Bank Question Test
Bank Question Test
00) – Switching
Concepts, VLANs, and Inter-VLAN Routing Exam
1. Which tasks can be accomplished by using the command history feature? (Choose two.)
View a list of commands entered in a previous session.
Recall up to 15 command lines by default.
Set the command history buffer size.
Recall previously entered commands.
Save command lines in a log file for future reference.
2. What is the first action in the boot sequence when a switch is powered on?
load the default Cisco IOS software
load boot loader software
low-level CPU initialization
load a power-on self-test program
3. What must an administrator have in order to reset a lost password on a router?
a TFTP server
a crossover cable
access to another router
physical access to the router
4. When configuring a switch for SSH access, what other command that is associated with the login local
command is required to be entered on the switch?
enable secret password
password password
username username secret secret
login block-for seconds attempts number within*seconds*
5. Which command displays information about the auto-MDIX setting for a specific interface?
show interfaces
show controllers
show processes
show running-config
6. If one end of an Ethernet connection is configured for full duplex and the other end of the connection is
configured for half duplex, where would late collisions be observed?
on both ends of the connection
on the full-duplex end of the connection
only on serial interfaces
on the half-duplex end of the connection
7. Which command is used to set the BOOT environment variable that defines where to find the IOS image
file on a switch?
config-register
boot system
boot loader
confreg
8. What does a switch use to locate and load the IOS image?
BOOT environment variable
IOS image file
POST
startup-config
NVRAM
9. Which protocol adds security to remote connections?
FTP
HTTP
NetBEUI
POP
SSH
10. What is a characteristic of an IPv4 loopback interface on a Cisco IOS router?
The no shutdown command is required to place this interface in an UP state.
It is a logical interface internal to the router.
Only one loopback interface can be enabled on a router.
It is assigned to a physical port and can be connected to other devices.
11. What is the minimum Ethernet frame size that will not be discarded by the receiver as a runt frame?
64 bytes
512 bytes
1024 bytes
1500 bytes
12. After which step of the switch bootup sequence is the boot loader executed?
after CPU initialization
after IOS localization
after flash file system initialization
after POST execution
13. Which impact does adding a Layer 2 switch have on a network?
an increase in the number of dropped frames
an increase in the size of the broadcast domain
an increase in the number of network collisions
an increase in the size of the collision domain
14. Which characteristic describes cut-through switching?
Error-free fragments are forwarded, so switching occurs with lower latency.
Frames are forwarded without any error checking.
Only outgoing frames are checked for errors.
Buffering is used to support different Ethernet speeds.
15. What is the significant difference between a hub and a Layer 2 LAN switch?
A hub extends a collision domain, and a switch divides collision domains.
A hub divides collision domains, and a switch divides broadcast domains.
Each port of a hub is a collision domain, and each port of a switch is a broadcast domain.
A hub forwards frames, and a switch forwards only packets.
16. Which statement is correct about Ethernet switch frame forwarding decisions?
Frame forwarding decisions are based on MAC address and port mappings in the CAM table.
Cut-through frame forwarding ensures that invalid frames are always dropped.
Only frames with a broadcast destination address are forwarded out all active switch ports.
Unicast frames are always forwarded regardless of the destination MAC address.
17. How do switch buffers affect network performance?
They provide error checking on the data received.
They store frames received, thus preventing premature frame discarding when network congestion
occurs.
They provide extra memory for a particular port if autonegotiation of speed or duplex fails.
They hold data temporarily when a collision occurs until normal data transmission resumes.
18. Which switch characteristic helps keep traffic local and alleviates network congestion?
high port density
fast port speed
large frame buffers
fast internal switching
19. Which switch component reduces the amount of packet handling time inside the switch?
ASIC
dual processors
large buffer size
store-and-forward RAM
20. Refer to the exhibit. A switch receives a Layer 2 frame that contains a source MAC address of
000b.a023.c501 and a destination MAC address of 0050.0fae.75aa. Place the switch steps in the order they
occur. (Not all options are used.)
CCNA2 v7 SRWE – Modules 1 – 4: Switching Concepts, VLANs, and InterVLAN Routing Exam Answers
CCNA 2 v7 Modules 1 – 4: Switching Concepts, VLANs, and InterVLAN Routing Exam Answers 20
21. What information is added to the switch table from incoming frames?
source MAC address and incoming port number
destination MAC address and incoming port number
source IP address and incoming port number
destination IP address and incoming port number
22. Which switching method ensures that the incoming frame is error-free before forwarding?
cut-through
FCS
fragment free
store-and-forward
23. Refer to the exhibit. How many broadcast domains are displayed?
CCNA2 v7 SRWE – Modules 1 – 4 Switching Concepts, VLANs, and InterVLAN Routing Exam Answers 23
1
4
8
16
55
24. Under which two occasions should an administrator disable DTP while managing a local area network?
(Choose two.)
when connecting a Cisco switch to a non-Cisco switch
when a neighbor switch uses a DTP mode of dynamic auto
when a neighbor switch uses a DTP mode of dynamic desirable
on links that should not be trunking
on links that should dynamically attempt trunking
25. Which two characteristics describe the native VLAN? (Choose two.)
Designed to carry traffic that is generated by users, this type of VLAN is also known as the default
VLAN.
The native VLAN traffic will be untagged across the trunk link.
This VLAN is necessary for remote management of a switch.
High priority traffic, such as voice traffic, uses the native VLAN.
The native VLAN provides a common identifier to both ends of a trunk.
26. On a switch that is configured with multiple VLANs, which command will remove only VLAN 100 from
the switch?
Switch# delete flash:vlan.dat
Switch(config-if)# no switchport access vlan 100
Switch(config-if)# no switchport trunk allowed vlan 100
Switch(config)# no vlan 100
27. Refer to the exhibit. A network administrator is reviewing port and VLAN assignments on switch S2 and
notices that interfaces Gi0/1 and Gi0/2 are not included in the output. Why would the interfaces be missing
from the output?
CCNA2 v7 SRWE – Modules 1 – 4 Switching Concepts, VLANs, and InterVLAN Routing Exam Answers 29
Allow VLAN 20 on the trunk link.
Enable DTP on both ends of the trunk.
Configure all workstations on SW1 to be part of the default VLAN.
Configure all workstations on SW2 to be part of the native VLAN.
30. What happens to switch ports after the VLAN to which they are assigned is deleted?
The ports are disabled.
The ports are placed in trunk mode.
The ports are assigned to VLAN1, the default VLAN.
The ports stop communicating with the attached devices.
31. Match the IEEE 802.1Q standard VLAN tag field with the description. (Not all options are used.)
CCNA2 v7 Modules 1 – 4 Switching Concepts, VLANs, and InterVLAN Routing Exam Answers 31
32. Refer to the exhibit. In what switch mode should port G0/1 be assigned if Cisco best practices are being
used?
CCNA2 v7 Modules 1 – 4 Switching Concepts, VLANs, and InterVLAN Routing Exam Answers 32
access
trunk
native
auto
33. Match the DTP mode with its function. (Not all options are used.)
CCNA2 v7 Modules 1 – 4 Switching Concepts, VLANs, and InterVLAN Routing Exam Answers 33
34. Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport access vlan 30 is entered
on the Fa0/11 interface, what will happen?
Port Fa0/11 will be shutdown.
An error message would be displayed.
Port Fa0/11 will be returned to VLAN 1.
VLAN 30 will be deleted.
35. Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the
Fa0/1 interface?
show vlan brief
show interfaces Fa0/1 switchport
show mac address-table interface Fa0/1
show interfaces trunk
36. Refer to the exhibit. A technician is programming switch SW3 to manage voice and data traffic through
port Fa0/20. What, if anything, is wrong with the configuration?
CCNA2 v7 Modules 1 – 4 Switching Concepts, VLANs, and InterVLAN Routing Exam Answers 38
Interface G0/2 is not configured as a trunk.
VLAN 20 has not been created.
The encapsulation on interface G0/1 is incorrect.
The DTP mode is incorrectly set to dynamic auto on interface G0/1.
39. Refer to the exhibit. What is the cause of the error that is displayed in the configuration of inter-VLAN
routing on router CiscoVille?
CCNA2 v7 Modules 1 – 4 Switching Concepts, VLANs, and InterVLAN Routing Exam Answers 39
The gig0/0 interface does not support inter-VLAN routing.
The no shutdown command has not been configured.
The IP address on CiscoVille is incorrect.
The encapsulation dot1Q 20 command has not been configured.
40. Refer to the exhibit. A network administrator has configured router CiscoVille with the above commands
to provide inter-VLAN routing. What command will be required on a switch that is connected to the Gi0/0
interface on router CiscoVille to allow inter-VLAN routing?
CCNA2 v7 Modules 1 – 4 Switching Concepts, VLANs, and InterVLAN Routing Exam Answers 43
Gi1/1 is in the default VLAN.
Voice VLAN is not assigned to Gi1/1.
Gi1/1 is configured as trunk mode.
Negotiation of trunking is turned on on Gi1/1.
The trunking encapsulation protocol is configured wrong.
44. Refer to the exhibit. A network administrator is verifying the configuration of inter-VLAN routing. Users
complain that PC2 cannot communicate with PC1. Based on the output, what is the possible cause of the
problem?
CCNA2 v7 Modules 1 – 4 Switching Concepts, VLANs, and InterVLAN Routing Exam Answers 44
Gi0/0 is not configured as a trunk port.
The command interface GigabitEthernet0/0.5 was entered incorrectly.
There is no IP address configured on the interface Gi0/0.
The no shutdown command is not entered on subinterfaces.
The encapsulation dot1Q 5 command contains the wrong VLAN.
45. Refer to the exhibit. A network administrator has configured router CiscoVille with the above commands
to provide inter-VLAN routing. What type of port will be required on a switch that is connected to Gi0/0 on
router CiscoVille to allow inter-VLAN routing?
routed port
access port
trunk port
SVI
46. Refer to the exhibit. A network administrator is configuring RT1 for inter-VLAN routing. The switch is
configured correctly and is functional. Host1, Host2, and Host3 cannot communicate with each other. Based
on the router configuration, what is causing the problem?
CCNA2 v7 Modules 1 – 4 Switching Concepts, VLANs, and InterVLAN Routing Exam Answers 46
Interface Fa0/0 is missing IP address configuration information.
IP addresses on the subinterfaces are incorrectly matched to the VLANs.
Each subinterface of Fa0/0 needs separate no shutdown commands.
Routers do not support 802.1Q encapsulation on subinterfaces.
47. Refer to the exhibit. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45,
according to the show running-config command output. PCs on VLAN 45 that are using the 172.16.45.0 /24
network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is
most likely causing this problem?
CCNA2 v7 Modules 1 – 4 Switching Concepts, VLANs, and InterVLAN Routing Exam Answers 47
The wrong VLAN has been configured on GigabitEthernet 0/0.45.
The command no shutdown is missing on GigabitEthernet 0/0.30.
The GigabitEthernet 0/0 interface is missing an IP address.
There is an incorrect IP address configured on GigabitEthernet 0/0.30.
48. What is a characteristic of a routed port on a Layer 3 switch?
It supports trunking.
It is not assigned to a VLAN.
It is commonly used as a WAN link.
It cannot have an IP address assigned to it.
49. Refer to the exhibit. A network administrator needs to configure router-on-a-stick for the networks that are
shown. How many subinterfaces will have to be created on the router if each VLAN that is shown is to be
routed and each VLAN has its own subinterface?
CCNA2 v7 Modules 1 – 4 Switching Concepts, VLANs, and InterVLAN Routing Exam Answers 49
1
2
3
4
5
50. A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-
if)# mdix auto command?
It automatically adjusts the port to allow device connections to use either a straight-through or a
crossover cable.
It applies an IPv4 address to the virtual interface.
It applies an IPv6 address to the virtual interface.
It permits an IPv6 address to be configured on a switch physical interface.
It updates the MAC address table for the associated port.
51. A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-
if)# ip address 172.18.33.88 255.255.255.0 command?
It applies an IPv4 address to the virtual interface.
It applies an IPv6 address to the virtual interface.
It activates a virtual or physical switch interface.
It permits an IPv6 address to be configured on a switch physical interface.
It updates the MAC address table for the associated port.
52. A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw#
configure terminal command?
It enters the global configuration mode.
It enters configuration mode for a switch virtual interface.
It applies an IPv4 address to the virtual interface.
It updates the MAC address table for the associated port.
It permits an IPv6 address to be configured on a switch physical interface.
53. A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw#
configure terminal command?
It enters the global configuration mode.
It saves the running configuration to NVRAM.
It disables a virtual or physical switch interface.
It updates the MAC address table for the associated port.
It saves the startup configuration to the running configuration.
54. A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-
if)# shutdown command?
It disables a virtual or physical switch interface.
It saves the running configuration to NVRAM.
It activates a virtual or physical switch interface.
It updates the MAC address table for the associated port.
It saves the startup configuration to the running configuration.
55. A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-
if)# shutdown command?
It disables a virtual or physical switch interface.
It applies an IPv6 address to the virtual interface.
It applies an IPv4 address to the virtual interface.
It permits an IPv6 address to be configured on a switch physical interface.
It updates the MAC address table for the associated port.
56. A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-
if)# ipv6 address 2001:db8:a2b4:88::1/64 command?
It applies an IPv6 address to the virtual interface.
It activates a virtual or physical switch interface.
It applies an IPv4 address to the virtual interface.
It permits an IPv6 address to be configured on a switch physical interface.
It updates the MAC address table for the associated port.
57. A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-
if)# exit command?
It returns to global configuration mode.
It returns to privileged mode.
It configures the default gateway for the switch.
It enters user mode.
It saves the startup configuration to the running configuration.
58. A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw> enable
command?
It enters privileged mode.
It enters the global configuration mode.
It enters configuration mode for a switch virtual interface.
It updates the MAC address table for the associated port.
It permits an IPv6 address to be configured on a switch physical interface.
58. A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-
if)# duplex full command?
It allows data to flow in both directions at the same time on the interface.
It allows data to flow in only one direction at a time on the interface
It automatically adjusts the port to allow device connections to use either a straight-through or a
crossover cable.
It configures the switch as the default gateway.
It encrypts user-mode passwords when users connect remotely.
60. What type of VLAN should not carry voice and network management traffic?
data VLAN
voice VLAN
management VLAN
security VLAN
62. What type of VLAN is designed to reserve bandwidth to ensure IP Phone quality?
voice VLAN
trunk VLAN
security VLAN
management VLAN
63. What type of VLAN is initially the management VLAN?
default VLAN
native VLAN
data VLAN
management VLAN
64. What type of VLAN is designed to have a delay of less than 150 ms across the network?
voice VLAN
desirable VLAN
trunk VLAN
security VLAN
65. What type of VLAN is used to separate the network into groups of users or devices?
data VLAN
management VLAN
voice VLAN
native VLAN
66. What type of VLAN is configured specifically for network traffic such as SSH, Telnet, HTTPS, HTTP,
and SNMP?
management VLAN
security VLAN
trunk VLAN
voice VLAN
68. What type of VLAN supports untagged traffic?
native VLAN
voice VLAN
security VLAN
management VLAN
69. What type of VLAN supports untagged traffic?
native VLAN
desirable VLAN
trunk VLAN
security VLAN
70. Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks
the status of the serial interface, the interface is shown as being administratively down. What additional
command must be entered on the serial interface of R1 to bring the interface up?
CCNA2 v7 Modules 1 – 4 Switching Concepts, VLANs, and InterVLAN Routing Exam Answers 70
IPv6 enable
clockrate 128000
end
no shutdown
71. Refer to the exhibit. The network administrator wants to configure Switch1 to allow SSH connections and
prohibit Telnet connections. How should the network administrator change the displayed configuration to
satisfy the requirement?
CCNA2 v7 Modules 1 – 4 Switching Concepts, VLANs, and InterVLAN Routing Exam Answers 71
Use SSH version 1.
Reconfigure the RSA key.
Configure SSH on a different line.
Modify the transport input command.
72. Which solution would help a college alleviate network congestion due to collisions?
a firewall that connects to two Internet providers
a high port density switch
a router with two Ethernet ports
a router with three Ethernet ports
73. Which two statements are correct with respect to SVI inter-VLAN routing? (Choose two.)
Switching packets is faster with SVI.
There is no need for a connection to a router.
Virtual interfaces support subinterfaces.
SVIs can be bundled into EtherChannels.
SVIs eliminate the need for a default gateway in the hosts.
74. Refer to the exhibit. A network administrator is configuring inter-VLAN routing on a network. For now,
only one VLAN is being used, but more will be added soon. What is the missing parameter that is shown as
the highlighted question mark in the graphic?
CCNA2 v7 Modules 1 – 4 Switching Concepts, VLANs, and InterVLAN Routing Exam Answers 74
It identifies the subinterface.
It identifies the VLAN number.
It identifies the native VLAN number.
It identifies the type of encapsulation that is used.
It identifies the number of hosts that are allowed on the interface.
75. Which type of VLAN is used to designate which traffic is untagged when crossing a trunk port?
data
default
native
management
76. A network administrator issues the show vlan brief command while troubleshooting a user support ticket.
What output will be displayed?
the VLAN assignment and membership for device MAC addresses
the VLAN assignment and membership for all switch ports
the VLAN assignment and trunking encapsulation
the VLAN assignment and native VLAN
77. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
Which message is displayed when 10.10.10.1 is entered into the PC1 Web Browser address bar?
Local Server
Test Server
File Server
Cisco Server
78. Match each DHCP message type with its description. (Not all options are used.)
CCNA 2 v7 Modules 1 – 4: Switching Concepts, VLANs, and InterVLAN Routing Exam Answers
79. What type of VLAN is configured specifically for network traffic such as SSH, Telnet, HTTPS, HHTP,
and SNMP?
voice VLAN
management VLAN
native VLAN
security VLAN
7. In which two port states does a switch learn MAC addresses and process BPDUs in a PVST network?
(Choose two.)
disabled
forwarding
listening
blocking
learning
Explanation: Switches learn MAC addresses at the learning and forwarding port states. They receive and
process BPDUs at the blocking, listening, learning, and forwarding port states.
8. If no bridge priority is configured in PVST, which criteria is considered when electing the root bridge?
lowest MAC address
lowest IP address
highest IP address
highest MAC address
Explanation: Only one switch can be the root bridge for a VLAN. The root bridge is the switch with the
lowest BID. The BID is determined by priority and the MAC address. If no priority is configured then all
switches use the default priority and the election of the root bridge will be based on the lowest MAC address.
9. Match the spanning-tree feature with the protocol type. (Not all options are used.)
Explanation: MST is the Cisco implementation of MSTP (IEEE 802.1s).
10. When the show spanning-tree vlan 33 command is issued on a switch, three ports are shown in the
forwarding state. In which two port roles could these interfaces function while in the forwarding state?
(Choose two.)
alternate
designated
disabled
blocked
root
Explanation: The role of each of the three ports will be either designated port or root port. Ports in the
disabled state are administratively disabled. Ports in the blocking state are alternate ports.
11. What is the function of STP in a scalable network?
It decreases the size of the failure domain to contain the impact of failures.
It protects the edge of the enterprise network from malicious activity.
It combines multiple switch trunk links to act as one logical link for increased bandwidth.
It disables redundant paths to eliminate Layer 2 loops.
Explanation: STP is an important component in a scalable network because it allows redundant physical
connections between Layer 2 devices to be implemented without creating Layer 2 loops. STP prevents Layer
2 loops from forming by disabling interfaces on Layer 2 devices when they would create a loop.
12. What is a characteristic of spanning tree?
It is enabled by default on Cisco switches.
It is used to discover information about an adjacent Cisco device.
It has a TTL mechanism that works at Layer 2.
It prevents propagation of Layer 2 broadcast frames.
Explanation: Spanning tree does work at Layer 2 on Ethernet-based networks and is enabled by default, but it
does not have a TTL mechanism. Spanning tree exists because Layer 2 frames do not have a TTL mechanism.
Layer 2 frames are still broadcast when spanning tree is enabled, but the frames can only be transmitted
through a single path through the Layer 2 network that was created by spanning tree. Cisco Discovery
Protocol (CDP) is used to discover information about an adjacent Cisco device.
13. Which spanning tree standard supports only one root bridge so that traffic from all VLANs flows over the
same path?
PVST+
802.1D
MST
Rapid PVST
Explanation: MST is the Cisco implementation of MSTP, an IEEE standard protocol that provides up to 16
instances of RSTP. PVST+ provides a separate 802.1D spanning-tree instance for each VLAN that is
configured in the network. 802.1D is the original STP standard defined by the IEEE and allows for only one
root bridge for all VLANs. 802.1w, or RSTP, provides faster convergence but still uses only one STP instance
for all VLANs.
14. What is the purpose of the Spanning Tree Protocol (STP)?
creates smaller collision domains
prevents routing loops on a router
prevents Layer 2 loops
allows Cisco devices to exchange routing table updates
creates smaller broadcast domains
Explanation: The Spanning-Tree Protocol (STP) creates one path through a switch network in order to prevent
Layer 2 loops.
15. What is the value used to determine which port on a non-root bridge will become a root port in a STP
network?
the path cost
the highest MAC address of all the ports in the switch
the lowest MAC address of all the ports in the switch
the VTP revision number
Explanation: STP establishes one root port on each non-root bridge. The root port is the lowest-cost path from
the non-root bridge to the root bridge, indicating the direction of the best path to the root bridge. This is
primarily based on the path cost to the root bridge.
16. Refer to the exhibit. Which switch will be the root bridge after the election process is complete?
S1
S2
S3
S4
Explanation: The root bridge is determined by the lowest bridge ID, which consists of the priority value and
the MAC address. Because the priority values of all of the switches are identical, the MAC address is used to
determine the root bridge. Because S2 has the lowest MAC address, S2 becomes the root bridge.
17. What are two drawbacks to turning spanning tree off and having multiple paths through the Layer 2 switch
network? (Choose two.)
The MAC address table becomes unstable.
The switch acts like a hub.
Port security becomes unstable.
Broadcast frames are transmitted indefinitely.
Port security shuts down all of the ports that have attached devices.
Explanation: Spanning tree should never be disabled. Without it, the MAC address table becomes unstable,
broadcast storms can render network clients and the switches unusable, and multiple copies of unicast frames
can be delivered to the end devices.
18. A small company network has six interconnected Layer 2 switches. Currently all switches are using the
default bridge priority value. Which value can be used to configure the bridge priority of one of the switches
to ensure that it becomes the root bridge in this design?
1
28672
32768
34816
61440
Explanation: The default bridge priority value for all Cisco switches is 32768. The range is 0 to 61440 in
increments of 4096. Thus, the values 1 and 34816 are invalid. Configuring one switch with the lower value of
28672 (and leaving the bridge priority value of all other switches unchanged) will make the switch become
the root bridge.
19. Refer to the exhibit. The administrator tried to create an EtherChannel between S1 and the other two
switches via the commands that are shown, but was unsuccessful. What is the problem?
Traffic cannot be sent to two different switches through the same EtherChannel link.
Traffic cannot be sent to two different switches, but only to two different devices like an
EtherChannel-enabled server and a switch.
Traffic can only be sent to two different switches if EtherChannel is implemented on Gigabit
Ethernet interfaces.
Traffic can only be sent to two different switches if EtherChannel is implemented on Layer 3
switches.
Explanation: An EtherChannel link can only be created between two switches or between an EtherChannel-
enabled server and a switch. Traffic cannot be sent to two different switches through the same EtherChannel
link.
20. Which statement is true regarding the use of PAgP to create EtherChannels?
It requires full duplex.
It increases the number of ports that are participating in spanning tree.
It requires more physical links than LACP does.
It mandates that an even number of ports (2, 4, 6, etc.) be used for aggregation.
It is Cisco proprietary.
Explanation: PAgP is used to automatically aggregate multiple ports into an EtherChannel bundle, but it only
works between Cisco devices. LACP can be used for the same purpose between Cisco and non-Cisco devices.
PAgP must have the same duplex mode at both ends and can use two ports or more. The number of ports
depends on the switch platform or module. An EtherChannel aggregated link is seen as one port by the
spanning-tree algorithm.
21. What are two requirements to be able to configure an EtherChannel between two switches? (Choose two.)
All the interfaces need to work at the same speed.
All interfaces need to be assigned to different VLANs.
Different allowed ranges of VLANs must exist on each end.
All the interfaces need to be working in the same duplex mode.
The interfaces that are involved need to be contiguous on the switch.
Explanation: All interfaces in the EtherChannel bundle must be assigned to the same VLAN or be configured
as a trunk. If the allowed range of VLANs is not the same, the interfaces do not form an EtherChannel even
when set to auto or desirable mode.
22. Refer to the exhibit. On the basis of the output that is shown, what can be determined about the
EtherChannel bundle?
192.168.1.1
192.168.1.255
255.255.255.255
192.168.1.8
Explanation: When a host boots and has been configured for dynamic IP addressing, the device tries to obtain
a valid IP address. It sends a DHCPDISCOVER message. This is a broadcast message because the DHCP
server address is unknown (by design). The destination IP address in the IP header is 255.255.255.255 and the
destination MAC address is FF:FF:FF:FF:FF:FF.
8. Which message does an IPv4 host use to reply when it receives a DHCPOFFER message from a DHCP
server?
DHCPOFFER
DHCPDISCOVER
DHCPREQUEST
DHCPACK
Explanation: When the client receives the DHCPOFFER from the server, it sends back a DHCPREQUEST
broadcast message. On receiving the DHCPREQUEST message, the server replies with a unicast DHCPACK
message.
9. Which command, when issued in the interface configuration mode of a router, enables the interface to
acquire an IPv4 address automatically from an ISP, when that link to the ISP is enabled?
service dhcp
ip address dhcp
ip helper-address
ip dhcp pool
Explanation: The ip address dhcp interface configuration command configures an Ethernet interface as a
DHCP client. The service dhcp global configuration command enables the DHCPv4 server process on the
router. The ip helper-address command is issued to enable DHCP relay on the router. The ip dhcp
pool command creates the name of a pool of addresses that the server can assign to hosts.
10. Which kind of message is sent by a DHCP client when its IP address lease has expired?
a DHCPDISCOVER unicast message
a DHCPREQUEST broadcast message
a DHCPREQUEST unicast message
a DHCPDISCOVER broadcast message
Explanation: When the IP address lease time of the DHCP client expires, it sends a DHCPREQUEST unicast
message directly to the DHCPv4 server that originally offered the IPv4 address.
11. A host PC is attempting to lease an address through DHCP. What message is sent by the server to let the
client know it is able to use the provided IP information?
DHCPDISCOVER
DHCPOFFER
DHCPREQUEST
DHCPACK
DHCPNACK
Explanation: When a host uses DHCP to automatically configure an IP address, the typically sends two
messages: the DHCPDISCOVER message and the DHCPREQUEST message. These two messages are
usually sent as broadcasts to ensure that all DHCP servers receive them. The servers respond to these
messages using DHCPOFFER, DHCPACK, and DHCPNACK messages, depending on the circumstance.
12. What is one indication that a Windows computer did not receive an IPv4 address from a DHCP server?
The computer cannot ping 127.0.0.1.
The computer receives an IP address that starts with 169.254.
Windows displays a DHCP timeout message.
The computer cannot ping other devices on the same network with IP addresses in the
169.254.0.0/16 range.
Explanation: When a Windows PC cannot communicate with an IPv4 DHCP server, the computer
automatically assigns an IP address in the 169.254.0.0/16 range. Any other device on the same network that
receives an address in the same range is reachable.
13. Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server?
broadcast DHCPACK
broadcast DHCPREQUEST
unicast DHCPACK
unicast DHCPREQUEST
Explanation: When a DHCP client receives DHCPOFFER messages, it will send a broadcast
DHCPREQUEST message for two purposes. First, it indicates to the offering DHCP server that it would like
to accept the offer and bind the IP address. Second, it notifies any other responding DHCP servers that their
offers are declined.
14. A small coffee shop is offering free Wi-Fi to customers. The network includes a wireless router and a DSL
modem that is connected to the local phone company. What method is typically used to configure the
connection to the phone company?
Set the WAN connection in the wireless router as a DHCP client.
Set the connection between the wireless router and the DSL modem as a private IP network.
Set the DSL modem as a DHCP client to get a public IP address from the wireless router.
Set the DSL modem as a DHCP client to the phone company and a DHCP server for the internal
connection.
Explanation: In a SOHO environment, a wireless router connects to an ISP via a DSL or cable modem. The IP
address between the wireless router and ISP site is typically assigned by the ISP through DHCP. The DSL
modem does not manage IP address allocation.
15. A company uses DHCP to manage IP address deployment for employee workstations. The IT department
deploys multiple DHCP servers in the data center and uses DHCP relay agents to facilitate the DHCP requests
from workstations. Which two UDP ports are used to forward DHCP traffic? (Choose two.)
23
53
67
68
80
Explanation: The DHCP protocol operates with 2 UDP ports. UDP port 67 is the destination port for DHCP
servers, and DHCP clients use UDP port 68.
16. A client device on an Ethernet segment needs an IP address in order to communicate on the network. A
DHCP server with IP address 192.168.1.1 has been configured and enabled on the network. How will a client
device obtain a usable IP address for this network?
Send a DHCPACK packet to the default gateway address.
Use a statically configured IP address from the pool of IP addresses that is offered by the DHCP
server.
Send a DHCPDISCOVER message to physical address FF-FF-FF-FF-FF-FF.
Send a DHCPREQUEST packet to IP address 255.255.255.255.
Explanation: Like IP addressing, there is also a special MAC address for broadcast purposes: FF-FF-FF-FF-
FF-FF. When a DHCP client needs to send a DHCP Discover message in order to seek DHCP servers, the
client will use this MAC address as the destination MAC address in the Ethernet frame. It does this because it
has no knowledge of the IP and MAC addresses of DHCP servers.
17. What is an advantage of configuring a Cisco router as a relay agent?
It can provide relay services for multiple UDP services.
It reduces the response time from a DHCP server.
It can forward both broadcast and multicast messages on behalf of clients.
It will allow DHCPDISCOVER messages to pass without alteration.
