Klausur


Kartei Details

Karten 105
Sprache English
Kategorie Informatik
Stufe Andere
Erstellt / Aktualisiert 16.03.2016 / 07.07.2016
Weblink
https://card2brain.ch/box/its_modul_02_19
Einbinden
<iframe src="https://card2brain.ch/box/its_modul_02_19/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

What is a basic function of the Cisco Borderless Architecture distribution layer?

A network designer must provide a rationale to a customer for a design which will move an enterprise from a flat network topology to a hierarchical network topology. Which two features of the hierarchical design make it the better choice? (Choose two.)

What is a collapsed core in a network design?

Which two previously independent technologies should a network administrator attempt to combine after choosing to upgrade to a converged network infrastructure? (Choose two.)

What is a definition of a two-tier LAN network design?

A local law firm is redesigning the company network so that all 20 employees can be connected to a LAN and to the Internet. The law firm would prefer a low cost and easy solution for the project. What type of switch should be selected?

What are two advantages of modular switches over fixed-configuration switches? (Choose two.)

Refer to the exhibit. Consider that the main power has just been restored. PC3 issues a broadcast IPv4 DHCP request. To which port will SW1 forward this request?

What is one function of a Layer 2 switch?

Refer to the exhibit. How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty?

What two criteria are used by a Cisco LAN switch to decide how to forward Ethernet frames? (Choose two.)

Which network device can be used to eliminate collisions on an Ethernet network?

Which type of address does a switch use to build the MAC address table?

What are two reasons a network administrator would segment a network with a Layer 2 switch? (Choose two.)

  • to isolate ARP request messages from the rest of the network

Which statement describes the microsegmentation feature of a LAN switch?

What is the destination address in the header of a broadcast frame?

Refer to the exhibit. Fill in the blank.

How many collision domains are shown in the topology?

2

Fill in the blank.

A _________________ network is one that uses the same infrastructure to carry voice, data, and video signals.

converged

Match the functions to the corresponding layers. (Not all options are used.)

true

Match the borderless switched network guideline description to the principle. (Not all options are used.)

true

Match the forwarding characteristic to its type. (Not all options are used.)

true

Which interface is the default location that would contain the IP address used to manage a 24-port Ethernet switch?

A production switch is reloaded and finishes with a Switch> prompt. What two facts can be determined? (Choose two.)

Which two statements are true about using full-duplex Fast Ethernet? (Choose two.)

Which statement describes the port speed LED on the Cisco Catalyst 2960 switch?

What is a function of the switch boot loader?

In which situation would a technician use the show interfaces switch command?

Refer to the exhibit. A network technician is troubleshooting connectivity issues in an Ethernet network with the command show interfaces fastEthernet 0/0. What conclusion can be drawn based on the partial output in the exhibit?

Refer to the exhibit. The network administrator wants to configure Switch1 to allow SSH connections and prohibit Telnet connections. How should the network administrator change the displayed configuration to satisfy the requirement?

What is one difference between using Telnet or SSH to connect to a network device for management purposes?

In which type of attack does a malicious node request all available IP addresses in the address pool of a DHCP server in order to prevent legitimate hosts from obtaining network access?​

Which method would mitigate a MAC address flooding attack?

Which two features on a Cisco Catalyst switch can be used to mitigate DHCP starvation and DHCP spoofing attacks? (Choose two.)

Which two basic functions are performed by network security tools? (Choose two.)

An administrator wants to use a network security auditing tool on a switch to verify which ports are not protected against a MAC flooding attack. For the audit to be successful, what important factor must the administrator consider?

Which action will bring an error-disabled switch port back to an operational state?

Refer to the exhibit. Port Fa0/2 has already been configured appropriately. The IP phone and PC work properly. Which switch configuration would be most appropriate for port Fa0/2 if the network administrator has the following goals?

  • SWA(config-if)# switchport port-security
    SWA(config-if)# switchport port-security maximum 2
    SWA(config-if)# switchport port-security mac-address sticky

Which two statements are true regarding switch port security? (Choose two.)

A network administrator configures the port security feature on a switch. The security policy specifies that each access port should allow up to two MAC addresses. When the maximum number of MAC addresses is reached, a frame with the unknown source MAC address is dropped and a notification is sent to the syslog server. Which security violation mode should be configured for each access port?

Refer to the exhibit. What can be determined about port security from the information that is shown?