1 What is the purpose of VLAN trunking? It carries the traffic of multiple VLANs through a single link. 2 Both switches are configured with default bridge priority. Which port will act as the STP root port if all links are operating at the same bandwidth? 1. determine root switch: S2 2. default priority is 32768 3. port-priority higher with lower number: Fa0/2 has higher priority 4. S1Fa0/2 is root port 5. S1Fa0/1 will be blocked 3 The network administrator wants to configure Switch1 to allow SSH connections and prohibit Telnet connections. How should the network administrator change the displayed configuration to satisfy the requirement? Modify the transport input command. 4 Which two facts about STP can be determined from the displayed output? (Choose two.) Root FWD is the root port of switch S1. Altn BLK is the redundant link. 5 Which statement correctly describes the spanning-tree path cost? It is calculated based on the utilization of all the switches along a given path. 6 What are two requirements for configuring inter-VLAN routing using the router-on-a-stick model? Each subinterface should be configured with its own IP address, subnet mask, and unique VLAN assignment. The physical interface of the router must be connected to a trunk link on the adjacent switch. 7 sub-interfaces Which two options correctly describe the router configuration that is shown? The configuration is appropriate for a router-on-a-stick network design. Trunking has been appropriately configured on the router subinterfaces. 8 802.1q What is true of the configuration of switch S1? Switch ports Fa0/1 and Fa0/3 are configured to carry data from multiple VLANs. 9 Switches S2 and S3 are properly connected using an ethernet cable. A network administrator has configured both switches with VTP, but S3 is unable to propagate VLANs to S2. What could be the reason for this? The VTP domains are different on both switches. 10 Router R1 is properly configured for router on a stick inter-VLAN routing, but PC1 is unable to ping PC2. What needs to be done to resolve the problem? Configure the Fa0/1 port of S1 as a trunk port. 11 Router R-West and switch S-West1 are connected via a single ethernet cable between the router interface fa0/0 and the switch interface fa0/1. The router and switch have been configured with the commands that are displayed in the exhibit. The network administrator enters the show interfaces trunk command and receives the output as shown. What is the cause of the "not-trunking" status for switch port Fa0/1? Because the router does not support Dynamic Trunking Protocol, the trunk has not been established. 12 All trunk links are operational and all VLANs are allowed on all trunk links. An ARP request is sent by computer 5. Which device or devices will receive this message? computer 3 and RTR-A 13 A network administrator enters the displayed commands to configure VLAN 30. What is the result of running these commands? VLAN 30 will be added to the VLAN database of S3 but will not be propagated to S4, S2 or S1. 14 VTP pruning is enabled in the VTP domain that is shown. How will switch ST-1 handle Layer 2 broadcast traffic originating from host A on switch ST-C? It will be forwarded out port Fa0/5 only. 15 The devices in the network are operational and configured as indicated in the exhibit. However, hosts A and D cannot ping each other. What is the most likely cause of this problem? The Fa0/11 interface of Switch1 is not configured as a trunk. 16 After unpacking a new Linksys WRT300N wireless multifunction device, a user needs to change the default administrator password and make other configuration changes. What must the user do to access the device in order to make these changes? Establish a wired connection from a computer in the same IP subnet as the WRT300N and enter the default IP address of the device into a web browser on the computer. 17 How is port Gi1/1 on SWT-A functioning in the spanning-tree topology? It is sending and receiving data frames. 18 The switches have been configured as shown. The hosts that are connected to switch 101-2FL are not able to communicate with the hosts in their corresponding VLANs that are connected to switch 101-3FL. What should be done to fix the problem? Configure port Fa0/2 on switch 101-3FL as a static trunk link. 19 After listening for the presence of a signal on the network media, hosts A and C transmit data at the same time. In what two ways do the hosts respond to this situation? (Choose two.) The hosts transmit a jam signal to ensure that all hosts on the network are aware that a collision has occured. After the backoff period of a host, the host checks to determine if the line is idle before retransmitting. 20 When configuring a router to act as an SSH server, what should be configured before issuing the crypto key generate rsa command? the IP domain name 21 Content Addressable Memory (CAM) MAC-address table Which statement regarding the service password-encryption command is true? The service password-encryption command encrypts all previously unencrypted passwords in the running configuration. 22 Which statement correctly describes the function of a Layer 2 switch? It automatically uses STP to prevent switching loops in redundant topologies. 23 Which three statements are correct concerning the default configuration of a new switch? (Choose three.) It is configured in VTP server mode. STP is automatically enabled. All switch ports are assigned to VLAN1. 24 Which two statements are correct about wireless infrastructure components? (Choose two.) An AP converts the TCP/IP data packets from their 802.11 frame encapsulation format to the 802.3 Ethernet frame format on the wired Ethernet network. The wireless router performs the roles of AP and router. 25 A new switch is to be added to an existing network in a remote office. The network administrator does not want the technicians in the remote office to be able to add new VLANs to the switch, but the switch should receive VLAN updates from the VTP domain. Which two steps must be performed to configure VTP on the new switch to meet these conditions? (Choose two.) Configure the existing VTP domain name on the new switch. Configure the new switch as a VTP client. 26 Which two statements describe Spanning Tree Protocol? (Choose two.) It is only used at Layer 2. It eliminates Layer 2 loops in network topologies. 27 What are three benefits of employing a hierarchical network design? (Choose three.) Hierarchically designed networks can more easily be expanded to suit future needs. Hierarchical design models enhance existing bandwidth through the use of link aggregation. The hierarchical model allows for specialized functionality at each layer, simplifying device management. 28 What provides an authentication mechanism for 802.11-based wireless networks? WPA 29 What is the effect of setting the security mode to WEP on the Linksys integrated router? WEP encrypts data between the wireless client and the access point.