Cisco 123

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 14

CHAPTER 1

1. Which two features of enterprise class equipment assists an enterprise network in


maintaining 99.999 percent up-time? (Choose two.)
failover capabilities
collapsed core
redundant power supplies
failure domains
services module

2. Refer to the exhibit. Which devices exist in the failure domain when switch S3 loses
power?

S4 and PC_2
PC_3 and AP_2
AP_2 and AP_1
PC_3 and PC_2
S1 and S4

3. How can an enterprise network be designed to optimize bandwidth?


by installing devices with failover capabilities
by limiting the size of failure domains
by deploying a collapsed core model
by organizing the network to control traffic patterns

4. In the Cisco Enterprise Architecture, which two functional parts of the network are
combined to form a collapsed core design? (Choose two.)
core layer
access layer
enterprise edge
provider edge
distribution layer

5. What network design would contain the scope of disruptions on a network should a
failure occur?
the installation of only enterprise class equipment throughout the network
the configuration of all access layer devices to share a single gateway
the reduction in the number of redundant devices and connections in the network core
the deployment of distribution layer switches in pairs and the division of access layer switch connections
between them
6. Which design feature will limit the size of a failure domain in an enterprise network?
the use of a collapsed core design
the use of the building switch block approach
the installation of redundant power supplies
the purchase of enterprise equipment that is designed for large traffic volume

7. A network administrator is planning redundant devices and cabling in a switched


network to support high availability. Which benefit will implementing the Spanning
Tree Protocol provide to this design?
Multiple physical interfaces can be combined into a single EtherChannel interface.
Redundant paths can be available without causing logical Layer 2 loops.
Network access can be expanded to support both wired and wireless devices.
Faster convergence is available for advanced routing protocols.

8. What are two benefits of extending access layer connectivity to users through a
wireless medium? (Choose two.)
increased flexibility
decreased number of critical points of failure
reduced costs
increased bandwidth availability
increased network management options

9. As the network administrator you have been asked to implement EtherChannel on


the corporate network. What does this configuration consist of?
providing redundant links that dynamically block or forward traffic
grouping multiple physical ports to increase bandwidth between two switches
grouping two devices to share a virtual IP address
providing redundant devices to allow traffic to flow in the event of device failure

10. Which statement describes a characteristic of Cisco Meraki switches?


They promote infrastructure scalability, operational continuity, and transport flexibility.
They are cloud-managed access switches that enable virtual stacking of switches.
They are campus LAN switches that perform the same functions as Cisco 2960 switches.
They are service provider switches that aggregate traffic at the edge of the network.

11. In which situation would a network administrator install a Cisco Nexus Series
or Cisco Catalyst 6500 Series switch to promote infrastructure scalability?
to enable virtual stacking of switches to provide cloud-managed access
on a service provider network to promote integrated security, and simplified management
on a data center network to provide expansion and transport flexibility
on a campus LAN network as access layer switches

12. Which statement describes a characteristic of Cisco Catalyst 2960 switches?


They do not support an active switched virtual interface (SVI) with IOS versions prior to 15.x.
They are best used as distribution layer switches.
They are modular switches.
New Cisco Catalyst 2960-C switches support PoE pass-through.

13. What is the function of ASICs in a multilayer switch?


They provide power to devices such as IP phones and wireless access points through Ethernet ports.
They streamline forwarding of IP packets in a multilayer switch by bypassing the CPU.
They prevent Layer 2 loops by disabling redundant links between switches.
They aggregate multiple physical switch ports into a single logical port.
14. What is the function of PoE pass-through?
allows a switch to disable redundant Layer 2 paths in the topology to prevent Layer 2 loops
allows switches, phones, and wireless access points to receive power over existing Ethernet cables from
an upstream switch
allows a multilayer switch to forward IP packets at a rate close to that of Layer 2 switching by bypassing
the CPU
allows multiple physical switch ports to be aggregated together and act as a single logical link to increase
bandwidth on trunk links

15. What term is used to express the thickness or height of a switch?


rack unit
port density
domain size
module size

16. A network engineer is reviewing a network design that uses a fixed


configuration enterprise router that supports both LAN and WAN connections.
However, the engineer realizes that the router does not have enough interfaces to
support growth and network expansion. Which type of device should be used as a
replacement?
a Layer 3 switch
a modular router
a PoE device
another fixed configuration router

17. What are two functions of a router? (Choose two.)


It connects multiple IP networks.
It controls the flow of data via the use of Layer 2 addresses.
It determines the best path to send packets.
It manages the VLAN database.
It increases the size of the broadcast domain.

