID

virtual ID

HSRP code

last octet of the IP address of the active router converted to hex

last octet of the IP address of the standby router converted to hex

When redundant supervisor engines are implemented, which command displays the active supervisor module?

show supervisor

show active

show module

show slot

What are the responsibilities of the active supervisor module when redundancy is configured? (Choose two.)

protocol selection

system bus

receiving packets

all line cards

system overload conditions

When implementing redundant power supplies, which features are reenabled automatically? (Choose two.)

redundancy

software configuration

backup mode

load splitting

load sharing

What is the goal of IP routing redundancy?

to provide alternate paths

to provide a network gateway

to protect against first-hop failures

to establish a backup path

 

Top of Form

Which routing protocol provides redundancy and load sharing among a single group of routers?

SRM

HSRP

VRRP

GLBP

Bottom of Form

Which protocol will allow a host to dynamically find an alternative router when the host no longer receives hello messages?

Proxy ARP

ICMP

IRDP

VRRP

HSRP

Which command will configure IRDP routing?

enable ip irdp

enable irdp

ip irdp enable

ip irdp

Which command is used to troubleshoot IRDP?

debug ip irdp

debug ip icmp

debug irdp

debug icmp

show icmp

show irdp

Which two protocols enable two or more devices to work together in a group, sharing a single virtual IP address? (Choose two.)

HRRP

HSRP

VRRP

VSRP

IRDP

ICMP

Which protocol is an alternative to having both multilayer switch feature cards (MSFC) in a chassis active at the same time?

DFC

SRM

CEF

RFC

 

Top of Form

What is the default advertisement rate for IRDP?

1 to 7 seconds

7 to 10 seconds

1 to 7 minutes

7 to 10 minutes

30 minutes

Bottom of Form

Even with the use of equipment from multiple vendors, which protocol ensures immediate and transparent recovery from first-hop failures?

IRDP

HSRP

VRRP

GLBP

A local host utilized proxy ARP to obtain the MAC address of Router A. Router B is a redundant router on the same local segment. If Router A were to fail, how long would it take the local host to learn the new path through Router B?

immediately, the local host should already be aware of Router B

when the local host sends a new hello timer, default every 30 seconds

when Router B transmits the routing table

when the local host sends a new MAC request

 

Top of Form

In which state does an HSRP enabled router know the virtual IP address, but is neither the active router nor the standby router?

initial

learn

listen

speak

Bottom of Form

How does an HSRP enabled router update its holdtime?

group numbers

hello messages

priority settings

standby commands

What is the default holdtime for a HSRP enabled router?

5 seconds

10 seconds

30 seconds

90 seconds

As a general rule, what should the holdtime be set to on a HSRP enabled router?

the same amount of time as the hellotime

less than the hellotime

greater than or equal to three times the value of the hellotime

greater than or equal to the group number

HSRP routers on a VLAN communicate with each other to designate router states. Which three router states can be designated? (Choose three.)

active

adjacent

standby

passive

init

 

Top of Form

Which hardware component is traditionally considered a bottleneck in a high speed networking environment?

Ethernet network cards

switches

routers

servers

Bottom of Form

 

Top of Form

Which of the following technologies was developed to solve the router-as-a-bottleneck issue?

multilayer switching

spanning-tree

PortFast

BackboneFast

Bottom of Form

Which technology used by newer Cisco devices enables packet switching to circumvent the route processor altogether, therefore providing wire speed routing of packets?

MLS

CEF

PortFast

BackboneFast

optimum-switching

Which type of flow mask is used when the MLS-RP interface has an extended access list?

ip-flow

destination-ip

source-ip

source-destination-ip

Which type of flow mask is used when the MLS-RP interface has a standard access list?

ip-flow

destination-ip

source-destination-ip

source-ip

Which type of flow mask is used when the MLS-RP interface has no access control lists configured?

destination-ip

source-destination-ip

source-ip

ip-flow

 

When host A initiates an FTP file transfer to Host B, which kind of entry is created for a flow in the content-addressable memory of Switch A?

 

 

access list

 

 

MLS-RP

 

 

multicast entry

 

 

MLS entry

 

 

MLS-SE

 

 

Which method is used by MLSP to inform the MLS-SE of the MLS-RP MAC addresses used on different subnets?

 

 

multicast

 

 

unicast

 

 

anycast

 

 

broadcast

 

 

Host A and Host B are on different VLANs. Once the MLS-SE has learned the destination MAC addresses and VLANs through MLSP, what type of packet will be the first packet sent in the data stream from Host A to Host B?

 

 

ip-flow

 

 

candidate packet

 

 

enable packet

 

 

hello packet

 

 

FIB

 

 

CEF implementation adds support to the Catalyst 6000 for which feature?

 

 

AppleTalk forwarding

 

 

IPX forwarding

 

 

access control lists

 

 

multiple VTP domains

 

 

Which module provides the connectivity to the switching fabric?

 

 

policy feature card

 

 

supervisor base board

 

 

inline-power module

 

 

multilayer switching feature card

 

 

route switch module

 

 

Which component provides an array of ASICs to enable all hardware based forwarding?

 

 

policy feature card

 

 

multilayer switching feature card

 

 

supervisor base board

 

 

NetFlow feature card

 

 

CEF relies on which algorithm?

 

 

spanning-tree algorithm

 

 

shortest path first

 

 

longest-match forwarding algorithm

 

 

DUAL

 

 

Which three tables are used by CEF? (Choose three.)

 

 

forwarding information base

 

 

adjacency table

 

 

topology table

 

 

NetFlow table

 

 

accounting database

 

 

What is the first step in the CEF forwarding process?

 

 

The forwarding engine performs a lookup on the destination MAC address.

 

 

The ASICs perform the input security ACL lookups.

 

 

The ASICs receive the packet headers from the data bus.

 

 

The ASICs perform any input QoS/ACL lookups.

 

 

What command is used to add an IP MLS interface to a VTP domain?

 

 

mls rp domain

 

 

vtp domian

 

 

mls rp ip domain

 

 

mls rp vtp-domain

 

 

Which command enables MLS to cooperate with ACLs?

 

 

mls rp ip list

 

 

mls rp ip input-acl

 

 

mls rp ip acl

 

 

mls rp ip access-list

 

 

Which command enables MLS on a Cisco 2926G switch?

 

 

set mls enable

 

 

mls rp ip

 

 

set mls rp ip

 

 

mls rp ip enable

 

 

What command specifies the external router(s) participating in MLS?

 

 

mls rp ip

 

 

set mls ip

 

 

set mls include

 

 

mls ip rp

 

 

At what time interval is the MLS entry aged out by default?

 

 

8 seconds

 

 

64 seconds

 

 

128 seconds

 

 

256 seconds

 

 

What command purges all existing MLS cache entries and affects the number of active entries on the MLS-SE?

 

 

clear ip mls

 

 

set mls flow

 

 

delete mls entry

 

 

clear mls-cache

 

 

 

Top of Form

Which command displays all the MLS entries on the switch?

show mls rp

show mls status

show mls entry

show mls ip

Bottom of Form

 

 

 

Top of Form

Which command removes entries from the MLS cache?

clear mls entry

clear mls rp entry

clear entry mls

clear mls ip enrty

Bottom of Form

 

 

Which situations require configuration of MLS on a switch? (Choose three.)

 

 

when RSFC is installed in the Catalyst 5000 chassis

 

 

when an external router is the MLS-RP

 

 

when NetFlow Data Export(NDE) must be enabled

 

 

when RSM is installed in the Catalyst 5000 chassis

 

 

when packet threshold values must be changed

 

 

What would be one indication that IP routing is disabled?

 

 

the presence of the command ip routing disabled in the running-configuration

 

 

the absence of Layer 3 VLAN information and IP addressing information after the show ip interfaces brief command has been issued

 

 

the presence of directly connected networks after the absence of routes has been learned via a dynamic routing protocol

 

 

the absence of directly connected networks after the show ip route command is issued

 

 

What is one advantage of an InterVLAN routing configuration that uses dot1q trunking to carry traffic for multiple VLANs through a single physical interface on an external router?

 

 

Fewer physical interfaces are required on the router.

 

 

There is a high-speed connection to each VLAN.

 

 

There is more bandwidth available to each VLAN than is available in a multiple router interface configuration.

 

 

A router-on-a-stick configuration is much more efficient than using a route processor.

