CNS Netacad Final Exam.pdf
Document Details

Uploaded by CongratulatorySocialRealism
Tags
Full Transcript
REPUBLIC OF THE PHILIPPINES POLYTECHNIC UNIVERSITY OF THE PHILIPPINES STA. MESA, MANILA COLLEGE OF ENGINEERING COMPUTER...
REPUBLIC OF THE PHILIPPINES POLYTECHNIC UNIVERSITY OF THE PHILIPPINES STA. MESA, MANILA COLLEGE OF ENGINEERING COMPUTER ENGINEERING DEPARTMENT Which command will start the process to bundle two physical configuration should be made on the switch port that connects to the interfaces to create an EtherChannel group via LACP? router? interface range GigabitEthernet 0/4 – 5 Configure the port as an 802.1q trunk port. Employees are unable to connect to servers on one of the internal A static route has been configured on a router. However, the networks. What should be done or checked? destination network no longer exists. What should an administrator Use the “show ip interface brief” command to see if an interface is do to remove the static route from the routing table? down. Remove the route using the no ip route command. What would be the primary reason an attacker would launch a MAC What is the effect of entering the show ip dhcp snooping binding address overflow attack? configuration command on a switch? so that the attacker can see frames that are destined for other hosts It displays the IP-to-MAC address associations for switch interfaces. What network attack seeks to create a DoS for clients by preventing What protocol or technology disables redundant paths to eliminate them from being able to obtain a DHCP lease? Layer 2 loops? DHCP starvation STP How will a router handle static routing differently if Cisco Express Which mitigation technique would prevent rogue servers from Forwarding is disabled? providing false IPv6 configuration parameters to clients? Ethernet multiaccess interfaces will require fully specified static enabling DHCPv6 Guard routes to avoid routing inconsistencies. What protocol should be disabled to help mitigate VLAN attacks? DTP Which network attack is mitigated by enabling BPDU guard? rogue switches on a network What else is required when configuring an IPv6 static route using a next-hop link-local address? interface number and type Refer to the exhibit. Which route was configured as a static route to Which option shows a correctly configured IPv4 default static route? a specific network using the next-hop address? ip route 0.0.0.0 0.0.0.0 S0/0/0 S 10.17.2.0/24 [1/0] via 10.16.2.2 Which type of static route is configured with a greater administrative Compared with dynamic routes, what are two advantages of using distance to provide a backup route to a route learned from a dynamic static routes on a router? (Choose two.) routing protocol? They improve network security. floating static route They use fewer router resources. Refer to the exhibit. After attempting to enter the configuration that is shown in router RTA, an administrator receives an error and users on VLAN 20 report that they are unable to reach users on VLAN 30. What is causing the problem? RTA is using the same subnet for VLAN 20 and VLAN 30. Which command will create a static route on R2 in order to reach PC B? A network administrator is using the router-on-a-stick model to R2(config)# ip route 172.16.2.0 255.255.255.0 172.16.3.1 configure a switch and a router for inter-VLAN routing. What Computer Networks and Security Netacad Final Exam Page 1 of 7 REPUBLIC OF THE PHILIPPINES POLYTECHNIC UNIVERSITY OF THE PHILIPPINES STA. MESA, MANILA COLLEGE OF ENGINEERING COMPUTER ENGINEERING DEPARTMENT To obtain an overview of the spanning tree status of a switched on the multiple access points will make sure that the wireless network, a network engineer issues the show spanning-tree channels are not overlapping? command on a switch. Which two items of information will this channels 1, 6, and 11 command display? (Choose two.) The root bridge BID. A network engineer is troubleshooting a newly deployed wireless The role of the ports in all VLANs. network that is using the latest 802.11 standards. When users access high bandwidth services such as streaming video, the wireless network performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve the wireless network performance for that type of service? The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia. A new Layer 3 switch is connected to a router and is being configured for interVLAN routing. What are three of the five steps required for the configuration? (Choose three.) creating SVI interfaces enabling IP routing assigning ports to VLANs Match the forwarding characteristic to its type. (Not all options are Refer to the exhibit. Which trunk link will not forward any traffic used.) after the root bridge election process is complete? Trunk2 A network administrator is preparing the implementation of Rapid PVST+ on a production network. How are the Rapid PVST+ link types determined on the switch interfaces? Link types are determined automatically. Refer to the exhibit. A network administrator is configuring the router R1 for IPv6 address assignment. Based on the partial Which statement describes a result after multiple Cisco LAN configuration, which IPv6 global unicast address assignment switches are interconnected? scheme does the administrator intend to implement? The broadcast domain expands to all switches. stateful Select the three PAgP channel establishment modes. (Choose three.) auto desirable on A company is deploying a wireless network in the distribution facility in a Boston suburb. The warehouse is quite large and it requires multiple access points to be used. Because some of the company devices still operate at 2.4GHz, the network administrator decides to deploy the 802.11g standard. Which channel assignments Computer Networks and Security Netacad Final Exam Page 2 of 7 REPUBLIC OF THE PHILIPPINES POLYTECHNIC UNIVERSITY OF THE PHILIPPINES STA. MESA, MANILA COLLEGE OF ENGINEERING COMPUTER ENGINEERING DEPARTMENT Refer to the exhibit. Consider that the main power has just been restored. PC3 issues a broadcast IPv4 DHCP request. To which port Refer to the exhibit. What are the possible port roles for ports A, B, will SW1 forward this request? C, and D in this RSTP-enabled network? to Fa0/1, Fa0/2, and Fa0/3 only alternate, designated, root, root Match the DHCP message types to the order of the DHCPv4 process. (Not all options are used.) Refer to the exhibit. A network administrator is configuring inter- VLAN routing on a network. For now, only one VLAN is being used, but more will be added soon. What is the missing parameter that is shown as the highlighted question mark in the graphic? It identifies the VLAN number. Which wireless encryption method is the most secure? WPA2 with AES Match the description to the correct VLAN type. (Not all options are used.) Computer Networks and Security Netacad Final Exam Page 3 of 7 REPUBLIC OF THE PHILIPPINES POLYTECHNIC UNIVERSITY OF THE PHILIPPINES STA. MESA, MANILA COLLEGE OF ENGINEERING COMPUTER ENGINEERING DEPARTMENT 192.168.0.36 network link should serve as a backup when the OSPF link goes down. The floating static route command ip route 0.0.0.0 0.0.0.0 S0/0/1 100 was issued on R1 and now traffic is using the backup link even when the OSPF link is up and functioning. Which change should be made to the static route command so that traffic will only use the OSPF link when it is up? Change the administrative distance to 120. Refer to the exhibit. Which destination MAC address is used when frames are sent from the workstation to the default gateway? MAC address of the virtual router What are three techniques for mitigating VLAN attacks? (Choose three.) Refer to the exhibit. How is a frame sent from PCA forwarded to Enable trunking manually. PCC if the MAC address table on switch SW1 is empty? Disable DTP. SW1 floods the frame on all ports on SW1, excluding the port Set the native VLAN to an unused VLAN. through which the frame entered the switch. Match the link state to the interface and protocol status. (Not all After a host has generated an IPv6 address by using the DHCPv6 or options are used.) SLAAC process, how does the host verify that the address is unique and therefore usable? The host sends an ICMPv6 neighbor solicitation message to the DHCP or SLAAC-learned address and if no neighbor advertisement is returned, the address is considered unique. Refer to the exhibit. Router R1 has an OSPF neighbor relationship with the ISP router over the 192.168.0.32 network. The Computer Networks and Security Netacad Final Exam Page 4 of 7 REPUBLIC OF THE PHILIPPINES POLYTECHNIC UNIVERSITY OF THE PHILIPPINES STA. MESA, MANILA COLLEGE OF ENGINEERING COMPUTER ENGINEERING DEPARTMENT What is a secure configuration option for remote access to a network Refer to the exhibit. A network administrator has connected two device? switches together using EtherChannel technology. If STP is running, Configure SSH. what will be the end result? STP will block one of the redundant links. An administrator is trying to remove configurations from a switch. After using the command erase startup-config and reloading the switch, the administrator finds that VLANs 10 and 100 still exist on the switch. Why were these VLANs not removed? Because these VLANs are stored in a file that is called vlan.dat that is located in flash memory, this file must be manually deleted. Refer to the exhibit. Host A has sent a packet to host B. What will be the source MAC and IP addresses on the packet when it arrives at host B? Source MAC: 00E0.FE91.7799 Source IP: 10.1.1.10 What two default wireless router settings can affect network security? (Choose two.) The SSID is broadcast. A well-known administrator password is set. A network administrator is adding a new WLAN on a Cisco 3500 series WLC. Which tab should the administrator use to create a new VLAN interface to be used for the new WLAN? CONTROLLER Refer to the exhibit. Which static route would an IT technician enter On a Cisco 3504 WLC Summary page ( Advanced > Summary ), to create a backup route to the 172.16.1.0 network that is only used which tab allows a network administrator to configure a particular if the primary RIP learned route fails? WLAN with a WPA2 policy? ip route 172.16.1.0 255.255.255.0 s0/0/0 121 WLANs After attaching four PCs to the switch ports, configuring the SSID A technician is troubleshooting a slow WLAN and decides to use and setting authentication properties for a small office network, a the split-the-traffic approach. Which two parameters would have to technician successfully tests the connectivity of all PCs that are be configured to do this? (Choose two.) connected to the switch and WLAN. A firewall is then configured Configure the 5 GHz band for streaming multimedia and time on the device prior to connecting it to the Internet. What type of sensitive traffic. network device includes all of the described features? Configure the 2.4 GHz band for basic internet traffic that is not time wireless router sensitive. Match the step to each switch boot sequence description. (Not all options are used.) Computer Networks and Security Netacad Final Exam Page 5 of 7 REPUBLIC OF THE PHILIPPINES POLYTECHNIC UNIVERSITY OF THE PHILIPPINES STA. MESA, MANILA COLLEGE OF ENGINEERING COMPUTER ENGINEERING DEPARTMENT Refer to the exhibit. Based on the exhibited configuration and output, why is VLAN 99 missing? because VLAN 99 has not yet been created What action takes place when a frame entering a switch has a unicast destination MAC address appearing in the MAC address table? The switch forwards the frame out of the specified port. What action does a DHCPv4 client take if it receives more than one DHCPOFFER from multiple DHCP servers? It sends a DHCPREQUEST that identifies which lease offer the client is accepting. Refer to the exhibit. What can be concluded about the configuration Refer to the exhibit. The network administrator configures both shown on R1? switches as displayed. However, host C is unable to ping host D and R1 is configured as a DHCPv4 relay agent. host E is unable to ping host F. What action should the administrator take to enable this communication? Configure either trunk port in the dynamic desirable mode. Which three pairs of trunking modes will establish a functional trunk link between two Cisco switches? (Choose three.) dynamic desirable – dynamic desirable dynamic desirable – trunk dynamic desirable – dynamic auto Refer to the exhibit. A network administrator has added a new subnet to the network and needs hosts on that subnet to receive IPv4 addresses from the DHCPv4 server. What two commands will allow hosts on the new subnet to receive addresses from the DHCP4 server? (Choose two.) Computer Networks and Security Netacad Final Exam Page 6 of 7 REPUBLIC OF THE PHILIPPINES POLYTECHNIC UNIVERSITY OF THE PHILIPPINES STA. MESA, MANILA COLLEGE OF ENGINEERING COMPUTER ENGINEERING DEPARTMENT R1(config)# interface G0/0 R1(config-if)# ip helper-address 10.2.0.250 Match the step number to the sequence of stages that occur during the HSRP failover process. (Not all options are used.) Computer Networks and Security Netacad Final Exam Page 7 of 7