You are on page 1of 23

Assessment System

Take Assessment - SWITCH Final Exam - CCNP SWITCH (Version 6.0)

1 Which phase of the Cisco Lifecycle Services approach includes building a network according to the design and verifying
that it performs according to specifications?
prepare phase

plan phase

design phase

implement phase

operate phase

optimize phase

2 What is required for SLA to capture one-way delays?
two IP SLA responders

a Round Trip Timer value

Network Time Protocol (NTP)
IP SLA source using TCP port 2020

3 What is the recommended maximum one-way latency when implementing video over IP for real-time video applications?
Latency is not a factor for a smooth video over IP implementation.

Latency should be defined for voice traffic only (not for video).

The recommended maximum one-way latency should not be more than 150 ms.

When mixed video and voice packets are included in the video stream, the latency should be 300 ms.

4 The TCAM defines three different match options that correlate to which three specific match regions? (Choose three.)
bifurcated match

longest match

second match

exact match

first match

third match

1

5 What device can be used to support Power over Ethernet (PoE) to power the access points?
a host computer

an IP phone

an Ethernet switch

a lightweight access point

6

Refer to the exhibit. A network administrator wants to verify the proper operations of the packet load sharing between a
group of redundant routers that are configured with GLBP. On the basis of the provided output, which router is the Active
Virtual Forwarder (AVF) for Host2?
the router with an IP address of 10.1.1.1

the router with an IP address of 10.1.1.2

the router with the virtual IP address of 10.1.1.254

the router with the IP address 10.1.1.1 and the router with the IP address 10.1.1.2

2

7 Refer to the exhibit. What is the result of the displayed configuration on switches ASW1 and ASW2? BPDU guard puts an interface that is configured for STP PortFast in the err-disable state upon receipt of a BPDU. BPDU guard places the uplink ports on a ASW1 and ASW2 into the STP loop-inconsistent blocking state when the ports stop receiving BPDUs. 8 Which benefit is provided by centralizing servers in a data center server farm? It keeps client-to-server traffic local to a single subnet. BPDU guard overrides the PortFast configuration and reverts to the default spanning tree configuration on the access ports. It is easier to filter and prioritize traffic to and from the data center. 3 . Servers that are located in a data center require less bandwidth. Server farms are not subject to denial of service attacks. BPDU guard forces the uplink ports on ASW1 and ASW2 to become designated ports to prevent DSW2 from becoming a root switch.

5. 11 How do FlexLink and STP operate together? If an active STP port is blocked. A routed port is a physical switch port with Layer 2 capability. 3. Which interfaces should be configured as routed ports? all interfaces on links 5 and 6 all interfaces on links 1. and 6 all interfaces between the distribution and the access switches 10 Which two statements are true about routed ports on a multilayer switch? (Choose two. the active FlexLink port will take over. 12 Which three parameters must be configured in order to enable SSH? (Choose three. STP can be active in the distribution layer. A routed port is not associated with a particular VLAN. but is unaware of any FlexLink updates in the access layer.9 A network administrator wants to implement inter-VLAN routing in the network. The interface vlan global configuration command is used to create a routed port. Both the active STP port and active FlexLink port can forward traffic simultaneously but only for different VLANs.) retries hostname timeouts domain name keys routing protocol 4 . Both the active STP port and active FlexLink port can forward traffic simultaneously. 4. 2. and 4 all interfaces on links 1. 2. 3.) A routed port behaves like a regular router interface and supports VLAN subinterfaces. To create a routed port requires removal of Layer 2 port functionality with the no switchport interface configuration command.

13 Which two statements are true about the default operation of STP in a Layer 2 switched environment that has redundant connections between switches? (Choose two. thereby creating a Layer 2 loop. Switch SW1 shuts down the Fa0/1 port and thus reinforces a new spanning-tree calculation.) The root switch is the switch with the highest speed ports. Switch SW1 negotiates the Fa0/2 port on SW2 to be in half-duplex mode and thus forces SW2 to become the root bridge for the spanning tree.) dictionary denial of service (DoS) replay MAC-address flooding password 5 . The link between switch SW1 and SW2 is manually configured as full duplex on SW2 and with half duplex on SW1. Switch SW2 negotiates the Fa0/1 port on SW1 to be in full-duplex mode which keeps SW1 as the root bridge for the spanning tree. Root switches have all ports set as root ports. 15 Which two types of attacks can be mitigated by port security? (Choose two. How could this impact the STP operations? Switch SW2 can move port Fa0/3 into a forwarding state. Nonroot switches each have only one root port. All trunking ports are designated and not blocked. 14 Refer to the exhibit. Decisions on which port to block when two ports have equal cost depend on the port priority and index.

1. and standby priority is set to 100. Switches DSw1 and DSw2 are configured with the HSRP virtual IP address 10. then DSw1 will be the active router.1. The HSRP group number in this HSRP configuration is HSRP group number 50. On the basis of this information.16 What is the most fundamental form of high availability when using Catalyst modular switches? Spanning Tree Protocol routing protocol First Hop Redundancy Protocol (FHRP) Supervisor Engine redundancy redundant switching modules 17 Refer to the exhibit. then DSw2 will be the active router.10. 6 .10.) Applying the standby 32 timers 10 30 command on the Gi0/2 interfaces of each switch would decrease the failover time. Virtual Router replies with the MAC address of the active router. If the DSw1 and DSw2 switches have been configured to preempt. which three HSRP statements are true? (Choose three.10. When host A sends an ARP request for 10. Assume both switches finish booting at the same time and HSRP is operating as expected. The standby track command is useful for tracking interfaces that are not configured for HSRP.10. If the DSw1 switch is configured with the standby preempt command and DSw2 is not.

What two effects will occur when a fourth distribution module is included in the campus enterprise network that is depicted in the exhibit? (Choose two.18 Refer to the exhibit. 19 What is the recommended maximum one-way jitter when implementing video over IP for real-time video applications? 1 ms 2 ms 5 ms 10 ms 20 When should a proactive management be performed within the stages of the Cisco Lifecycle Services? prepare phase plan phase design phase implement phase operate phase optimize phase 7 .) The inclusion of the fourth module will increase the routing complexity. It will provide scalability for future growth. It will impact the security of the traffic between the distribution switches. It will limit the traffic flow in the network. It will increase the number of additional links that are required to provide redundant connectivity.

24 What is a characteristic of a standalone WLAN solution? has no centralized monitoring has no centralized management has no centralized operational control has no centralized access authentication 8 . What port security mode is in effect? sticky shutdown restrict protect 22 What are two actions a hacker may take in a VLAN hopping attack? (Choose two. UDLD cannot be configured on interface Fa3/42. The difference in BPDUs sent and received indicates a loop caused by unidirectional link failure has been detected. Given that interface Fa3/42 is an active trunk port.21 When a port security violation occurs on a switch port. what two conclusions can be made based on the displayed output? (Choose two. If a spanning-tree loop is detected on VLAN 1. data traffic will be blocked for all VLANs on interface Fa3/42.1Q headers 23 Refer to the exhibit.) Root guard is not enabled on interface Fa3/42. the switch sends a syslog message but does not shut down the port. Interface Fa3/42 will not pass data traffic if it detects that it is part of a spanning-tree loop caused by unidirectional link failure.) replying to ARP requests that are intended for other recipients sending malicious dynamic trunking protocol (DTP) frames replying to DHCP requests that are intended for a DHCP server sending a unicast flood of Ethernet frames with distinct source MAC addresses sending frames with two 802.

Configure the links between DSW and the access switches as access links. What configuration will be required on the DSW switch in order to perform inter-VLAN routing for all VLANs that are configured on the access switches? Configure the routing protocol. Loop guard should be implemented on the Layer 2 ports between DSW1 and DSW2 and on the uplink ports from the access switches to the distribution switches. Configure as routed ports the DSW interfaces that face the access switches. Configure SVI for each VLAN in the network. 26 What is the purpose of the debug condition standby vlan vlan-id group-number command in troubleshooting HSRP? redirect the debug standby output for the referenced HSRP group to a syslog server on the specified VLAN block the debug standby output for the referenced VLAN and HSRP group display debug standby output only for HSRP traffic that is received by HSRP peers in the specified VLAN and group display debug standby output only for HSRP traffic that is sent to HSRP peers in the specified VLAN and group limit the output of the debug standby command to the specific VLAN interface and HSRP group 27 Which STP enhancement should be configured in the network to prevent a nondesignated port to transition to a forwarding state when a topology change occurs? Root guard should be implemented on the Layer 2 ports between the distribution switches. 9 . BPDU guard should be implemented on the Layer 2 ports between DSW1 and DSW2 and on the uplink ports from the access switches to the distribution switches. PortFast should be implemented on the uplink ports from the access switches to the distribution switches.25 Refer to the exhibit.

which conclusion can be made based on the output? Spanning-tree load balancing is in effect. Configure interfaces Fa0/2 and Fa0/3 on SW1 as trunk links. 29 Refer to the exhibit. 10 . PVRST+ is still operating on switch DLS1. PVST+ is still operating on switch DLS1. What additional configuration is required in order for users in VLAN 10 to communicate with the users in VLAN 20? Configure interface Fa0/1 on SW1 as a trunk. MST will require fewer resources than PVST+ or PVRST+. Remove the subinterfaces on R1 and configure interface Fa0/0 as a trunk. Configure VLAN 100 as a data VLAN and VLAN 1 as the native VLAN.28 Refer to the exhibit. Assuming that the switch is running Multiple Spanning Tree (MST). All VLANs are mapped to MST instance 2.

configure trunking between the router and the switch.30 Which statement is true concerning the core layer within the hierarchical design model? Remote users are granted access to the network through the core.1Q trunking? (Choose three. which acts as the front door to a network. Configure a routing protocol on the Layer 3 switch to include each interface. distribution lists. address translation. The core. Configure switch virtual interfaces. Routing should be configured without traffic filtering. 32 What three features are provided by IEEE 802. The core provides an optimized and reliable transport structure by using a combination of route summaries. and route maps. The result is that the router will have a virtual interface in each VLAN.) security resilience QoS support multivendor support relatively small frame overhead multicast support 33 Which multilayer switching forwarding method does Cisco Express Forwarding (CEF) use? route caching process switching silicon switching topology-based switching 11 . or other packet manipulation at the core. For each VLAN. is designed to prevent unauthorized users from gaining entry. 31 What is the most common method of configuring inter-VLAN routing on a Layer 3 switch? Configure the switch physical interface so that the router will have an interface in each VLAN.

34 Refer to the exhibit.) VLAN ID ACL information destination MAC address QoS information source MAC address hash key 12 . 35 Which two items in the TCAM table are referenced in the process of forwarding a packet? (Choose two. The implementation of IGP routing protocols will be limited. The implementation of scalability that is required during future growth will be limited. The implementation of EtherChannels on redundant links will exceed the bandwidth. What restriction will be presented in a campus enterprise network that is designed with four large distribution building blocks? The implementation of link aggregation will be limited.

36 Refer to the exhibit. Edge ports never generate topology change notifications (TCNs) when the port transitions to a disabled or enabled status. local username and password RADIUS server and. if that fails. local username and password TACACS+ server TACACS+ server and. How will someone dialing in be authenticated? local username and password TACACS+ server RADIUS server and. TACACS+ server 37 Which three statements about RSTP edge ports are true? (Choose three. The exhibit contains the configuration for a Cisco access device. Edge ports immediately transition to learning mode and then forwarding mode when enabled. Edge ports can have another switch connected to them as long as the link is operating in full duplex. If an edge port receives a BPDU. if that fails. it becomes a normal spanning-tree port. 13 .) Edge ports function similarly to UplinkFast ports. Edge ports should never connect to another switch. if that fails.

