QUESTION 11:
With regards to bridges and switches, which of the following statements are true?
(Choose three)
A. Switches are primarily software based while bridges are hardware based.
B. Both bridges and switches forward Layer 2 broadcasts.
C. Bridges are frequently faster than switches
D. Switches typically have a higher number of ports than bridges.
E. Bridges define broadcast domain while switches define collision domains.
F. Both bridges and switches make forwarding decisions based on Layer 2 addresses.
Explanation:
B, F: Both are layer 2 (data link) devices designed to forward layer 2 broadcasts and multicast addresses.
D: Switches do have more ports than bridges. Bridges normally use two ports to bridge LANs together while switches typically come in 24 or 48 ports.
QUESTION 12:
Which Layer 1 devices can be used to extend the area covered by a single LAN segment? (Select two)
A. Switch
B. Router
C. NIC
D. hub
E. Repeater
F. RJ-45 transceiver
Explanation:
Both hub, Repeater, Router and Switch repeat the packet. But only hub and Repeater do not segment the network. Repeaters and Hubs are contained in layer one of the OSI model (Physical layer) while a switch lies in layer two and a router is in layer 3.
QUESTION 13:
CDP is running between two Certkiller devices. What information is supplied by
CDP? (Select three)
A. Device Identifiers
B. Capabilities list
C. Platform
D. Route identifier
E. Neighbor traffic data
Explanation:
QUESTION 14:
If a host on a network has the address 172.16.45.14/30, what is the address of the subnetwork to which this host belongs?
A. 172.16.45.0
B. 172.16.45.4
C. 172.16.45.8
D. 172.16.45.12
E. 172.16.45.18
Explanation:
The last octet in binary form is 00001110. Only 6 bits of this octet belong to the subnet mask. Hence, the subnetwork is 172.16.45.12.
QUESTION 15:
Two Certkiller devices are connected as shown below:
How many broadcast domains are shown in the graphic assuming only the default VLAN is configured on the switches?
A. One
B. Two
C. Six
D. Twelve
Explanation:
There is only one broadcast domain because switches and hubs do not segment the broadcast domains when only a single VLAN is configured. Only layer 3 devices can segment the broadcast domains, or VLAN-capable switches where multiple VLANs are configured. By default, all ports in a switch belong to VLAN 1 so in this case the entire network will consist of one large broadcast domain.
QUESTION 16:
Exhibit:
Study the Exhibit carefully. What switch functionality will prevent Layer 2 broadcasts from moving between the networks shown?
A. VLA.N
B. STP
C. ISL
D. VTP
Explanation:
Broadcasts occur in every protocol, but how often they occur depends upon three things:
1. The type of protocol
2. The application(s) running on the internetwork
3. How these services are used Since switches have become more cost-effective lately, many companies are replacing their flat hub networks with a pure switched network and VLAN environment. All devices in a VLAN are members of the same broadcast domain and receive all broadcasts. The broadcasts, by default, are filtered from all ports on a switch that are not members of the same VLAN. This is great because it offers all the benefits you gain with a switched design without the serious anguish you would experience if all your users were in the same broadcast domain!
QUESTION 17:
The Certkiller network is shown in the following exhibit:
Accounting1, CEO, Mgr1, and Mgr2 workstations should be the only computers with access to the Payroll Server. What two technologies should be implemented to help prevent unauthorized access to the server? (Choose two.)
A. Access lists
B. Encrypted router passwords
C. STP
D. VLANs
E. VTP
F. Wireless LANs
Explanation:
Layer 2 switched networks are typically designed as flat networks from a broadcast perspective.
Every broadcast packet that is transmitted is seen by every device on the network, regardless of whether the device needs to receive that data or not. By default, routers allow broadcasts only within the originating network, but switches forward broadcasts to all segments. The reason it's called a flat network is because it's one broadcast domain, not because its design is physically flat. VLAN helps to control the broadcast for entire LAN, as well as VLAN helps to implement for Secure LAN design. Access List is another most import security tool in Cisco router, using access list we can allow or deny certain services to certain host or network.
