0% found this document useful (0 votes)
17 views6 pages

SET C Final

Uploaded by

adhe laishram
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views6 pages

SET C Final

Uploaded by

adhe laishram
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

1.

Assuming that all switches in a network have the default bridge priority for each MST instance, what effect does the
command spanning-tree mst 10 root primary have when entered on a single switch?
A. sets the bridge priority on the switch to 24582 for MST instance 10
B. sets the bridge priority on the switch to 24576 for MST instance 10
C. sets the bridge priority on the switch to 28672 for MST instance 10
D. sets the bridge priority on the switch to 24586 for MST instance 10

2. What are two characteristics of Gateway Load Balancing Protocol (GLBP) operation? (Choose two.)
A. The active virtual gateway (AVG) is the backup for the AVF.
B. GLBP will attempt to balance traffic on a per-router basis by the use of the round-robin algorithm.
C. The active virtual forwarder (AVF) is assigned a virtual MAC address and forwards packets sent to that MAC address.
D. GLBP will attempt to balance traffic on a per-host basis by the use of the round-robin algorithm.
E. GLBP members communicate with each other through hello messages sent every 3 seconds to the multicast address
224.0.0.104.

3. Refer to the exhibit. What action does the command standby 1 track Serial0/0/0 on router R1 perform?

A. It tracks the state of the Serial0/0/0 interface on R1 and brings down the priority of standby group 1 if the interface goes
down.
B. It tracks the state of the Fa0/0 interface on R1 and brings down the priority of standby group 1 if the interface goes down.
C. It links the default gateway virtual address 192.168.21.10 to the IP address 192.168.42.2 on interface Serial0/0/0.
D. It links the default gateway virtual address 192.168.21.10 to the IP address 192.168.31.1 on interface Serial0/0/0.

4. Which two statements about VRRP are true? (Choose two.)

A. VRRP cannot track interfaces or objects.


B. A VRRP group has one master router and one or more backup routers.
C. VRRP provides redundancy for the IP address of a router or for a virtual IP address shared among the VRRP group
members.
D. VRRP does not support preemption.
E. The virtual IP address for the VRRP group must be different from active and standby IP addresses.

5. Which statement describes the purpose of the configuration that is shown?

A. It is meant to disable any host that is configured to be in VLAN 3.


B. It is meant to disable any rogue DHCP servers that are attached to VLAN 3.
C. It is meant to monitor VLAN 3 for DHCP attacks that will deplete the DHCP pool.
D. It is meant to monitor VLAN 3 and disable any hosts that are using static IP addresses rather than DHCP addresses.

6. How does MAC address flooding cause a vulnerability in the network?


A. The CAM table will be full, causing legitimate frames to be forwarded out all ports within the VLAN and allowing
unauthorized users to capture data.
B. An attacking device can send or receive packets on various VLANs and bypass Layer 3 security measures.
C. An attacking device can exhaust the address space available to the DHCP servers for a period of time or establish itself as
a DHCP server in man in the middle attacks.
D. Information that is sent through CDP is transmitted in clear text and is unauthenticated, allowing it to be captured and to
divulge network topology information.

Refer to the exhibit.

Which IP address becomes the active next hop for 192.168.102.0/24 when 192.168.101.2 fails?

A. 192.168.101.10
B. 192.168.101.14
C. 192.168.101.6
D. 192.168.101.18

Which PAgP mode combination prevents an EtherChannel from forming?

A. auto/desirable
B. desirable/desirable
C. desirable/auto
D. auto/auto

Refer to the exhibit.


The traceroute fails from R1 to R3.
What is the cause of the failure?
A. An ACL applied inbound on loopback0 of R2 is dropping the traffic.
B. The loopback on R3 is in a shutdown state.
C. Redistribution of connected routes into OSPF is not configured.
D. An ACL applied inbound on fa0/1 of R3 is dropping the traffic.

10

An engineer configures GigabitEthernet 0/1 for VRRP group 115. The router must assume the primary role when it has the
highest priority in the group.
Which command set is required to complete this task?
interface GigabitEthernet0/1
ip address 10.10.10.2 255.255.255.0
vrrp 115 ip 10.10.10.1
vrrp 115 authentication 407441579

A. Router(config if)# vrrp 115 track 1 decrement 100 Router(config-if)# vrrp 115 preempt
B. Router(config-if)# vrrp 115 priority 100
C. Router(config-if)# vrrp 115 track 1 decrement 10 Router(config-if)# vrrp 115 preempt
D. Router(config-if)# standby 115 priority 100 Router(config-if)# standby 115 preempt

11

Drag and drop Place the EIGRP packets to the proper locations
12

Refer to the exhibit. A network device needs to be installed in the place of the icon labeled Network Device
to accommodate a leased line attachment to the Internet. Which network device and interface configuration
meets the minimum requirements for this installation?

A. a router with two Ethernet interfaces


B. a switch with two Ethernet interfaces
C. a router with one Ethernet and one serial interface
D. a switch with one Ethernet and one serial interface
E. a router with one Ethernet and one modem interface

13
Refer to the exhibit. The exhibit is showing the topology and the MAC address table. Host A sends a data
frame to host D. What will the switch do when it receives the frame from host A?

A. The switch will add the source address and port to the MAC address table and forward the frame to host
D.
B. The switch will discard the frame and send an error message back to host A.
C. The switch will flood the frame out of all ports except for port Fa0/3.
The switch will add the destination address of the frame to the MAC address table and forward the frame to host D.

14

Given an IP address of 192.168.1.42 255.255.255.248, what is the subnet address?

A. 192.168.1.8/29
B. 192.168.1.32/27
C. 192.168.1.40/29
D. 192.168.1.16/28
E. 192.168.1.48/29
15

Which two statements describe the IP address 10.16.3.65/23? (Choose two)

A. The subnet address is 10.16.3.0 255.255.254.0.


B. The lowest host address in the subnet is 10.16.2.1 255.255.254.0.
C. The last valid host address in the subnet is 10.16.2.254 255.255.254.0
D. The broadcast address of the subnet is 10.16.3.255 255.255.254.0.
E. The network is not subnetted.

16
Which two characteristics describe the access layer of the hierarchical network design model? (Choose two)

A. layer 3 support
B. port security
C. redundant components
D. VLANs
E. PoE

17
A switch has 48 ports and 4 VLANs. How many collision and broadcast domains exist on the switch?

A. 4, 48
B. 48, 4
C. 48, 1
D. 1, 48
E. 4, 1

18

A switch receives a frame on one of its ports. There is no entry in the MAC address table for the
destination MAC address. What will the switch do with the frame?

A. drop the frame


B. forward it out of all ports except the one that received it
C. forward it out of all ports
D. store it until it learns the correct port
19

Which address type does a switch use to make selective forwarding decisions?
A. source IP address
B. destination IP address
C. source and destination IP address
D. source MAC address
E. destination MAC address
20

Which two characteristics apply to Layer 2 switches? (Choose two)


A. increases the number of collision domains
B. decreases the number of collision domains
C. implements VLAN
D decreases the number of broadcast domains
E. uses the IP address to make decisions for forwarding data packets

Theory Questions

1.What is the role of the Spanning Tree Protocol (STP) in a switched network, and how does it prevent network loops?

2.What are the differences between Internal BGP (iBGP) and External BGP (eBGP), and why is it important to understand the
distinction between the two?

3.What are the different OSPF network types, and how do they influence the behavior of OSPF routers on broadcast, non-
broadcast, and point-to-point networks?

4.How does BGP handle path selection, and what are the key attributes used in determining the best path?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy