Quizzes
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
›
Computer
Switch 26-50
25 Questions
|
By Jordbluenose | Updated: Mar 21, 2022
| Attempts: 407
Share
Quiz
Flashcard
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 26
🏆
Rank #--
▾
0 %
0/100
Score
0/100
1.
Which dhcp option can be configured to ensure that the IP address of the TFTP server is provided to an IP phone?
Option 43
Option 150
Option 69
Option 70
Submit
Start Quiz
About This Quiz
.
2.
What first name or nickname would you like us to use?
You may optionally provide this to label your report, leaderboard, or certificate.
2.
Refer to the exhibit. What is the problem between the connection on Switch1 and Switch2?
Native VLAN mismatch
Encapsulation mismatch
Switchport mode mismatch
VTP mismatch
DTP mismatch
Hardware failure
Submit
3.
Refer to the exhibit. What additional configuration is required in order for users in VLAN 10 to communicate with the users in VLAN 20?
Configure interface Fa0/1 on SW1 as a trunk.
Remove the subinterfaces on R1 and configure interface Fa0/0 as a trunk.
Configure interfaces Fa0/2 and Fa0/3 on SW1 as trunk links.
Configure VLAN 100 as a data VLAN and VLAN 1 as the native VLAN.
Submit
4.
When a port security violation occurs on a switch port, the switch sends a syslog message but does not shut down the port. What port security mode is in effect?
Sticky
Shutdown
Restrict
Protect
Submit
5.
A bridging loop occurs in a network and disrupts user connectivity. What action should be taken by a network administrator to restore connectivity?
Disable ports that should be in the blocking state.
Disable ports that should be in the forwarding state.
Disable and re-enable all ports on the distribution switches.
Disable all ports on the distribution switches and replace with new switches.
Submit
6.
What must be understood about the VRRP master when troubleshooting the Virtual Router Redundancy Protocol (VRRP)?
The master has the lowest VRRP priority
The master has the lowest real IP address.
The master is not aware of the backup router
The preempt option must be enabled on the master.
Submit
7.
Which STP enhancement should be configured in the network to prevent a nondesignated port to transition to a forwarding state when a topology change occurs?
Root guard should be implemented on the Layer 2 ports between the distribution switches.
PortFast should be implemented on the uplink ports from the access switches to the distribution switches.
Loop guard should be implemented on the Layer 2 ports between DSW1 and DSW2 and on the uplink ports from...
Loop guard should be implemented on the Layer 2 ports between DSW1 and DSW2 and on the uplink ports from the access switches tothe distribution switches.
BPDU guard should be implemented on the Layer 2 ports between DSW1 and DSW2 and on the uplink ports from...
BPDU guard should be implemented on the Layer 2 ports between DSW1 and DSW2 and on the uplink ports from the access switchesto the distribution switches.
Submit
8.
Refer to the exhibit. What configuration will be required on the DSW switch in order to perform inter-VLAN routing for all VLANs that are configured on the access switches?
Configure the routing protocol.
Configure SVI for each VLAN in the network.
Configure the links between DSW and the access switches as access links.
Configure as routed ports the DSW interfaces that face the access switches.
Submit
9.
Which three parameters must be configured in order to enable SSH? (Choose three.)
Retries
Hostname
Timeouts
Domain name
Keys
Routing protocol
Submit
10.
The company's switch network was updated to use VTP Version 3 for VLANs a week ago, and everything seemed to be working fine. Yesterday you were asked to deploy two new VLANs to support new environmental control systems being installed in the building. You configured VLAN 1433 and VLAN 500 on the primary server and left the port-assignments to junior admins as the systems were installed. Today one of the admins reported that they were unable to assign any interfaces on switch XFL1778 to VLAN 1433, and that the switch was reporting that the VLAN does not exist. After further investigation, they reported that they were able to assign an interface on XFL1778 to VLAN 500 with no issues. What is the most likely problem?
Switch XFL1778 never got upgraded to VTP version 3
Switch XFL1778 has the wrong VTP password
Switch XFL1778 needs to be in transparent mode to support extended range VLANs
Switch XFL1778 probably does not support extended range VLANs
Submit
11.
Refer to the exhibit. What is the result of the displayed configuration on switches ASW1 and ASW2?
BPDU guard puts an interface that is configured for STP PortFast in the err-disable state upon receipt of a BPDU.
BPDU guard overrides the PortFast configuration and reverts to the default spanning tree configuration on the access ports.
BPDU guard forces the uplink ports on ASW1 and ASW2 to become designated ports to prevent DSW2 from becoming a...
BPDU guard forces the uplink ports on ASW1 and ASW2 to become designated ports to prevent DSW2 from becoming a root switch.
BPDU guard places the uplink ports on a ASW1 and ASW2 into the STP loop-inconsistent blocking state when the ports...
BPDU guard places the uplink ports on a ASW1 and ASW2 into the STP loop-inconsistent blocking state when the ports stop receivingBPDUs.
Submit
12.
What are two benefits of local VLANs in the Enterprise Campus Network? (Choose two.)
Wide coverage because of the fact that a VLAN can be geographically dispersed throughout the network
Finite failure domain because VLANs are local to a switch block
High availability because redundant paths exist at all infrastructure levels
Broad expansion domain because the number of devices on each VLAN can easily be added to
IP address conservation because address blocks can be allocated to VLANs
Submit
13.
Refer to the exhibit. What two conclusions can be made based on the output? (Choose two.)
Interfaces Fa0/1 through Fa0/6 are trunk ports.
Switch DLS1 is not the root bridge for VLAN 1.
The Cost column in the lower part of the exhibit is not the cumulative root path cost
The default spanning-tree timers have been adjusted.
That Fa0/12 is displaying the alternate port role indicates that PVRST+ is enabled.
Submit
14.
Refer to the exhibit. The indicated configuration was established on the HSRP standby router RTB. However, the console message %IP-4-DUPADDR started appearing almost immediately on the RTB router. Given the output of the show standby brief command on RTA, what is the cause of the problem?
The command standby preempt should only be applied on the active router.
The subnet mask is missing from the standby ip 10.1.1.1 command.
The group number 50 is missing in the Router RTB configuration commands.
The priority number 150 is missing in the Router RTB configuration commands.
The virtual IP address should be the same as the active router.
The ports on the switch must be configured with the spanning-tree PortFast feature.
Submit
15.
Which three statements about RSTP edge ports are true? (Choose three.)
Edge ports function similarly to UplinkFast ports.
Edge ports should never connect to another switch.
If an edge port receives a BPDU, it becomes a normal spanning-tree port.
Edge ports immediately transition to learning mode and then forwarding mode when enabled
Edge ports never generate topology change notifications (TCNs) when the port transitions to a disabled or enabled status.
Edge ports can have another switch connected to them as long as the link is operating in full duplex.
Submit
16.
What is the most common method of configuring inter-VLAN routing on a Layer 3 switch?
Configure the switch physical interface so that the router will have an interface in each VLAN.
For each VLAN, configure trunking between the router and the switch.
Configure a routing protocol on the Layer 3 switch to include each interface.
Configure switch virtual interfaces. The result is that the router will have a virtual interface in each VLAN.
Submit
17.
Refer to the exhibit. What statement is true about the way HSRP is configured?
Switch DLS1 is the standby router for VLANs 1,10, and 20.
Switch DLS2 is the standby router for VLANs 30 and 40
Issuing the show standby command on switch DSL1 will reveal that the HSRP state for VLAN 10 is standby.
Issuing the show standby command on switch DSL2 will reveal that the HSRP state for VLAN 30 is standby.
By setting different priorities on different VLANs, a type of load balancing is occurring.
If the Ethernet cables between switch DLS2 and switch ALS1 were severed, Payroll Host would not be able to reach...
If the Ethernet cables between switch DLS2 and switch ALS1 were severed, Payroll Host would not be able to reach SQL Server.
Submit
18.
What three features are provided by IEEE 802.1Q trunking? (Choose three.)
Security
Resilience
QoS support
Multivendor support
Relatively small frame overhead
Multicast support
Submit
19.
Which VTP mode is exclusive to VTP version 3?
Server
Client
Transparent
Off
Submit
20.
Refer to the exhibit. What happens if interface gigabitEthernet 5/1 on SwitchA stops receiving UDLD packets? (Choose two.)
UDLD stops trying to establish a connection with the neighbor
UDLD changes the port state to err-disable.
UDLD changes the port to loop-inconsistent blocking state.
UDLD sends messages to its neighbor at a rate of one per second to attempt to recover the connection.
Submit
21.
Which three actions can cause problems with a VTP implementation? (Choose three.)
Using a non-trunk link to connect switches
Using non-Cisco switches
Configuring all switches to be in VTP server mode
Not using any VTP passwords on any switches
Using lowercase on one switch and uppercase on another switch for domain names
Having a VTP transparent switch in between a VTP server switch and a VTP client switch (all switches in the...
Having a VTP transparent switch in between a VTP server switch and a VTP client switch (all switches in the same VTP domain)
Submit
22.
Refer to the exhibit. What restriction will be presented in a campus enterprise network that is designed with four large distribution building blocks?
The implementation of link aggregation will be limited.
The implementation of IGP routing protocols will be limited.
The implementation of EtherChannels on redundant links will exceed the bandwidth
The implementation of scalability that is required during future growth will be limited.
Submit
23.
Which two items are recommended when mapping local VLANs in an Campus Enterprise Architecture? (Choose two.)
Associate a VLAN to each building.
Associate a VLAN to each department.
Associate a VLAN to each subnet.
Configure routing between VLANs at the access layer.
Configure routing between VLANs at the distribution layer.
Configure routing between VLANs at the core layer.
Submit
24.
Which two statements are true about the default operation of STP in a Layer 2 switched environment that has redundant connections between switches? (Choose two.)
The root switch is the switch with the highest speed ports.
Decisions on which port to block when two ports have equal cost depend on the port priority and index.
All trunking ports are designated and not blocked.
Root switches have all ports set as root ports.
Nonroot switches each have only one root port.
Submit
25.
Which three actions are permitted with a VLAN access control list (VACL)? (Choose three.)
Drop
Permit
Capture
Suspend
Restrict
Redirect
Submit
×
Thank you for your feedback!
View My Results
Related Quizzes
Tablet Quiz: What Tablet Should I Buy Quiz
Tablet Quiz: What Tablet Should I Buy Quiz
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (25)
Unanswered (
)
Answered (
)
Which dhcp option can be configured to ensure that the IP address of...
Refer to the exhibit. What is the problem between the connection on...
Refer to the exhibit. What additional configuration is required in...
When a port security violation occurs on a switch port, the switch...
A bridging loop occurs in a network and disrupts user connectivity....
What must be understood about the VRRP master when troubleshooting the...
Which STP enhancement should be configured in the network to prevent a...
Refer to the exhibit. What configuration will be required on the DSW...
Which three parameters must be configured in order to enable SSH?...
The company's switch network was updated to use VTP Version 3 for...
Refer to the exhibit. What is the result of the displayed...
What are two benefits of local VLANs in the Enterprise Campus Network?...
Refer to the exhibit. What two conclusions can be made based on the...
Refer to the exhibit. The indicated configuration was established on...
Which three statements about RSTP edge ports are true? (Choose three.)
What is the most common method of configuring inter-VLAN routing on a...
Refer to the exhibit. What statement is true about the way HSRP is...
What three features are provided by IEEE 802.1Q trunking? (Choose...
Which VTP mode is exclusive to VTP version 3?
Refer to the exhibit. What happens if interface gigabitEthernet 5/1 on...
Which three actions can cause problems with a VTP implementation?...
Refer to the exhibit. What restriction will be presented in a campus...
Which two items are recommended when mapping local VLANs in an Campus...
Which two statements are true about the default operation of STP in a...
Which three actions are permitted with a VLAN access control list...
X
OK
X
OK
Cancel
X
OK
Cancel
Your Rank: #-- / --
Leaderboard
✕