Explanation: By default, the ip helper-address command forwards the following eight UDP services:
Port 37: Time
Port 49: TACACS
Port 53: DNS
Port 67: DHCP/BOOTP client
Port 68: DHCP/BOOTP server
Port 69: TFTP
Port 137: NetBIOS name service
Port 138: NetBIOS datagram service
18. Which statement is true about DHCP operation?
When a device that is configured to use DHCP boots, the client broadcasts a DHCPDISCOVER
message to identify any available DHCP servers on the network.
A client must wait for lease expiration before it sends another DHCPREQUEST message.
If the client receives several DHCPOFFER messages from different servers, it sends a unicast
DHCPREQUEST message to the server from which it chooses to obtain the IP information.
The DHCPDISCOVER message contains the IP address and subnet mask to be assigned, the IP
address of the DNS server, and the IP address of the default gateway.
Explanation: The client broadcasts a DHCPDISCOVER message to identify any available DHCP servers on
the network. A DHCP server replies with a DHCPOFFER message. This message offers to the client a lease
that contains such information as the IP address and subnet mask to be assigned, the IP address of the DNS
server, and the IP address of the default gateway. After the client receives the lease, the received information
must be renewed through another DHCPREQUEST message prior to the lease expiration.
19. Order the DHCP message types as they would occur between a DHCP client and a DHCP server.
Explanation: The DHCPDISCOVER message is used to identify any DHCP servers on a network.
The DHCPOFFER message is used by a server to offer a lease to a client. The DHCPREQUEST message is
used to identify both the specific DHCP server and the lease that the client is accepting.
The DHCPACK message is used by a server to finalize a successful lease with a client.
The DHCPNAK message is used when an offered lease is no longer valid.
20. A network administrator configures a router to send RA messages with M flag as 0 and O flag as 1. Which
statement describes the effect of this configuration when a PC tries to configure its IPv6 address?
It should contact a DHCPv6 server for the prefix, the prefix-length information, and an interface
ID that is both random and unique.
It should use the information that is contained in the RA message and contact a DHCPv6 server for
additional information.
It should use the information that is contained in the RA message exclusively.
It should contact a DHCPv6 server for all the information that it needs.
Explanation: ICMPv6 RA messages contain two flags to indicate whether a workstation should use SLAAC, a
DHCPv6 server, or a combination to configure its IPv6 address. These two flags are M flag and O flag. When
both flags are 0 (by default), a client must only use the information in the RA message. When M flag is 0 and
O flag is 1, a client should use the information in the RA message and look for the other configuration
parameters (such as DNS server addresses) on DHCPv6 servers.
21. Refer to the exhibit. What should be done to allow PC-A to receive an IPv6 address from the DHCPv6
server?
Add the ipv6 dhcp relay command to interface Fa0/0.
Change the ipv6 nd managed-config-flag command to ipv6 nd other-config-flag.
Configure the ipv6 nd managed-config-flag command on interface Fa0/1.
Add the IPv6 address 2001:DB8:1234:5678::10/64 to the interface configuration of the DHCPv6
server.
Explanation: Client DHCPv6 messages are sent to a multicast address with link-local scope, which means that
the messages will not be forwarded by routers. Because the client and server are on different subnets on
different interfaces, the message will not reach the server. The router can be configured to relay the DHCPv6
messages from the client to the server by configuring the ipv6 dhcp relay command on the interface that is
connected to the client.
22. Refer to the exhibit. A network administrator is implementing the stateless DHCPv6 operation for the
company. Clients are configuring IPv6 addresses as expected. However, the clients are not getting the DNS
server address and the domain name information configured in the DHCP pool. What could be the cause of
the problem?
The DNS server address is not on the same network as the clients are on.
The router is configured for SLAAC operation.
The GigabitEthernet interface is not activated.
The clients cannot communicate with the DHCPv6 server, evidenced by the number of active
clients being 0.
Explanation: The router is configured for SLAAC operation because there is no configuration command to
change the RA M and O flag value. By default, both M and O flags are set to 0. In order to permint stateless
DHCPv6 operation, the interface command ipv6 nd other-config-flag should be issued. The GigabitEthernet
interface is in working condition because clients can get RA messages and configure their IPv6 addresses as
expected. Also, the fact that R1 is the DHCPv6 server and clients are getting RA messages indicates that
clients can communicate with the DHCP server. The number of active clients is 0 because the DHCPv6 server
does not maintain the state of clients IPv6 addresses (it is not configured for stateful DHCPv6 operation). The
DNS server address issue is not relevant to the problem.
23. Question as presented:
A stateless DHCPv6 client would send a DHCPv6 INFORMATION-REQUEST message as step 3 in the
process.
24. A company uses the SLAAC method to configure IPv6 addresses for the employee workstations. Which
address will a client use as its default gateway?
the global unicast address of the router interface that is attached to the network
the unique local address of the router interface that is attached to the network
the all-routers multicast address
the link-local address of the router interface that is attached to the network
Explanation: When a PC is configured to use the SLAAC method for configuring IPv6 addresses, it will use
the prefix and prefix-length information that is contained in the RA message, combined with a 64-bit interface
ID (obtained by using the EUI-64 process or by using a random number that is generated by the client
operating system), to form an IPv6 address. It uses the link-local address of the router interface that is attached
to the LAN segment as its IPv6 default gateway address.
25. Refer to the exhibit. A network administrator is configuring a router for DHCPv6 operation. Which
conclusion can be drawn based on the commands?
The router is configured for stateful DHCPv6 operation, but the DHCP pool configuration is
incomplete.
The DHCPv6 server name is ACAD_CLASS.
Clients would configure the interface IDs above 0010.
The router is configured for stateless DHCPv6 operation.
Explanation: The DHCPv6 is for the stateless DHCPv6 operation that is indicated by changing the O flag to 1
and leaving the M flag as default, which is 0. Therefore, it is not configured for stateful DHCPv6 operation.
Although the DNS server has the interface ID 0010, clients in stateless DHCPv6 operation will configure their
interface IDs either by EUI-64 or a random number. The ACAD_CLASS is the name of the DHCP pool, not
the DHCP server name.
26. A network administrator is analyzing the features that are supported by different first-hop router
redundancy protocols. Which statement describes a feature that is associated with HSRP?
HSRP uses active and standby routers.
HSRP is nonproprietary.
It allows load balancing between a group of redundant routers.
It uses ICMP messages in order to assign the default gateway to hosts.
Explanation: The HSRP first-hop router redundancy protocol is Cisco proprietary and supports standby and
active devices. VRRPv2 and VRRPv3 are nonproprietary. GLBP is Cisco proprietary and supports load
balancing between a group of redundant routers.
27. Refer to the exhibit. What protocol can be configured on gateway routers R1 and R2 that will allow traffic
from the internal LAN to be load balanced across the two gateways to the Internet?
GLBP
PVST+
PVST
STP
Explanation: GLBP, or Group Load Balancing Protocol, allows multiple routers to act as a single default
gateway for hosts. GLBP load balances the traffic across the individual routers on a per host basis.
28. Refer to the exhibit. A network engineer is troubleshooting host connectivity on a LAN that uses a first
hop redundancy protocol. Which IPv4 gateway address should be configured on the host?
192.168.2.0
192.168.2.1
192.168.2.2
192.168.2.100
Explanation: The host default gateway address should be the FHRP (in this case GLBP) virtual IP address.
29. Refer to the exhibit. Which destination MAC address is used when frames are sent from the workstation to
the default gateway?
Explanation: The DHCPDISCOVER message is used to identify any DHCP servers on a network. The
DHCPOFFER message is used by a server to offer a lease to a client. The DHCPREQUEST message is used
to identify both the specific DHCP server and the lease that the client is accepting.
The DHCPACK message is used by a server to finalize a successful lease with a client.
The DHCPNAK message is used when an offered lease is no longer valid.
39. Match the DHCP message types to the order of the stateful DHCPv6 process when a client first connects
to an IPv6 network. (Not all options are used.)
40. Match the step number to the sequence of stages that occur during the HSRP failover process. (Not all
options are used.)
Explanation: Hot Standby Router Protocol (HSRP) is a Cisco-proprietary protocol that is designed to allow
for transparent failover of a first-hop IPv4 device.
41. Match the FHRP protocols to the appropriate description. (Not all options are used.)
42. Match the DHCP message types to the order of the DHCPv4 process. (Not all options are used.)
Explanation: The broadcast DHCPDISCOVER message finds DHCPv4 servers on the network. When the
DHCPv4 server receives a DHCPDISCOVER message, it reserves an available IPv4 address to lease to the
client and sends the unicast DHCPOFFER message to the requesting client. When the client receives the
DHCPOFFER from the server, it sends back a DHCPREQUEST. On receiving the DHCPREQUEST message
the server replies with a unicast DHCPACK message. DHCPREPLY and DHCPINFORMATION-REQUEST
are DHCPv6 messages.
43. The address pool of a DHCP server is configured with 192.168.234.0/27. The network administrator
reserves 22 IP addresses for IP phones. How many IP addresses are left in the pool to be assigned to other
hosts?
10
0
8
21
18
Explanation: Calculate the maximum number of hosts available for the slash value and subtract the required
static IP addresses required for the devices.
/24 = 254 hosts
/25 = 126 hosts
/26 = 62 hosts
/27 = 30 hosts
/28 = 14 hosts
44. A company uses DHCP servers to dynamically assign IPv4 addresses to employee workstations. The
address lease duration is set as 5 days. An employee returns to the office after an absence of one week. When
the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3
destination addresses will the message contain?
both MAC and IPv4 addresses of the DHCP server
FF-FF-FF-FF-FF-FF and IPv4 address of the DHCP server
FF-FF-FF-FF-FF-FF and 255.255.255.255
MAC address of the DHCP server and 255.255.255.255
Explanation:When the lease of a dynamically assigned IPv4 address has expired, a workstation will send a
DHCPDISCOVER message to start the process of obtaining a valid IP address. Because the workstation does
not know the addresses of DHCP servers, it sends the message via broadcast, with destination addresses of
FF-FF-FF-FF-FF-FF and 255.255.255.255.
45. Which command will allow a network administrator to check the IP address that is assigned to a particular
MAC address?
Router# show running-config I section_dhcp
Router# show ip dhcp server statistics
Router# show ip dhcp binding
Router# show ip dhcp pool
Explanation: The show ip dhcp binding command will show the leases, including IP addresses, MAC addresses,
lease expiration, type of lease, client ID, and user name.
