logo image

BOIIIII

Competes with normal network traffic for bandwidth.
Uses a dedicated communication channel.
Must be encrypted to protect communications from sniffing.
Does not compete with normal network traffic for bandwidth.
Affected by network outages.
In-band management
Out-of-band management
In-band management

Out-of-band management

In-band management

Commonly sold at retail stores.
Provide port security features.
Support VLANs.
Provide very few configuration options.
Can be configured over a network connection.
Can be configured over a dedicated communication channel.
Unmanaged switch
Managed switch
Managed switch
Unmanaged switch
Managed switch.
Managed switch.
Which of the following configuration values would prevent PuTTY from connecting? (Select two.)
4600 baud
Flow control = RTS/CTS
Controls the ability to log on through a LAN or WAN interface configured on the device.
Controls the ability to switch configuration modes.
Controls the ability to connect to the device using a direct connection.
VTY

EXEC
Console

Which of the following statements is true about access via a Telnet or SSH session?
Access is denied.
Which command would you use on a switch to enable management from a remote network?
ip default-gateway 192.168.10.185
What does the ip address dhcp command allow you to do?
Configures the switch to obtain an IP address from a DHCP server.
Will this configuration work?
No, the no shutdown command needs to be entered.
Enter global configuration mode.
Enter interface configuration mode.
Set the speed of the interface.
Set the duplex setting for the interface.
conf t
int fa0/1
speed auto
duplex auto
Enter global configuration mode.
Enter interface configuration mode.
Disable the interface.
Verify the interface is disabled.
conf t
int fa0/0
shutdown
show ip interface brief
Enter global configuration mode.
Enter interface configuration mode.
Enable the interface.
Verify the interface is disabled.
conf t
int fa0/0
no shut
show interface status
What will the switch do with the frame?
Send it out all ports except for the port it was received on.
Which of the following are reasons to configure VLANs on a switch as opposed to using switches without VLANs? (Select two.)
Increased security
Increased number of broadcast domains
Which of the following benefits apply only to creating VLANs with switches and not to segmenting the network with regular switches?
You can create multiple broadcast domains.
How many broadcast domains are there in the network shown? http://i.imgur.com/wmOfVie.png
2
Which of the following statements describe how VLANs affect broadcast traffic within an internetwork? (Select two.)
Devices on the same VLAN have the same subnet address.
Broadcast traffic is transmitted only within a VLAN.
Which of the following are true regarding using multiple VLANs on a single switch? (Select two.)
The number of broadcast domains increases.
The number of collision domains remains the same.
Which of the following best describes the composition of the frame as it travels from A to B?
Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B.
Which of the following statements accurately describes a VLAN ID?
Switches append a VLAN ID to the header of each frame to identify the virtual network to which it belongs.
A virtual LAN can be created using which of the following?
Switch
Which of the following devices should you choose?
Switch
Which of the following best describes the concept of a VLAN?
Devices on the same network logically grouped as if they were on the same network.
When configuring VLANs on a switch, what is used to identify VLAN membership of a device?
Switch port
What should you configure so that the two devices can communicate?
Routing
Which of the following technologies should you use to logically isolate the networks?
VLANs
Which feature allows the switches to pass VLAN traffic between the switches?
Trunking
What should you configure to allow communication between these two devices through the switches?
Trunking
When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch?
Trunk ports
When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch?
Trunk ports
Which of the following features dynamically places switch ports in blocking or forwarding states?
Spanning tree
Which feature should your switch support?
Spanning tree
What problem does the Spanning Tree Protocol prevent?
Switching loops from developing when redundant paths are implemented between switches.
Which of the following are advantages of using the Spanning Tree Protocol (STP) in network segmented bridges? (Select three.)
Lets you provide redundancy by using more than one connection between devices, making your network more reliable.
Identifies the optimal path between network devices.
Prevents switching loops from forming.
Which statements accurately describe the port states of both bridges and switches? (Select two.)
Ports in a blocked state still receive BPDUs.
In the learning state, the MAC address table can be populated, but frames are not forwarded.
What state is it in?
Blocking
In what port state are the switches?
Listening
Which of the following best describes what the switch will do? (learning)
It uses the source MAC address and network segment information to build its bridge database, but does not forward the message.
Which of the following best describes what the switch will do? (listening)
It does not record address or segment information. It does not forward the message.
Assuming the default switch configuration, which switch will become the root bridge? http://i.imgur.com/tJ2GOcV.png
B
On which ports would you use the portfast command?
Fa0/1 and Fa0/2
Assuming the default switch configuration, how can you force switch C to become the root bridge?
http://i.imgur.com/7he7snM.png
Configure a priority number of 4096 for switch C.
How can you guarantee that switch C becomes the root bridge? http://i.imgur.com/IdHxhfN.png
Configure switch C with a lower priority value.
Which protocol should you use?
Rapid PVST+
Desirable mode places the port in a negotiating state.
Based on the 802.3ad standard.
Passive mode places the port into a passive negotiating state.
Auto mode places the port into a passive negotiating state.
Active mode places the port int a negotiating state.
Port Aggregation Protocol (PAgP)
Link Aggregation Control Protocol (LACP)
Link Aggregation Control Protocol (LACP)

Link Aggregation Control Protocol (LACP)

Port Aggregation Protocol (PAgP)

Which condition are you most likely to experience on the network?
Collisions
Which feature should you implement?
VLANs
Select the statement that best describes a broadcast storm.
A broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth.
Which of the following solutions would you implement to eliminate switching loops?
Spanning tree
Which feature should your switch support?
Spanning tree
What should you use for this situation?
VLAN
Which feature prevents switching loops and ensures there is only a single active path between any two switches?
Spanning tree
Which of the following conditions is the most likely cause?
Duplex mismatch
Which of the following is the most likely cause of the problem?
Incorrect VLAN assignment
Which of the following will help reduce the effects of a broadcast storm?
Enable spanning tree on the switches
Which of the following solutions would you implement to eliminate switching loops?
Spanning tree
What could be causing this to happen?
The workstation’s network board is jabbering.
Given that it is a Cisco switch, which commands can be used on the switch to show a list of all switch ports and their current settings? (Select two.)
show running-config interface
show interface

Need essay sample on "BOIIIII"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy