SB&W: Exam CH 3 & 4

Description

SB&W Exam CH 3&4
Anthony Schulmeister
Quiz by Anthony Schulmeister, updated more than 1 year ago
Anthony Schulmeister
Created by Anthony Schulmeister about 8 years ago
37
0

Resource summary

Question 1

Question
When a range of ports is being configured for EtherChannel by the use of PAgP, which mode will form the bundled channel only if the port receives PAgP packets from another device?
Answer
  • desirable
  • auto
  • passive
  • active

Question 2

Question
Refer to the exhibit. A network administrator issued the show etherchannel summary command on the switch S1. What conclusion can be drawn?
Answer
  • The EtherChannel is suspended.
  • The EtherChannel is not functional.
  • FastEthernet ports Fa0/1, Fa0/2, and Fa0/3 do not join the EtherChannel.
  • The port aggregation protocol PAgP is misconfigured.

Question 3

Question
Which command will initiate EtherChannel interface configuration mode?
Answer
  • channel-group group-identifier
  • interface interface-identifier
  • interface range interface-identifier
  • interface port-channel interface-identifier

Question 4

Question
Which statement describes a characteristic of EtherChannel?
Answer
  • It can combine up to a maximum of 4 physical links.
  • It consists of multiple parallel links between a switch and a router.
  • It is made by combining multiple physical links that are seen as one link between two switches.
  • It can bundle mixed types of 100 Mb/s and 1Gb/s Ethernet links.

Question 5

Question
The trunk link between two 2960 switches has reached its capacity. How can this be addressed in the most economical way?
Answer
  • Decrease the size of the inter-switch collision domain by configuring additional VLANs.
  • Combine physical ports into a high-speed logical link by configuring EtherChannel.
  • Increase the speed of the ports.
  • Create additional broadcast domains by inserting a router between the switches.

Question 6

Question
Which three settings must match in order for switch ports to form an EtherChannel? (Choose three.)
Answer
  • The switch port numbers that will be combined to form the EtherChannel must match.
  • Port security settings on the connected physical interfaces must be configured to the same violation mode.
  • The interfaces must be configured to the same speed.
  • Non-trunk ports must belong to the same VLAN.
  • The duplex settings of the switch ports on both sides of the physical link must match.
  • The SNMP community strings must be configured the same.

Question 7

Question
Which two protocols are link aggregation protocols? (Choose two.)
Answer
  • 802.3ad
  • RSTP
  • STP
  • PAgP
  • EtherChannel

Question 8

Question
What is a best practice to use before beginning an EtherChannel implementation?
Answer
  • Assign affected interfaces to VLAN 1.
  • Enable each of the affected interfaces.
  • Assign affected interfaces to the management VLAN
  • Assign affected interfaces to an unused VLAN.
  • Shut down each of the affected interfaces

Question 9

Question
Refer to the exhibit. A network administrator has decided that an EtherChannel between ports 0/1 and 0/2 on switches S1 and S2 would help performance. After making the configuration, the administrator notices no performance gain. Based on the output that is shown, what two assumptions can the network administrator make? (Choose two.)
Answer
  • Switch S2 did not use a compatible EtherChannel mode
  • The EtherChannel bundle is not working.
  • LACP and PAgP were both used to form the EtherChannel
  • One of the ports on S2 was not configured correctly
  • Switch S2 must be configured so that the maximum number of port channels is increased.
  • The EtherChannel bundle is working.

Question 10

Question
Refer to the exhibit. Which switching technology would allow each access layer switch link to be aggregated to provide more bandwidth between each Layer 2 switch and the Layer 3 switch?
Answer
  • EtherChannel
  • trunking
  • HSRP
  • PortFast

Question 11

Question
Refer to the exhibit. The administrator tried to create an EtherChannel between S1 and the other two switches via the commands that are shown, but was unsuccessful. What is the problem?
Answer
  • Traffic can only be sent to two different switches if EtherChannel is implemented on Gigabit Ethernet interfaces.
  • Traffic cannot be sent to two different switches through the same EtherChannel link.
  • Traffic can only be sent to two different switches if EtherChannel is implemented on Layer 3 switches.
  • Traffic cannot be sent to two different switches, but only to two different devices like an EtherChannel-enabled server and a switch.

Question 12

Question
A network administrator is configuring an EtherChannel link between switches SW1 and SW2 by using the command SW1(config-if-range)# channel-group 1 mode passive. Which command must be used on SW2 to enable this EtherChannel?
Answer
  • SW2(config-if-range)# channel-group 1 mode active
  • SW2(config-if-range)# channel-group 1 mode passive
  • SW2(config-if-range)# channel-group 1 mode desirable
  • SW2(config-if-range)# channel-group 1 mode auto

Question 13

Question
An EtherChannel link using LACP was formed between two switches, S1 and S2. While verifying the configuration, which mode combination could be utilized on both switches?
Answer
  • S1-passive and S2-passive
  • S1-passive and S2-active
  • S1-on and S2-active
  • S1-on and S2-passive

Question 14

Question
Which two load balancing methods can be implemented with EtherChannel technology? (Choose two.)
Answer
  • destination IP to destination MAC
  • destination IP to source IP
  • source IP to destination IP
  • source MAC to destination MAC
  • destination MAC to source MAC
  • destination MAC to destination IP

Question 15

Question
Which statement describes an EtherChannel implementation?
Answer
  • A trunked port can be part of an EtherChannel bundle.
  • PAgP cannot be used in conjunction with EtherChannel.
  • EtherChannel operates only at Layer 2.
  • EtherChannel can support up to a maximum of ten separate links

Question 16

Question
Which PAgP mode combination will establish an EtherChannel?
Answer
  • switch 1 set to on; switch 2 set to desirable.
  • switch 1 set to desirable; switch 2 set to desirable.
  • switch 1 set to auto; switch 2 set to auto
  • switch 1 set to auto; switch 2 set to on.

Question 17

Question
Which statement is true regarding the use of PAgP to create EtherChannels?
Answer
  • It mandates that an even number of ports (2, 4, 6, etc.) be used for aggregation.
  • It requires more physical links than LACP does
  • It is Cisco proprietary
  • It requires full duplex.
  • It increases the number of ports that are participating in spanning tree.

Question 18

Question
When a range of ports is being configured for EtherChannel, which mode will configure LACP so that it initiates the EtherChannel negotiation?
Answer
  • active
  • desirable
  • auto
  • passive

Question 19

Question
What are two advantages of using LACP? (Choose two.)
Answer
  • increases redundancy to Layer 3 devices
  • eliminates the need for the spanning-tree protocol
  • allows use of multivendor devices
  • provides a simulated environment for testing link aggregation
  • allows automatic formation of EtherChannel links
  • decreases the amount of configuration that is needed on a switch for EtherChannel

Question 20

Question
Which three Wi-Fi standards operate in the 2.4GHz range of frequencies? (Choose three.)
Answer
  • 802.11b
  • 802.11n
  • 802.11g
  • 802.11a
  • 802.11ac

Question 21

Question
Which encryption protocol is used by the WPA2 shared key authentication technique? [blank_start]AES[blank_end]
Answer
  • AES

Question 22

Question
A network administrator discovers a rogue AP in the network. The rogue AP is capturing traffic and then forwarding it on to the legitimate AP. This type of attack is known as a [blank_start]man in the middle[blank_end] attack.
Answer
  • man in the middle

Question 23

Question
Ad hoc wireless topologies sometimes can use a feature called [blank_start]tethering[blank_end] to enable a smartphone to create a personal hotspot.
Answer
  • tethering

Question 24

Question
Which type of wireless topology is created when two or more Basic Service Sets are interconnected by Ethernet?
Answer
  • WiFi Direct
  • ad hoc WLAN
  • ESS
  • IBISS
  • BSS

Question 25

Question
A supervisor needs wireless access in the construction office during the construction of a new building. The construction office is in the new building and directly across the road from headquarters. What could be used to satisfy this requirement of needing a narrow area of coverage?
Answer
  • multiple MIMO antennas
  • Yagi
  • rubber duck
  • omnidirectional