46. What is the reason that an ISP commonly assigns a DHCP address to a wireless router in a SOHO
environment?
better network performance
better connectivity
easy IP address management
easy configuration on ISP firewall
Explanation:In a SOHO environment, a wireless router connects to the ISP via a DSL or cable modem. The IP
address between the wireless router and ISP site is typically assigned by the ISP through DHCP. This method
facilitates the IP addressing management in that IP addresses for clients are dynamically assigned so that if a
client is dropped, the assigned IP address can be easily reassigned to another client.
47. What information can be verified through the show ip dhcp binding command?
the IPv4 addresses that are assigned to hosts by the DHCP server
that DHCPv4 discover messages are still being received by the DHCP server
the IPv4 addresses that have been excluded from the DHCPv4 pool
the number of IP addresses remaining in the DHCP pool
Explanation:The show ip dhcp binding command shows a list of IPv4 addresses and the MAC addresses of the
hosts to which they are assigned. Using this information an administrator can determine which host interfaces
have been assigned to specific hosts.
48. What is the result of a network technician issuing the command ip dhcp excluded-address 10.0.15.1
10.0.15.15 on a Cisco router?
The Cisco router will exclude only the 10.0.15.1 and 10.0.15.15 IP addresses from being leased to
DHCP clients.
The Cisco router will exclude 15 IP addresses from being leased to DHCP clients.
The Cisco router will automatically create a DHCP pool using a /28 mask.
The Cisco router will allow only the specified IP addresses to be leased to clients.
Explanation: The ip dhcp excluded-address command is followed by the first and the last addresses to be excluded
from being leased to DHCP clients.
49. Match the descriptions to the corresponding DHCPv6 server type. (Not all options are used.)
50. Refer to the exhibit. Based on the output that is shown, what kind of IPv6 addressing is being configured?
Switching, Routing, and Wireless Essentials ( Version 7.00) – L2 Security and WLANs
Exam
1. Which Layer 2 attack will result in legitimate users not getting valid IP addresses?
ARP spoofing
DHCP starvation
IP address spoofing
MAC address flooding
Explanation: The DHCP starvation attack causes the exhaustion of the IP address pool of a DHCP server
before legitimate users can obtain valid IP addresses.
2. What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?
Disable DTP.
Disable STP.
Enable port security.
Place unused ports in an unused VLAN.
Explanation: A MAC address (CAM) table overflow attack, buffer overflow, and MAC address spoofing can
all be mitigated by configuring port security. A network administrator would typically not want to disable
STP because it prevents Layer 2 loops. DTP is disabled to prevent VLAN hopping. Placing unused ports in an
unused VLAN prevents unauthorized wired connectivity.
3. Which three Cisco products focus on endpoint security solutions? (Choose three.)
IPS Sensor Appliance
Web Security Appliance
Email Security Appliance
SSL/IPsec VPN Appliance
Adaptive Security Appliance
NAC Appliance
Explanation: The primary components of endpoint security solutions are Cisco Email and Web Security
appliances, and Cisco NAC appliance. ASA, SSL/IPsec VPN, and IPS sensor appliances all provide security
solutions that focus on the enterprise network, not on endpoint devices.
4. True or False?
In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.
true
false
5. Which authentication method stores usernames and passwords in the router and is ideal for small networks?
server-based AAA over TACACS+
local AAA over RADIUS
server-based AAA
local AAA over TACACS+
local AAA
server-based AAA over RADIUS
Explanation: In a small network with a few network devices, AAA authentication can be implemented with
the local database and with usernames and passwords stored on the network devices. Authentication using the
TACACS+ or RADIUS protocol will require dedicated ACS servers although this authentication solution
scales well in a large network.
6. What represents a best practice concerning discovery protocols such as CDP and LLDP on network
devices?
Enable CDP on edge devices, and enable LLDP on interior devices.
Use the open standard LLDP rather than CDP.
Use the default router settings for CDP and LLDP.
Disable both protocols on all interfaces where they are not required.
Explanation: Both discovery protocols can provide hackers with sensitive network information. They should
not be enabled on edge devices, and should be disabled globally or on a per-interface basis if not required.
CDP is enabled by default.
7. Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network
devices?
SNMP
TFTP
SSH
SCP
Explanation: Telnet uses plain text to communicate in a network. The username and password can be captured
if the data transmission is intercepted. SSH encrypts data communications between two network devices.
TFTP and SCP are used for file transfer over the network. SNMP is used in network management solutions.
8. Which statement describes the behavior of a switch when the MAC address table is full?
It treats frames as unknown unicast and floods all incoming frames to all ports on the switch.
It treats frames as unknown unicast and floods all incoming frames to all ports across multiple
switches.
It treats frames as unknown unicast and floods all incoming frames to all ports within the local
VLAN.
It treats frames as unknown unicast and floods all incoming frames to all ports within the collision
domain.
Explanation: When the MAC address table is full, the switch treats the frame as an unknown unicast and
begins to flood all incoming traffic to all ports only within the local VLAN.
9. What device is considered a supplicant during the 802.1X authentication process?
the router that is serving as the default gateway
the authentication server that is performing client authentication
the client that is requesting authentication
the switch that is controlling network access
Explanation: The devices involved in the 802.1X authentication process are as follows:
The supplicant, which is the client that is requesting network access
The authenticator, which is the switch that the client is connecting to and that is actually
controlling physical network access
The authentication server, which performs the actual authentication
10. Refer to the exhibit. Port Fa0/2 has already been configured appropriately. The IP phone and PC work
properly. Which switch configuration would be most appropriate for port Fa0/2 if the network administrator
has the following goals?
No one is allowed to disconnect the IP phone or the PC and connect some other wired device.
If a different device is connected, port Fa0/2 is shut down.
The switch should automatically detect the MAC address of the IP phone and the PC and add those addresses
to the running configuration.
SWA(config-if)# switchport port-security
SWA(config-if)# switchport port-security mac-address sticky
SWA(config-if)# switchport port-security
SWA(config-if)# switchport port-security maximum 2
SWA(config-if)# switchport port-security mac-address sticky
SWA(config-if)# switchport port-security violation restrict
SWA(config-if)# switchport port-security mac-address sticky
SWA(config-if)# switchport port-security maximum 2
SWA(config-if)# switchport port-security
SWA(config-if)# switchport port-security maximum 2
SWA(config-if)# switchport port-security mac-address sticky
Explanation: The default mode for a port security violation is to shut down the port so the switchport port-
security violation command is not necessary. The switchport port-security command must be entered with no
additional options to enable port security for the port. Then, additional port security options can be added.
11. Refer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action
will occur when PC1 is attached to switch S1 with the applied configuration?
Frames from PC1 will be forwarded since the switchport port-security violation command is
missing.
Frames from PC1 will be forwarded to its destination, and a log entry will be created.
Frames from PC1 will be forwarded to its destination, but a log entry will not be created.
Frames from PC1 will cause the interface to shut down immediately, and a log entry will be made.
Frames from PC1 will be dropped, and there will be no log of the violation.
Frames from PC1 will be dropped, and a log message will be created.
Explanation: Manual configuration of the single allowed MAC address has been entered for port fa0/12. PC1
has a different MAC address and when attached will cause the port to shut down (the default action), a log
message to be automatically created, and the violation counter to increment. The default action of shutdown is
recommended because the restrict option might fail if an attack is underway.
12. Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native
VLAN?
DHCP spoofing
DHCP starvation
VLAN double-tagging
DTP spoofing
Explanation: Spoofing DTP messages forces a switch into trunking mode as part of a VLAN-hopping attack,
but VLAN double tagging works even if trunk ports are disabled. Changing the native VLAN from the default
to an unused VLAN reduces the possibility of this type of attack. DHCP spoofing and DHCP starvation
exploit vulnerabilities in the DHCP message exchange.
13. A network administrator is configuring DAI on a switch with the command ip arp inspection validate src-
mac. What is the purpose of this configuration command?
It checks the source MAC address in the Ethernet header against the user-configured ARP ACLs.
It checks the source MAC address in the Ethernet header against the MAC address table.
It checks the source MAC address in the Ethernet header against the sender MAC address in the
ARP body.
It checks the source MAC address in the Ethernet header against the target MAC address in the
ARP body.
Explanation: DAI can be configured to check for both destination or source MAC and IP addresses:
Destination MAC – Checks the destination MAC address in the Ethernet header against the target
MAC address in the ARP body.
Source MAC – Checks the source MAC address in the Ethernet header against the sender MAC
address in the ARP body.
IP address – Checks the ARP body for invalid and unexpected IP addresses including addresses
0.0.0.0, 255.255.255.255, and all IP multicast addresses.
14. Which two commands can be used to enable BPDU guard on a switch? (Choose two.)
S1(config)# spanning-tree bpduguard default
S1(config-if)# spanning-tree portfast bpduguard
S1(config)# spanning-tree portfast bpduguard default
S1(config-if)# enable spanning-tree bpduguard
S1(config-if)# spanning-tree bpduguard enable
Explanation: BPDU guard can be enabled on all PortFast-enabled ports by using the spanning-tree portfast
bpduguard default global configuration command. Alternatively, BPDU guard can be enabled on a PortFast-
enabled port through the use of the spanning-tree bpduguard enable interface configuration command.
15. As part of the new security policy, all switches on the network are configured to automatically learn MAC
addresses for each port. All running configurations are saved at the start and close of every business day. A
severe thunderstorm causes an extended power outage several hours after the close of business. When the
switches are brought back online, the dynamically learned MAC addresses are retained. Which port security
configuration enabled this?
auto secure MAC addresses
dynamic secure MAC addresses
static secure MAC addresses
sticky secure MAC addresses
Explanation: With sticky secure MAC addressing, the MAC addresses can be either dynamically learned or
manually configured and then stored in the address table and added to the running configuration file. In
contrast, dynamic secure MAC addressing provides for dynamically learned MAC addressing that is stored
only in the address table.
16. Which type of management frame may regularly be broadcast by an AP?
authentication
probe request
probe response
beacon
Explanation: Beacons are the only management frame that may regularly be broadcast by an AP. Probing,
authentication, and association frames are used only during the association (or reassociation) process.
17. What are the two methods that are used by a wireless NIC to discover an AP? (Choose two.)
delivering a broadcast frame
receiving a broadcast beacon frame
initiating a three-way handshake
sending an ARP request
transmitting a probe request
Explanation: Two methods can be used by a wireless device to discover and register with an access point:
passive mode and active mode. In passive mode, the AP sends a broadcast beacon frame that contains the
SSID and other wireless settings. In active mode, the wireless device must be manually configured for the
SSID, and then the device broadcasts a probe request.
18. A technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of
adjusting the channel?
to enable different 802.11 standards
to avoid interference from nearby wireless devices
to disable broadcasting of the SSID
to provide stronger security modes
Explanation: Channels 1, 6, and 11 are selected because they are 5 channels apart. thus minimizing the
interference with adjacent channels. A channel frequency can interfere with channels on either side of the
main frequency. All wireless devices need to be used on nonadjacent channels.
19. While attending a conference, participants are using laptops for network connectivity. When a guest
speaker attempts to connect to the network, the laptop fails to display any available wireless networks. The
access point must be operating in which mode?
mixed
passive
active
open
Explanation: Active is a mode used to configure an access point so that clients must know the SSID to
connect to the access point. APs and wireless routers can operate in a mixed mode meaning that that multiple
wireless standards are supported. Open is an authentication mode for an access point that has no impact on the
listing of available wireless networks for a client. When an access point is configured in passive mode, the
SSID is broadcast so that the name of wireless network will appear in the listing of available networks for
clients.
20. A network administrator is required to upgrade wireless access to end users in a building. To provide data
rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be
implemented?
802.11n
802.11ac
802.11g
802.11b
Explanation: 802.11ac provides data rates up to 1.3 Gb/s and is still backward compatible with 802.11a/b/g/n
devices. 802.11g and 802.11n are older standards that cannot reach speeds over 1Gb/s. 802.11ad is a newer
standard that can offer theoretical speeds of up to 7 Gb/s.
21. A technician is about to install and configure a wireless network at a small branch office. What is the first
security measure the technician should apply immediately upon powering up the wireless router?
Enable MAC address filtering on the wireless router.
Configure encryption on the wireless router and the connected wireless devices.
Change the default user-name and password of the wireless router.
Disable the wireless network SSID broadcast.
Explanation: The first action a technician should do to secure a new wireless network is to change the default
user-name and password of the wireless router. The next action would usually be to configure encryption.
Then once the initial group of wireless hosts have connected to the network, MAC address filtering would be
enabled and SSID broadcast disabled. This will prevent new unauthorized hosts from finding and connecting
to the wireless network.
22. On a Cisco 3504 WLC dashboard, which option provides access to the full menu of features?
Access Points
Network Summary
Advanced
Rogues
Explanation: The Cisco 3504 WLC dashboard displays when a user logs into the WLC. It provides some basic
settings and menus that users can quickly access to implement a variety of common configurations. By
clicking the Advanced button, the user will access the advanced Summary page and access all the features of
the WLC.
23. Which step is required before creating a new WLAN on a Cisco 3500 series WLC?
Create a new SSID.
Build or have an SNMP server available.
Build or have a RADIUS server available.
Create a new VLAN interface.
Explanation: Each new WLAN configured on a Cisco 3500 series WLC needs its own VLAN interface. Thus
it is required that a new VLAN interface to be created first before a new WLAN can be created.
24. A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11
standards. When users access high bandwidth services such as streaming video, the wireless network
performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency
band SSID and train users to use that SSID for streaming media services. Why might this solution improve the
wireless network performance for that type of service?
Requiring the users to switch to the 5 GHz band for streaming media is inconvenient and will
result in fewer users accessing these services.
The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it
more suited to streaming multimedia.
The 5 GHz band has a greater range and is therefore likely to be interference-free.
The only users that can switch to the 5 GHz band will be those with the latest wireless NICs,
which will reduce usage.
Explanation: Wireless range is determined by the access point antenna and output power, not the frequency
band that is used. In this scenario it is stated that all users have wireless NICs that comply with the latest
standard, and so all can access the 5 GHz band. Although some users may find it inconvenient to switch to the
5 Ghz band to access streaming services, it is the greater number of channels, not just fewer users, that will
improve network performance.
25. A network administrator is configuring a RADIUS server connection on a Cisco 3500 series WLC. The
configuration requires a shared secret password. What is the purpose for the shared secret password?
It is used by the RADIUS server to authenticate WLAN users.
It is used to authenticate and encrypt user data on the WLAN.
It is used to encrypt the messages between the WLC and the RADIUS server.
It allows users to authenticate and access the WLAN.
Explanation: The RADIUS protocol uses security features to protect communications between the RADIUS
server and clients. A shared secret is the password used between the WLC and the RADIUS server. It is not
for end users.
26. Which three parameters would need to be changed if best practices are being implemented for a home
wireless AP? (Choose three.)
wireless client operating system password
antenna frequency
wireless network password
wireless beacon time
AP password
SSID
Explanation: As soon as an AP is taken out of a box, the default device password, SSID, and security
parameters (wireless network password) should be set. The frequency of a wireless antenna can be adjusted,
but doing so is not required. The beacon time is not normally configured. The wireless client operating system
password is not affected by the configuration of a home wireless network.
27. Which access control component, implementation, or protocol is based upon usernames and passwords?
802.1X
accounting
authentication
authorization
28. Which type of wireless network is based on the 802.11 standard and a 2.4-GHz or 5-GHz radio frequency?
wireless metropolitan-area network
wireless wide-area network
wireless local-area network
wireless personal-area network
29. Which two Cisco solutions help prevent DHCP starvation attacks? (Choose two.)
DHCP Snooping
IP Source Guard
Dynamic ARP Inspection
Port Security
Web Security Appliance
Explanation: Cisco provides solutions to help mitigate Layer 2 attacks including these:
IP Source Guard (IPSG) – prevents MAC and IP address spoofing attacks
Dynamic ARP Inspection (DAI) – prevents ARP spoofing and ARP poisoning attacks
DHCP Snooping – prevents DHCP starvation and SHCP spoofing attacks
Port Security – prevents many types of attacks including MAC table overflow attacks and DHCP
starvation attacks
Web Security Appliance (WSA) is a mitigation technology for web-based threats.
30. What are three techniques for mitigating VLAN attacks? (Choose three.)
Enable trunking manually.
Disable DTP.
Enable Source Guard.
Set the native VLAN to an unused VLAN.
Use private VLANs.
Enable BPDU guard.
Explanation: Mitigating a VLAN attack can be done by disabling Dynamic Trunking Protocol (DTP),
manually setting ports to trunking mode, and by setting the native VLAN of trunk links to VLANs not in use.
31. Refer to the exhibit. What can be determined about port security from the information that is shown?
The port has the maximum number of MAC addresses that is supported by a Layer 2 switch port
which is configured for port security.
The port has been shut down.
The port violation mode is the default for any port that has port security enabled.
The port has two attached devices.
Explanation: The Port Security line simply shows a state of Enabled if the switchport port-security command
(with no options) has been entered for a particular switch port. If a port security violation had occurred, a
different error message appears such as Secure-shutdown. The maximum number of MAC addresses
supported is 50. The Maximum MAC Addresses line is used to show how many MAC addresses can be
learned (2 in this case). The Sticky MAC Addresses line shows that only one device has been attached and
learned automatically by the switch. This configuration could be used when a port is shared by two cubicle-
sharing personnel who bring in separate laptops.
32. A network administrator of a college is configuring the WLAN user authentication process. Wireless users
are required to enter username and password credentials that will be verified by a server. Which server would
provide such service?
AAA
NAT
RADIUS
SNMP
Explanation: Remote Authentication Dial-In User Service (RADIUS) is a protocol and server software that
provides user-based authentication for an organization. When a WLAN is configured to use a RADIUS
server, users will enter username and password credentials that are verified by the RADIUS server before
allowing to the WLAN.
33. A technician is troubleshooting a slow WLAN that consists of 802.11b and 802.11g devices . A new
802.11n/ac dual-band router has been deployed on the network to replace the old 802.11g router. What can the
technician do to address the slow wireless speed?
Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.
Update the firmware on the new router.
Configure devices to use a different channel.
Change the SSID.
Explanation: Splitting the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band will allow
for the 802.11n to use the two bands as two separate wireless networks to help manage the traffic, thus
improving wireless performance.
34. The company handbook states that employees cannot have microwave ovens in their offices. Instead, all
employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the
company trying to avoid?
improperly configured devices
rogue access points
accidental interference
interception of data
Explanation: Denial of service attacks can be the result of improperly configured devices which can disable
the WLAN. Accidental interference from devices such as microwave ovens and cordless phones can impact
both the security and performance of a WLAN. Man-in-the-middle attacks can allow an attacker to intercept
data. Rogue access points can allow unauthorized users to access the wireless network.
35. What is the function provided by CAPWAP protocol in a corporate wireless network?
CAPWAP creates a tunnel on Transmission Control Protocol (TCP) ports in order to allow a WLC
to configure an autonomous access point.
CAPWAP provides the encapsulation and forwarding of wireless user traffic between an access
point and a wireless LAN controller.
CAPWAP provides connectivity between an access point using IPv6 addressing and a wireless
client using IPv4 addressing.
CAPWAP provides the encryption of wireless user traffic between an access point and a wireless
client.
Explanation: CAPWAP is an IEEE standard protocol that enables a WLC to manage multiple APs and
WLANs. CAPWAP is also responsible for the encapsulation and forwarding of WLAN client traffic between
an AP and a WLC.
36. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
38. What are two protocols that are used by AAA to authenticate users against a central database of usernames
and password? (Choose two.)
SSH
HTTPS
TACACS+
RADIUS
CHAP
NTP
Explanation: By using TACACS+ or RADIUS, AAA can authenticate users from a database of usernames
and passwords stored centrally on a server such as a Cisco ACS server.
39. What is the result of a DHCP starvation attack?
The attacker provides incorrect DNS and default gateway information to clients.
The IP addresses assigned to legitimate clients are hijacked.
Clients receive IP address assignments from a rogue DHCP server.
Legitimate clients are unable to lease IP addresses.
Explanation: DCHP starvation attacks are launched by an attacker with the intent to create a DoS for DHCP
clients. To accomplish this goal, the attacker uses a tool that sends many DHCPDISCOVER messages to lease
the entire pool of available IP addresses, thus denying them to legitimate hosts.
