ログイン

CCNA2

CCNA2
15問 • 2年前
  • Axel Alexe
  • 通報

    問題一覧

  • 1

    110. What is a drawback of the local database method of securing device access that can be solved by using AAA with centralized servers?

    User accounts must be configured locally on each device, which is an unscalable authentication solution.

  • 2

    111. What action does a DHCPv4 client take if it receives more than one DHCPOFFER from multiple DHCP servers?

    It sends a DHCPREQUEST that identifies which lease offer the client is accepting.

  • 3

    112. Refer to the exhibit. The network administrator is configuring the port security feature on switch SWC. The administrator issued the command show port-security interface fa 0/2 to verify the configuration. What can be concluded from the output that is shown? (Choose three.)

    Security violations will cause this port to shut down immediately., This port is currently up., The switch port mode for this interface is access mode.

  • 4

    113. What method of wireless authentication is dependent on a RADIUS authentication server?

    WPA2 Enterprise

  • 5

    114. A network administrator has found a user sending a double-tagged 802.1Q frame to a switch. What is the best solution to prevent this type of attack?

    The VLANs for user access ports should be different VLANs than any native VLANs used on trunk ports.

  • 6

    115. Refer to the exhibit. Which two conclusions can be drawn from the output? (Choose two.)

    The EtherChannel is down., The port channel ID is 2.

  • 7

    117. On a Cisco 3504 WLC Summary page ( Advanced > Summary ), which tab allows a network administrator to configure a particular WLAN with a WPA2 policy?

    WLANs

  • 8

    118. Refer to the exhibit. A network engineer is configuring IPv6 routing on the network. Which command issued on router HQ will configure a default route to the Internet to forward packets to an IPv6 destination network that is not listed in the routing table?​

    ipv6 route ::/0 serial 0/1/1

  • 9

    119. Users are complaining of sporadic access to the internet every afternoon. What should be done or checked?

    Check the statistics on the default route for oversaturation.

  • 10

    120. What action takes place when the source MAC address of a frame entering a switch appears in the MAC address table associated with a different port?

    The switch replaces the old entry and uses the more current port.

  • 11

    121. A network administrator is configuring a WLAN. Why would the administrator use a WLAN controller?

    to facilitate group configuration and management of multiple WLANs through a WLC

  • 12

    123. Which three statements accurately describe duplex and speed settings on Cisco 2960 switches? (Choose three.)

    An autonegotiation failure can result in connectivity issues., When the speed is set to 1000 Mb/s, the switch ports will operate in full-duplex mode., The duplex and speed settings of each switch port can be manually configured.

  • 13

    124. Refer to the exhibit. A network administrator configures R1 for inter-VLAN routing between VLAN 10 and VLAN 20. However, the devices in VLAN 10 and VLAN 20 cannot communicate. Based on the configuration in the exhibit, what is a possible cause for the problem?

    B. The encapsulation is misconfigured on a subinterface.

  • 14

    125. A network administrator uses the spanning-tree portfast bpduguard default global configuration command to enable BPDU guard on a switch. However, BPDU guard is not activated on all access ports. What is the cause of the issue?

    PortFast is not configured on all access ports.

  • 15

    126. Which two types of spanning tree protocols can cause suboptimal traffic flows because they assume only one spanning-tree instance for the entire bridged network? (Choose two.)

    RSTP, STP

  • CCNA

    CCNA

    Axel Alexe · 100問 · 2年前

    CCNA

    CCNA

    100問 • 2年前
    Axel Alexe

    問題一覧

  • 1

    110. What is a drawback of the local database method of securing device access that can be solved by using AAA with centralized servers?

    User accounts must be configured locally on each device, which is an unscalable authentication solution.

  • 2

    111. What action does a DHCPv4 client take if it receives more than one DHCPOFFER from multiple DHCP servers?

    It sends a DHCPREQUEST that identifies which lease offer the client is accepting.

  • 3

    112. Refer to the exhibit. The network administrator is configuring the port security feature on switch SWC. The administrator issued the command show port-security interface fa 0/2 to verify the configuration. What can be concluded from the output that is shown? (Choose three.)

    Security violations will cause this port to shut down immediately., This port is currently up., The switch port mode for this interface is access mode.

  • 4

    113. What method of wireless authentication is dependent on a RADIUS authentication server?

    WPA2 Enterprise

  • 5

    114. A network administrator has found a user sending a double-tagged 802.1Q frame to a switch. What is the best solution to prevent this type of attack?

    The VLANs for user access ports should be different VLANs than any native VLANs used on trunk ports.

  • 6

    115. Refer to the exhibit. Which two conclusions can be drawn from the output? (Choose two.)

    The EtherChannel is down., The port channel ID is 2.

  • 7

    117. On a Cisco 3504 WLC Summary page ( Advanced > Summary ), which tab allows a network administrator to configure a particular WLAN with a WPA2 policy?

    WLANs

  • 8

    118. Refer to the exhibit. A network engineer is configuring IPv6 routing on the network. Which command issued on router HQ will configure a default route to the Internet to forward packets to an IPv6 destination network that is not listed in the routing table?​

    ipv6 route ::/0 serial 0/1/1

  • 9

    119. Users are complaining of sporadic access to the internet every afternoon. What should be done or checked?

    Check the statistics on the default route for oversaturation.

  • 10

    120. What action takes place when the source MAC address of a frame entering a switch appears in the MAC address table associated with a different port?

    The switch replaces the old entry and uses the more current port.

  • 11

    121. A network administrator is configuring a WLAN. Why would the administrator use a WLAN controller?

    to facilitate group configuration and management of multiple WLANs through a WLC

  • 12

    123. Which three statements accurately describe duplex and speed settings on Cisco 2960 switches? (Choose three.)

    An autonegotiation failure can result in connectivity issues., When the speed is set to 1000 Mb/s, the switch ports will operate in full-duplex mode., The duplex and speed settings of each switch port can be manually configured.

  • 13

    124. Refer to the exhibit. A network administrator configures R1 for inter-VLAN routing between VLAN 10 and VLAN 20. However, the devices in VLAN 10 and VLAN 20 cannot communicate. Based on the configuration in the exhibit, what is a possible cause for the problem?

    B. The encapsulation is misconfigured on a subinterface.

  • 14

    125. A network administrator uses the spanning-tree portfast bpduguard default global configuration command to enable BPDU guard on a switch. However, BPDU guard is not activated on all access ports. What is the cause of the issue?

    PortFast is not configured on all access ports.

  • 15

    126. Which two types of spanning tree protocols can cause suboptimal traffic flows because they assume only one spanning-tree instance for the entire bridged network? (Choose two.)

    RSTP, STP