A medium-sized company has a Class C IP address. It has two Cisco routers and one non-Cisco
router. All three routers are using RIP version 1. The company network is using the block of
198.133.219.0/24. The company has decided it would be a good idea to split the network into
three smaller subnets and create the option of conserving addresses with VLSM. What is the best
course of action if the company wants to have 40 hosts in each of the three subnets?
A -
Convert all the routers to EIGRP and use 198.133.219.32/27,198.133.219.64/27, and 198.133.219.92/27 as the new subnetworks.
B -
Maintain the use of RIP version 1 and use 198.133.219.32/27,198.133.219.64/27, and 198.133.219.92/27 as the new subnetworks.
C -
Convert all the routers to EIGRP and use 198.133.219.64/26,198.133.219.128/26, and 198.133.219.192/26 as the new subnetworks.
D -
Convert all the routers to RIP version 2 and use 198.133.219.64/26, 198.133.219.128/26, and 198.133.219.192/26 as the new subnetworks.
2-
Refer to the exhibit. Why has this switch not been elected the root bridge for VLAN1?
A -
It has more than one interface that is connected to the root network segment.
B -
It is running RSTP while the elected root bridge is running 802.1 d spanning tree.
C -
It has a higher bridge ID than the elected root bridge.
D -
It has a higher MAC address than the elected root bridge.
3-
Refer to the exhibit. At the end of an RSTP election process, which access layer switch port will
assume the discarding role?
A -
Switch3, port fa0/1
B -
Switch3, port fa0/12
C -
Switch4, port fa0/11
D -
Switch4, port fa0/2
4-
Refer to the exhibit. How many paths can the EIGRP routing process use to forward packets from
HQ_Router to a neighbor router?
A -
three equal-cost paths
B -
four unequal-cost paths
C -
four equal-cost paths
D -
three unequal-cost paths
5-
Select the action that results from executing these commands.
Switch(config-if)# switchport port-security
Switch(config-if)# switchport port-security mac-address sticky
A -
A dynamically learned MAC address is saved in the startup-configuration file.
B -
A dynamically learned MAC address is saved in the running-configuration file.
C -
A dynamically learned MAC address is saved in the VLAN database.
D -
All are correct
6-
Refer to the exhibit. The following commands are executed on interface fa0/1 of 2950Switch. 2950Switch(config-if)# switchport port-security
2950Switch(config-if)# switchport port-security mac-address sticky
2950Switch(config-if)# switchport port-security maximum 1
The Ethernet frame that is shown arrives on interface fa0/1.
What one functions will occur when this frame is received by 2950Switch?
A -
The MAC address table will now have an additional entry of fa0/1 FFFF.FFFF.FFFF.
B -
Only host A will be allowed to transmit frames on fa0/1.
C -
This frame will be discarded when it is received by 2950Switch.
D -
Hosts B and C may forward frames out fa0/1 but frames arriving from other switches will not be forwarded out fa0/1.
7-
Refer to the exhibit. Some 2950 series switches are connected to the conference area of the
corporate headquarters network. The switches provide two to three jacks per conference room to
host laptop connections for employees who visit the headquarters office. When large groups of
employees come from other locations, the network administrator often finds that hubs have been
connected to wall jacks in the conference area although the ports on the access layer switches
were not intended to support multiple workstations.
What action could the network administrator take to prevent access by multiple laptops through a
single switch port and still leave the switch functional for its intended use?
A -
Configure static entries in the switch MAC address table to include the range of addresses used by visiting employees.
B -
Configure an ACL to allow only a single MAC address to connect to the switch at one time.
C -
Use the mac-address-table 1 global configuration command to limit each port to one source MAC address.
D -
Implement Port Security on all interfaces and use the port-security maximum 1 command to limit port access to a single MAC address.
8-
Running both IPv4 and IPv6 on a router simultaneously is known as what?