Question 26

Question
Which IEEE wireless standard is known as WiGig and operates using a tri-band solution in the 2.4, 5, and 60 GHz ranges?
Answer
  • 802.11ac
  • 802.11g
  • 802.11n
  • 802.11ad

Question 27

Question
A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network?
Answer
  • Split the traffic between the 2.4 GHz and 5 GHz frequency bands.
  • Replace the wireless NICs on the computers that are experiencing slow connections.
  • Disable DHCP on the access point and assign static addresses to the wireless clients.
  • Upgrade the firmware on the wireless access point

Question 28

Question
Which parameter is commonly used to identify a wireless network name when a home wireless AP is being configured?
Answer
  • SSID
  • ESS
  • BESS
  • ad hoc

Question 29

Question
What is an advantage of SSID cloaking?
Answer
  • It provides free Internet access in public locations where knowing the SSID is of no concern.
  • It is the best way to secure a wireless network.
  • Clients will have to manually identify the SSID to connect to the network
  • SSIDs are very difficult to discover because APs do not broadcast them

Question 30

Question
Which two roles are typically performed by a wireless router that is used in a home or small business? (Choose two.)
Answer
  • repeater
  • WLAN controller
  • Ethernet switch
  • access point
  • RADIUS authentication server

Question 31

Question
Which security mode is the least secure choice when a home wireless router is configured?
Answer
  • WPA2-Personal
  • WPA
  • WPA2
  • WEP

Question 32

Question
A student uses a laptop to upload an assignment to a file server. Which wireless frame type did the laptop send to locate and associate with the campus access point?
Answer
  • control frame
  • data frame
  • management frame
  • beacon frame

Question 33

Question
For which discovery mode will an AP generate the most traffic on a WLAN?
Answer
  • mixed mode
  • passive mode
  • open mode
  • active mode

Question 34

Question
Which statement defines the control frame operation between two stations?
Answer
  • A station responds to an RTS frame with an ACK frame, thus providing permission for the requesting station to send a data frame.
  • If the sending station does not receive an ACK frame within a predetermined period of time, the sending station will drop the connection
  • A station sends an RTS frame as the first step in a three-way handshake that is required before sending data frames.
  • After receiving a data frame, the receiving station will send an ACK frame to the sending station if no errors are found.

Question 35

Question
During which stage of establishing connectivity between a WLAN client and an AP does the client learn the MAC address of the AP?
Answer
  • probing
  • discovery
  • authentication
  • encryption
  • association

Question 36

Question
What is the purpose of the Distributed Coordination Function in an IEEE 802.11 WLAN environment?
Answer
  • It is used to send data over a half-duplex connection
  • It is used in a full-duplex environment to detect collisions.
  • It allows a client to detect whether or not a channel is clear prior to transmission.
  • It allows the client to change transmission channels.

Question 37

Question
If three 802.11b access points need to be deployed in close proximity, which three frequency channels should be used? (Choose three.)
Answer
  • 1
  • 3
  • 5
  • 6
  • 8
  • 11

Question 38

Question
Which feature of 802.11n wireless access points allows them to transmit data at faster speeds than previous versions of 802.11 Wi-Fi standards did?
Answer
  • WPS
  • MITM
  • SPS
  • MIMO

Question 39

Question
An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation?
Answer
  • spoofing
  • denial of service
  • rogue access point
  • cracking
Show full summary Hide full summary

Similar

Tips for Succeeding on the Day of the Exam
Jonathan Moore
The GoConqr Guide to End of Term Exams
Sarah Egan
GCSE Chemistry C3 (OCR)
Usman Rauf
GCSE History: The 2014 Source Paper
James McConnell
AQA Biology B2 Unit 2.1 - Cells Tissues and Organs
BeccaElaine
A View from the Bridge Quotes
Emma Payne
A-level English Language Power & Gender Theories
Libby Shaw
NCEA Guide to Studying
Kerrin _
GRE Prep - Reading Comprehension
Abood
Why the Nazis Achieved Power in 1933 - essay intro/conclusion
Denise Draper
core biology gcse
Meg Jackson