Loading questions...
Updated
Instructions -
✑ Enter IOS commands on the device to verify network operation and answer the multiple-choice questions.
✑ THIS TASK DOES NOT REQUIRE DEVICE CONFIGURATION.
✑ Click on SW1, SW2, New_Switch or SW4 to gain access to the consoles of these devices. No console or enable passwords are required.
✑ To access the multiple-choice questions, click on the numbered boxes on the left of the top panel.
✑ There are four multiple-choice questions with this task. Be sure to answer all four questions before selecting the Next button
Scenario -
You have been asked to install and configure a new switch in a customer network. Use the console access to the existing and new switches to configure and verify correct device configuration.
Topology -
Instructions -
✑ Enter IOS commands on the device to verify network operation and answer the multiple-choice questions.
✑ THIS TASK DOES NOT REQUIRE DEVICE CONFIGURATION.
✑ Click on SW1, SW2, New_Switch or SW4 to gain access to the consoles of these devices. No console or enable passwords are required.
✑ To access the multiple-choice questions, click on the numbered boxes on the left of the top panel.
✑ There are four multiple-choice questions with this task. Be sure to answer all four questions before selecting the Next button
Scenario -
You have been asked to install and configure a new switch in a customer network. Use the console access to the existing and new switches to configure and verify correct device configuration.
Topology -
An access switch has been configured with an EtherChannel port. After configuring SPAN to monitor this port, the network administrator notices that not all traffic is being replicated to the management server. What is a cause for this issue?
Which technique allows specific VLANs to be strictly permitted by the administrator?
A network engineer is extending a LAN segment between two geographically separated data centers. Which enhancement to a spanning-tree design prevents unnecessary traffic from crossing the extended LAN segment?
When you design a switched network using VTPv2, how many VLANs can be used to carry user traffic?
What does the command vlan dot1q tag native accomplish when configured under global configuration?
Which statement about Cisco Discovery Protocol configuration on a Cisco switch is true?
Which VTP mode is needed to configure an extended VLAN, when a switch is configured to use VTP versions 1 or 2?
Refer to the exhibit.
Which VLAN range is eligible to be pruned when a network engineer enables VTP pruning on a switch?
Which statement about using native VLANs to carry untagged frames is true?
A network engineer must improve bandwidth and resource utilization on the switches by stopping the inefficient flooding of frames on trunk ports where the frames are not needed. Which Cisco IOS feature can be used to achieve this task?
Refer to the exhibit.
Which statement about using EtherChannel on Cisco IOS switches is true?
Refer to the exhibit.
Refer to the exhibit.
Which statement about restrictions for multichassis LACP is true?
SIMULATION -
Scenario:
You work for SWITCH.com. They have just added a new switch (SwitchB) to the existing network as shown in the topology diagram.
RouterA is currently configured correctly and is providing the routing function for devices on SwitchA and SwitchB. SwitchA is currently configured correctly, but will need to be modified to support the addition of SwitchB. SwitchB has a minimal configuration. You have been tasked with competing the needed configuring of
SwitchA and SwitchB. SwitchA and SwitchB use Cisco as the enable password.
All commands must be entered at the physical interface level.
Configuration Requirements for SwitchA
The VTP and STP configuration models on Switch A should not be modified.
✑ SwitchA needs to be the root switch for vlans 11, 12, 13, 21, 22, and 23. All other vlans should be left at their default values.
Configuration Requirements for SwitchB
✑ Vlan21
After port security is deployed throughout an enterprise campus, the network team has been overwhelmed with port reset requests. They decide to configure the network to automate the process of re-enabling user ports. Which command accomplishes this task?
Which private VLAN can have only one VLAN and be a secondary VLAN that carries unidirectional traffic upstream from the hosts toward the promiscuous ports and the gateway?
On which interface can port security be configured?
Which command creates a login authentication method named "login" that will primarily use RADIUS and fail over to the local user database?
What is the maximum number of switches that can be stacked using Cisco StackWise?
SIMULATION -
You have been tasked with configuring multilayer SwitchC, which has a partial configuration and has been attached to RouterC as shown in the topology diagram.
You need to configure SwitchC so that Hosts H1 and H2 can successfully ping the server S1. Also SwitchC needs to be able to ping server S1.
Due to administrative restrictions and requirements you should not add/delete vlans or create trunk links. Company policies forbid the use of static or default routing. All routes must be learned via EIGRP 65010 routing protocol.
You do not have access to RouteC. RouterC is correctly configured. No trunking has been configured on RouterC.
Routed interfaces should use the lowest host on a subnet when possible. The following subnets are available to implement this solution:
10.10.10.0/24
190.200.250.32/27
190.200.250.64/27
Hosts H1 and H2 are configured with the correct IP address and default gateway.
SwitchC uses Cisco as the enable password.
Routing must only be enabled for the specific subnets shown in the diagram.
Note: Due to administrative restrictions and requirements you should not add or delete VLANs, changes VLAN port assignments or create trunks. Company policies forbid the use of static or default routing. All routes must be learned via the EIGRP routing protocol.
You are adding new VLANs. VLAN500 and VLAN600 to the topology in such way that you need to configure SW1 as primary root for VLAN 500 and secondary for
VLAN 600 and SW2 as primary root for VLAN 600 and secondary for VLAN 500. Which configuration step is valid?
Examine the VTP configuration. You are required to configure private VLANs for a new server deployment connecting to the SW4 switch. Which of the following configuration steps will allow creating private VLANs?
Which option shows the expected result if a show vlan command is issued?
A.
B.
C.
D.
Which EtherChannel negotiation protocol is configured on the interface f0/13 f0/15?
f1/0 and f1/1 have the same end-to-end path cost to the designated bridge. Which action is needed to modify the Layer 2 spanning-tree network so that traffic for
PC1 VLAN from switch SW3 uses switchport f1/1 as a primary port?
Why would the switch be considered as a root bridge?