38 Refer to the exhibit. What two conclusions can be made based on the output? (Choose two. The default spanning-tree timers have been adjusted. 14 . Switch DLS1 is not the root bridge for VLAN 1. That Fa0/12 is displaying the alternate port role indicates that PVRST+ is enabled.) Interfaces Fa0/1 through Fa0/6 are trunk ports. The Cost column in the lower part of the exhibit is not the cumulative root path cost.

The indicated configuration was established on the HSRP standby router RTB. Disable and re-enable all ports on the distribution switches. The subnet mask is missing from the standby ip 10. The group number 50 is missing in the Router RTB configuration commands.1. The priority number 150 is missing in the Router RTB configuration commands. What action should be taken by a network administrator to restore connectivity? Disable ports that should be in the blocking state. Disable all ports on the distribution switches and replace with new switches. The ports on the switch must be configured with the spanning-tree PortFast feature. However. Given the output of the show standby brief command on RTA.1. 40 A bridging loop occurs in a network and disrupts user connectivity. the console message %IP-4-DUPADDR started appearing almost immediately on the RTB router. what is the cause of the problem? The command standby preempt should only be applied on the active router.1 command.39 Refer to the exhibit. The virtual IP address should be the same as the active router. Disable ports that should be in the forwarding state.) wide coverage because of the fact that a VLAN can be geographically dispersed throughout the network ease of management because local VLANs are typically confined to the building access submodule high availability because redundant paths exist at all infrastructure levels broad expansion domain because the number of devices on each VLAN can easily be added to IP address conservation because address blocks can be allocated to VLANs 15 . 41 What are two benefits of local VLANs in the Enterprise Campus Network? (Choose two.

42 How many physical links can comprise a single PAgP EtherChannel on a Catalyst 3560 switch? (Choose three.) 2 5 8 10 12 13 16 43 Catalyst Catalyst 6500 switches support which three Supervisor Engine redundancy features? (Choose three.) Route Processor Redundancy+ (RPR+) distributed CEF (dCEF) Stateful Switchover (SSO) Resilient Packet Ring (RPR) Nonstop Forwarding (NSF) Per Line Card Traffic Policing 16 .

) using a non-trunk link to connect switches using non-Cisco switches configuring all switches to be in VTP server mode not using any VTP passwords on any switches using lowercase on one switch and uppercase on another switch for domain names having a VTP transparent switch in between a VTP server switch and a VTP client switch (all switches in the same VTP domain) 17 .44 Refer to the exhibit. What is the problem between the connection on Switch1 and Switch2? native VLAN mismatch encapsulation mismatch switchport mode mismatch VTP mismatch DTP mismatch hardware failure 45 Which three actions can cause problems with a VTP implementation? (Choose three.

such as security.) native VLAN mismatch unassigned management VLAN Layer 2 interface mode incompatibilities missing default VLAN mismatched trunk encapsulations PAgP not enabled 18 . and improved application performance to every office. 50 Which three issues can cause devices to become disconnected across a trunk link? (Choose three. What feature does an SNMP manager need to be able to set a parameter on ACSw1? a manager who is using an SNMP string of K44p0ut a manager who is using an Inform Request MIB a manager who is using host 192.168. The QoS requirements should accommodate the bursty nature of voice traffic. The QoS requirements should accommodate the intensive demand on bandwidth for voice traffic.5 a manager who is using authPriv 47 Which architecture enables enterprises to offer important network services. low latency. a network engineer discovers that suboptimal paths are being used for upstream traffic. The QoS requirements should accommodate the smooth demand on bandwidth. regardless of its size or proximity to headquarters? Cisco Enterprise Campus Architecture Cisco Enterprise Data Center Architecture Cisco Enterprise Branch Architecture Cisco Enterprise Teleworker Architecture 48 When troubleshooting GLBP in an environment with a VLAN that spans multiple access layer switches. new communication services. Configure spanning tree so that the spanning-tree topology adjusts with the GLBP active virtual forwarder (AVF). and delay for voice traffic. Adjust the GLBP timers. Disable GLBP preemption on all route processors. What is the recommended solution? Use HSRP instead of GLBP.0.46 Refer to the exhibit. 49 Which QoS requirement should be taken into account when implementing VoIP in a campus environment? The QoS requirements should accommodate the best effort delivery for voice traffic.