18. Which two requirements must always be met to use in-band management to
configure a network device? (Choose two.)
a direct connection to the console port
a direct connection to the auxiliary port
a terminal emulation client
at least one network interface that is connected and operational
Telnet, SSH, or HTTP access to the device

19. Immediately after a router completes its boot sequence, the network
administrator wants to check the routers configuration. From privileged EXEC mode,
which of the following commands can the administrator use for this purpose?
(Choose two.)
show flash
show NVRAM
show startup-config
show running-config
show version
20. What are two ways to access a Cisco switch for out-of-band management?
(Choose two.)
a connection that uses HTTP
a connection that uses Telnet
a connection that uses the console port
a connection that uses SSH
a connection that uses the AUX port

21. Match the purpose to the related configuration item. (Not all options are used.)
Question

Answer

CHAPTER 2
1. What could be the effect of duplicate unicast frames arriving at a destination device
due to multiple active alternative physical paths?
Frame collisions increase.
The number of broadcast domains increases.
Application protocols malfunction.
The number of collision domains increases.

2. What additional information is contained in the 12-bit extended system ID of a


BPDU?
MAC address
VLAN ID
IP address
port ID
3. Which three components are combined to form a bridge ID?
port ID
IP address
extended system ID
MAC address
bridge priority
cost

4. Refer to the exhibit. Which trunk link will not forward any traffic after the root bridge
election process is complete?

Trunk1
Trunk2
Trunk3
Trunk4
5. Which STP port role is adopted by a switch port if there is no other port with a lower
cost to the root bridge?
designated port
root port
alternate
disabled port

6. Which is the default STP operation mode on Cisco Catalyst switches?


RSTP
PVST+
MST
MSTP
Rapid PVST+

7. What is an advantage of PVST+?


PVST+ requires fewer CPU cycles for all the switches in the network.
PVST+ reduces bandwidth consumption compared to traditional implementations of STP that use CST.
PVST+ optimizes performance on the network through autoselection of the root bridge.
PVST+ optimizes performance on the network through load sharing.
8. In which two port states does a switch learn MAC addresses and process BPDUs in
a PVST network? (Choose two.)
blocking
disabled
forwarding
learning
listening

9. Which STP priority configuration would ensure that a switch would always be the
root switch?
spanning-tree vlan 10 priority 0
spanning-tree vlan 10 priority 61440
spanning-tree vlan 10 root primary
spanning-tree vlan 10 priority 4096

10. To obtain an overview of the spanning tree status of a switched network, a


network engineer issues the show spanning-tree command on a switch. Which two
items of information will this command display? (Choose two.)
The root bridge BID.
The role of the ports in all VLANs.
The status of native VLAN ports.
The number of broadcasts received on each root port.
The IP address of the management VLAN interface.

11. Which two network design features require Spanning Tree Protocol (STP) to
ensure correct network operation? (Choose two.)
static default routes
implementing VLANs to contain broadcasts
redundant links between Layer 2 switches
link-state dynamic routing that provides redundant routes
removing single points of failure with multiple Layer 2 switches

12. Which nonproprietary protocol provides router redundancy for a group of


routers which support IPv4 LANs?
HSRP
VRRPv2
GLBP
SLB

13. Refer to the exhibit. Which protocol information is being displayed in the
output?
FHRP
GLBP
HSRP
VRRP

14. Refer to the exhibit. A network engineer is troubleshooting host connectivity


on a LAN that uses a first hop redundancy protocol. Which IPv4 gateway address
should be configured on the host?

192.168.2.0
192.168.2.1
192.168.2.2
192.168.2.100

15. What value determines the root bridge when all switches connected by trunk
links have default STP configurations?
VLAN ID
MAC address
extended system ID
bridge priority

16. Which two concepts relate to a switch port that is intended to have only end
devices attached and intended never to be used to connect to another switch?
(Choose two.)
bridge ID
edge port
extended system ID
PortFast
PVST+

17. Which Cisco switch feature ensures that configured switch edge ports do not
cause Layer 2 loops if a port is mistakenly connected to another switch?
BPDU guard
extended system ID
PortFast
PVST+

18. Refer to the exhibit. A network administrator configured routers R1 and R2 as


part of HSRP group 1. After the routers have been reloaded, a user on Host1
complained of lack of connectivity to the Internet The network administrator issued
the show standby brief command on both routers to verify the HSRP operations. In
addition, the administrator observed the ARP table on Host1. Which entry should be
seen in the ARP table on Host1 in order to gain connectivity to the Internet?

the IP address and the MAC address of R1


the virtual IP address and the virtual MAC address for the HSRP group 1
the virtual IP address of the HSRP group 1 and the MAC address of R1
the virtual IP address of the HSRP group 1 and the MAC address of R2

19. Fill in the blank. Do not abbreviate.


To enable Rapid PVST+ on a Cisco switch, the spanning-tree mode rapid-
pvst global configuration mode command is required

20. Fill in the blank. Use a number.


The default hello timer value for STP BPDU frames is 2 seconds.

21. Fill in the blank.


In FHRP operation, two or more routers are represented as a single virtual router.

22. Match the spanning-tree feature with the protocol type. (Not all options are
used.)
Question

Answer
23. Match the step number to the sequence of stages that occur during the HSRP
failover process.
Question

Answer

24. Open the PT Activity. Perform the tasks in the activity instructions and then
answer the question.
Which switch is the root bridge?
Switch_1
Switch_2
Switch_3
Switch_4
CHAPTER 3
1. The trunk link between two 2960 switches has reached its capacity. How can this be
addressed in the most economical way?
Increase the speed of the ports.
Decrease the size of the inter-switch collision domain by configuring additional VLANs.
Combine physical ports into a high-speed logical link by configuring EtherChannel.
Create additional broadcast domains by inserting a router between the switches.

2. Refer to the exhibit. Which switching technology would allow each access layer
switch link to be aggregated to provide more bandwidth between each Layer 2
switch and the Layer 3 switch?

HSRP
PortFast
trunking
EtherChannel

3. Which two load balancing methods can be implemented with EtherChannel


technology? (Choose two.)
destination MAC to destination IP
destination IP to destination MAC
source MAC to destination MAC
source IP to destination IP
destination MAC to source MAC
destination IP to source IP

4. Which statement is true regarding the use of PAgP to create EtherChannels?


It requires full duplex.
It is Cisco proprietary.
It requires more physical links than LACP does.
It increases the number of ports that are participating in spanning tree.
It mandates that an even number of ports (2, 4, 6, etc.) be used for aggregation.

5. Which two protocols are link aggregation protocols? (Choose two.)


802.3ad
PAgP
STP
EtherChannel
RSTP

6. Which PAgP mode combination will establish an EtherChannel?


switch 1 set to on; switch 2 set to desirable.
switch 1 set to desirable; switch 2 set to desirable.
switch 1 set to auto; switch 2 set to auto.
switch 1 set to auto; switch 2 set to on.
7. Refer to the exhibit. The administrator tried to create an EtherChannel between S1
and the other two switches via the commands that are shown, but was unsuccessful.
What is the problem?

Traffic can only be sent to two different switches if EtherChannel is implemented on Gigabit Ethernet
interfaces.
Traffic can only be sent to two different switches if EtherChannel is implemented on Layer 3 switches.
Traffic cannot be sent to two different switches through the same EtherChannel link.
Traffic cannot be sent to two different switches, but only to two different devices like an EtherChannel-
enabled server and a switch.

8. When a range of ports is being configured for EtherChannel, which mode will
configure LACP so that it initiates the EtherChannel negotiation?
active
auto
desirable
passive

9. When a range of ports is being configured for EtherChannel by the use of PAgP,
which mode will form the bundled channel only if the port receives PAgP packets
from another device?
active
auto
desirable
passive

10. Which statement describes a characteristic of EtherChannel?


It can combine up to a maximum of 4 physical links.
It can bundle mixed types of 100 Mb/s and 1Gb/s Ethernet links.
It consists of multiple parallel links between a switch and a router.
It is made by combining multiple physical links that are seen as one link between two switches.

11. What are two advantages of using LACP? (Choose two.)


increases redundancy to Layer 3 devices
eliminates the need for the spanning-tree protocol
allows automatic formation of EtherChannel links
provides a simulated environment for testing link aggregation
decreases the amount of configuration that is needed on a switch for EtherChannel
allows use of multivendor devices
12. Which three settings must match in order for switch ports to form an
EtherChannel? (Choose three.)
The switch port numbers that will be combined to form the EtherChannel must match.
Non-trunk ports must belong to the same VLAN.
The SNMP community strings must be configured the same.
The interfaces must be configured to the same speed.
The duplex settings of the switch ports on both sides of the physical link must match.
Port security settings on the connected physical interfaces must be configured to the same violation mode.

13. Which command will initiate EtherChannel interface configuration mode?


channel-group group-identifier
interface port-channel interface-identifier
interface interface-identifier
interface range interface-identifier

14. What is a best practice to use before beginning an EtherChannel


implementation?
Assign affected interfaces to VLAN 1.
Assign affected interfaces to the management VLAN.
Shut down each of the affected interfaces.
Enable each of the affected interfaces.
Assign affected interfaces to an unused VLAN.

15. A network administrator is configuring an EtherChannel link between switches


SW1 and SW2 by using the command SW1(config-if-range)# channel-group 1 mode
passive. Which command must be used on SW2 to enable this EtherChannel?
SW2(config-if-range)# channel-group 1 mode auto
SW2(config-if-range)# channel-group 1 mode active
SW2(config-if-range)# channel-group 1 mode passive
SW2(config-if-range)# channel-group 1 mode desirable

16. An EtherChannel link using LACP was formed between two switches, S1 and
S2. While verifying the configuration, which mode combination could be utilized on
both switches?
S1-on and S2-passive
S1-passive and S2-passive
S1-on and S2-active
S1-passive and S2-active

17. Refer to the exhibit. A network administrator has decided that an


EtherChannel between ports 0/1 and 0/2 on switches S1 and S2 would help
performance. After making the configuration, the administrator notices no
performance gain. Based on the output that is shown, what two assumptions can the
network administrator make? (Choose two.)
The EtherChannel bundle is working.
The EtherChannel bundle is not working.
One of the ports on S2 was not configured correctly.
Switch S2 did not use a compatible EtherChannel mode.
LACP and PAgP were both used to form the EtherChannel.
Switch S2 must be configured so that the maximum number of port channels is increased.

18. Refer to the exhibit. A network administrator issued the show etherchannel
summary command on the switch S1. What conclusion can be drawn?

The EtherChannel is suspended.


The EtherChannel is not functional.
The port aggregation protocol PAgP is misconfigured.
FastEthernet ports Fa0/1, Fa0/2, and Fa0/3 do not join the EtherChannel.

19. Which statement describes an EtherChannel implementation?


EtherChannel operates only at Layer 2.
PAgP cannot be used in conjunction with EtherChannel.
A trunked port can be part of an EtherChannel bundle.
EtherChannel can support up to a maximum of ten separate links.
20. Match the description to the correct command. (Not all options are used.)
Question

Answer

21. Open the PT Activity. Perform the tasks in the activity instructions and then
answer the question.
What are two reasons why the ping messages that are issued from Laptop0 towards
Laptop1 are failing? (Choose two.)
The channel group mode is not set correctly on the switches.
The wrong cable types are connecting the two switches.
The interface VLAN 1 is shut down on both switches.
The channel group should be configured as a trunk on each switch.
The two interfaces on each of the switches belong to different VLANs.

You might also like