 

 

In order to optimize performance, what is true regarding the distribution layer switch in an InterVLAN routing scenario?

 

 

The distribution layer switch should have spanning tree disabled for each connection to the distribution layer router.

 

 

The distribution layer switch should provide Layer 2, 3, and 4 functionality.

 

 

The distribution layer switch should have multiple connections to one or more external routers for load balancing.

 

 

The distribution layer switch should be the root of the spanning tree for each VLAN that is routed by the distribution router.

 

 

What is the most common method of configuring InterVLAN routing on a Layer 3 switch?

 

 

Configure the switch physical interface so that the router will have an interface in each VLAN.

 

 

Configure trunking between the router and the switch for each VLAN.

 

 

Configure a routing protocol on the Layer 3 switch to include each interface.

 

 

Configure the switch virtual interface. The result is that the router will have a virtual interface in each VLAN.

 

 

Communication between hosts in different VLANs is not working. Hosts within the same VLAN can reach each other and they can all ping the router interface within their VLANs. Layer 3 configuration on the router appears to be correct. What is one possible cause of this problem?

 

 

The gateway address could be misconfigured on the hosts.

 

 

The DNS address could be misconfigured on the hosts.

 

 

The hosts may not have routing enabled.

 

 

The IP address on the hosts could be incorrect.

 

 

Which command would be used as the first step in troubleshooting an InterVLAN routing problem?

 

 

show ip interface brief

 

 

show vlan

 

 

show ip protocol

 

 

show ip route

 

 

show ip routing

 

 

The following are the results of the command:

switch#show interface fa0/10 switchport

Name: fa0/10
Switchport: Disabled

What is the most likely cause of the switchport being disabled?

 

 

fa0/10 is configured with PortFast.

 

 

fa0/10 is configured for trunking.

 

 

fa0/10 is configured as a routed port.

 

 

fa0/10 is configured as a switchport, but has been administratively disabled.

 

 

Which command will confirm that IP routing is enabled on a Layer 3 capable switch?

 

 

Switch#show ip interface brief

 

 

Switch#show vlan routing

 

 

Switch#show vlan

 

 

Switch#show ip route

 

 

Switch#show ip routing

 

 

Which command will display a useful summary of both virtual and routed interfaces?

 

 

show vlan

 

 

show ip interface

 

 

show ip interface brief

 

 

show ip int switchport

 

 

show ip interface all

 

 

Which terms refer to routing capabilities that are integrated within the switch itself? (Choose three.)

 

 

Layer 3 switch

 

 

Layer 2 switch

 

 

backplane switching

 

 

route switch module

 

 

route processor

 

 

 

Top of Form

A straight-through cable is connected from fa0/4 on device RouteSwitch to fa0/1 on device ExternalRouter. Which set of commands will configure a connection between an external router and an internal route processor?

RouteSwitch(config)# interface fa0/4
RouteSwitch(config-if)# no switchport
RouteSwitch(config-if)# ip address 172.16.55.1 255.255.255.0
ExternalRouter(config)# interface fa0/1
ExternalRouter(config-if)# ip address 172.16.55.2 255.255.255.0

RouteSwitch(config)# interface fa0/4
RouteSwitch(config-if)# switchport
RouteSwitch(config-if)# ip address 172.16.55.1 255.255.255.0
ExternalRouter(config)# interface fa0/1
ExternalRouter(config-if)# ip address 172.16.55.2 255.255.255.0

RouteSwitch(config)# interface vlan 10
RouteSwitch(config-if)# no switchport
RouteSwitch(config-if)# ip address 172.16.55.1 255.255.255.0
ExternalRouter(config)# interface fa0/1
ExternalRouter(config-if)# ip address 172.16.55.2 255.255.255.0

RouteSwitch(config)# interface fa0/4
RouteSwitch(config-if)# ip address 172.16.55.1 255.255.255.0
ExternalRouter(config)# interface fa0/1
ExternalRouter(config-if)# ip address 172.16.55.2 255.255.255.0

Bottom of Form

 

 

Which cards will add additional Layer 3 performance to a route switch processor? (Choose two.)

 

 

Multilayer Switch Feature Card

 

 

QoS Feature Card

 

 

Application-Specific Integrated Card

 

 

Cisco Express Forwarding Card

 

 

Policy Feature Card

 

 

What is the highest performing InterVLAN routing solution?