Ports Fa0/1. Only ports Fa0/1 and Fa0/2 can send and receive all DHCP messages. and Fa0/24 can send and receive all DHCP messages. Fa0/2. For all intercepted packets. Based on the provided show ip dhcp snooping command. which statement is true? Only port Fa0/24 can send and receive all DHCP messages. All intercepted packets that come from trusted ports are sent to untrusted ports only. 52 Refer to the exhibit. Fa0/2. 19 . Ports Fa0/1.51 Which statement correctly explains the process of mitigating ARP attacks on a switch where dynamic ARP inspection (DAI) has been configured? All intercepted packets that come from untrusted ports are dropped. and Fa0/24 can send and receive only DHCP requests. an ARP request is sent to the DHCP server for IP-to-MAC address resolution. The intercepted packets are verified against the DHCP snooping binding table for valid IP-to-MAC bindings.

53 Refer to the exhibit. What statement is true about the way HSRP is configured? 20 .

Configure the Weighted Random Early Detection (WRED) congestion avoidance mechanism to guarantee that the voice traffic will be placed in the priority queue. If the Ethernet cables between switch DLS2 and switch ALS1 were severed.) Keep voice and data traffic in the same VLAN and mark the traffic for high priority treatment. and 20. Payroll Host would not be able to reach SQL Server. Issuing the show standby command on switch DSL2 will reveal that the HSRP state for VLAN 30 is standby. 21 . Configure QoS policy to classify the voice traffic in the priority queue to guarantee reserved bandwidth allocation for the traffic. 54 How should a switch port be configured for a connection to a standalone wireless access point that provides multiple VLAN-separated SSIDs? as a trunk port as a routed port as an access port as a switched virtual interface 55 What are three possible misconfigurations or indicators of misconfigurations on a Layer 3 interface? (Choose three. a type of load balancing is occurring. Switch DLS2 is the standby router for VLANs 30 and 40.) wrong IP address or subnet mask ports in the wrong VLAN mismatch between SVI and VLAN numbering disabled VTP pruning downed SVI ACL on wrong interface 56 Which two procedures should be implemented and in place when deploying VoIP in a campus network? (Choose two. By setting different priorities on different VLANs. Create voice VLANs to keep voice traffic separate from other data to ensure special handling of the traffic. Issuing the show standby command on switch DSL1 will reveal that the HSRP state for VLAN 10 is standby. Switch DLS1 is the standby router for VLANs 1. Configure traffic shaping QoS policy to guarantee minimum delay for the voice traffic.10.

What happens if interface gigabitEthernet 5/1 on SwitchA stops receiving UDLD packets? UDLD stops trying to establish a connection with the neighbor. UDLD changes the port to loop-inconsistent blocking state. 22 . Configure SVI for each VLAN in the network. Configure 802.1 Q encapsulation on routed ports. Disable Layer 2 functionality on interfaces that will be configured as routed ports.) Enable IP routing globally. Disable Power over Ethernet (PoE) on the physical Layer 3 interfaces. Assign IP addresses to routed ports.57 Refer to the exhibit. 58 Which three steps are required to configure interfaces as routed ports on a multilayer Catalyst switch? (Choose three. UDLD changes the port state to err-disable. UDLD sends hello messages to its neighbor at a rate of one per second to attempt to recover the connection.

PortFast is enabled.) BPDU guard is enabled. Trunking is disabled. Channel group is disabled. Cisco Discovery Protocol (CDP) is disabled. VLAN trunking protocol (VTP) is disabled. 60 What type of queuing provides the best quality for voice applications? custom queuing FIFO queuing priority queuing weighted round robin (WRR) queuing 23 .59 Which three actions are taken when the command switchport host is entered on a switch port? (Choose three.