1.which of the following are true of unicast ip?
( R2 `- l$ D- a! g' e8 ?it can be either tcp or udp + r% \- x! K/ a' U& z4 [9 w
it uses a class d address
3 w$ x" X. @% m* M- X. Sa server transmitting unicast ip does not need to ‘know’ the recipient’s address $ q9 C; J: ]* t( G6 F6 o
: M5 E& O- U3 y' X9 ^2.which of the following are true of remote services? 5 A* \' M" o3 I+ U5 |
they are centralized and therefore require transport across the backbone to reach the user - w4 h9 H* \3 n
they are common to all users
1 k6 C" [$ r& v' Bthey are on a different vlan than the user 9 v. ^7 _2 U1 y5 C& T( p& G4 ]
they are typically connected to the user via a layer 2 switching path & t) ]- A& T% a* F! {+ @7 B' J
0 \7 Q9 L1 U# F# t3.which of the following is a form of out-of-band management?
; {, M0 y3 e9 T- ` bweb-based management ! T& Q% k# s B5 [ `2 M
console port
" N3 w8 b. ^- v, O" ?7 | Olat
+ U: p: I2 m2 a+ G5 Rtelnet 7 T- _% o0 Q; L* y8 n" b
4.spanning tree protocols puts a port in one of 5 states. which of the following is true of the forwarding state?
2 j& ~. z& G6 p* P9 @. qno frames are forwarded. bpdu’s are heard. ( n% t ?% o+ x$ G* k" x
no frames are forwarded. no bpdu’s are heard. & m8 F, D% R# r1 k" ]5 v, z
no frames are forwarded. learning addresses. + v p9 A8 O. t( l, b" z8 M+ I7 h: n
frames are forwarded. learning addresses. ( `5 x, {+ I, [/ }# Q+ ?6 @. \5 k
% t. E! h, {, P) d( B* S, l2 R r5.what security measures does CISCO suggest in the access layer of their recommended campus architecture?
2 G! e- t, z m2 `' e9 f. Sroute filtering : M$ ?2 b, u3 E# U. d1 a' T& Q9 ?
cisco recommends no security measures in the access layer " i7 U8 ~8 d8 G0 ~. g
device security such as passwords 9 u1 R& y8 s& L. m. D1 D
port security ' ]+ _& \" c7 f
9 |' h) D) t- W9 k3 i6.telnet access directly to a switch or router command uses what facility? - b+ a: A$ N% {9 G) {
slip / Q5 C" r8 g/ V& U
server & Z$ z7 `$ f9 b1 W
async port
6 ?9 x7 z3 a+ Y J G6 S0 a* ~line
+ w2 \7 V* q8 @4 j' _, O$ Y % ?& O$ x& y( X
7.what mechanism can be used to prevent ‘rogue’ hsrp routers from asserting high priorities and BEComing the active router? - k# N! L$ [% T# h7 J
md5 authentication may be used in hsrp messages
) @/ z8 F7 ~ J# Eplain text authentication may be used in hsrp messages
' N* x$ Y; E7 A+ m- mthe command ‘standby (group_number) access-group (access_list)’ is used to specify the routers that may participate in an hsrp group 8 J1 F# N% w) H' ~ G7 `
each hsrp router is explicitly configured with the address of the other routers in the group using the command ‘standby (group_number) (group_member_address)
! C7 D, ~% i1 t. h7 y
8 q# Q5 C$ X, Q8.what command will set duplex mode on a set based switch to half? + }- B: }2 r8 H" b
9.which of the following are true of a lan segmented with layer 2 switches?
* s3 U) r2 y0 [% b( Dpath determination is based on osi reference model layer2 information ' n5 |, T' J0 E
path determination is based on osi reference model layer3 information
$ y. `% C0 i Lpath determination is based on osi reference model layer4 information
* s8 d) M c, [, Z* Fit supports multiple high-speed data exchanges 5 t* X6 _6 |* y1 S
, k0 x! h' V& T8 P10.what will a catalyst switch do with a multicast (in default configuration)? + |; T& `( d9 ?, p$ Q3 w' a
learn the correct destinations # ^4 C7 E5 `0 ?1 z2 b' Q
flood the multicast frames out each port within the vlan on which it is received " F6 I' x! N5 Q0 ~, a) s
query the igmp designated router
: A8 ~/ [6 R! X$ Gquery the domain to determine multicast group membership |