1.
Refer to the exhibit. What two statements can be concluded from the information that is shown in the exhibit? (Choose two.)
Correct Answer(s)
A. All ports that are listed in the exhibit are access ports.
E. A router connected to the switch is needed to forward traffic between the hosts
Explanation
From the information shown in the exhibit, we can conclude that all ports listed are access ports because they are assigned to VLANs. Additionally, a router connected to the switch is needed to forward traffic between the hosts because they are in different VLANs and require routing for communication.
2.
A router is configured to connect to a trunked uplink as shown in the exhibit. A packet is received on the FastEthernet 0/1 physical interface from VLAN 10. The packet destination address is 192.168.1.120. What will the router do with this packet?
Correct Answer
B. The router will forward the packet out of interface FastEthernet 0/1.2 tagged for VLAN 60
Explanation
The router will forward the packet out of interface FastEthernet 0/1.2 tagged for VLAN 60 because the packet's destination address matches the VLAN 60 subnet.
3.
The information contained in a BPDU is used for which two purposes? (Choose two.)
Correct Answer(s)
C. To determine the shortest path to the root bridge
D. To determine which ports will forward frames as part of the spanning tree
Explanation
BPDU (Bridge Protocol Data Unit) is used in spanning tree protocol (STP) to exchange information between switches and prevent loops in a network. The information contained in a BPDU is used to determine the shortest path to the root bridge, which helps in building a loop-free topology. Additionally, the BPDU helps switches determine which ports will forward frames as part of the spanning tree, ensuring that only necessary ports are used for forwarding and preventing unnecessary flooding of frames throughout the network.
4.
A router has two serial interfaces and two Fast Ethernet interfaces. This router must be connected to a WAN link and to a switch that supports four VLANs. How can this be accomplished in the most efficient and cost-effective manner to support inter-VLAN routing between the four VLANs?
Correct Answer
C. Connect a trunked uplink from the switch to one FastEthernet interface on the router and create logical subinterfaces for each VLAN
Explanation
Connecting a trunked uplink from the switch to one FastEthernet interface on the router and creating logical subinterfaces for each VLAN is the most efficient and cost-effective way to support inter-VLAN routing between the four VLANs. This allows multiple VLANs to be carried over a single physical interface, reducing the need for additional interfaces and cables. Logical subinterfaces can be created to separate and route traffic between the VLANs, providing connectivity and communication between them.
5.
When are MAC addresses removed from the CAM table?
Correct Answer
D. After they have been idle for a certain period of time
Explanation
MAC addresses are removed from the CAM table after they have been idle for a certain period of time. The CAM table is responsible for mapping MAC addresses to their corresponding ports on a network switch. When a device sends a frame with its MAC address, the switch updates the CAM table with the MAC address and the port it was received on. If a device does not send any frames for a certain period of time, it is considered idle, and its MAC address is removed from the CAM table to free up space for other devices.
6.
Refer to the exhibit. Switch1 is not participating in the VTP management process with the other switches. Which two are possible reasons for this? (Choose two.)
Correct Answer(s)
C. Switch1 is using VTP version 1 and Switch2 is using VTP version 2
E. Switch1 is in a different management domain
Explanation
Switch1 is not participating in the VTP management process with the other switches because it is using VTP version 1 while Switch2 is using VTP version 2. VTP version 1 and version 2 are not compatible with each other, so they cannot communicate and share VLAN information. Additionally, Switch1 is in a different management domain, which means it is not part of the same VTP domain as the other switches. Therefore, it cannot participate in the VTP management process.
7.
Which three must be used when a router interface is configured for VLAN trunking? (Choose three.)
Correct Answer(s)
A. One subinterface per VLAN
C. One IP network or subnetwork for each subinterface
F. A compatible trunking protocol encapsulation for each subinterface
Explanation
When a router interface is configured for VLAN trunking, three things must be used: one subinterface per VLAN, one IP network or subnetwork for each subinterface, and a compatible trunking protocol encapsulation for each subinterface. These are necessary to ensure that the router can properly communicate with and route traffic between the different VLANs.
8.
Refer to the exhibit. The switches are connected with trunks within the same VTP management domain. Each switch is labeled with its VTP mode. A new VLAN is added to Switch3. This VLAN does not show up on the other switches. What is the reason for this?
VLANs cannot be created on transparent mode switches.
Correct Answer
B. VLANs created on transparent mode switches are not included in VTP advertisements
Explanation
In VTP, transparent mode switches do not participate in VTP advertisements, which means they do not send or receive VTP updates. Therefore, any VLANs created on transparent mode switches will not be included in the VTP advertisements and will not be propagated to other switches in the VTP domain. As a result, the new VLAN added to Switch3 will not show up on the other switches.
9.
Which two criteria are used by STP to select a root bridge? (Choose two.)
Correct Answer(s)
B. Bridge priority
E. Best MAC address
Explanation
STP (Spanning Tree Protocol) uses two criteria to select a root bridge: bridge priority and best MAC address. The bridge priority is a numerical value assigned to each bridge, and the bridge with the lowest priority becomes the root bridge. The best MAC address is used as a tiebreaker when multiple bridges have the same priority. The bridge with the lowest MAC address is selected as the root bridge. These criteria help determine the root bridge in a network and ensure proper spanning tree topology.
10.
Which three steps should be taken before moving a Catalyst switch to a new VTP management domain? (Choose three.)
Correct Answer(s)
B. Reset the VTP counters to allow the switch to synchronize with the other switches in the domain
E. Select the correct VTP mode and version
F. Configure the switch with the name of the new management domain
Explanation
Before moving a Catalyst switch to a new VTP management domain, three steps should be taken. First, the VTP counters should be reset to allow the switch to synchronize with the other switches in the domain. This ensures that the switch receives the latest VTP information from the domain. Second, the correct VTP mode and version should be selected to ensure compatibility with the new domain. Finally, the switch should be configured with the name of the new management domain to identify itself as part of that domain. These steps ensure a smooth transition and proper functioning within the new VTP management domain.
11.
Which two items will prevent broadcasts from being sent throughout the network? (Choose two.)
Correct Answer(s)
B. Routers
D. VLANs
Explanation
Routers and VLANs are the two items that can prevent broadcasts from being sent throughout the network. Routers are used to connect different networks and can control the flow of traffic between them, including preventing broadcasts from being forwarded. VLANs, or Virtual Local Area Networks, are used to divide a physical network into multiple virtual networks, and broadcasts are contained within each VLAN, preventing them from being sent to other VLANs.
12.
Which two characteristics describe a port in the STP blocking state? (Choose two.)
Correct Answer(s)
D. Discards data frames received from the attached segment
E. Receives BPDUs and directs them to the system module
Explanation
A port in the STP blocking state discards data frames received from the attached segment to prevent loops in the network. It also receives Bridge Protocol Data Units (BPDUs) and directs them to the system module for processing and maintaining the Spanning Tree Protocol (STP) topology.
13.
What is the first step in the process of convergence in a spanning tree topology?
Correct Answer
A. Election of the root bridge
Explanation
The first step in the process of convergence in a spanning tree topology is the election of the root bridge. The root bridge is the central point in the network and all other switches in the topology will determine their roles and paths based on the root bridge. By electing the root bridge, the spanning tree protocol establishes a single point of reference for all switches, ensuring a loop-free topology and allowing for efficient communication within the network.
14.
In which STP state does a switch port transmit user data and learn MAC addresses?
Correct Answer
E. Forwarding
Explanation
In the Forwarding state, a switch port is actively transmitting user data and learning MAC addresses. This means that the switch is actively forwarding network traffic and updating its MAC address table by learning the source MAC addresses of incoming frames. The switch is fully operational in this state and is actively participating in network communication.
15.
What is the main purpose of VTP?
Correct Answer
A. Maintaining consistency in VLAN configuration across the network
Explanation
The main purpose of VTP is to maintain consistency in VLAN configuration across the network. VTP allows for easy management and configuration of VLANs by automatically propagating VLAN information to all switches in the network. This ensures that all switches have the same VLAN database, reducing the chances of misconfigurations and inconsistencies.
16.
Which statement best describes adaptive cut-through switching?
Correct Answer
A. The switch initially forwards all traffic using cut-through switching and then changes to store-and-forward switching if errors exceed a threshold value.
Explanation
Adaptive cut-through switching is a switching technique where the switch initially forwards all traffic using cut-through switching, which means it starts transmitting the frame before the entire frame has been received. However, if errors exceed a certain threshold value, the switch changes its switching method to store-and-forward switching. Store-and-forward switching involves receiving the entire frame, checking it for errors, and then forwarding it. This adaptive approach allows for faster transmission under normal conditions, but switches to a more reliable method when errors are detected.
17.
Using STP, how long does it take for a switch port to go from the blocking state to the forwarding state?
Correct Answer
D. 50 seconds
Explanation
The correct answer is 50 seconds. This is because the Spanning Tree Protocol (STP) uses a series of timers to determine the state of switch ports. When a switch port initially comes up, it goes through the blocking state for a period of time to allow the STP to calculate the best path for forwarding. This blocking state typically lasts for 20 seconds. After the blocking state, the port transitions to the listening state for an additional 15 seconds. Finally, it enters the forwarding state, where it actively forwards network traffic. Therefore, the total time for a switch port to go from the blocking state to the forwarding state is 20 seconds + 15 seconds + 15 seconds = 50 seconds.
18.
Refer to the exhibit. The switches are interconnected by trunked links and are configured for VTP as shown. A new VLAN is added to Switch1. Which three actions will occur? (Choose three.)
Correct Answer(s)
B. Switch2 will add the VLAN to its database and pass the update to Switch3
C. Switch3 will pass the VTP update to Switch4
F. Switch4 will not receive the update
Explanation
When a new VLAN is added to Switch1, it will update its VTP database with the new VLAN information. Switch1 will then send a VTP update to Switch2. Switch2 will receive the update and add the new VLAN to its database. It will also pass the update to Switch3. Switch3 will receive the update from Switch2 and add the new VLAN to its database. Switch3 will then pass the VTP update to Switch4. However, Switch4 will not receive the update, so it will not add the new VLAN to its database.
19.
Which Catalyst feature causes a switch port to enter the spanning-tree forwarding state immediately?
Correct Answer
C. Portfast
Explanation
Portfast is a Catalyst feature that allows a switch port to bypass the usual spanning-tree listening and learning states and enter the forwarding state immediately. This feature is useful for ports that are connected to end devices, such as computers or printers, as it reduces the time it takes for the port to become operational and avoids unnecessary delays. By enabling portfast, the switch port can quickly start forwarding traffic, improving network efficiency.
20.
Refer to the exhibit. Which set of commands would be used on the router to provide communication between the two hosts connected to the switch?
Correct Answer
B. Router(config)# interface fastethernet 0/0
Router(config-if)# no shutdown
Router(config-if)# interface fastethernet 0/0.2
Router(config-subif)# encapsulation dot1q 2
Router(config-subif)# ip address 192.168.2.1 255.255.255.0
Router(config-if)# interface fastethernet 0/0.3
Router(config-subif)# encapsulation dot1q 3
Router(config-subif)# ip address 192.168.3.1 255.255.255.0
Explanation
The given set of commands configures the subinterfaces on the router's FastEthernet 0/0 interface with VLAN tagging. The subinterface FastEthernet 0/0.2 is configured with encapsulation dot1q 2 and an IP address of 192.168.2.1, while the subinterface FastEthernet 0/0.3 is configured with encapsulation dot1q 3 and an IP address of 192.168.3.1. This allows communication between the two hosts connected to the switch by assigning them to separate VLANs and providing them with unique IP addresses within their respective VLANs. The "no shutdown" command ensures that the interfaces are enabled.