40. Which feature or configuration on a switch makes it vulnerable to VLAN double-tagging attacks?
the limited size of content-addressable memory space
the automatic trunking port feature enabled for all ports by default
the native VLAN of the trunking port being the same as a user VLAN
mixed duplex mode enabled for all ports by default
Explanation: A double-tagging (or double-encapsulated) VLAN hopping attack takes advantage of the way
that hardware on most switches operates. Most switches perform only one level of 802.1Q de-encapsulation,
which allows an attacker to embed a hidden 802.1Q tag inside the frame. This tag allows the frame to be
forwarded to a VLAN that the original 802.1Q tag did not specify. An important characteristic of the double-
encapsulated VLAN hopping attack is that it works even if trunk ports are disabled, because a host typically
sends a frame on a segment that is not a trunk link. This type of attack is unidirectional and works only when
the attacker is connected to a port residing in the same VLAN as the native VLAN of the trunk port.
41. Which component of AAA allows an administrator to track individuals who access network resources and
any changes that are made to those resources?
authentication
accounting
accessibility
authorization
Explanation: One of the components in AAA is accounting. After a user is authenticated through AAA, AAA
servers keep a detailed log of exactly what actions the authenticated user takes on the device.
42. Refer to the exhibit. PC1 and PC2 should be able to obtain IP address assignments from the DHCP server.
How many ports among switches should be assigned as trusted ports as part of the DHCP snooping
configuration?
1
3
5
7
Explanation: The DHCP snooping configuration includes building the DHCP Snooping Binding Database and
assigning necessary trusted ports on switches. A trusted port points to the legitimate DHCP servers. In this
network design, because the DHCP server is attached to AS3, seven switch ports should be assigned as trusted
ports, one on AS3 toward the DHCP server, one on DS1 toward AS3, one on DS2 toward AS3, and two
connections on both AS1 and AS2 (toward DS1 and DS2), for a total of seven.
43. An IT security specialist enables port security on a switch port of a Cisco switch. What is the default
violation mode in use until the switch port is configured to use a different violation mode?
shutdown
disabled
restrict
protect
Explanation: If no violation mode is specified when port security is enabled on a switch port, then the security
violation mode defaults to shutdown.
44. A laptop cannot connect to a wireless access point. Which two troubleshooting steps should be taken first?
(Choose two.)
Ensure that the correct network media is selected.
Ensure that the laptop antenna is attached.
Ensure that the wireless NIC is enabled.
Ensure that the wireless SSID is chosen.
Ensure that the NIC is configured for the proper frequency.
Explanation: A wireless laptop normally does not have an antenna attached unless a repair has recently been
implemented. If the wireless NIC is enabled, the correct media, radio, will be used. When the NIC detects an
access point, the correct frequency is automatically used.
45. What is an advantage of SSID cloaking?
Clients will have to manually identify the SSID to connect to the network.
It is the best way to secure a wireless network.
SSIDs are very difficult to discover because APs do not broadcast them.
It provides free Internet access in public locations where knowing the SSID is of no concern.
Explanation: SSID cloaking is a weak security feature that is performed by APs and some wireless routers by
allowing the SSID beacon frame to be disabled. Although clients have to manually identify the SSID to be
connected to the network, the SSID can be easily discovered. The best way to secure a wireless network is to
use authentication and encryption systems. SSID cloaking does not provide free Internet access in public
locations, but an open system authentication could be used in that situation.
46. What is a wireless security mode that requires a RADIUS server to authenticate wireless users?
personal
shared key
enterprise
WEP
Explanation: WPA and WPA2 come in two types: personal and enterprise. Personal is used in home and small
office networks. Shared key allows three different authentication techniques: (1) WEP, (2) WPA, and (3)
802.11i/WPA2. WEP is an encryption method.
47. A company has recently implemented an 802.11n wireless network. Some users are complaining that the
wireless network is too slow. Which solution is the best method to enhance the performance of the wireless
network?
Disable DHCP on the access point and assign static addresses to the wireless clients.
Upgrade the firmware on the wireless access point.
Split the traffic between the 2.4 GHz and 5 GHz frequency bands.
Replace the wireless NICs on the computers that are experiencing slow connections.
Explanation: Because some users are complaining about the network being too slow, the correct option would
be to split the traffic so that there are two networks using different frequencies at the same time. Replacing the
wireless NICs will not necessarily correct the network being slow and it could be expensive for the company.
DHCP versus static addressing should have no impact of the network being slow and it would be a huge task
to have all users assigned static addressing for their wireless connection. Upgrading the firmware on the
wireless access point is always a good idea. However, if some of the users are experiencing a slow network
connection, it is likely that this would not substantially improve network performance.
48. Which protocol can be used to monitor the network?
DHCP
SNMP
RADIUS
AAA
Explanation: Simple Network Management Protocol (SNMP) is used to monitor the network.
49. A network administrator deploys a wireless router in a small law firm. Employee laptops join the WLAN
and receive IP addresses in the 10.0.10.0/24 network. Which service is used on the wireless router to allow the
employee laptops to access the internet?
DHCP
RADIUS
DNS
NAT
Explanation: Any address with the 10 in the first octet is a private IPv4 address and cannot be routed on the
internet. The wireless router will use a service called Network Address Translation (NAT) to convert private
IPv4 addresses to internet-routable IPv4 addresses for wireless devices to gain access to the internet.
50. Which service can be used on a wireless router to prioritize network traffic among different types of
applications so that voice and video data are prioritized over email and web data?
QoS
DNS
DHCP
NAT
Explanation: Many wireless routers have an option for configuring quality of service (QoS). By configuring
QoS, certain time-sensitive traffic types, such as voice and video, are prioritized over traffic that is not as
time-sensitive, such as email and web browsing.
51. Which access control component, implementation, or protocol is based on device roles of supplicant,
authenticator, and authentication server?
accounting
authentication
authorization
802.1X
52. Which type of wireless network is suitable for national and global communications?
wireless metropolitan-area network
wireless local-area network
wireless personal-area network
wireless wide-area network
53. Which feature on a switch makes it vulnerable to VLAN hopping attacks?
the mixed duplex mode enabled for all ports by default
the limited size of content-addressable memory space
mixed port bandwidth support enabled for all ports by default
the automatic trunking port feature enabled for all ports by default
Explanation: A VLAN hopping attack enables traffic from one VLAN to be seen by another VLAN without
routing. In a basic VLAN hopping attack, the attacker takes advantage of the automatic trunking port feature
enabled by default on most switch ports.
54. Which component of AAA is used to determine which resources a user can access and which operations
the user is allowed to perform?
accounting
authentication
auditing
authorization
Explanation: One of the components in AAA is authorization. After a user is authenticated through AAA,
authorization services determine which resources the user can access and which operations the user is allowed
to perform.
55. Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured with the switchport port-
security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the
reason that the Fa0/2 interface is shutdown?
CCNA 2 v7 Modules 10 – 13: L2 Security and WLANs Exam Answers 55
The Fa0/24 interface of S1 is configured with the same MAC address as the Fa0/2 interface.
The connection between S1 and PC1 is via a crossover cable.
S1 has been configured with a switchport port-security aging command.
The MAC address of PC1 that connects to the Fa0/2 interface is not the configured MAC address.
Explanation: The security violation counter for Fa0/2 has been incremented (evidenced by the 1 in the
SecurityViolation column). The most secure addresses allowed on port Fa0/2 is 1 and that address was
manually entered. Therefore, PC1 must have a different MAC address than the one configured for port Fa0/2.
Connections between end devices and the switch, as well as connections between a router and a switch, are
made with a straight-through cable.
56. A network administrator enters the following commands on the switch SW1.
Switching, Routing, and Wireless Essentials ( Version 7.00) – Routing Concepts and
Configuration Exam
1. Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route?
next-hop
gateway of last resort
route source
outgoing interface
Explanation: A default static route is used as a gateway of last resort to forward unknown destination traffic to
a next hop/exit interface. The next-hop or exit interface is the destination to send traffic to on a network after
the traffic is matched in a router. The route source is the location a route was learned from.
2. Which three advantages are provided by static routing? (Choose three.)
Static routing does not advertise over the network, thus providing better security.
Configuration of static routes is error-free.
Static routes scale well as the network grows.
Static routing typically uses less network bandwidth and fewer CPU operations than dynamic
routing does.
The path a static route uses to send data is known.
No intervention is required to maintain changing route information.
Explanation: Static routes are prone to errors from incorrect configuration by the administrator. They do not
scale well, because the routes must be manually reconfigured to accommodate a growing network.
Intervention is required each time a route change is necessary. They do provide better security, use less
bandwidth, and provide a known path to the destination.
3. What are two functions of dynamic routing protocols? (Choose two.)
to maintain routing tables
to assure low router overhead
to avoid exposing network information
to discover the network
to choose the path that is specified by the administrator
Explanation: Dynamic routing protocols exist to discover the network, maintain routing tables, and calculate
the best path. Having low levels of routing overhead, using the path specified by the administrator, and
avoiding the exposure of network information are functions of static routing.
4. What is an advantage of using dynamic routing protocols instead of static routing?
easier to implement
more secure in controlling routing updates
fewer router resource overhead requirements
ability to actively search for new routes if the current path becomes unavailable
Explanation: Dynamic routing has the ability to search and find a new best path if the current path is no longer
available. The other options are actually the advantages of static routing.
5. What happens to a static route entry in a routing table when the outgoing interface associated with that
route goes into the down state?
The static route is removed from the routing table.
The router polls neighbors for a replacement route.
The router automatically redirects the static route to use another interface.
The static route remains in the table because it was defined as static.
Explanation: When the interface associated with a static route goes down, the router will remove the route
because it is no longer valid.
6. What is a characteristic of a static route that matches all packets?
It uses a single network address to send multiple static routes to one destination address.
It identifies the gateway IP address to which the router sends all IP packets for which it does not
have a learned or static route.
It backs up a route already discovered by a dynamic routing protocol.
It is configured with a higher administrative distance than the original dynamic routing protocol
has.
Explanation: A default static route is a route that matches all packets. It identifies the gateway IP address to
which the router sends all IP packets for which it does not have a learned or static route. A default static route
is simply a static route with 0.0.0.0/0 as the destination IPv4 address. Configuring a default static route creates
a gateway of last resort.
7. When would it be more beneficial to use a dynamic routing protocol instead of static routing?
in an organization where routers suffer from performance issues
on a stub network that has a single exit point
in an organization with a smaller network that is not expected to grow in size
on a network where there is a lot of topology changes
Explanation: Dynamic routing protocols consume more router resources, are suitable for larger networks, and
are more useful on networks that are growing and changing.
8. Which route would be used to forward a packet with a source IP address of 192.168.10.1 and a destination
IP address of 10.1.1.1?
C 192.168.10.0/30 is directly connected, GigabitEthernet0/1
O 10.1.1.0/24 [110/65] via 192.168.200.2, 00:01:20, Serial0/1/0
S* 0.0.0.0/0 [1/0] via 172.16.1.1
S 10.1.0.0/16 is directly connected, GigabitEthernet0/0
Explanation: Even though OSPF has a higher administrative distance value (less trustworthy), the best match
is the route in the routing table that has the most number of far left matching bits.
9. Refer to the exhibit. What is the administrative distance value of the route for router R1 to reach the
destination IPv6 address of 2001:DB8:CAFE:4::A?
120
110
1
4
Explanation: The RIP route with the source code R is used to forward data to the destination IPv6 address of
2001:DB8:CAFE:4::A. This route has an AD value of 120.
10. Which value in a routing table represents trustworthiness and is used by the router to determine which
route to install into the routing table when there are multiple routes toward the same destination?
administrative distance
metric
outgoing interface
routing protocol
Explanation: The administrative distance represents the trustworthiness of a particular route. The lower an
administrative distance, the more trustworthy the learned route is. When a router learns multiple routes toward
the same destination, the router uses the administrative distance value to determine which route to place into
the routing table. A metric is used by a routing protocol to compare routes received from the routing protocol.
An exit interface is the interface used to send a packet in the direction of the destination network. A routing
protocol is used to exchange routing updates between two or more adjacent routers.
12. Refer to the graphic. Which command would be used on router A to configure a static route to direct
traffic from LAN A that is destined for LAN C?
The 172.16.1.0 static route would be entered into the running-config but not shown in the routing
table.
The 172.16.1.0 route learned from RIP would be replaced with the 172.16.1.0 static route.
The 0.0.0.0 default route would be replaced with the 172.16.1.0 static route.
The 172.16.1.0 static route is added to the existing routes in the routing table.
Explanation: A route will be installed in a routing table if there is not another routing source with a lower
administrative distance. If a route with a lower administrative distance to the same destination network as a
current route is entered, the route with the lower administrative distance will replace the route with a higher
administrative distance.
34. What two pieces of information are needed in a fully specified static route to eliminate recursive lookups?
(Choose two.)
the interface ID of the next-hop neighbor
the interface ID exit interface
the IP address of the exit interface
the IP address of the next-hop neighbor
the administrative distance for the destination network
Explanation: A fully specified static route can be used to avoid recursive routing table lookups by the router.
A fully specified static route contains both the IP address of the next-hop router and the ID of the exit
interface.
35. Refer to the exhibit. Which command will properly configure an IPv6 static route on R2 that will allow
traffic from PC2 to reach PC1 without any recursive lookups by router R2?
39. Refer to the exhibit. PC A sends a request to Server B. What IPv4 address is used in the destination field
in the packet as the packet leaves PC A?
192.168.11.1
192.168.10.1
192.168.12.16
192.168.10.10
Explanation: The destination IP address in packets does not change along the path between the source and
destination.
40. What does R1 use as the MAC address of the destination when constructing the frame that will go from
R1 to Server B?
If the destination MAC address that corresponds to the IPv4 address is not in the ARP cache, R1
sends an ARP request.
R1 uses the destination MAC address of S1.
The packet is encapsulated into a PPP frame, and R1 adds the PPP destination address to the
frame.
R1 leaves the field blank and forwards the data to the PC.
Explanation: Communication inside a local network uses Address Resolution Protocol to obtain a MAC
address from a known IPv4 address. A MAC address is needed to construct the frame in which the packet is
encapsulated.
41. What route would have the lowest administrative distance?
a route received through the OSPF routing protocol
a directly connected network
a static route
a route received through the EIGRP routing protocol
Explanation: The most believable route or the route with the lowest administrative distance is one that is
directly connected to a router.
42. What characteristic completes the following statement?
When an IPv6 static route is configured, as a backup route to a static route in the routing table, the “distance”
command is used with ……
the “show ipv6 route static” command.
an administrative distance of 2.
a destination host route with a /128 prefix.
the interface type and interface number.
43. A router has used the OSPF protocol to learn a route to the 172.16.32.0/19 network. Which command will
implement a backup floating static route to this network?
ip route 172.16.0.0 255.255.224.0 S0/0/0 100
ip route 172.16.0.0 255.255.240.0 S0/0/0 200
ip route 172.16.32.0 255.255.224.0 S0/0/0 200
ip route 172.16.32.0 255.255.0.0 S0/0/0 100
Explanation: OSPF has an administrative distance of 110, so the floating static route must have an
administrative distance higher than 110. Because the target network is 172.16.32.0/19, that static route must
use the network 172.16.32.0 and a netmask of 255.255.224.0.
44. Consider the following command:
R1#
Refer to the exhibit. Which interface will be the exit interface to forward a data packet that has the destination
IP address 172.18.109.152?
GigabitEthernet0/0
GigabitEthernet0/1
Serial0/0/0
None, the packet will be dropped.
48. Refer to the exhibit. What will the router do with a packet that has a destination IP address of
192.168.12.227?
Which route would have to go down in order for this static route to appear in the routing table?
a default route
a static route to the 192.168.10.0/24 network
an OSPF-learned route to the 192.168.10.0/24 network
an EIGRP-learned route to the 192.168.10.0/24 network
The administrative distance of 5 added to the end of the static route creates a floating static situation for a
static route that goes down. Static routes have a default administrative distance of 1. This route that has an
administrative distance of 5 will not be placed into the routing table unless the previously entered static route
to the 192.168.10.0/24 goes down or was never entered. The administrative distance of 5 added to the end of
the static route configuration creates a floating static route that will be placed in the routing table when the
primary route to the same destination network goes down. By default, a static route to the 192.168.10.0/24
network has an administrative distance of 1. Therefore, the floating route with an administrative distance of 5
will not be placed into the routing table unless the previously entered static route to the 192.168.10.0/24 goes
down or was never entered. Because the floating route has an administrative distance of 5, the route is
preferred to an OSPF-learned route (with the administrative distance of 110) or an EIGRP-learned route (with
the administrative distance of 110) to the same destination network.
50. What are two advantages of static routing over dynamic routing? (Choose two.)
Static routing is more secure because it does not advertise over the network.
Static routing scales well with expanding networks.
Static routing requires very little knowledge of the network for correct implementation.
Static routing uses fewer router resources than dynamic routing.
Static routing is relatively easy to configure for large networks.
Static routing requires a thorough understanding of the entire network for proper implementation. It can be
prone to errors and does not scale well for large networks. Static routing uses fewer router resources, because
no computing is required for updating routes. Static routing can also be more secure because it does not
advertise over the network.
51. What characteristic completes the following statement?
When an IPv6 static route is configured, it is possible that the same IPv6 link-local address is used for …
a destination host route with a /128 prefix.
the “ipv6 unicast-routing” command.
the next-hop address of two different adjacent routers.
an administrative distance of 2.
52. A network administrator configures the interface fa0/0 on the router R1 with the command ip address
172.16.1.254 255.255.255.0. However, when the administrator issues the command show ip route, the routing
table does not show the directly connected network. What is the possible cause of the problem?
The subnet mask is incorrect for the IPv4 address.
The configuration needs to be saved first.
The interface fa0/0 has not been activated.
No packets with a destination network of 172.16.1.0 have been sent to R1.
Explanation: A directly connected network will be added to the routing table when these three conditions are
met: (1) the interface is configured with a valid IP address; (2) it is activated with no shutdown command; and
(3) it receives a carrier signal from another device that is connected to the interface. An incorrect subnet mask
for an IPv4 address will not prevent its appearance in the routing table, although the error may prevent
successful communications.
53. Refer to the exhibit. What command would be used to configure a static route on R1 so that traffic from
both LANs can reach the 2001:db8:1:4::/64 remote network?
54. Refer to the exhibit. What two commands will change the next-hop address for the 10.0.0.0/8 network
from 172.16.40.2 to 192.168.1.2? (Choose two.)
55. Refer to the exhibit. Which interface will be the exit interface to forward a data packet that has the
destination IP address 192.168.139.244?
R1#
GigabitEthernet0/1
None, the packet will be dropped.
Serial0/0/1
GigabitEthernet0/0
56. What characteristic completes the following statement?
When an IPv6 static route is configured, a fully-specified configuration should be used with …
::/0.
the “ipv6 unicast-routing” command.
the next-hop address of two different adjacent routers.
a directly connected multiaccess network.
57. Refer to the exhibit. Which interface will be the exit interface to forward a data packet that has the
destination IP address 192.168.71.52?
R1#
R1#
R1#
GigabitEthernet0/1
Serial0/0/1
GigabitEthernet0/0
Serial0/0/0
62. Match the characteristic to the corresponding type of routing. (Not all options are used.)
Explanation: Both static and dynamic routing could be used when more than one router is involved. Dynamic
routing is when a routing protocol is used. Static routing is when every remote route is entered manually by an
administrator into every router in the network topology.
63. Refer to the exhibit. Which interface will be the exit interface to forward a data packet that has the
destination IP address 172.25.128.244?
R1#
GigabitEthernet0/0
GigabitEthernet0/1
None, the packet will be dropped.
Serial0/0/1
64. Ipv6 route 2001:0DB8::/32 2001:0DB8:3000::1
Which static route is configured here?
Floating static
Recursive static
Directly attached static
Fully specified static
Explain: The Router has to look up in the routing table twice to find the exit interface. The first is shown in
the Question now the router has to lookup what interface ex.s0/0/0 that the 3000::1 address is associated with.
route table ex. 2001:0DB8:3000::1 is directly connected, Serial0/0/0. This is the 2nd lookup in the table to
find out that the packet needs to exit the s0/0/0 interface making the first route a recursive and 2nd route a
direct.