 

 

external router

 

 

internal route switch processor

 

 

trunking

 

 

internal Layer 2 switch

 

 

router-on-a-stick

 

 

A site is using an external router with one FastEthernet port for interVLAN routing. When would the site have to consider switching to an integrated route processor instead?

 

 

when the configuration of VLAN subinterfaces exceeds the maximum number allowed on the router

 

 

when they must route between more than 30 VLANs

 

 

when the switch exceeds the use of more than 30 VLANs

 

 

when the traffic on the link to the router exceeds 100Mbps

 

 

Which set of commands would configure the interface of an external router to process packets for VLAN 30?

 

 

Router(config)# interface fastethernet0/0.30
Router(config-if)# ip address 192.168.105.1 255.255.255.0
Router(config-if)# encapsulation dot1q

 

 

Router(config)# interface ethernet 0/0.30
Router(config-subif)# encapsulation dot1q 30
Router config-subif# ip address 192.168.105.1 255.255.255.0

 

 

Router(config)# interface fastethernet 0/0.30
Router(config-subif)# encapsulation dot1q 30
Router(config-subif)# ip address 192.168.105.1 255.255.255.0

 

 

Router(config)# interface fastethernet0/0
Router(config-subif)# encapsulation dot1q vlan 30
Router(config-subif)# ip address 192.168.105.1 255.255.255.0

 

 

A site needs to connect an external router to an internal route switch processor. Which command should be entered to allow Layer 3 connectivity between these two devices?

 

 

Switch(config-if)# switchport layer3

 

 

Switch(config-if)# routerport on

 

 

Switch(config-if)# no switchport

 

 

Switch(config-if)# switchport off

 

 

Switch(config-if)# routing enable

 

 

When is a router-on-a-stick design most appropriate for interVLAN routing?

 

 

when there is more than one Fast Ethernet interface available on a router

 

 

when multilayer switching is desired

 

 

when a route/switch module is available

 

 

when there is only one Fast Ethernet interface available on the router

 

 

when QoS is required

 

 

Which command should be entered to turn a physical switch port/interface into a Layer 3 port?

 

 

Switch(config-if)#routerport

 

 

Switch(config-if)#switchport layer3

 

 

Switch(config-if)#switchport off

 

 

Switch(config-if)#no switchport

 

 

Switch(config-if)#routerport on

 

 

What are two potential problems with native VLANs? (Choose two.)

 

 

If native VLANs at both ends of a link are not the same, they will not be in independent broadcast domains.

 

 

If a native VLAN is on a trunk, frames sent without a tag will be dropped at the receiving router.

 

 

If a native VLAN on a trunk is assigned to a dummy VLAN, frames sent without a tag will be dropped by the receiving router and connectivity will be broken.

 

 

If the native VLANs are removed from the list of trunking eligible VLANS at both ends of a link, they will no longer be in independent broadcast domains.

 

 

What is a primary reason to use a trunk link to connect a switch to an external router that is providing interVLAN routing?

 

 

fewer router and switch ports are used

 

 

high bandwidth

 

 

ease of MLS integration

 

 

reduction of CPU overhead

 

 

router cpu is well-matched to the connected switch

 

 

What are three key requirements for interVLAN routing using an external router? (Choose three.)

 

 

VLAN capable switch

 

 

serial connection between router and switch

 

 

trunk connection between router and switch

 

 

redundant routers

 

 

virtual router interface

 

 

router with FastEthernet interface

 

 

What are four alternatives that can be introduced into a Layer-2 switched environment to provide interVLAN communications? (Choose four.)

 

 

redundant layer 2 switches

 

 

Route Switch Module (RSM)

 

 

Route Processor (RP)

 

 

external router

 

 

Route Module (RM)

 

 

Layer 3 switch

 

 

routing table corruption

 

 

broadcast loops

 

 

routing loops

 

 

bridge table corruption

 

 

corrupt forwarding information base

 

 

Which protocol extends the IEEE 802.1w Rapid Spanning Tree (RST) algorithm to multiple spanning-trees?

