0% found this document useful (0 votes)
22 views

Q6523

Uploaded by

shhhgmg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Q6523

Uploaded by

shhhgmg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Name:

PNO:

1. Which two statements about the purpose of the OSI model are accurate? (Choose two)
A. Defines the network functions that occur at each layer
B. Facilitates an understanding of how information travels throughout a network
C. Changes in one layer do not impact other layer
D. Ensures reliable data delivery through its layered approach
2. What is the destination MAC address of a broadcast frame?
A. 00:00:0c:07:ac:01
B. ff:ff:ff:ff:ff:ff
C. 43:2e:08:00:00:0c
D. 00:00:0c:43:2e:08
E. 00:00:0crfHfrff
3. Which action is taken by a switch port enabled for PoE power classification override?
A. When a powered device begins drawing power from a PoE switch port a syslog message
is generated
B. As power usage on a PoE switch port is checked data flow to the connected device is
temporarily paused
C. If a switch determines that a device is using less than the minimum configured power it
assumes the device has failed and disconnects
D. If a monitored port exceeds the maximum administrative value for power, the port is
shutdown and errdisabled
4. A frame that enters a switch fails the Frame Check Sequence. Which two interface
counters are incremented? (Choose two)
A. runts
B. giants
C. frame
D. CRC
E. input errors
5. What is the primary function of a Layer 3 device?
A. to analyze traffic and drop unauthorized traffic from the Internet
B. to transmit wireless traffic between hosts
C. forward traffic within the same broadcast domain
D. to pass traffic between different networks
6. What is the same for both copper and fiber interfaces when using SFP modules?
A. They support an inline optical attenuator to enhance signal strength
B. They accommodate single-mode and multi-mode in a single module
C. They offer reliable bandwidth up to 100 Mbps in half duplex mode
D. They provide minimal interruption to services by being hot-swappable
7. Which WAN access technology is preferred for a small office / home office architecture?
A. broadband cable access
B. frame-relay packet switching
C. dedicated point-to-point leased line
D. Integrated Services Digital Network switching
8. Which function is performed by the collapsed core layer in a two-tier architecture?
A. applying security policies
B. marking interesting traffic for data polices
C. enforcing routing policies
D. attaching users to the edge of the network
9. An organization has decided to start using cloud-provided services. Which cloud service
allows the organization to install its own operating system on a virtual machine?
A. platform-as-a-service
B. software-as-a-service
C. network-as-a-service
D. infrastructure-as-a-service
10. A manager asks a network engineer to advise which cloud service models are used so
employees do not have to waste their time installing, managing, and updating software
which is only used occasionally. Which cloud service model does the engineer recommend?
A. infrastructure-as-a-service
B. software-as-a-service
C. platform-as-a-service
D. business process as service to support different types of service
11. Which three statements about MAC addresses are correct? (Choose three)
A. To communicate with other devices on a network, a network device must have a unique
MAC address
B. The MAC address is also referred to as the IP address
C. The MAC address of a device must be configured in the Cisco IOS CLI by a user with
administrative privileges
D. A MAC address contains two main components, the first of which identifies the
manufacturer of the hardware and the second of which uniquely identifies the hardware
E. An example of a MAC address is 0A:26:B8:D6:65:90
F. A MAC address contains two main components, the first of which identifies the network on
which the host resides and the second of which uniquely identifies the host on the network
12. What are two functions of a Layer 2 switch? (Choose two)
A. makes forwarding decisions based on the MAC address of a packet
B. selects the best route between networks on a WAN
C. moves packets within a VLAN
D. moves packets between different VLANs
E. acts as a central point for association and authentication servers
13. How does the dynamically-learned MAC address feature function?
A. It requires a minimum number of secure MAC addresses to be filled dynamically
B. Switches dynamically learn MAC addresses of each connecting CAM table
C. The ports are restricted and learn up to a maximum of 10 dynamically-learned addresses
D. The CAM table is empty until ingress traffic arrives at each port
14

A. There is a native VLAN mismatch


B. Access mode is configured on the switch ports.
C. The PCs are in the incorrect VLAN
D. All VLANs are not enabled on the trunk
15. Two switches are connected and using Cisco Dynamic Trunking Protocol. SW1 is set to
Dynamic Desirable. What is the result of this configuration?
A. The link is in a downstate.
B. The link is in an error disables stale
C. The link is becomes an access port
D. The link becomes a trunkport
16.

A. switchport access vlan 67


B. switchport trunk allowed vlan 67
C. switchport private-vlan association host 67
D. switchport trunk native vlan 67
17.

A. The frame is processed in VLAN 5


B. The frame is processed in VLAN 11
C. The frame is processed in VLAN 1
D. The frame is dropped

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy