Sematec CCNP Quiz

10 Questions

Settings
Sematec CCNP Quiz

These 10 questions will test the most important parts of the lesson. and you will get a lower score of 70, you need to study this lesson. .


Questions and Answers
  • 1. 
    Refer to the exhibit. The indicated configuration was established on the HSRP standby router RTB. However, the console message %IP-4-DUPADDR started appearing almost immediately on the RTB router. Given the output of the show standby brief command on RTA, what is the cause of the problem? 
    • A. 

      The command standby preempt should only be applied on the active router

    • B. 

      The subnet mask is missing from the standby ip 10.1.1.1 command

    • C. 

      The group number 50 is missing in the Router RTB configuration commands.

    • D. 

      The priority number 150 is missing in the Router RTB configuration commands.

    • E. 

      The virtual IP address should be the same as the active router

    • F. 

      The ports on the switch must be configured with the spanning-tree PortFast feature.

  • 2. 
    Which statement correctly explains the process of mitigating ARP attacks on a switch where dynamic ARP inspection (DAI) has been configured? 
    • A. 

      All intercepted packets that come from untrusted ports are dropped.

    • B. 

      All intercepted packets that come from trusted ports are sent to untrusted ports only

    • C. 

      The intercepted packets are verified against the DHCP snooping binding table for valid IP-to-MAC bindings.

    • D. 

      For all intercepted packets, an ARP request is sent to the DHCP server for IP-to-MAC address resolution

  • 3. 
    Refer to the exhibit. What feature does an SNMP manager need to be able to set a parameter on ACSw1?
    • A. 

      A manager who is using an SNMP string of K44p0ut

    • B. 

      A manager who is using an Inform Request MIB

    • C. 

      a manager who is using host 192.168.0.5

    • D. 

      A manager who is using authPriv

  • 4. 
    Which statement is true concerning the core layer within the hierarchical design model?
    • A. 

      Remote users are granted access to the network through the core.

    • B. 

      Routing should be configured without traffic filtering, address translation, or other packet manipulation at the core

    • C. 

      The core, which acts as the front door to a network, is designed to prevent unauthorized users from gaining entry.

    • D. 

      The core provides an optimized and reliable transport structure by using a combination of route summaries, distribution lists, and route maps

  • 5. 
    When a port security violation occurs on a switch port, the switch sends a syslog message but does not shut down the port. What port security mode is in effect?
    • A. 

      Sticky

    • B. 

      Shutdown

    • C. 

      Restrict

    • D. 

      Protect

  • 6. 
    Which three steps are required to configure interfaces as routed ports on a multilayer Catalyst switch? (Choose three.) 
    • A. 

      Enable IP routing globally

    • B. 

      Assign IP addresses to routed ports.

    • C. 

      Configure SVI for each VLAN in the network.

    • D. 

      Configure 802.1 Q encapsulation on routed ports.

    • E. 

      Disable Power over Ethernet (PoE) on the physical Layer 3 interfaces.

    • F. 

      Disable Layer 2 functionality on interfaces that will be configured as routed ports

  • 7. 
    A bridging loop occurs in a network and disrupts user connectivity. What action should be taken by a network administrator to restore connectivity?
    • A. 

      Disable ports that should be in the blocking state.

    • B. 

      Disable ports that should be in the forwarding state.

    • C. 

      Disable and re-enable all ports on the distribution switches.

    • D. 

      Disable all ports on the distribution switches and replace with new switches

  • 8. 
    Which three actions can cause problems with a VTP implementation? (Choose three.)
    • A. 

      Using a non-trunk link to connect switches

    • B. 

      Using non-Cisco switches

    • C. 

      Configuring all switches to be in VTP server mode

    • D. 

      Not using any VTP passwords on any switches

    • E. 

      Using lowercase on one switch and uppercase on another switch for domain names

    • F. 

      having a VTP transparent switch in between a VTP server switch and a VTP client switch (all switches in the same VTP domain)

  • 9. 
    Refer to the exhibit. What two conclusions can be made based on the output? (Choose two.)
    • A. 

      Interfaces Fa0/1 through Fa0/6 are trunk ports.

    • B. 

      Switch DLS1 is not the root bridge for VLAN 1.

    • C. 

      The Cost column in the lower part of the exhibit is not the cumulative root path cost.

    • D. 

      The default spanning-tree timers have been adjusted.

    • E. 

      That Fa0/12 is displaying the alternate port role indicates that PVRST+ is enabled.

  • 10. 
    Which QoS requirement should be taken into account when implementing VoIP in a campus environment? 
    • A. 

      The QoS requirements should accommodate the best effort delivery for voice traffic

    • B. 

      The QoS requirements should accommodate the bursty nature of voice traffic.

    • C. 

      The QoS requirements should accommodate the intensive demand on bandwidth for voice traffic

    • D. 

      The QoS requirements should accommodate the smooth demand on bandwidth, low latency, and delay for voice traffic.