QUESTION 18:
Exhibit:
Refer to the exhibit shown above. What is required to allow communication between host A and host B?
A. A CSU/DSU connected to the switches with crossover cables
B. A router connected to the switches with straight-through cables
C. A router connected to the switches with crossover cables
D. A straight-through cable only
E. A crossover cable only
Explanation:
There are two different VLANs in the figure so we will require a router to make inter-VLAN communication. In addition, the switch should connect with the router using the straight-through cable to router for the trunk. Straight-through cable is used to connect two different devices like, switch to router, host to switch. Since we need to insert a router for communication between the two switches, straight through cables will be used between the switches and the router.
QUESTION 19:
The Certkiller network is shown in the following exhibit:
A. Switch CK2 is the root bridge.
B. Spanning Tree is not running.
C. Host D and Server 1 are in the same network.
D. No collisions can occur in traffic between Host B and Host C.
E. If Fa0/0 is down on Router 1, Host A cannot access Server 1.
F. If Fa0/1 is down on Switch 3, Host C cannot access Server 2.
Explanation:
A VLAN is a group of hosts with a common set of requirements that communicate as if they were attached to the same wire, regardless of their physical location. A VLAN has the same attributes as a physical LAN, but it allows for end stations to be grouped together even if they are not located on the same LAN segment.
The above diagram is configured with inter-VLAN communication so the router has a great role to make communication between different VLAN. When router's port configured with trunk goes down all host can't communicate with other host in different VLAN.
QUESTION 20:
Refer to the exhibit shown below. What is needed to allow host A to ping host B?
A. a backbone switch connecting the switches with either fiber optic or straight-through cables B. a crossover cable connecting the switches
C. a router connected to the switches with straight-through cables
D. a straight-through cable connecting the switches
E. a CSU/DSU connected to the switches with straight-through cables
Explanation:
Routers are Layers 3 devices used for inter-network communication. In this scenario there are two different networks, so both switches need to connect to a router using straight-through cables.
With regards to bridges and switches, which of the following statements are true?
(Choose three)
A. Switches are primarily software based while bridges are hardware based.
B. Both bridges and switches forward Layer 2 broadcasts.
C. Bridges are frequently faster than switches
D. Switches typically have a higher number of ports than bridges.
E. Bridges define broadcast domain while switches define collision domains.
F. Both bridges and switches make forwarding decisions based on Layer 2 addresses.
Explanation:
B, F: Both are layer 2 (data link) devices designed to forward layer 2 broadcasts and multicast addresses.
D: Switches do have more ports than bridges. Bridges normally use two ports to bridge LANs together while switches typically come in 24 or 48 ports.
QUESTION 12:
Which Layer 1 devices can be used to extend the area covered by a single LAN segment? (Select two)
A. Switch
B. Router
C. NIC
D. hub
E. Repeater
F. RJ-45 transceiver
Explanation:
Both hub, Repeater, Router and Switch repeat the packet. But only hub and Repeater do not segment the network. Repeaters and Hubs are contained in layer one of the OSI model (Physical layer) while a switch lies in layer two and a router is in layer 3.
QUESTION 13:
CDP is running between two Certkiller devices. What information is supplied by
CDP? (Select three)
A. Device Identifiers
B. Capabilities list
C. Platform
D. Route identifier
E. Neighbor traffic data
Explanation:
QUESTION 14:
If a host on a network has the address 172.16.45.14/30, what is the address of the subnetwork to which this host belongs?
A. 172.16.45.0
B. 172.16.45.4
C. 172.16.45.8
D. 172.16.45.12
E. 172.16.45.18
Explanation:
The last octet in binary form is 00001110. Only 6 bits of this octet belong to the subnet mask. Hence, the subnetwork is 172.16.45.12.
QUESTION 15:
Two Certkiller devices are connected as shown below:
How many broadcast domains are shown in the graphic assuming only the default VLAN is configured on the switches?
A. One
B. Two
C. Six
D. Twelve
Explanation:
There is only one broadcast domain because switches and hubs do not segment the broadcast domains when only a single VLAN is configured. Only layer 3 devices can segment the broadcast domains, or VLAN-capable switches where multiple VLANs are configured. By default, all ports in a switch belong to VLAN 1 so in this case the entire network will consist of one large broadcast domain.
QUESTION 16:
Exhibit:
Study the Exhibit carefully. What switch functionality will prevent Layer 2 broadcasts from moving between the networks shown?
A. VLA.N
B. STP
C. ISL
D. VTP
Explanation:
Broadcasts occur in every protocol, but how often they occur depends upon three things:
1. The type of protocol
2. The application(s) running on the internetwork
3. How these services are used Since switches have become more cost-effective lately, many companies are replacing their flat hub networks with a pure switched network and VLAN environment. All devices in a VLAN are members of the same broadcast domain and receive all broadcasts. The broadcasts, by default, are filtered from all ports on a switch that are not members of the same VLAN. This is great because it offers all the benefits you gain with a switched design without the serious anguish you would experience if all your users were in the same broadcast domain!
QUESTION 17:
The Certkiller network is shown in the following exhibit:
Accounting1, CEO, Mgr1, and Mgr2 workstations should be the only computers with access to the Payroll Server. What two technologies should be implemented to help prevent unauthorized access to the server? (Choose two.)
A. Access lists
B. Encrypted router passwords
C. STP
D. VLANs
E. VTP
F. Wireless LANs
Explanation:
Layer 2 switched networks are typically designed as flat networks from a broadcast perspective.
Every broadcast packet that is transmitted is seen by every device on the network, regardless of whether the device needs to receive that data or not. By default, routers allow broadcasts only within the originating network, but switches forward broadcasts to all segments. The reason it's called a flat network is because it's one broadcast domain, not because its design is physically flat. VLAN helps to control the broadcast for entire LAN, as well as VLAN helps to implement for Secure LAN design. Access List is another most import security tool in Cisco router, using access list we can allow or deny certain services to certain host or network.
QUESTION 18:
Exhibit:
Refer to the exhibit shown above. What is required to allow communication between host A and host B?
A. A CSU/DSU connected to the switches with crossover cables
B. A router connected to the switches with straight-through cables
C. A router connected to the switches with crossover cables
D. A straight-through cable only
E. A crossover cable only
Explanation:
There are two different VLANs in the figure so we will require a router to make inter-VLAN communication. In addition, the switch should connect with the router using the straight-through cable to router for the trunk. Straight-through cable is used to connect two different devices like, switch to router, host to switch. Since we need to insert a router for communication between the two switches, straight through cables will be used between the switches and the router.
QUESTION 19:
The Certkiller network is shown in the following exhibit:
A. Switch CK2 is the root bridge.
B. Spanning Tree is not running.
C. Host D and Server 1 are in the same network.
D. No collisions can occur in traffic between Host B and Host C.
E. If Fa0/0 is down on Router 1, Host A cannot access Server 1.
F. If Fa0/1 is down on Switch 3, Host C cannot access Server 2.
Explanation:
A VLAN is a group of hosts with a common set of requirements that communicate as if they were attached to the same wire, regardless of their physical location. A VLAN has the same attributes as a physical LAN, but it allows for end stations to be grouped together even if they are not located on the same LAN segment.
The above diagram is configured with inter-VLAN communication so the router has a great role to make communication between different VLAN. When router's port configured with trunk goes down all host can't communicate with other host in different VLAN.
QUESTION 20:
Refer to the exhibit shown below. What is needed to allow host A to ping host B?
A. a backbone switch connecting the switches with either fiber optic or straight-through cables B. a crossover cable connecting the switches
C. a router connected to the switches with straight-through cables
D. a straight-through cable connecting the switches
E. a CSU/DSU connected to the switches with straight-through cables
Explanation:
Routers are Layers 3 devices used for inter-network communication. In this scenario there are two different networks, so both switches need to connect to a router using straight-through cables.
0 ความคิดเห็น:
Subscribe to:
Post Comments (Atom)