1.
Which two statements about the functions of a hub are accurate? (Choose two.) (Source: Understanding the Challenges of Shared LANs)
Correct Answer(s)
A. A hub extends an Ethernet LAN.
D. A hub is a data link layer device.
Explanation
A hub extends an Ethernet LAN by connecting multiple devices together, allowing them to communicate with each other. A hub is a data link layer device, as it operates at the physical layer of the OSI model, receiving and transmitting data packets between devices on the network.
2.
Which three statements best describe collisions? (Choose three.) (Source: Understanding the Challenges of Shared LANs)
Correct Answer(s)
A. Collisions occur when two or more stations on a shared media transmit at the
same time
C. In a collision, the frames are destroyed, and each station in the segment begins a random timer that must be completed before attempting to retransmit the data.
E. More segments on a network mean greater potential for collisions.
Explanation
Answer key is wrong in book. See p 2-7 bottom of page.
3.
Which of these choices best describes a collision domain? (Source: Understanding the Challenges of Shared LANs)
Correct Answer
C. Network segments that share the same bandwidth
4.
What type of hardware will help eliminate collisions? (Source: Solving Network Challenges with Switched LAN Technology)
Correct Answer
B. Bridge
5.
Which three factors are typical causes of network congestion? (Choose three.) (Source: Solving Network Challenges with Switched LAN Technology)
Correct Answer(s)
A. high-bandwidth applications
C. increasing volume of network traffic
D. More powerful computer and network technologies
6.
What are three characteristics of a bridge? (Choose three.) (Source: Solving Network Challenges with Switched LAN Technology)
Correct Answer(s)
B. Bridges maintain MAC address tables.
C. Bridges are more "intelligent" than hubs.
D. Bridges can buffer and forward frames between two or more LAN segments.
7.
What are two major benefits of adding a bridge to a network? (Choose two.) (Source: Solving Network Challenges with Switched LAN Technology)
Correct Answer(s)
A. Isolating potential network problems to specific segments
C. Extending a LAN to cover greater distances by joining multiple segments
8.
Which three characteristics apply to a switch? (Choose three.) (Source: Solving Network Challenges with Switched LAN Technology)
Correct Answer(s)
A. Uses a table of MAC addresses to determine the port to which the data is to be sent
B. Connects LAN segments
D. Increases the number of collision domains
9.
Which three features differentiate switches from bridges? (Choose three.) (Source:
Solving Network Challenges with Switched LAN Technology)
Correct Answer(s)
A. Large frame buffers
C. Support for mixed media rates
D. High port densities
10.
Which three statements are accurate about how the network performance of a switch compares to that of a bridge? (Choose three.) (Source: Solving Network Challenges with Switched LAN Technology)
Correct Answer(s)
A. Switches operate at much higher speeds than bridges.
C. Switches support more advanced functionality than bridges.
E. Switches support dedicated communication between devices.
11.
Which three statements about microsegmentation are accurate? (Choose three.) (Source: Maximizing the Benefits of Switching)
Correct Answer(s)
B. Microsegmentation increases bandwidth availability
C. Each device on a network segment is connected directly to a switch port.
D. Microsegmentation eliminates collisions.
12.
Upon initial installation of a Cisco switch or router, the network administratOr typically configures the networking devices from a -. (Source: Operating Cisco IOS Software)
Correct Answer
C. Console Terminal
13.
If a network administrator is supporting a remote device, the preferred method is to use a modem connection to the - of the device for remote configuration. (Source: Operating Cisco IOS Software)
Correct Answer
D. Auxiliary port
Explanation
The auxiliary port is the preferred method for remote configuration of a remote device when a network administrator is supporting it. This port allows the administrator to establish a modem connection to the device, enabling remote access and configuration. The console port is typically used for local configuration, while the LAN and uplink ports are used for network connectivity. Therefore, the auxiliary port is the correct choice for remote configuration.
14.
How do you instruct a Cisco device to parse and execute an entered command? (Source: Operating Cisco IOS Software)
Correct Answer
B. Press the Enter key
Explanation
To instruct a Cisco device to parse and execute an entered command, you need to press the Enter key. This is the standard method used to send the command to the device for processing.
15.
Which CLI prompt indicates that you are working in privileged EXEC mode? (Source: Operating Cisco IOS Software)
Correct Answer
A. Hostname#
Explanation
The CLI prompt "hostname#" indicates that you are working in privileged EXEC mode. In this mode, you have access to all the commands and features of the Cisco IOS software and can make configuration changes to the device. The "#" symbol at the end of the prompt is the indicator that you are in privileged mode.
16.
Which command would you enter in the privileged EXEC mode to list the command options? (Source: Operating Cisco IOS Software)
Correct Answer
A. ?
Explanation
In the privileged EXEC mode, entering the "?" command will list the available command options. This command is used to get help and display a list of available commands and their descriptions. It is a useful tool for navigating and using the Cisco IOS software effectively.
17.
How do you start a Catalyst 2950 series switch? (Source: Starting a Switch)
Correct Answer
A. Press the on/off switch
18.
If the POST tests complete successfully on a Catalyst switch, what display could you see on the console? (Source: Starting a Switch)
Correct Answer
A. The> prompt
19.
What CLI command should you enter to display a list of commands that begin with the letter "C" on a Catalyst switch? (Source: Starting a Switch)
Correct Answer
A. C?
Explanation
To display a list of commands that begin with the letter "C" on a Catalyst switch, you should enter the command "c?". This command will provide a list of available commands that start with "C". It is a common convention in CLI (Command Line Interface) to use the "?" symbol as a wildcard to display a list of available options or commands.
20.
What CLI command should you enter to display the command syntax help so that you can see how to complete a command that begins with config? (Source: Starting a Switch)
Correct Answer
B. Config ?
21.
Which Cisco IOS command correctly configures an IP address and subnet mask on a switch? (Source: Starting a Switch)
Correct Answer
D. Ip address 196.125.243.10 255.255.255.0
Explanation
The correct answer is "ip address 196.125.243.10 255.255.255.0". This command is used to configure an IP address and subnet mask on a switch. The IP address "196.125.243.10" and the subnet mask "255.255.255.0" are specified in the command, allowing the switch to be assigned a unique IP address within the network and defining the range of IP addresses that are considered local to the switch.
22.
Which configuration mode will you use to configure a particular port on a switch? (Source: Starting a Switch)
Correct Answer
C. Interface configuration mode
Explanation
To configure a particular port on a switch, you would use the "interface configuration mode." This mode allows you to make changes and customize settings specifically for a particular interface or port on the switch. In this mode, you can configure parameters such as speed, duplex, VLAN membership, and security settings for the specific port you are working with.
23.
When you use the show interface command to display the status and statistics for the interfaces configured on a Catalyst switch, which output field indicates the MAC address that identifies the interface hardware? (Source: Starting a Switch)
Correct Answer
C. Address is 0050.BD73.E2Cl
Explanation
The output field "Address is 0050.BD73.E2Cl" indicates the MAC address that identifies the interface hardware.
24.
Which show command requires that you have privileged EXEC mode access? (Source: Starting a Switch)
Correct Answer
C. Show running
Explanation
The show running command requires privileged EXEC mode access. This command displays the current running configuration of the device, including all the current settings and parameters. Privileged EXEC mode access is required because the running configuration contains sensitive information about the device's operation and settings, and only authorized users should have access to it.
25.
How should you power up a Cisco router? (Source: Starting a Switch)
Correct Answer
B. Turn the power switch to "on."
Explanation
To power up a Cisco router, you should turn the power switch to "on." This will provide the necessary electrical power to the router, allowing it to start functioning. Pressing the Reset button is not the correct method for powering up the router as it is primarily used for resetting the device to its default settings. Connecting the fiber cable to another router is not related to powering up the router, and attaching the power cable plug to the router power supply socket is a step that follows after turning the power switch on.
26.
Which of two the following would be considered a physical threat? (Choose two.) (Source: Switch Security)
Correct Answer(s)
B. Someone turning off the power to the switch to block network access.
C. Someone turning off the air conditioning system in the network closet.
Explanation
The two options that would be considered physical threats are someone turning off the power to the switch to block network access and someone turning off the air conditioning system in the network closet. Both of these actions can directly impact the functionality and availability of the network and its components. Leaving a password in a desk and breaking into the cabinet containing network documentation are security risks, but they do not fall under the category of physical threats.
27.
Which four of the following can be protected with a password? (Choose four.) (Source: Switch Security)
Correct Answer(s)
A. Console access
B. VTY access
D. User level access
E. Exec level access
Explanation
I believe book is wrong again, it lists TTY. But see page 2-79 bottom of page. lists user login. same as router
28.
Which of the following is customized text that is displayed before the usemame and password login prompts? (Source: Switch Security)
Correct Answer
B. Login banner
Explanation
A login banner is customized text that is displayed before the username and password login prompts. It is typically used to provide important information or warnings to users before they log in to a system.
29.
Which of the following is the most secure method of remotely accessing a network device? (Source: Switch Security)
Correct Answer
C. SSH
Explanation
SSH (Secure Shell) is the most secure method of remotely accessing a network device. Unlike HTTP and Telnet, which transmit data in plain text, SSH encrypts all data, including passwords and commands, providing confidentiality and protection against eavesdropping. RMON (Remote Monitoring) and SNMP (Simple Network Management Protocol) are network monitoring protocols and do not provide secure remote access like SSH does. Therefore, SSH is the best choice for securely accessing a network device remotely.
30.
Which of the following is a Cisco IOS feature that can be used to control access to the vty ports? (Source: Switch Security)
Correct Answer
C. Access-list
Explanation
Access-list is a Cisco IOS feature that can be used to control access to the vty ports. Access-lists are used to filter traffic based on specific criteria such as source and destination IP addresses, protocols, and port numbers. By configuring an access-list on the vty ports, administrators can restrict or allow access to the device based on defined rules. This helps in enhancing the security of the network infrastructure by preventing unauthorized access to the vty ports.
31.
Which of the following is a Cisco IOS command that can be used to control access to a switch port based upon a MAC address? (Source: Switch Security)
Correct Answer
C. Mac-secure
Explanation
The correct answer is "mac-secure." This command is used in Cisco IOS to control access to a switch port based on a MAC address. It allows the network administrator to specify which MAC addresses are allowed or denied access to the port, enhancing security by preventing unauthorized devices from connecting to the network.
32.
Which of the following is a Cisco IOS command that can be used to increase the security of unused switch ports? (Source: Switch Security)
Correct Answer
A. Shutdown
Explanation
The correct answer is "shutdown." By using the "shutdown" command, the administrator can disable unused switch ports, effectively preventing unauthorized access or potential security breaches. This command ensures that only authorized devices can connect to active switch ports, thereby increasing the overall security of the network.
33.
Which problem is caused by redundant connections in a network? (Source: Maximizing the Benefits of Switching)
Correct Answer
B. Loops
Explanation
Redundant connections in a network can cause loops. Loops occur when there are multiple paths between network devices, leading to packets being continuously forwarded in a loop without reaching their intended destination. This can result in network congestion, increased latency, and even network failures. Therefore, loops caused by redundant connections are a problem in a network.
34.
Which statement best describes how loops can affect performance in a switched LAN? (Source: Maximizing the Benefits of Switching)
Correct Answer
A. Broadcast storms may be created when loops occur, preventing data trom being transmitted over the network.
Explanation
Loops in a switched LAN can lead to the creation of broadcast storms, which can have a negative impact on network performance. Broadcast storms occur when a broadcast message is continuously forwarded and replicated by switches, causing excessive network traffic and congestion. This prevents other data from being transmitted effectively over the network, leading to performance issues. Therefore, the statement "Broadcast storms may be created when loops occur, preventing data from being transmitted over the network" accurately describes how loops can affect performance in a switched LAN.
35.
Which statement accurately describes Spanning-Tree Protocol? (Source: Maximizing Benefits of Switching)
Correct Answer
A. STP assigns roles to bridges and ports to ensure that only one forwarding path exists through the network at any given time
Explanation
Spanning-Tree Protocol (STP) assigns roles to bridges and ports to ensure that only one forwarding path exists through the network at any given time. This means that STP prevents loops and ensures that there is a single active path for data transmission. By designating one bridge as the root bridge and determining the shortest path to reach it, STP eliminates redundant paths and avoids network congestion. It achieves this by blocking certain ports, effectively keeping previously inactive paths inactive. This ensures a stable and efficient network topology.
36.
Which of the following is a Cisco IOS command that is the most useful when troubleshooting media issues? (Source: Troubleshooting Switch Issues)
Correct Answer
C. Show interface
Explanation
The command "show interface" is the most useful when troubleshooting media issues because it provides detailed information about the interfaces on a Cisco device. This command displays the status, configuration, and statistics of the interfaces, allowing the user to identify any issues related to media connectivity. By examining the output of this command, network administrators can determine if there are any errors, collisions, or other problems with the media, helping them diagnose and resolve media-related issues effectively.
37.
Which of the following is a Cisco IOS command that is the most useful when troubleshooting port access issues? (Source: Troubleshooting Switch Issues)
Correct Answer
C. Show interface
Explanation
The "show interface" command is the most useful when troubleshooting port access issues. This command provides detailed information about the interface, including its status, configuration, and statistics. By using this command, network administrators can quickly identify any errors, collisions, or other issues that may be affecting port access. It also provides information about the interface's current operational state, such as its speed, duplex mode, and VLAN membership. Therefore, the "show interface" command is essential for diagnosing and resolving port access problems.
38.
Which three of the following are methods used to mitigate configuration issues? (Choose three.) (Source: Troubleshooting Switch Issues)
Correct Answer(s)
B. Secure the configuration.
C. Verify changes before you save.
D. Know what you have before you start.
Explanation
The three methods used to mitigate configuration issues are:
1. Secure the configuration: This involves implementing security measures such as password protection, encryption, and access control lists to prevent unauthorized access and changes to the configuration settings.
2. Verify changes before you save: This involves testing and validating any configuration changes before saving them to ensure they do not cause any issues or disruptions in the network.
3. Know what you have before you start: This refers to having a clear understanding of the existing network configuration and documentation before making any changes, to avoid any unintended consequences or conflicts.