62. Refer to the exhibit. A network administrator needs to add IP...
4. Refer to the exhibit. A network administrator has segmented the...
94. An administrator is troubleshooting a PC on the network which is...
8. Which parameter is used to uniquely identify one wireless network...
9. Which value determines if a switch becomes the central point of...
116. Which value determines if a switch becomes the central point of...
117. An administrator is troubleshooting a PC on the network which is...
127. Refer to the exhibit. A new switch, SW3, has been added to the...
24. Why is MAC address filtering considered a poor choice in securing...
131. Which type of traffic can still be received on a switch interface...
141. A network technician is attempting to configure 802.1q trunking...
66. Refer to the exhibit. Router RA receives a packet with a source...
113. Which parameter is used to uniquely identify one wireless network...
121. Refer to the exhibit. A network administrator needs to add IP...
126. Refer to the exhibit. What is the maximum number of VLANs that...
138. Refer to the exhibit. Switch SWB is not responding to VTP updates...
82. What information in an Ethernet frame is used by a Layer 2 switch...
103. Refer to the exhibit. What would happen if the network...
59. Which value determines if a switch becomes the central point of...
129. Why is MAC address filtering considered a poor choice in securing...
11. Refer to the exhibit. A network administrator needs to add IP...
133. Why is it advisable that a network administrator use SSH instead...
68. What is the purpose of the Spanning Tree algorithm?
5. Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt...
34. A network technician is attempting to configure 802.1q trunking on...
10. An administrator is troubleshooting a PC on the network which is...
53. Refer to the exhibit. What will allow a host on VLAN 40 on switch...
125. Refer to the exhibit. A network administrator has segmented the...
...
143. Refer to the exhibit. A technician is troubleshooting a trunk...
84. Refer to the exhibit. Switch SWB is not responding to VTP updates...
98. Which configuration changes will increment the configuration...
107. Refer to the exhibit. Hosts A and B, connected to hub HB1,...
28. What is the purpose of configuring a switch port as a trunk port?
29. Refer to the exhibit. Which statement is true about the status of...
139. Which IEEE trunking protocol is used to encapsulate data traffic...
142. Refer to the exhibit. Although they are directly connected,...
77. Using the command copy tftp:backup.cfg startup-config, an...
95. Refer to the exhibit. What does "LEARNING" mean as it relates to...
38. Which type of VLAN would accommodate untagged traffic on a 802.1q...
108. In which mode is a VTP switch operating if it has been configured...
50. What information in an Ethernet frame is used by a Layer 2 switch...
78. Refer to the exhibit. Each switch is configured to participate in...
2. Which CLI mode allows users to access all device commands, such as...
81. Why is it advisable that a network administrator use SSH instead...
102. Company policy requires disabling the command history buffer on...
51. Refer to the exhibit. What would happen if the network...
119. What is an efficient and cost effective way to minimize the...
20. Refer to the exhibit. What is the maximum number of VLANs that can...
124. Refer to the exhibit. Router R1 is properly configured for router...
26. Refer to the exhibit. What can be determined from the...
35. Refer to the exhibit. Switch SWA is not processing VTP...
14. What is the purpose of the Spanning Tree algorithm?
56. Which method establishes an administrative connection for...
60. Refer to the exhibit. The Layer 2 switching design that is shown...
75. Refer to the exhibit. A new switch, SW3, has been added to the...
109. Which method establishes an administrative connection for...
55. In which mode is a VTP switch operating if it has been configured...
123. Refer to the exhibit. What does the term DYNAMIC indicate in the...
32. Refer to the exhibit. What is the effect of setting the security...
64. Refer to the exhibit. What does the term DYNAMIC indicate in the...
87. A network administrator enters the enable command at the...
44. Refer to the exhibit. VLAN 20 was recently added on the network....
47. Refer to the exhibit. Router RA receives a packet with a source...
99. Refer to the exhibit. A network administrator has segmented the...
27. Which type of traffic can still be received on a switch interface...
70. Refer to the exhibit. A network administrator has segmented the...
91. Refer to the exhibit. A network administrator is configuring RT1...
7. Which method establishes an administrative connection for...
65. What is the purpose of the switch command switchport access vlan...
3. Refer to the exhibit. Which Spanning Tree Protocol version is in...
23. Refer to the exhibit. Each switch is configured to participate in...
61. A network administrator is asked to connect four switches that are...
115. Refer to the exhibit. The hosts connected to switch SW1 are not...
13. Refer to the exhibit. VTP pruning is enabled in the VTP domain...
...
52. Refer to the exhibit. R1 is configured for traditional inter-VLAN...
58. Refer to the exhibit. The hosts connected to switch SW1 are not...
21. Which configuration changes will increment the configuration...
128. What advantage does cut-through switching provide?
67. Refer to the exhibit. A new host needs to be connected to VLAN 3....
18. Refer to the exhibit. An administrator documented the output of a...
22. Using the command copy tftp:backup.cfg startup-config, an...
63. Refer to the exhibit. What happens when a frame from a source MAC...
71. Refer to the exhibit. Users A and B are reporting intermittent...
72. How does a switch that is configured for 802.1Q trunking handle...
74. A wireless LAN access point will convert traffic between which two...
86. What type of message do wireless clients transmit when they are...
39. Company policy requires disabling the command history buffer on...
40. Refer to the exhibit. What does "LEARNING" mean as it relates to...
43. Refer to the exhibit. Users complain that they do not have...
15. In which mode is a VTP switch operating if it does not allow for...
118. What will be the effect of the command S1# copy...
41. Refer to the exhibit. All trunk links are operational and all...
46. Which two operations can be performed from the boot loader command...
106. Refer to the exhibit. Both switches are interconnected via a...
48. Refer to the exhibit. A network administrator enters the displayed...
30. Refer to the exhibit. Switch SWB is not responding to VTP updates...
135. Which switch forwarding method should be used on a network that...
12. What VLANs are allowed across a trunk when the range of allowed...
19. When port security is used on a switch, which violation mode will...
31. Which wireless topology supports roaming from one access point to...
130. Refer to the exhibit. The commands are entered into switch SW1 as...
105. Refer to the exhibit. The devices in the network are operational...
83. What are two characteristics of normal range VLANs? (Choose two.)
100. A network administrator issued the erase nvram: command on a...
112. What are two benefits of the IEEE 802.11n standard over the IEEE...
97. What operational change will occur if an 802.11b client associates...
33. Refer to the exhibit. Which two switch interfaces would be RSTP...
136. Refer to the exhibit. The broadcast traffic from PC1 is consuming...
76. Refer to the exhibit. The network consists of four hubs and a...
1. Refer to the exhibit. After entering the commands in the exhibit,...
90. Why is priority configured in 4096 increments when using PVST+?
36. A network administrator is planning the upgrade of an enterprise...
57. Refer to the exhibit. Hosts PC_A and PC_B send traffic...
85. What benefit does 802.1x provide to a wireless network?
16. Which three statements are correct concerning the default...
132. In a three-layer hierarchical network design, which distribution...
42. Refer to the exhibit. Router R1 is connected to a switch through a...
120. Which combination of DTP modes set on adjacent switches will...
69. What are two requirements for configuring inter-VLAN routing using...
37. The global configuration command ip default-gateway...
114. Refer to the exhibit. All hosts are in listen mode. Host 1 and...
79. What is the benefit of the auto-MDIX feature on a Cisco Catalyst...
49. Refer to the exhibit. A network administrator issues the show...
54. Why is it important that the network administrator consider the...
134. Which service should be disabled on a Cisco switch or router to...
104. What identifier in the BPDU creates a unique BID for a switch?
80. Refer to the exhibit. Which two settings show the default value of...
73. While configuring a new switch, a network administrator configures...
89. Which feature is uniquely found in an access layer switch within a...
6. Refer to the exhibit. Which three options correctly identify...
111. Refer to the exhibit. What does "FORWARDING" mean in the command...
144. What allows WLAN clients to learn which networks and access...
145. What technique is a security attack that depletes the pool of IP...
88. Refer to the exhibit. The network administrator needs to remove...
146. Refer to the exhibit. All edge ports are configured with the...
45. Which statement correctly describes an IBSS?
137. Refer to the exhibit. All switch interfaces are members of the...
96. What does TKIP have in common with AES?
140. When an access point is placed near the outside wall of a...
92. What happens when the crypto key zeroize rsa command is entered on...
93. What three tasks should be performed before moving a Catalyst...
101. Refer to the exhibit. The network administrator wants to allow...
110. Which three statements are true regarding router-on-a-stick...
122. Refer to the exhibit. This switch is to be added to the...