QUESTION 1 You are a technician at Cisco Highway. Your newly appointed Cisco Highway trainee wants you to describe the concept 'NetFlow traffic flow' to her. What would your reply be?
A. It is a sequence of packets between a particular source and destination.
B. It is a uni-directional sequence of packets between a particular source and destination.
C. It is a bi-directional sequence of packets between a particular source and destination.
D. It is a multi-directional sequence of packets between a particular source and destination. Answer: A Explanation: A NetFlow export-enabled device is one that has been configured to operate with Cisco IOS NetFlow Services software (see Appendix A) in a way that enables the device to export information about traffic flows between communicating end nodes in a network. For NetFlow data export, traffic flows in a network have the following attributes in common:
Source and destination autonomous system (AS) numbers
Source and destination IP addresses
Source and destination application port numbers
Input interfaces
IP type of services (ToS)
IP protocol Reference: http://www.cisco.com/en/US/products/sw/netmgtsw/ps1974/products_installation_guide_chapter09186a008008 0774.html
QUESTION 2 You are a technician at Cisco Highway. You inform your newly appointed Cisco Highway trainee that Cisco's Architecture for Voice, Video and Integrated Data (AVVID) addresses a number of concerns when it comes to network deployment. Your trainee now wants to know what represents intelligent network services in Cisco's AVVID? What would your reply be? (Choose all that apply.)
A. Quality of Service (QoS)
B. Intelligent platforms
C. Mobility and scalability
D. Security
E. High availability Answer: A, C, D, E Explanation: By creating a robust foundation of basic connectivity and protocol implementation, Cisco AVVID Network Infrastructure addresses five primary concerns of network deployment:
High availability
Quality of service (QoS)
Security
Mobility and
Scalability Reference: http://www.cisco.com/en/US/netsol/netwarch/ns19/ns24/networking_solutions_audience_business_benefit0918 6a008009d678.html
QUESTION 3 You are a technician at Cisco Highway. You inform your newly appointed Cisco Highway trainee that some Cisco switches perform processing such as Access Control List (ACL) in hardware. Your trainee now wants to know what action will take place if the hardware reaches its maximum storage capacity of ACLs What would your reply be? (Choose all that apply.)
A. Packets are dropped.
B. Packet filtering will be accomplished.
C. Performance is increased.
D. Performance is decreased. Answer: B D Explanation: Determining if the ACL Configuration Fits in Hardware As previously stated, ACL processing in the Catalyst 3550 switch is mostly accomplished in hardware. However, if the hardware reaches its capacity to store ACL configurations, the switch software attempts to fit a simpler configuration into the hardware. This simpler configuration does not do all the filtering that has been configured, but instead sends some or all packets to the CPU to be filtered by software. In this way, all configured filtering will be accomplished, but performance is greatly decreased when the filtering is done in software. Reference: http://www.cisco.com/en/US/products/hw/switches/ps646/products_configuration_guide_chapter09186a008007 e701.html
QUESTION 4 Which of the following captures the speed of switching and scalability of routing?
A. Layer 3 switching
B. Fast switching
C. Layer 2 routing
D. Process routing Answer: A Explanation: Layer 3 switching is hardware-based routing. In particular, packet forwarding is handled by specialized hardware ASICs. A layer 3 switch does everything to a packet that a traditional router does. Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 18
QUESTION 5 Drag and drop the type of flow mask used with Multiplayer Switching (MLS) in the options column to the statement that defines its character in the target column.
Answer: Destination-IP - Used when no access list are configured Source- Destination -IP - Used when standard access list is configured IP-Flow - Used when extended access list is configured Explanation: Flow Mask
Destination-IP - This mode is used if no access list are configured on any of the MLS router interfaces.
Source- Destination -IP - This mode is used if there is a standard access list on any of the MLS interfaces.
IP-Flow -This mode is used if there is an extended access list on any MLS interfaces. Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 234-235
QUESTION 6 Which of the following features of VLAN maps do not contain a match clause?
A. Implicit deny feature at end of list.
B. Implicit deny feature at start of list.
C. Implicit forward feature at end of list
D. Implicit forward feature at start of list. Answer: A Explanation: Each VLAN access map can consist of one or more map sequences, each sequence with a match clause and an action clause. The match clause specifies IP, IPX, or MAC ACLs for traffic filtering and the action clause specifies the action to be taken when a match occurs. When a flow matches a permit ACL entry the associated action is taken and the flow is not checked against the remaining sequences. When a flow matches a deny ACL entry, it will be checked against the next ACL in the same sequence or the next sequence. If a flow does not match any ACL entry and at least one ACL is configured for that packet type, the packet is denied. Reference: http://www.cisco.com/en/US/products/hw/switches/ps700/products_configuration_guide_chapter09186a008007 f4d4.html
QUESTION 7 In which states is the Spanning Tree protocol (STP) affected by the forward delay parameter? (Choose all that apply.)
A. Forwarding
B. Listening
C. Blocking
D. Disabled
E. Learning Answer: B, E Explanation: Listen - The switch listens for a period of time called the fwd delay (forward delay) Learn - The switch learns for a period of time called the fwd delay (forward delay) Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 139
QUESTION 8 When using the CGMP protocol, CGMP-enabled switches and routers exchange a certain type of information. Which one of the following is exchanged?
A. Summarized IGMP information.
B. Multicast group to port assignments.
C. Multicast join and leave events.
D. CAM table changes. Answer: C Explanation: CGMP is based on a client/server model. The router is considered a CGMP server, with the switch taking on the client role. The basis of CGMP is that the IP multicast router sees all ICMP packets and therefore can inform the switch when specific hosts join or leave multicast groups. The switch then uses this information to construct a forwarding table. Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 306
QUESTION 9 Which three network features are necessary for high availability? (Choose all that apply.)
A. Spanning Tree Protocol (STP)
B. Delay reduction
C. Hot Standby Routing Protocol (HSRP)
D. Dynamic routing protocols
E. Quality of Service (QoS)
F. Jitter management Answer: A C D Explanation: Because the importance of high availability networks is increasingly being recognized, many organizations are beginning to make reliability/availability features a key selection criteria for network infrastructure products. With this in mind, Cisco Systems engaged ZD Tag to observe and confirm the results of a series of tests demonstrating the high availability features of Cisco Catalyst Layer 2/Layer 3 switches. In order to maximize the relevance of the results, the demonstration was based on a model of a "real world" campus (in one of Cisco's Enterprise Solution Center labs in San Jose, California). This switched internetwork consisted of wiring closet, wiring center, and backbone switches and conformed to Cisco's modular three-tier (Access/Distribution/Core) design philosophy. The testing demonstrated the following high availability and resilience features of Catalyst switches:
per-VLAN Spanning Tree (PVST) using Cisco's InterSwitch Link (ISL) and 802.1Q VLAN Trunking
Cisco Spanning Tree Enhancements, including UplinkFast and PortFast
Cisco Hot Standby Router Protocol (HSRP) and HSRP Track
Cisco IOS per-destination load balancing over equal cost OSPF paths
Cisco IOS fast convergence for OSPF Reference: http://www.cisco.com/warp/public/779/Largent/learn/technologies/campuslan.pdf
QUESTION 10 You are a technician at Cisco Highway. Your newly appointed Cisco Highway trainee wants to know why Dynamic Trunking Protocol (DTP) mode is 'desirable'. What would your reply be?
A. The interface is put into permanent trunking mode but prevented from generating DTP frames.
B. The interface actively attempts to convert the link to a trunk link.
C. The interface is put into a passive mode, waiting to convert the link to a trunk link.
D. The interface is put into permanent trunking mode and negotiates to convert the link into a trunk link. Answer: B Explanation: Desirable - makes the port actively attempt to convert the link to a trunk link. Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 105
QUESTION 11 You are the network administrator at Cisco Highway. You want to enable VTP pruning on the entire Cisco Highway management domain. What action should you take?
A. Enable VTP pruning on any client switch in the management domain.
B. Enable VTP pruning on any switch in the management domain.
C. Enable VTP pruning on every switch in the management domain.
D. Enable VTP pruning on a VTP server in the management domain.
E. Disable VTP pruning on a VTP server in the management domain. Answer: D Explanation: Enabling VTP pruning on a VTP server allows pruning for the entire management domain. VTP pruning takes effect several seconds after you enable it. By default, VLANs 2 through 1000 are pruning-eligible. Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 117
QUESTION 12 In which of the following states can HSRP routers on a LAN be in? (Choose all that apply.)
A. Standby
B. Idle
C. Init
D. Backup
E. Established
F. Active Answer: A, C, F Explanation: Using HSRP, a set of routers works in concert to present the illusion of a single virtual router to the hosts on the LAN. This set is known as an HSRP group or a standby group. A single router elected from the group is responsible for forwarding the packets that hosts send to the virtual router. This router is known as the Active router. Another router is elected as the Standby router. In the event that the Active router fails, the Standby assumes the packet-forwarding duties of the Active router. Although an arbitrary number of routers may run HSRP, only the Active router forwards the packets sent to the virtual router. Reference: http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080094a91.shtml
QUESTION 13 With regard to Layer 2 broadcast traffic, which of the following statements is valid?
A. Layer 2 broadcast traffic is blocked by Layer 3 devices.
B. A new packet is sent each time the client requests it.
C. Each frame uses a special address for which only interested clients listen.
D. It is the most efficient way to send data to a small group of clients.
E. Each packet is refreshed when requested. Answer: A Explanation: LAN broadcasts do not cross routers (Layer 3 devices). Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 17
QUESTION 14 You are the network administrator at Cisco Highway. The Cisco Highway network contains a Cisco switch with a redundant power supply. The two power supplies are of the same wattage. How is the total power available for use by the switch when both of the power supplies are operating normally? (Choose all that apply.)
A. Total power of one supply.
B. Total combined power of both supplies.
C. Total power is the sum of one-half of total power of both supplies.
D. Total power required is shared nearly equally by both supplies. Answer: C D Explanation: Specifying the redundant keyword enables redundancy. In a redundant configuration, the total power drawn from both supplies is at no time greater than the capability of one supply. If one supply malfunctions, the other supply can take over the entire system load. When you install and turn on two power supplies, each concurrently provides approximately half of the required power to the system. Load sharing and redundancy are enabled automatically; no software configuration is required. Reference: http://www.cisco.com/en/US/products/hw/switches/ps708/products_configuration_guide_chapter09186a008007 e6f6.html
QUESTION 15 You are a technician at Cisco Highway. You inform your newly appointed Cisco Highway trainee that IP routing redundancy is susceptible to first-hop router failure. Your trainee now wants to know which protocols have been developed to protect against first-hop router failure. What would your reply be? (Choose all that apply.)
A. HSRP
B. VRRP
C. ICMP
D. GLBP
E. MSTP
F. IRDP Answer: A B D F
D: GLBP is not used for redundancy. Not E: MSTP (multiple spanning tree protocol) is not used for redundancy
QUESTION 16 Which of the following routing protocols are dense-mode multicast routing protocols? (Choose all that apply.)
A. PIM-SM
B. PIM-DM
C. MOSPF
D. OSPF
E. DVMRPAnswer: B C E Explanation: Dense mode routing protocols include the following:
Distance Vector Multicast Routing Protocol (DVMRP)
Multicast Open Shortest Path First (MOSPF)
Protocol-Independent Multicast Dense Mode (PIM DM) Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 313
QUESTION 17 You are a technician at Cisco Highway. You inform your newly appointed Cisco Highway trainee that all devices at all the layers in a hierarchical model should have basic security measures implemented. Your trainee now wants to know what these basic security measures are. What would your reply be? (Choose all that apply.)
A. Physical security.
B. Privilege levels.
C. Security surveillance.
D. Password protection.
E. Managed remote access.
F. Inventory audit. Answer: A B D E Explanation: The policy to control access to network devices should be one of the first components of the access policy. All devices at every layer of the campus network should have a plan to provide for the following:
Physical security
Passwords
Privilege levels to allow limited access to a network device
Limiting virtual terminal or telnet access Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 368
QUESTION 18 Which one of the following describes hardware-based PDU header rewriting and forwarding based on specific information regarding one or more OSI layers?
A. Multiplayer switching
B. Cisco express routing
C. Multilayer switching
D. Multilayer routing
E. Router express forwarding Answer: C Explanation: Multilayer Switching Switch Engine (MLS-SE) - The switching entity that handles the function of moving and rewriting packets. Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 219
QUESTION 19 According to the IEEE 802.1s standard, what is the purpose of MST?
A. It is the spanning-tree implementation used by non-Cisco 892.1Q switches.
B. It runs a separate instance of STP for each VLAN.
C. It allows a VLAN bridge to use multiple spanning trees to prevent Layer 2 loops.
D. It creates a single loop-tree structure that spans the entire Layer 2 network. Answer: C Explanation: IEEE 802.1s MST Overview Releases 12.1(11b)EX and later releases support MST. MST in this release is based on the draft version of the IEEE standard. 802.1s for MST is an amendment to 802.1 Q MST extends the IEEE 802.1w rapid spanning tree (RST) algorithm to multiple spanning trees. This extension provides both rapid convergence and load balancing in a VLAN environment. MST converges faster than PVST+. MST is backward compatible with 802.1D STP, 802.1w (rapid spanning tree protocol [RSTP]), and the Cisco PVST+ architecture. MST allows you to build multiple spanning trees over trunks. You can group and associate VLANs to spanning tree instances. Each instance can have a topology independent of other spanning tree instances. This new architecture provides multiple forwarding paths for data traffic and enables load balancing. Network fault tolerance is improved because a failure in one instance (forwarding path) does not affect other instances (forwarding paths). In large networks, you can more easily administer the network and use redundant paths by locating different VLAN and spanning tree instance assignments in different parts of the network. A spanning tree instance can exist only on bridges that have compatible VLAN instance assignments. You must configure a set of bridges with the same MST configuration information, which allows them to participate in a specific set of spanning tree instances. Interconnected bridges that have the same MST configuration are referred to as an MST region. Reference: http://www.cisco.com/en/US/products/hw/switches/ps708/products_configuration_guide_chapter09186a008007 e71a.php#1050594
QUESTION 20 Which one of the following processes plays a major role in the creation of the CEF adjacency table?
A. Address Resolution Protocol (ARP)
B. NetFlow switching
C. PDU header rewrite
D. Hello packet exchange Answer: A Explanation: The next step in processing a packet in a Layer 3 device is to determine the Payer 2 information needed to switch the packet to the next hop. This Layer 2 information is generally contained in the ARP cache table. Cisco Express Forwarding creates a adjacency table to prepend the layer 2 information. Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 412
QUESTION 21 Which of the statements below is a characteristic of a Switch Port Analyzer (SPAN) session?
A. Affects switching traffic on source ports.
B. Associates multiple source interfaces with a single destination interface.
C. Eliminates multiple copies of packets.
D. Associates a source interface with multiple destination interfaces. Answer: B Explanation: On page 481 of Cisco Press BCMSN exam cert guide, it states that SPAN source can be one or more ports to one destination. Not A: Traffic on the source port is merely copied, so original traffic is not affected. Answer A states that traffic would be affected
QUESTION 22 Drag-and-drop the technology term in the options column to the matching term in the target Area. Not all options are used.
Answer: LANE - ATM ISL - Encapsulation frames 802.1Q - embedded VLAN tag 802.10 - Fiber links, FDDI VLAN VMPS Explanation:
LANE - LAN Emulation - An IEEE standard method for transporting VLANs over Asynchronous Transfer
Mode (ATM) networks.
ISL - A Cisco Proprietary encapsulation protocol for interconnection multiple switches.
802.1Q - An IEEE standard method for identifying VLANs by inserting a VLAN identifier into the frame header. This process is called frame tagging.
802.10 - A Cisco Proprietary method of transporting VLAN information inside the standard 802.10 frame (Fiber Distributed Data Interface [FDDI]). Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 99
QUESTION 23 With regard to Virtual Router Redundancy Protocol (VRRP), which of the following statements best describes VRRP?
A. A VRRP group has one active and one more standby virtual routers.
B. A VRRP group has one master and one more backup virtual routers.
C. A VRRP group has one active and one more standby virtual routers.
D. A VRRP group has one master and one redundant virtual router. Answer: B Explanation: The Virtual Router Redundancy Protocol (VRRP) feature can solve the static configuration problem. VRRP enables a group of routers to form a single virtual router. The LAN clients can then be configured with the virtual router as their default gateway. The virtual router, representing a group of routers, is also known as a VRRP group. In a topology where multiple virtual routers are configured on a router interface, the interface can act as a master for one virtual router and as a backup for one or more virtual routers. Reference: http://www.cisco.com/en/US/products/sw/iosswrel/ps1612/products_feature_guide09186a0080080a60.html
QUESTION 24 Which port state is defined by IEEE 802.1w RSTP?
A. Listening, Learning, Forwarding, Blocking, Disabled
B. Learning, Forwarding, Discarding
C. Listening, Forwarding, Active, Blocking
D. Learning, Active, Block Answer: B Explanation: There are only three port states left in RSTP, corresponding to the three possible operational states. The 802.1d states disabled, blocking, and listening have been merged into a unique 802.1w discarding state. Reference: http://www.cisco.com/en/US/tech/tk389/tk621/technologies_white_paper09186a0080094cfa.shtml#subtopic1a
QUESTION 25 You are a technician at Cisco Highway. You tell your assistant to enable a trunking protocol on a switch in the Cisco Highway network. The protocol must append a four byte CRC to the packet. Which command should your assistant issue?
A. Switch(config-if)#switchport trunk encapsulation fddi
B. Switch(config-if)#switchport trunk encapsulation dot1q
C. Switch(config-if)#switchport trunk encapsulation itef D. Switch(config-if)#switchport trunk encapsulation isl Answer: D Explanation: ISL is made up of three major components: a header, the original Ethernet frame, and a frame check sequence (FCS) at the end. With ISL, an Ethernet frame is encapsulated with a header that transports VLAN IDs between switches and routers. The 26-byte header containing a 10-bit VLAN ID is added to each frame. In addition, a 4- byte tail is added to the frame to perform a cyclic redundancy check (CRC). This CRC is in addition to any frame checking that the Ethernet frame performs. Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 99
QUESTION 26 You are a technician at Cisco Highway. Your newly appointed Cisco Highway trainee wants to know what the technology is called that manages multicast traffic at Layer 2 by means of configuring Layer 2 LAN interfaces dynamically to forward multicast only to those interfaces that want to receive it?
A. IGMP
B. IGMP snooping
C. DVMRP
D. PIM-DM
E. OSPF Answer: B Explanation: Understanding IGMP Snooping In subnets where you have configured either IGMP (see "Configuring IP Multicast Layer 3 Switching") or the IGMP queried (see the "Enabling the IGMP Queried" section), IGMP snooping manages multicast traffic at Layer 2 by configuring Layer 2 LAN interfaces dynamically to forward multicast traffic only to those interfaces that want to receive it. Reference: http://www.cisco.com/en/US/products/hw/switches/ps708/products_configuration_guide_chapter09186a00800f 4ff2.html
QUESTION 27 Which of the following statements regarding the Metro 802.1-in-Q model is true? (Choose all that apply.)
A. Customer VLAN traffic is isolated from the service provide network's VLAN traffic.
B. Quality of service can be easily implemented using the Customer's ToS and CoS.
C. It has limited scalability in a service provider WAN.
D. Customer traffic retains original VLAN tags.
E. It provides efficient Layer 3 access.
F. It can connect disparate customer networks (Frame Relay, Ethernet, ATM, etc). Answer: A, C, D Explanation: Correct answers should be A, C, and D. On Page 480 of the Cisco Press BCMSN Flash Card book, it lists advantages for the 802.1Q in Q model. A, C and D are listed. E is incorrect because it all occurs at layer 2. F is actually listed as on EoMPLS advantage, not Q in Q.
QUESTION 28 Which of the password types illustrated below requires encryption with the service password-encryption command that will prevent transmission in clear text? (Choose all that apply.)
A. Enable password
B. User password
C. Secret password
D. Privilege password
E. Line password Answer: B D E Explanation:
To set a local password to control access to various privilege levels, use the enable password command in global configuration mode. Use the no form of this command to remove the password requirement.
To set the privilege level for a command, use the privilege level (global) command in configuration mode. Use the no form of this command to revert to default privileges for a given command.
To set the default privilege level for a line, use the privilege level (line) command in line configuration mode. Use the no form of this command to restore the default user privilege level to the line. Reference: http://www.cisco.com/en/US/products/sw/iosswrel/ps1831/products_command_summary_chapter09186a00800 880b0.php#xtocid116918
QUESTION 29 IEEE 802.1Q is specified as the encapsulation method for a trunked port on a Cisco IOS switch by which of the following commands? (Select the appropriate option)
A. Switch(config-if)#switchport trunk encapsulation dot1q
B. Switch(config-if)#switchport encapsulation dot1q
C. Switch(config-if)#switchport trunk encapsulation isl
D. Switch(config)#switchport 0/1 trunk encapsulation isl Answer: A Explanation: Ethernet Trunk Encapsulation Types:
switchport trunk encapsulation isl - Specifies ISL encapsulation on the trunk link.
switchport trunk encapsulation dot1q - Specifies 802.1Q encapsulation on the trunk link.
switchport trunk encapsulation negotiate - Specifies that the interface negotiate with the neighboring interface to become an ISL (preferred) or 802.1Q trunk, depending on the configuration and capabilities of the neighboring interface. The trunking mode, the trunk encapsulation type, and the hardware capabilities of the two connected interfaces determine whether a link becomes an ISL or 802.1Q trunk. Reference: http://www.cisco.com/en/US/products/hw/switches/ps700/products_configuration_guide_chapter09186a008007 f659.html
QUESTION 30 Cisco Highway.com has just purchased a new Catalyst 2950 layer switch for their parts department. The switch needs to have the passwords to secure access to the device's privileged EXEC mode, the five VTY sessions and to the console. All passwords will need to be encrypted so that they are unable to be read when viewing the configuration. The switch also requires that only the management VLAN (VLAN1) have access to the switch via Telnet. The management VLAN1 has already been configured.
Management VLAN IP address: 192.168.54.12/24 The passwords to be set are listed below. Console: Cisco Highway Privilege EXEC: test33 VTY sessions: king66 To configure the switch click on the host icon that is connected to a switch by a serial console cable.
Answer: Switch(config)#enable password test33 Switch(config)#lline console 0 Switch(config-line)#login Switch(config-line)#password Cisco Highway Switch(config-line)#line vty 0 4 Switch(config-line)#login Switch(config-line)#password king66 Switch(config-line)#exit Switch(config)#service password-encryption
(setting an unencrypted privilege password) (going into line console configuration mode) (enabling login) (setting console password) (going into telnet line configuration for 5 lines) (enabling login) (setting telnet password) (exiting line configuration mode) (encrypting all passwords so far set) Switch(config)access-list 1 permit 192.168.54.0 0.0.0.255 (Creating access list to permit users in the traffic
Switch(config)#line vty 0 4 the
"access- Switch(config-line)#access-class 1 in Switch(config-line)#^Z Switch#copy run start management vlan. Remember the implicit deny at the end of every access list will deny any other
since the above permit statement allows only the management vlan. (going into telnet line configuration mode to enable
access list we have created with the command class") (enabling the access list as an inbound access list) (exiting line config mode) (saving your configuration)
QUESTION 31 You are the network administrator at Cisco Highway. You apply the following VLAN access map configuration on a switch in the Cisco Highway network: Router(config)#vlan access-map thor 10 Router(config-access-map)#match ip address net_10 Router(config-access-map)#action forward Router(config)#vlan filter thor vlan-list 12-15 What will the effect of this configuration be?
A. All VLAN 12 through 16 IP traffic matching net_10 is forwarded and all other IP packets are dropped.
B. IP traffic matching net_10 is dropped an all other IP packets are forwarded to VLANs 12 through 16.
C. IP traffic matching vlan-list 12-16 is forwarded on all other IP packets are dropped.
D. All VLAN 12 through 16 IP traffic is forwarded, other VLAN IP traffic matching net_10 is dropped. Answer: A Explanation:
vlan access-map thor 10 Defines the VLAN access map. Optionally, you can specify the VLAN access map sequence number.
match ip address net_10 Configures the match clause in a VLAN access map sequence.
action forward Configures the action clause in a VLAN access map sequence.
vlan filter thor vlan-list 12-15 Applies the VLAN access map to the specified VLANs. VLAN access maps can be applied to VLANs. Each VLAN access map can consist of one or more map sequences, each sequence with a match clause and an action clause. The match clause specifies IP, IPX, or MAC ACLs for traffic filtering and the action clause specifies the action to be taken when a match occurs. When a flow matches a permit ACL entry, the associated action is taken and the flow is not checked against the remaining sequences. When a flow matches a deny ACL entry, it will be checked against the next ACL in the same sequence or the next sequence. If a flow does not match any ACL entry and at least one ACL is configured for that packet type, the packet is denied. To use access-control for both bridged and routed traffic, you can use VACLs alone or a combination of VACLs and ACLs. You can define ACLs on the VLAN interfaces to use access-control for both the input and output routed traffic. You can define a VACL to use access-control for the bridged traffic. Reference: http://www.cisco.com/en/US/products/hw/routers/ps368/products_configuration_guide_chapter09186a0080161 13d.html
QUESTION 32 Which commands would you issue to check whether routing is enabled in troubleshooting InterVLAN routing on a Cisco IOS-based switch?
A. Switch(config)#ip routing
B. Switch#show ip routing
C. Switch(config)#routing
D. Switch#show routing Answer: B Explanation: Use the show ip route command in EXEC mode to display the current state of the routing table. Reference: page http://www.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/ip_r/iprprt2/1rdindep.htm#1022513
QUESTION 33 You are the network administrator at Cisco Highway. You need to configure Hot Standby Routing Protocol (HSRP). Which tasks will allow you to successfully configure HSRP? (Choose all that apply.)
A. Enable HSRP
B. Define the IP address.
C. Define the standby route.
D. Enable the standby mode.
E. Define the encapsulation type. Answer: B C D Explanation: Configuring HSRP
Configuring an interface to participate in an HSRP standby group
Assigning HSRP standby priority
Configuring HSRP standby pre-empt
Configuring HSRP over trunk links
Configuring hello message timers
HSRP interface tracking
Displaying the status of HSRP Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 272
QUESTION 34 Which one of the methods below, in Layer 3 switching, uses a forwarding information base (FIB)?
A. Route caching
B. Demand-based switching
C. Flow-based switching
D. Topology-based switching Answer: D Explanation: On page 59 of Cisco Press BCMSN Exam cert guide and page 67, states that topology based switching uses a FIB and Adjacency table. It states that route caching was the predecessor to this (1st generation---route once, switch many).
QUESTION 35 You are the network administrator at Cisco Highway. You implement tail drops as a congestion avoidance mechanism on a router. You want to avoid the problems this might create. Which QoS technique can you use to avoid these problems?
A. CAR
B. WRED
C. CBWFQ
D. RSVP Answer: B Explanation: With class-based QoS queuing, you can create up to 64 classes for an interface. (Unlike WFQ, queues are not automatically based on the packet's ToS value.) Class-based QoS queuing also lets you control the drop mechanism used when congestion occurs on the interface. You can use WRED for the drop mechanism, and configure the WRED queues, to ensure that high-priority packets within a class are given the appropriate weight. If you use tail drop, all packets within a class are treated equally, even if the ToS values are not equal. Reference: http://www.cisco.com/en/US/products/sw/cscowork/ps2064/products_user_guide_chapter09186a00800e0a04.ht ml
QUESTION 36 You are the network administrator at Cisco Highway. You want to establish a traffic policy on a Cisco IOSbased switch on the Cisco Highway network. Which command will you use?
A. traffic-list
B. route-map
C. policy-map
D. policy-list Answer: C Explanation: The policy-map command is used to create a traffic policy. The purpose of a traffic policy is to configure the QoS features that should be associated with the traffic that has been classified in a user-specified traffic class or classes. A traffic policy contains three elements: a name, a traffic class (specified with the class command), and the QoS policies (which are detailed in the "Configuring the Modular Quality of Service Command-Line Interface" chapter of this book). The name of a traffic policy is specified in the policy-map CLI (for example, issuing the policy-map class1 command would create a traffic policy named class1). Reference: http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_configuration_guide_chapter09186a00800 bd908.html
QUESTION 37 You are the network administrator at Cisco Highway. You are asked to allow a customer's LAN traffic to be transmitted on a single VLAN across multiple provider networks. What technology will you use?
A. Transparent LAN Services
B. Metro network segmentation
C. VLAN tunneling
D. OC 192 Answer: C Explanation: Virtual private networks (VPNs) provide enterprise-scale connectivity on a shared infrastructure, often Ethernet-based, with the same security, prioritization, reliability, and manageability requirements of private networks. Tunneling is a feature designed for service providers who carry traffic of multiple customers across their networks and are required to maintain the VLAN and Layer 2 protocol configurations of each customer without impacting the traffic of other customers. The ML-Series cards support IEEE 802.1Q tunneling and Layer 2 protocol tunneling. Reference: http://www.cisco.com/en/US/products/hw/optical/ps2006/products_module_configuration_guide_chapter09186 a008014f544.php#19505
QUESTION 38 You work as a network administrator at Cisco Highway. One of your customers' network runs on VLAN Trunking Protocol (VTP) with a domain called main1. Active on the network are VLANs 1,2,3,4,5,10 and 20. However the network suddenly experiences difficulties. No traffic is being passed on VLANs 2,3,4,5,10,10, but traffic does pass on VLAN 1. This indicates to you that all switches are working. However, just before the difficulties set in, a switch named TEST1 was added to the network. What configuration issues on the new switch could be responsible for the network outage? (Choose all that apply.)
A. TEST1 is configured as a VTP server with a different domain name.
B. TEST1 is not configured to participate in VTP.
C. TEST1 is configured as a VTP server with the domain name main1.
D. TEST1 has a lower VTP configuration revision than the current VTP revision.
E. TEST1 has a higher VTP configuration revision than the current VTP revision.
F. TEST1 is configured with only VLAN1. Answer: C, E, F Explanation: . If a VTP server with the same name is added to the VTP domain (C), and the configuration revision number is higher (E), all other switches in the domain will synchronize with the highest number and take on that configuration (F), only VLAN1.
QUESTION 39 You are the network administrator at Cisco Highway. You are examining the Cisco Highway network configuration. The Cisco Highway network topology is shown in the following exhibit:
Switch Cisco Highway3 is configured with UplinkFast. What is the amount of time that will pass before Switch Cisco Highway3 activates the port connection to L3, after L2 fails?
A. 1-5 seconds
B. 15 seconds
C. 30 seconds
D. 50 seconds
E. 60 seconds Answer: A Explanation: If Switch C detects a link failure on the currently active link L2 (a direct link failure), UplinkFast unblocks the blocked port on Switch C and transitions it to the forwarding state immediately, without transitioning the port through the listening and learning states. This switchover takes approximately one to five seconds. Reference: http://www.cisco.com/en/US/products/hw/switches/ps679/products_configuration_guide_chapter09186a008007 ef24.html
QUESTION 40 You are the network administrator at Cisco Highway. You are required to manually put a switch port back in service after it has been put into the error disabled state upon receipt of Spanning Tree messages. Which of the options mentioned below will put a switch port into an error-disabled state when it receives Spanning Tree data messages?
A. BDPU Filtering
B. Root Guard
C. BDPU Guard
D. Port Fast
E. Loop Guard Answer: C Explanation: Understanding BPDU Guard The BPDU guard feature can be globally enabled on the switch or can be enabled per interface, but the feature operates with some differences. At the global level, you can enable BPDU guard on Port Fast-enabled ports by using the spanning-tree portfast bpduguard default global configuration command. Spanning tree shuts down ports that are in a Port Fast-operational state. In a valid configuration, Port Fast-enabled ports do not receive BPDUs. Receiving a BPDU on a Port Fast-enabled port signals an invalid configuration, such as the connection of an unauthorized device, and the BPDU guard feature puts the port in the error-disabled state. Reference: http://www.cisco.com/en/US/products/hw/switches/ps5206/products_configuration_guide_chapter09186a00801 7ff97.html
QUESTION 41 You are the network administrator at Cisco Highway. The Cisco Highway network topology is shown in the following exhibit:
You use the following information for switch Cisco HighwayA: Port Mode Encapsulation Status Native VLAN
fa0/1 desirable n-802.1q trunking 5 Port VLANs is allowed on trunk fa0/ 1 1-100, 102-1005 Port VLANs is owned and active in management domain fa0/1 1-6. 8-100, 102-15, 197-999, 1002-1005 Port VLANs in spanning tree forwarding state and not pruned fa0/1 1-6, 8-100, 102-105, 108-999, 1002-1005 Cisco Highway users in VLAN 107 complain that they are unable to gain access to the resources through the Cisco Highway1 router. What is the cause of this problem?
A. VLAN 107 is not configured on the trunk.
B. VLAN 107 does not exist on switch Cisco HighwayA.
C. VTP is pruning VLAN 107.
D. Spanning tree is not enabled on VLAN 107. Answer: D
QUESTION 42 What does 07.ac represent in the 0000.0c07.ac0av hardware address?
A. HSRP well-known physical MAC address
B. Vendor code
C. HSRP router number
D. HSRP group number
E. HSRP well-known virtual MAC address Answer: E Explanation: HSRP code (HSRP well-known virtual MAC address) - The fact that the MAC address is for an HSRP virtual router is indicated in the next two bytes of the address. The HSRP code is always 07.ac. Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 268
QUESTION 43 What will happen to the frame when a VLAN port configured as a trunk receives an untagged frame?
A. The frame will cause an error message to be sent.
B. The frame will be dropped.
C. The frame will be processed as a native VLAN frame.
D. The frame will be tagged, then processed as a native VLAN frame. Answer: C Explanation: On an IEEE 802.1Q trunk port, all transmitted and received frames are tagged except for those on the VLAN configured as the native VLAN for the port. Frames on the native VLAN are always transmitted untagged and are normally received untagged. Reference: http://www.cisco.com/en/US/products/hw/optical/ps2006/products_module_configuration_guide_chapter09186 a0080154a4a.html
QUESTION 44 What type of protocol will not allow switches to flood multicast traffic out every port, except the source port?
A. Internet Group Management Protocol Version 1 (IGMPv1)
B. Protocol Independent Multicast (PIM)
C. IP Multicast Routing
D. Cisco Group Management Protocol (CGMP)
E. Internet Group Management Protocol Version 2 (IGMPv2) Answer: D Explanation: On page 470 of BCMSN Flash card book, it states the answer to the question. IGMP snooping is also a way to accomplish this, but not listed as an answer.
QUESTION 45 You are a technician at Cisco Highway, Inc. You want to associate VLAN groups to Spanning Tree instances to provide multiple forwarding paths for data traffic and enable load balancing. Which of the following specification will enable you to achieve this?
A. IEEE 802.1d (STP)
B. IEEE 802.1s (MST)
C. IEEE 802.1Q (CST)
D. IEEE 802.1w (RSTP) Answer: B Explanation: IEEE 802.1s MST Overview Releases 12.1(11b)EX and later releases support MST. MST in this release is based on the draft version of the IEEE standard. 802.1s for MST is an amendment to 802.1QMST extends the IEEE 802.1w rapid spanning tree (RST) algorithm to multiple spanning trees. This extension provides both rapid convergence and load balancing in a VLAN environment. MST converges faster than PVST+. MST is backward compatible with 802.1D STP, 802.1w (rapid spanning tree protocol [RSTP]), and the Cisco PVST+ architecture. Reference: http://www.cisco.com/en/US/products/hw/switches/ps708/products_configuration_guide_chapter09186a008007 e71a.php#1050594
QUESTION 46 A DSCP value of 42 mapped is the default of which IP Precedence value?
A. 0
B. 1
C. 2
D. 3
E. 4
F. 5 Answer: F Explanation: On page 473 of BCMSN Flash card book, it shows table for IP precedence to DSCP mappings. An IP precedence of 5 maps to a DSCP value range of 40-47. Note: To preserve backward-compatibility with any IP Precedence scheme currently in use on the network, DiffServ
has defined a DSCP value in the form xxx000, where x is either 0 or 1. These DSCP values are called Class-Selector Code Points. (The DSCP value for a packet with default PHB 000000 is also called the Class-Selector Code Point.) The PHB associated with a Class-Selector Code Point is a Class-Selector PHB. These Class-Selector PHBs retain most of the forwarding behavior as nodes that implement IP Precedence-based classification and forwarding. For example, packets with a DSCP value of 110000 (the equivalent of the IP Precedence-based value of 110) have preferential forwarding treatment (for scheduling, queuing, and so on), as compared to packets with a DSCP value of 100000 (the equivalent of the IP Precedence-based value of 100). These Class-Selector PHBs ensure that DS-compliant nodes can coexist with IP Precedence-based nodes. Reference: http://www.cisco.com/en/US/products/sw/iosswrel/ps1834/products_feature_guide09186a0080080466.html
QUESTION 47 You are the network administrator at Cisco Highway, Inc. You are always looking for the most efficient way to do your network administration. What method will you use to improve the Spanning Tree Protocol's operation?
