Options

Help with Answers lan switching and wireless ccna exploration

beerpongbeerpong Registered Users Posts: 2 ■□□□□□□□□□
can anyone help me with answer to these questions?

1. What does the following error message signify?

R2# clock set 19:56:00 04 8

A. A parameter is missing.
B. The command was entered in the wrong CLI mode.
C. The data of one of the parameters is incorrect.
D. The command is ambiguous.

2. What is the effect of entering the banner login #Authorized Personnel Only!# command?

A. #Authorized Personnel Only! appears after the user logs in.
B. Authorized Personnel Only! appears only when the user makes a Telnet connection.
C. #Authorized Personnel Only!# appears only when the user enters global configuration
mode.
D. Authorized Personnel Only! appears before the username and password login
prompts for any connection.

Packet Tracer
Companion

Chapter 2: Basic Switch Concepts and Configuration 113

3. Which three options correctly associate the command with the paired behavior?
(Choose three.)


A. switchport port-security violation protect: Frames with unknown source addresses
are dropped and a notification is sent.
B. switchport port-security violation restrict: Frames with unknown source addresses
are dropped and no notification is sent.
C. switchport port-security violation shutdown: Frames with unknown source
addresses result in the port becoming error-disabled and a notification is sent.
D. switchport port-security mac-address sticky: Allows dynamically learned MAC
addresses to be stored in the running-configuration.
E. switchport port-security maximum: Defines the number of MAC addresses associated
with a port.



.

6. What advantage does SSH offer over Telnet when remotely connecting to a device?


A. Encryption
B. More connection lines
C. Connection-oriented services
D. Username and password authentication



Chapter 2: Basic Switch Concepts and Configuration 115

8. Which option correctly associates the Layer 2 security attack with the description?


A. MAC address flooding: Broadcast requests for IP addresses with spoofed MAC
addresses.

B. DHCP starvation: Using proprietary Cisco protocols to gain information about a
switch.
C. CDP attack: The attacker fills the switch MAC address table with invalid MAC
addresses.
D. Telnet attack: Using brute force password attacks to gain access to a switch.

9. Which three statements are true about the CSMA/CD access method? (Choose three.)

A. In an Ethernet LAN, each station continuously listens for traffic on the medium to
determine when gaps between frame transmissions occur and then sends the frame.
B. In an Ethernet LAN, stations may begin transmitting anytime they detect that the
network is quiet (there is no traffic).
C. In the CSMA/CD process, priorities are assigned to particular stations, and the station
with the highest priority transmits frames on the medium.
D. If a collision occurs in an Ethernet LAN, transmitting stations stop transmitting and
wait a random length of time before attempting to retransmit the frame.
E. If a collision occurs in an Ethernet LAN, only the station with the highest priority
continues to transmit, and the rest of the stations wait a random length of time
before attempting to retransmit the frame.
F. In an Ethernet LAN, all stations execute a backoff algorithm based on their assigned
priorities before they transmit frames on the medium.

10. How does the Ethernet switch process the incoming traffic using port-based memory
buffering?

A. The frames are stored in queues that are linked to specific incoming ports.
B. The frames are stored in queues that are linked to specific outgoing ports.
C. The frames are transmitted to the outgoing port immediately.
D. The frames are stored in queues that are linked to the common memory area.

11. What are two key features of an Ethernet switch with Layer 2 capabilities? (Choose
two.)


A. Full-duplex operation
B. Broadcast and multicast traffic management
C. Security through access lists
D. Layer 3 routing functions
E. Filtering based on MAC address
F. Network address translation (NAT)

116 LAN Switching and Wireless, CCNA Exploration Companion Guide

12. The network administrator wants to configure an IP address on a Cisco switch. How
does the network administrator assign the IP address?


A. In privileged EXEC mode
B. On the switch interface FastEthernet0/0
C. On the management VLAN
D. On the physical interface connected to the router or next-hop device

13. Why should a default gateway be assigned to a switch?


A. So that there can be remote connectivity to the switch via such programs as Telnet
and ping
B. So that frames can be sent through the switch to the router
C. So that frames generated from workstations and destined for remote networks can
pass to a higher level
D. So that other networks can be accessed from the command prompt of the switch

14. Which two tasks does autonegotiation in an Ethernet network accomplish? (Choose two.)

A. Sets the link speed
B. Sets the IP address
C. Sets the link duplex mode
D. Sets MAC address assignments on switch port
E. Sets the ring speed

15. What is the effect of entering the SW1(config-if)# duplex full command on a Fast
Ethernet switch port?


A. The connected device communicates in two directions, but only one direction at a
time.
B. The switch port returns to its default configuration.
C. If the connected device is also set for full duplex, it participates in collision-free
communication.
D. The efficiency of this configuration is typically rated at 50 to 60 percent.
E. The connected device should be configured as half duplex.

16. Which term describes the time delay between a frame being sent from a source device
and received on a destination device?


A. Bandwidth
B. Latency
C. Attenuation
D. Time-to-live
E. Frame check sequence

Chapter 2: Basic Switch Concepts and Configuration 117

17. Which option correctly associates the command with the description?


A. copy startup-config running-config: Copy the current running configuration to a
TFTP server.
B. copy running-config tftp: Save the current running configuration as the startup
configuration.
C. copy tftp startup-config: Restore a configuration from a TFTP server to the running
configuration.
D. copy tftp running-config: Restore the startup configuration to the running system.
E. copy startup-config tftp: Restore the configuration from a TFTP server to the startup
configuration.
F. copy running-config startup config: Save the current running configuration to the
startup configuration

18. Which three options correctly associate the command with the description? (Choose
three.)


A. enable: Enter the global configuration mode.
B. configure terminal: Enter configuration mode for the console line.
C. line vty 0 15: Set a password.
D. line console 0: Enter configuration mode for the console line.
E. password cisco: Set a password.
F. username admin password cisco: Enable AAA.
G. login: Permit login.

Comments

  • Options
    bbarrickbbarrick Member Posts: 242 ■■■□□□□□□□
    Some of these are extremely basic and should be easily found within your reading material. Maybe you should look them up and then narrow down your question(s) to those you really can not find the answer to.
  • Options
    beerpongbeerpong Registered Users Posts: 2 ■□□□□□□□□□
    do i have some right?
  • Options
    Carpe PorcusCarpe Porcus Member Posts: 84 ■■□□□□□□□□
    Some if not most require a basic understanding of networking concepts. Will all due respect, the auto negotiate question alone should ring alarm bells if nothing else.

    I suggest covering network basics first and learn the concepts before diving in with wireless as you are looking at an awful lot of resits if you don't.
    “I'm always admitting I'm wrong. That's how I eventually get to right.”
Sign In or Register to comment.