 

 

PVST+

 

 

PVST

 

 

IEEE 802.1q (CST)

 

 

IEEE 802.1s (MST)

 

 

Which two benefits are provided by MST as it is used with RSTP? (Choose two.)

 

 

load balancing

 

 

multiple spanning trees with ISL trunking

 

 

rapid router redundancy

 

 

rapid ISL convergnece

 

 

subsecond reconvergence

 

 

Which feature ensures that the configured port remains the designated port in an STP topology?

 

 

PortFast

 

 

Root Guard

 

 

UplinkFast

 

 

BackboneFast

 

 

Which Cisco proprietary technology can aggregate links into a single logical link that provides incremental trunk speeds ranging from 10 Mbps to 160 Gbps (full duplex)?

 

 

BackboneFast

 

 

UplinkFast

 

 

EtherChannel

 

 

PortFast

 

 

Which technology facilitates the automatic creation of EtherChannels by exchanging packets between Ethernet interfaces?

 

 

PortFast

 

 

UplinkFast

 

 

Frame Distribution

 

 

PAgP

 

 

Which protocol should an administrator recommend to manage bridged links when the customer requires a fully redundant network that can utilize load balancing technologies and reconverge on link failures in less than a second?

 

 

IEEE 802.1Q (CST)

 

 

IEEE 802.1s (MST)

 

 

Cisco PVST+

 

 

IEEE 802.1D(STP)

 

How is path cost defined by the spanning-tree algorithm?

1000 Mbps divided by the bandwidth in Mbps

by the inverse proportion definition

geography of the switch

hop count of the switch

What is the default spanning-tree configuration for Catalyst switches?

one instance per WAN

one instance per LAN

one instance per VLAN

no instances, must be configured

Which STP process does the UplinkFast feature accelerate?

new root bridge election

new designated port election

new root path cost

new root port election

Which three benefits does PVST+ provide? (Choose three.)

defined in IEEE 802.1D

Layer 2 load balancing

is the default STP on Ethernet

defined in IEEE 802.1s

multiple logical topology support

RSTP support

 

Top of Form

Which STP timer governs the interval of time spent in the listening and learning states?

forward delay timer

hello time

max age timer

blocking timer

Bottom of Form

Which three functions are performed when a port is in STP blocking state? (Choose three.)

forwards data frames received from the attached segment

discards data frames received from the attached segment

receives BPDUs and directs them to the system module

discards BPDUs and without directing them to the system module

transmits BPDUs received from the system module

does not transmit BPDUs received from the system module

Which Catalyst feature causes a switch or trunk port to enter the spanning-tree forwarding state immediately?

BackboneFast

UplinkFast

PortFast

Rapid Spanning Tree

In a bridged environment, which protocol provides subsecond reconvergence of blocked bridging loops after the failure of one of the uplinks?

IEEE 802.1Q (CST)

IEEE 802.1w (RSTP)

Cisco PVST+

IEEE 802.1D (STP)

In which roles could a blocked port be designated when using IEEE 802.1w (RSTP)? (Choose three.)

alternate port

backup port

designated port

root port

non-designated port

Which protocol defines a single instance of spanning tree for all VLANs and transmits BPDUs over VLAN 1?

IEEE 802.1w (RSTP)

IEEE 802.1Q (CST)

Cisco PVST+

IEEE 802.1D (STP)

 

Top of Form

Which protocol is a Cisco-proprietary STP mode that allows CST and PVST to exist on the same network?

IEEE 802.1w (RSTP)

IEEE 802.1Q (CST)

Cisco PVST+

IEEE 802.1D (STP)

Bottom of Form

Which protocol extends the IEEE 802.1w Rapid Spanning Tree (RST) algorithm for both rapid convergence and load balancing in a VLAN environment?

Cisco PVST

IEEE 802.1Q (CST)

Cisco PVST+

IEEE 802.1s (MST)

What is an advantage of having multiple VLAN spanning-tree instance assignments located in different parts of the network?

makes it easier to administer and utilize redundant paths

makes it more simple to implement STP design

allows all instances to share the same designated bridge

makes it easier to separate PVST and CST spanning-trees

In which port role do both IEEE 802.1D (STP) and IEEE 802.1w (RSTP) designate a bridge port that is receiving a BPDU with the lowest BID?

backup port

alternate port

designated port

root port

 

Top of Form

Which of the following best describes VLANs?

eliminates the need for routers

eliminates Layer 3 issues

simplifies network administration

provides better bandwidth utilization

Bottom of Form

How does a VMPS client communicate with a VMPS server?

TFTP server

VLAN query protocol

VLAN membership policy switch

VLAN trunking protocol

Which two modes can be assigned to a static switch port? (Choose two.)

access mode

inter-link switch mode

shared mode

trunk mode

static port mode

dot1q mode

Which command verifies a VMPS server entry?

show int interface switchport

show vlan database

show vmps database

show vmps server

show vmps

show port

Which type of link is used to connect switches to other switches, to routers, or to VLAN-enabled servers in order to carry traffic from multiple VLANs over the same link?

access links

inter-switch links

trunk links

uplink links

For which three reasons should VLANs be implemented? (Choose three.)

simplifies moves and changes in a network

simplifies network management tasks

simplifies network monitoring

provides network security

provides bandwidth utilization efficiency

eliminates the need for Layer 3 routing

Which two phrases best describe VTP? (Choose two.)

prevents the possibility of a bridging loop

maintains VLAN configuration consistency

stabilizes an STP domain

shares VTP configuration information across domains

a messaging protocol that uses Layer 3 trunk frames

a messaging protocol that uses Layer 2 trunk frames

Which mode are VTP management domains set to by default?

secure mode

access mode

transparent mode

switchport mode

nonsecure mode

Which two conditions are true for a VTP domain? (Choose two.)

The same secret password must be configured on every switch in the domain.

Each Catalyst switch must have the same VTP domain name.

All Catalyst switches in the domain must be configured to accept VTP information.

Trunking must be enabled between all Catalyst switches in the domain.

Catalyst switches can be configured with different domain names if they are adjacent to each other.

Which types of frames are VTP messages encapsulated in? (Choose two.)

OUI

ISL

LLC

dot1q

SNAP

DSAP

Which of the following is equivalent to a VLAN?

broadcast domains

physical network segments

routing domains

bandwidth domains

Why do VLANs result in better bandwidth utilization?

Many simultaneous transmissions can occur within the broadcast domain.

Many concurrent transmissions can occur within the bandwidth domain.

A switch configured for VLANs does not forward broadcasts.

VLANs can offer higher bandwidth to users than their NIC's inherent capability.

Which device tends to introduce the most latency into a network?

Layer 2 bridge

Layer 2 switch

Layer 3 router

Layer 3 switch

Which statement is true regarding end-to-end VLANs?

They cover the entire group of switches.

They facilitate the new 20/80 rule of traffic flow.

Switches in the group can only use ISL to trunk multiple VLANs.

Users are grouped dependent upon physical location.

 

Top of Form

What is true of static VLANs?

The port is assigned to a VLAN based on the device attached to the port.

Users connecting to a particular port can be members of any network.

A port's VLAN association is determined from VTP updates.

The port's VLAN assignment can only be changed by the administrator.

Bottom of Form

When using VMPS, what is the basis for assigning switch ports to VLANs?

The application used by the device connected to the port.

The IP address of the device connected to the port.

The MAC address of the device connected to the port.

The protocol type contained in frames received at the port.

 

Top of Form

What is the most appropriate use of static VLANs?

One in which moves are controlled and managed.

One where security is tied to the device attached to the switch port.

One in which manual changes to the VLAN are not wanted.

One where users frequently change location.

Bottom of Form

Which statement best describes an access link?

A link through which management access is gained to the switch.

Any port which connects to another switch.

A link which is used for configuration of the switch.

A switch link that is a member of only one VLAN.

Which statement is true regarding the differences between ISL and IEEE 802.1q?

ISL uses an explicit tagging method, while IEEE 802.1q does not.

IEEE 802.1q's information works on both access and trunk links, while ISL is for trunks only.

ISL uses an internal tagging method, while IEEE 802.1q uses external tags.

An ISL-tagged frame uses less overhead than an IEEE 802.1q-tagged frame.

Which VLANs are transported by default across a trunk link on a switch?

All VLANs (1 to 1005).

Only VLANs for which the switch has access ports defined.

Only VLANs which are configured to pass across the trunk link.

Only VLANs defined on the VMPS server.