A. Properly place the Root Bridge to ensure an optimal STP topology.
B. Configure access switches as Root Bridges to ensure optimal workstation access to the network.
C. Load balance on redundant links through the use of technologies such as BackboneFast.
D. Provide for efficient workstation access through the use of BackboneFast. Answer: A Explanation: One of the most important decisions that must be made in the Spanning tree network is the location(s) of the root bridge. Proper placement of the root bridge optimizes the path that is chosen by the Spanning-Tree Protocol. Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 151
QUESTION 48 A non-Root switch will choose its Root Port in the following way: (Select the appropriate option.)
A. It chooses the port with the lowest cumulative Root Path Cost to the Root Bridge.
B. The port receives an inferior BPDU from a neighboring switch on a shard LAN segment.
C. It chooses the port with the highest cumulative Root Path Cost to the Root Bridge.
D. The port receives a BPDU announcing a higher Root Path Cost from a neighboring switch on a shared LAN segment. Answer: A Explanation: The spanning tree Protocol uses the information found in the BPDUs to determine which ports should be forwarding and which should be blocking. If costs are equal, the STP reads through BPDU until it finds a parameter that is not equal. The lower port ID becomes the forwarding port, and the higher port ID is placed in a blocked state. As the BPDU prepares to leave a port, it applies a port cost. The sum of all the port costs is the path cost. Spanning Tree looks first at the path cost to decide which ports should forward and which should block. The port that reports the lowest path cost is chosen to forward. Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 155
QUESTION 49 How long is the transition time for a switch to move from blocking to forwarding state in the Spanning-Tree protocol by default?
A. 5 seconds
B. 50 seconds
C. 60 seconds
D. 90 seconds
E. 120 seconds Answer: B Explanation: ? From blocking to listening 20 seconds ? From listening to learning 15 seconds ? From learning to forwarding 15 seconds ? From forwarding to disabled in the event of failure Blocking to forwarding state 50 seconds Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 141
QUESTION 50 Which of the characteristics mentioned below is usually associated with the Quality of Service (QoS) Integrated Services Model (IntServ)?
A. QoS classified at layer 3 using IP precedence or DSCP.
B. Guaranteed rate service.
C. Implemented using FIFO queues.
D. All traffic has an equal chance of being dropped. Answer: B Explanation: Cisco IOS QoS includes the following features that provide controlled load service, which is a kind of integrated service: ? Resource Reservation Protocol (RSVP) can be used by applications to signal their QoS requirements to the router. ? Intelligent queuing mechanisms can be used with RSVP to provide the following kinds of services: Guaranteed Rate Service, which allows applications to reserve bandwidth to meet their requirements. For example, a Voice over IP (VoIP) application can reserve 32 Mbps end to end using this kind of service. Cisco IOS QoS uses weighted fair queuing (WFQ) with RSVP to provide this kind of service. Controlled Load Service, which allows applications to have low delay and high throughput even during times of congestion. For example, adaptive real-time applications such as playback of a recorded conference can use this kind of service. Cisco IOS QoS uses RSVP with Weighted Random Early Detection (WRED) to provide this kind of service. Reference: http://www.cisco.com/en/US/products/sw/iosswrel/ps1831/products_configuration_guide_chapter09186a00800 7ff07.php#1000946
QUESTION 51 What is the maximum time that a voice package should be allowed to cross a network?
A. 90 milliseconds
B. 120 milliseconds
C. 150 milliseconds
D. 240 milliseconds Answer: C Explanation: Delay is the time it takes for VoIP packets to travel between two endpoints and you should design networks to minimize this delay. However, because of the speed of network links and the processing power of intermediate devices, some delay is expected. The human ear normally accepts up to about 150 milliseconds (ms) of delay without noticing problems (the ITU's G.114 standard recommends no more than 150 ms of one-way delay). Reference: http://www.cisco.com/en/US/products/sw/iosswrel/ps5014/products_feature_guide09186a00800880e7.html
QUESTION 52 What is the function of VLAN tunneling in the Metro Ethernet environment?
A. Renumbers their LANs.
B. Extends their logical network topology across wide geographic networks.
C. Provides combined wavelength routing.
D. Translates their VLANs at the service provider edge. Answer: D Explanation: Network Design with Dot1q Tunneling An ideal scenario to support multiple customers in the service provider environment would be to have customers utilizing any range of VLAN numbers while the service provider forwards the traffic independent of those VLAN IDs. By assigning a unique VLAN to each customer, the identity of multiple VLAN IDs from the customer site will not be lost. This builds a Layer 2 VPN where traffic from different business customers is segregated inside the service provider core and is dot1q tagged with appropriate VLAN IDs. Dot1q tunneling is in essence a 1q-in-1q technique that expands the VLAN space by retagging the tagged packets entering the service provider infrastructure Reference: http://www.cisco.com/en/US/netsol/ns110/ns221/ns223/ns227/networking_solutions_white_paper09186a00800 a1195.shtml
QUESTION 53 You are a technician at Cisco Highway. Your newly appointed Cisco Highway trainee wants to know under which circumstances would local VLANs be preferred over end-to-end VLANs. What would your reply be?
A. Eighty percent of traffic on the network is destined for Internet sites.
B. There are common sets of traffic filtering requirements for workgroups located in multiple buildings.
C. Eighty percent of a workgroup's traffic is to the workgroup's own local server.
D. Users are grouped into VLANs independent of physical location. Answer: A Explanation: This geographic location can be as large as an entire building or as small as a single switch inside a wiring closet. In a geographic VLAN structure, it is typical to find 80 percent of the traffic remote to the user (server farms and so on) and 20 percent of the traffic local to the user (local server, printers, and so on). Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 93
QUESTION 54 You are the network administrator at Cisco Highway. The member routes of the Cisco Highway multicast route are far and wide apart. Which well-defined routing protocol would you configure on this particular multicast route?
A. Distance Vector Multicast Routing Protocol (DVMRP)
B. Core-Based Trees (CBT)
C. Multicast Open Shortest Path First (MOSPF)
D. Protocol Independent Multicast Sparse Mode (PIM-SM)
E. Protocol Independent Multicast Dense Mode (PIM-DM) Answer: D Explanation: Multicast routing protocols fall into two categories: Dense-mode (DM) and Sparse-mode (SM). DM protocols assume that almost all routers in the network will need to distribute multicast traffic for each multicast group (for example, almost all hosts on the network belong to each multicast group). Accordingly, DM protocols build distribution trees by initially flooding the entire network and then pruning back the small number of paths without receivers. SM protocols assume that relatively few routers in the network will be involved in each multicast. The hosts belonging to the group are widely dispersed, as might be the case for most multicasts in the Internet. Therefore, SM protocols begin with an empty distribution tree and add branches only as the result of explicit requests to join the distribution. Reference: http://www.cisco.com/en/US/tech/tk828/tk363/technologies_white_paper09186a0080092942.shtml
QUESTION 55 Which two factors gave rise to the 20/80 model LAN traffic pattern? (Choose all that apply.)
A. The Internet
B. Local servers
C. Server farms
D. Localized applications
E. More powerful desktop PC's Answer: A, C Explanation: Answers should A and C. Page 145 of the Cisco Press BCMSN exam cert guide states that remote services (server farms, Internet, etc.) are factors which contributed to Local VLANS.
QUESTION 56 You are a technician at Cisco Highway. You have been assigned a Cisco Highway trainee. What would you tell the trainee is the recommended relationship of VLANs to IP subnets?
A. One-to-one
B. Many-to-one
C. One-to-many
D. VLANs are mapped to MAC addresses Answer: A Explanation: Cisco systems recommend a one-to-one correspondence between VLANs and IP subnets, there can be no more than 254 devices in on VLAN. Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 90
QUESTION 57 Which hardware component does standard access lists and extended access list use to deny traffic at wire speed?
A. NetFlow Feature Card
B. Catalyst Switch Supervisor Engine III
C. Multilayer Switch Feature Card
D. MultiLayer Switching Protocol Answer: B Explanation: MLS allows you to enforce access lists on every packet of the flow without compromising MLS performance. When you enable MLS, the MLS-SE handles standard and extended access list permit traffic at wire speed. Reference: http://www.cisco.com/en/US/products/hw/switches/ps679/products_configuration_guide_chapter09186a008007 eadd.html
QUESTION 58 Which of the following protocols enables TACACS+ to communicate?
A. CDP
B. DES
C. TCP
D. UDP Answer: C Explanation: RADIUS uses UDP while TACACS+ uses TCP. TCP offers several advantages over UDP. TCP offers a connection-oriented transport, while UDP offers best-effort delivery. RADIUS requires additional programmable variables such as re-transmit attempts and time-outs to compensate for best-effort transport, but it lacks the level of built-in support that a TCP transport offers: Reference: http://www.cisco.com/en/US/tech/tk583/tk547/technologies_tech_note09186a0080094e99.shtml
QUESTION 59 You are the network administrator at Cisco Highway. The VLANs active in the Cisco Highway network are: 1,2,3,4,10,20 and 50. However, you only need to carry VLANs 1,2,10 and 20 on a trunk. Which of the following commands can you use to fulfil this requirement? (Choose all that apply.)
A. switchport trunk allowed vlan remove 3,4,50
B. switchport trunk allowed vlan except 3,4,50
C. switchport trunk allowed vlan except 1,2,10,20
D. switchport trunk allowed vlan add 1,2,10,20
E. switchport trunk disallowed vlan remove 3,4,50
F. switchport trunk disallowed vlan add 3,4,50 Answer: A D Explanation: switchport trunk allowed vlan vlan_list The vlan_list format is all none [add remove except] vlan_atom[,vlan_atom...], where:
all specifies all VLANs from 1 to 4094. This keyword is not supported on commands that do not permit all VLANs in the list to be set at the same time.
none indicates an empty list. This keyword is not supported on commands that require certain VLANs to be set or at least one VLAN to be set.
add adds the defined list of VLANs to those currently set, instead of replacing the list.
remove removes the defined list of VLANs from those currently set, instead of replacing the list.
except lists the VLANs that should be calculated by inverting the defined list of VLANs.
vlan_atom is either a single VLAN number from 1 to 4094 or a continuous range of VLANs described by two VLAN numbers, the lesser one first, separated by a hyphen. Reference: http://www.cisco.com/en/US/products/hw/switches/ps663/products_command_reference_chapter09186a008014 4e79.php#1022676
QUESTION 60 Which of the following can help a network with many broadcasts and multicasts?
A. Creating smaller broadcast domains by implementing VLANs.
B. Separate nodes into different hubs.
C. Creating larger broadcast domains by implementing VLANs.
D. Separate nodes into different switches. Answer: A Explanation: The second option is to implement virtual LANs (VLANs) within the switched network. Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 8
QUESTION 61 Which of the following attributes describes access layer switches? (Choose all that apply.)
A. High port density to connect to end users.
B. Robust Layer 3 throughput
C. Intervlan routing
D. Low cost Answer: A D Explanation: The Access Layer The main criteria for access devices are to provide this functionality with low-cost, high port density devices. Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 21
QUESTION 62 Which of the following table types are CEF components? (Choose all that apply.)
A. Adjacency tables
B. Forwarding information base
C. Neighbor tables
D. Route tables
E. Caching tables Answer: A B Explanation: There are two Cisco Express Forwarding components:
Forwarding Information Base
Adjacency table Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 412
QUESTION 63 Which of the following are closely related standards? (Choose all that apply.)
A. DSL
B. ATM
C. SDH
D. FDDI
E. SONET Answer: B, E Explanation: Synchronous Digital Hierarchy. The European standard that defines a rate and format for transmission of optical signals over fiber using ATM and SONET. In contrast to PDH, SDH provides for a synchronous multiplexing scheme. Reference: http://www.cisco.com/en/US/products/hw/optical/ps2011/prod_technical_reference09186a00800a8655.php#99
QUESTION 64 Match the Multilayer Switching term to the correct definition.
Answer:
Explanation: MLS components:
Multilayer Switching Engine (MLS-SE) - The switching entity that handles the function of moving and rewriting packets.
Multilayer Switching Route Processor (MLS-RP) - A route switch module or an externally connected Cisco
series router with software that supports multilayer switching.
Multilayer Switching Protocol (MLSP) - This protocol operates between the MLS-SE and MLS-RP to enable multilayer switching.
MLS Flow - The PFC maintains a Layer 3 switching table (the Layer 3 MLS cache) for Layer 3-switched flows. The cache also includes entries for traffic statistics that are updated in tandem with the switching of packets. After the MLS cache is created, packets identified as belonging to an existing flow can be Layer 3 switched based on the cached information. The MLS cache maintains flow information for all active flows.An MLS cache entry is created for the initial packet of each flow. Upon receipt of a packet that does not match any flow currently in the MLS cache, a new IP MLS entry is created. Note: IP MLS Flows Layer 3 protocols, such as IP and Internetwork Packet Exchange (IPX), are connectionless-they deliver every packet independently of every other packet. However, actual network traffic consists of many end-to-end conversations, or flows, between users or applications. A flow is a unidirectional sequence of packets between a particular source and destination that share the same protocol and transport-layer information. Communication from a client to a server and from the server to the client are separate flows. For example, Telnet traffic transferred from a particular source to a particular destination comprises a separate flow from File Transfer Protocol (FTP) packets between the same source and destination. Flows are based only on Layer 3 addresses, which allow IP traffic from multiple users or applications to a particular destination to be carried on a single flow if only the destination IP address is used to identify a flow. Layer 3 MLS Cache The PFC (MLS-SE) maintains a Layer 3 switching table (the Layer 3 MLS cache) for Layer 3-switched flows. The cache also includes entries for traffic statistics that are updated in tandem with the switching of packets. After the MLS cache is created, packets identified as belonging to an existing flow can be Layer 3 switched based on the cached information. The MLS cache maintains flow information for all active flows. An MLS cache entry is created for the initial packet of each flow. Upon receipt of a packet that does not match any flow currently in the MLS cache, a new IP MLS entry is created. The state and identity of the flow are maintained while packet traffic is active; when traffic for a flow ceases, the entry ages out. You can configure the aging time for MLS entries kept in the MLS cache. If an entry is not used for the specified period of time, the entry ages out and statistics for that flow can be exported to a flow collector application. The maximum MLS cache size is 128K entries. However, an MLS cache larger than 32K entries increases the probability that a flow will not be switched Reference: Building Cisco Multilayer Switched Networks (Ciscopress) page 219 + 220 http://www.cisco.com/en/US/products/hw/routers/ps368/products_configuration_guide_chapter09186a008007c 87c.php#1020417
QUESTION 65 You are the network administrator at Cisco Highway. You want to map VLANs 10 to 20 to MST instance 1. Which Cisco switch command will you use?
A. Switch(config)#vlan 10-20 instance 1
B. Switch(config)#instance 1 vlan 10-20
C. Switch(config-mst)#vlan 10-20 instance 1
D. Switch(config-mst)#instance 1 vlan 10-20 Answer: D QUESTION 66 You are the network administrator at Cisco Highway. You have to build up an IP multicast domain using PIM. The Cisco Highway CEO asks you which mode will assume that other routers do not want to forward multicast packets for the group. What would your response be?
A. CGMO
B. PIM-SM
C. PIM-RP
D. IGMP snooping
E. PIM-DOM Answer: B
QUESTION 67 In which way will VTP pruning enhance network bandwidth?
A. By limiting the spreading of VLAN information.
B. By reducing unnecessary flooding of traffic to inactive VLANs.
C. By disabling periodic VTP updates.
D. By restricting unicast traffic to across VTP domains.
E. By updating unicast traffic periodically. Answer: B
QUESTION 68 With which Quality of Service (QoS) model is a FIFO (First-In-First-Out) queue associated?
A. Less than Best Effort Model
B. Best Effort Model
C. Differentiated Services Model (DiffServ)
D. Integrated Services Model (IntServ) Answer: B Explanation (Reason): There are three QoS Models namely, Integrated Services Model, Best effort Model, and Differentiated Services model. Best effort is a single service model in which an application sends data whenever it must, in any quantity, without requesting permission or first informing the network. For best-effort service, the network delivers data if it can, without any assurance of reliability, delay bounds, or throughput. The Cisco IOS QoS feature that implements best-effort service is FIFO queuing.
QUESTION 69 You are a technician at Cisco Highway. Your newly appointed Cisco Highway trainee wants to know what mechanism is used to randomly drop packets with a certain IP precedence value when the buffers fill to a predefined threshold when one wants to configure congestion avoidance. What would your reply be?
A. WFQ
B. CQ
C. LLQ
D. WRED
E. tail drop Answer: D Explanation (Reason): WRED drops packets using IP precedence or DSCP value of the packets, packets with higher precedence are less likely to be dropped. If the default settings are preventing QoS, the precedence value can be used to control how WRED determines when and how often to drop packets.
QUESTION 70 A Cisco Highway.com customer is interested in configuring priority queuing for interface gig0/1 on a 3550 switch. Which command would accomplish this objective?
A. Under the global config, configure "priority-queue out"
B. Under the global config, configure "interface priority-queue gig0/1"
C. Under the interface gig0/1, configure "priority-queue out"
D. Priority queuing is on by default Answer: C
QUESTION 71 Your Cisco Highway trainee Sandra asks you which technology uses a Root Link Query BPDU. What should you tell her?
A. -BackboneFast
B. -PortFast
C. -UplinkFast
D. -STP standard Answer: A Explanation: If the local switch has blocked ports, BackboneFast begins to use the Root Link Query (RLQ) protocol to if upstream switches have stable connections to the Root Bridge. Reference: Cisco Press CCNP BCMSN, ISBN 1-58720-077-5, by David Hucaby - Chapter 10 Page 254
QUESTION 72 You are the network administrator at Cisco Highway. A switch on the Cisco Highway network has the following configuration: Interface gig Ethernet 0/1 Switchport mode trunk Switchport trunk encapsulation dot1q Switchport trunk native vlan 5 Untagged frames arrive on interface gig Ethernet 0/1. Which of the following statement are correct?
A. Untagged frames are automatically assumed to be in VLAN 5.
B. Untagged frames are defaulted to VLAN 1 traffic.
C. Untagged frames are dropped because all packets are tagged when dot1q trunked.
D. Untagged frames are determined on the other switch Answer: A
QUESTION 73 Match the six HSRP states in which an HSRP-enabled router can exist to their corresponding definitions.
Answer:
QUESTION 74 Drag the Spanning Tree Protocol state in the options column to the matching definition in targets column.
Answer:
Explanation: Learning State A port in the learning state is preparing to participate in frame forwarding. This is the second transitional state through which a port moves in anticipation of frame forwarding. The port enters the learning state from the listening state through the operation of Spanning-Tree Protocol. A port in the learning state performs as follows: Discards frames received from the attached segment. Discards frames switched from another port for forwarding. Incorporates station location into its address database. Receives BPDUs and directs them to the system module. Receives, processes, and transmits BPDUs received from the system module. Receives and responds to network management messages. http://www.cisco.com/univercd/cc/td/doc/product/rtrmgmt/sw_ntman/cwsimain/cwsi2/cwsiug2/vlan2/stpapp.ht m
QUESTION 75 You are the network administrator at Cisco Highway. A portion of the Cisco Highway network is shown in the following graphic: MLS QOS TRUST COS R1 - - -- - - -- R2 / \ PC PC There is a problem with COS on R1. What changes must you effect on R2 to correct the issue?
A. Configure MLS QOS TRUST 5
B. Configure MLS QOS TRUST COS on e0 of R1
C. Configure MLS QOS TRUST COS on e0 of R2 Answer: C
QUESTION 76 AN ISP provides transparent LAN services to interconnect five different locations for its customer. Which two statements are true about this solution? (Choose two)
A. Broadcasts are sent to all sites.
B. It is difficult to implement.
C. Routers do not have to peer with each other.
D. There are scalability issues with this solution. Answer: A, D
QUESTION 77 Which protocol specified by RFC 2281 provides network redundancy for IP networks, ensuring that user traffic immediately and transparently recovers from first-hop failures in network edge devices or access circuits?
A. STP
B. IRDP
C. ICMP
D. HSRP Answer: D Reference: RFC 2281
QUESTION 78 Which is a valid multicast MAC address?
A. 00-00-00-FA-11-67
B. 01-00-E0-56-AE-3C
C. 00-01-E0-AB-B2-C1
D. 01-00-5E-0A-08-CF
E. FF-FF-FF-FF-FF-FF Answer: D Explanation: IPv6 MULTICAST AND LAYER 2 Media Access Control (MAC) layer addresses within Ethernet are 48 bit addresses. These 48 bits comprise 24 bits for the Organizational Unit Identifier (OUI) and 24 bits for serial number of the card, which becomes the remainder of the unique address. The address of a multicast group does not relate to a physical device, but rather to a transient group of devices; therefore, the MAC address format uses a special OUI. The OUI for IPv4 Multicast is 00:00:5E with the Least Significant Bit Most Significant Byte set. Only half of this address space was allocated for IP Multicast. This means that 23 bits were available for the group address when using the historical OUI 01:00:5E. This prompted a 32-1 possible address overlap at Layer 2. IGMP Snooping Overview In subnets where you have configured IGMP, IGMP snooping manages multicast traffic at Layer 2 by configuring interfaces that have been set up using the switchport keyword to dynamically forward multicast traffic only to those interfaces that want to receive it. IGMP snooping constrains traffic in MAC multicast groups 01-00-5e-00-00-01 to 01-00-5e-ff-ff-ff. IGMP snooping does not constrain Layer 2 multicast packets generated by routing protocols.
QUESTION 79 Which statement about VTP is false?
A. Switches in VTP transparent mode will simply forward advertisements without processing them.
B. VTP reduces administrative overhead.
C. VTP pruning reduces overall network traffic.
D. VTP pruning is on by default. Answer: D Explanation: Understanding VTP Pruning VTP pruning enhances network bandwidth use by reducing unnecessary flooded traffic, such as broadcast, multicast, unknown, and flooded unicast packets. VTP pruning increases available bandwidth by restricting flooded traffic to those trunk links that the traffic must use to access the appropriate network devices. By default, VTP pruning is disabled. www.cisco.com/univercd/cc/td/doc/product/lan/cat5000/rel_4_2/config/vlas.htm
QUESTION 80 Which statement about a trunk link is true?
A. A trunk link only supports the native VLAN for a given port.
B. A trunk link used 802.10 to identify VLANs over an Ethernet backbone.
C. A trunk link connects multiple devices on a single subnet to a switch port.
D. The native VLAN of the trunk link is the VLAN to which the port will belong if that link becomes nontrunk. Answer: A Explanation: http://www.cisco.com/warp/public/473/140.pdf (enable)set trunk 2/19 desirable !--- By setting the trunk on the first port of the channel, !--- it dynamically trunks all channel ports. Port(s) 2/19-20 trunk mode set to desirable. ! Console> (enable) !--- Dot1q trunk will adopt the port's VLAN assignment (VLAN 1 by default) as its native VLAN. D is wrong because Native VLAN Number of the native VLAN for the trunk link (for 802.1Q trunks, the VLAN for which untagged traffic can be transmitted and received over the trunk; for ISL trunks, packets are tagged on all VLANs, including the native VLAN).
Vlans allowed on trunk Range of VLANs allowed to go on the trunk (default is 1 to 1000). Ref: http://www.cisco.com/univercd/cc/td/doc/product/lan/cat4000/rel7_1/command/sh_t_z.htm
QUESTION 81 What is the method used to filter traffic being bridged within a VLAN?
A. Ethernet maps
B. Router ACLs
C. VLAN maps
D. IP ACLsAnswer: C Explanation: www.cisco.com/univercd/cc/td/doc/product/lan/c3550/1219ea1/3550scg/swacl.htm VLAN ACLs or VLAN maps access-control all packets (bridged and routed). You can use VLAN maps to filter traffic between devices in the same VLAN.
QUESTION 82 Which command will allow a Layer 2 access port to move directly to the forwarding state and bypass the listing and learning states?
A. spanning-tree uplinkfast
B. spanning-tree port-priority
C. spanning-tree portfast
D. spanning-tree vlan vlan-id ret primary Answer: C Explanation: Spanning Tree PortFast causes an interface configured as a Layer 2 access port to enter the forwarding state immediately, bypassing the listening and learning states. You can use PortFast on Layer 2 access ports connected to a single workstation or server to allow those devices to connect to the network immediately, rather than waiting for spanning tree to converge. If the interface receives a bridge protocol data unit (BPDU), which should not happen if the interface is connected to a single workstation or server, spanning tree puts the port into the blocking state. To enable PortFast on a Layer 2 access port to force it to enter the forwarding state immediately, perform this procedure: Task Command Step 1 Specify an interface to configure. Switch(config)# interface {{fastethernet gigabit Ethernet} slot/ port} {port-channel port_channel_number} Step 2 Enable PortFast on a Layer 2 access port connected to a single workstation or server. You can use the no keyword to disable PortFast. Switch(config-if)# [no] spanning-tree portfast http://www.cisco.com/univercd/cc/td/doc/product/lan/cat4000/12_1_12/config/stp_enha.pdf
QUESTION 83 Network topology Exhibit: You work as a network technician at the Cisco Highway.com main office close to Toronto. The number of employees on the 31st floor has been growing rapidly. You have ordered a new larges chassis. To temporarily meet the demand, you will take a Catalyst 2950 from the corporate testing center and install it in the 31st floor wire closet. 24 employees will be connected to this 2950 Catalyst. As you are an experienced Cisco Highway.com technician with CCNP and CCSP certifications you know the importance of installing the correct configuration prior to connect the device to the active network. You also remember that VLAN and VTP information remains even if the previous configuration is erased and the switch rebooted. At the current point of time you have already erased the configuration, rebooted, and eliminated any unnecessary VLAN information. However, you still have several tasks you have to complete before connecting the Cisco 2950 Catalyst switch to the network. You need to disable VTP, and ensure that all Furthermore, you must use global commands to configure the ports for the following tasks: configure the FastEthernet ports 0/1 to 0/24 as permanently non-trunking, and configure ports 0/12 through 0/24 as part of VLAN 20. To put it more specifically you are required to achieve the following tasks:
disable VTP
Ensure that all non-trunking interfaces do not participate in Spanning Tree by default by globally configuring PortFast. For the following two tasks, you are required to use global commands to configure the ports: Ensure all FastEthernet interface are in permanent non-trunking mode. Place FastEthernet interfaces 0/12 through 0/24 in VLAN 20. Start by clicking on host CertKiA. Answer: enable configure terminal Switch(config)#vtp mode transparent (disable vtp) Switch(config)#spanning-tree portfast default (Globally, enable portfast on all ports) Switch(config)#interface range fa0/1 - 24 (select interfaces) Switch(config-if)#switchport mode access (set ports for access mode, NOT Trunking) exit Switch(config-if)#interface range fa0/12 - 24 (select interfaces) Switch(config-if)#switchport access vlan 20 (assign ports to vlan 20) end copy running-config startup-config (save configuration)
QUESTION 84 Which statement is true about the STP Path Cost on a particular port?
A. It is known only to the local switch where the port resides.
B. It can be modified to help determine Root Bridge selection.
C. Modifying it can cause TCN BPDU to be sent to the Root Bridge.
D. When increased, it can provider higher bandwidth to a connecting port. Answer: C Explanation: http://www.everett.wednet.edu/schools/high/hmjackson/Tech/cisco/glossary/b.php#REF36726 BPDU Bridge protocol data unit. Spanning-Tree Protocol hello packet that is sent out at configurable intervals to exchange information among bridges in the network. See also PDU.
QUESTION 85 Which two VTP modes can create and delete VLABs on their own switches? (Choose two)
A. Client
B. Server
C. Transparent
D. Pass-through Answer: B, C Explanation: In VTP server mode, you can create, modify, and delete VLANs and specify other configuration parameters http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122newft/122t/122t11/ft1636nm.htm Reference for C : http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122newft/122t/122t11/ft1636nm.htm#14345
VTP Modes You can configure a switch to operate in any one of these VTP modes:
Server-In VTP server mode, you can create, modify, and delete VLANs and specify other configuration parameters (such as VTP version) for the entire VTP domain. VTP servers advertise their VLAN configuration to other switches in the same VTP domain and synchronize their VLAN configuration with other switches based on advertisements received over trunk links. VTP server is the default mode.
Client-VTP clients behave the same way as VTP servers, but you cannot create, change, or delete VLANs on a VTP client.
Transparent-VTP transparent switches do not participate in VTP. A VTP transparent switch does not advertise its VLAN configuration and does not synchronize its VLAN configuration based on received advertisements. However, in VTP version 2, transparent switches do forward VTP advertisements that they receive out their trunk interfaces. If you configure the switch as VTP transparent, you can create and modify VLANs but the changes affect only the individual switch.
QUESTION 86 Which protocol enabled a group of routers to form a single virtual router and use the real IP address of a router as the gateway address?
A. Proxy ARP
B. HSRP
C. IRDP
D. VRRP
E. GLBP Answer: D Explanation: http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/120newft/120limit/120st/120st18/st_vrrpx.ht m Virtual Router Redundancy Protocol (VRRP), enables group of routers to form a single virtual router? The Virtual Router Redundancy Protocol (VRRP) feature can solve the static configuration problem. VRRP enables a group of routers to form a single virtual router. The LAN clients can then be configured with the virtual router as their default gateway. The virtual router, representing a group of routers, is also known as a VRRP group.
QUESTION 87 Your PC is experiencing slow performance. After clearing counters, the results of show port indicate a high number of FCS and alignment errors. What is the most likely cause of this problem?
A. speed mismatch
B. duplex mismatch
C. trunk mode mismatch
D. VTP mode mismatch Answer: A, D Explanation: Not D: VTP mode mismatch should not cause FCS and alignment errors.
QUESTION 88 In which three HSRP states do routers send hello messages? (Choose three)
A. standby
B. learn
C. listen
D. speak
E. active Answer: A, D, E Explanation: Listen The router knows the virtual IP address, but is neither the active router nor the standby router. It listens for hello messages from those routers. Speak The router sends periodic hello messages, and is actively participating in the election of the active and/or standby router. A router cannot enter speak state unless it has the virtual IP address. Standby The router is a candidate to become the next active router, and sends periodic hello messages. Excluding transient conditions, there would be at most one router in the group in standby state. Active The router is currently forwarding packets that are sent to the group's virtual MAC address. The router sends periodic hello messages. Excluding transient conditions, there must be at most one router in active state in the group. State Definition Initial This is the starting state, and indicates that HSRP is not running. This state is entered via a configuration change, or when an interface first comes up. Learn The router has not determined the virtual IP address, and has not yet seen an authenticated hello message from the active router. In this state, the router is still waiting to hear from the active router.
QUESTION 89 Which of the following guidelines is not necessary, when configuring dynamic VLAN membership?
A. Configure VMPS server
B. Turn off trunking on the port
C. Turn off 802.1x port security D. Configure the spanning-tree PortFast feature Answer: C Reference: http://www.cisc.com/univercd/cc/td/doc/product/lan/cat6000/sw_5_3/codified/6000_cfg.htm Explanation: These guidelines and restrictions apply to dynamic port VLAN membership:
You must configure VMPS before you configure ports as dynamic.
When you configure a port as dynamic, spanning-tree PortFast is enabled automatically for that port. Automatic enabling of spanning-tree PortFast prevents applications on the host from timing out and entering loops caused by incorrect configurations. You can disable spanning-tree PortFast mode on a dynamic port.
If you reconfigure a port from a static port to a dynamic port on the same VLAN, the port connects immediately to that VLAN. However, VMPS checks the legality of the specific host on the dynamic port after a certain period.
Static secure ports cannot become dynamic ports. You must turn off security on the static secure port before it can become dynamic.
Static ports that are trunking cannot become dynamic ports. You must turn off trunking on the trunk port before changing it from static to dynamic.
QUESTION 90 Which of the following could be used to provide a Layer 3 data path between separate VLANs? (Choose two)
A. A VLAN trunking
B. An external router
C. An internal processor
D. VLAN capable bridge
E. EtherChannel Answer: B, C Explanation: Ref B: The only connectivity that we want between VLANs is achieved at Layer 3 (L3) by a router. This is Inter-VLAN routing. To further simplify the diagrams, we will represent VLANs as different physical Ethernet segments, as we are not really interested in the specific bridging functions provided by the switch.
In the above diagram, the two VLANs are considered as two different Ethernet segments. Inter-VLAN traffic needs to go through the external router. If host A wants to communicate with host B, it will typically use the router as a default gateway. Ref:C The RSM is a Cisco 7500 Route Switch Processor (RSP) router inside of a Catalyst 5000 line card. You do not need to know a great deal about the architecture of the card to configure and troubleshoot it. However, having an idea of how the RSM is built will help to understand how it is different from a normal external router www.cisco.com/warp/public/473/56.html
QUESTION 91 Which specification is a companion to the IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) algorithm allowing the algorithm to use multiple spanning-trees?
A. IEEE 802.1s (MST)
B. IEEE 802.1Q (CST)
C. Cisco PVST+
D. IEEE 802.1d (STP) Answer: A Explanation: MST allows RSTP to use multiple spanning trees 802.1S Multiple Spanning Tree Protocol solves problems by supporting multiple spanning trees within a network. www.nwfusion.com/news/tech/2003/0804techupdate.html IEEE 802.1s, the Multiple Spanning Trees extension of the virtual LAN standard, was published in January 2003. www.cisco.com/warp/public/473/147.html www.techstreet.com
QUESTION 92 Which three statements are correct with regard to the IEEE 802.1Q standard? (Choose three)
A. The packet is encapsulated with a 26 byte header and a 4 byte FCS.
B. The IEEE 802.1Q frame format adds a 4 byte field to a Ethernet frame.
C. The IEEE 802.1Q frame retains the original MAC destination address.
D. The IEEE 802.1Q frame uses multicast destination of 0x01-00-0c-00-00
E. Protocol uses point-to-point connectivity.
F. Protocol uses point-to-multipoint connectivity. Answer: B, C, E Explanation: a trunk is a point-to-point link that supports several VLANs
QUESTION 93 Use the following output taken from each port Cisco Highway1: show config:
interface GigabitEthernet0/1 switchport trunk encapsulation dot1q switchport mode dynamic auto no ip address show interface gig0/1 switchport: Name: Gi0/1 Switchport: Enabled Administrative Mode: dynamic auto Operational Mode: down Administrative Trunking Encapsulation: dot1q Negotiation of Trunking: On Access Mode VLAN: 1 (default) Cisco Highway2: show interface gig0/1 switchport: Name: Gi0/1 Switchport Enabled Administrative Mode: dynamic auto Operational Mode: down Administrative Trunking Encapsulation: dot1q Negotiation of Trunking: On Access Mode VLAN: 1 (default) Trunking Native Mode VLAN: 1 (default) Given the configuration in the graphic, why are the two switches net trunking on the link between them?
A. There is no IP address denied.
B. no shutdown needs to be entered on the interfaces.
C. Both sides are in auto negotiation mode.
D. ISL should be used instead of 802.1q.
E. Access mode VLAN must be different from native mode VLAN. Answer: C Explanation: According to Cisco table Auto & Auto results in NO trunk formation
QUESTION 94 Which VTP information does a Catalyst switch advertise on its trunk ports when using VTP? (Choose two)
A. VTP mode
B. STP root status
C. Negotiation status
D. Management domain
E. Configuration revision number Answer: D Explanation: The VTP protocol maintains VLAN configuration consistency throughout the network by distributing VLAN information to the network. VLAN information is sent to network devices in advertisements that contain the VTP management domain name, the current configuration revision number, the VLANs that the server knows about, and certain VLAN parameters. Any time you change a VLAN, VTP automatically sends an advertisement to update all other network devices.
QUESTION 95 What is advertised by a Catalyst switch in a VTP domain?
A. The VLAN ID of all known VLANs, the management domain name, and the total number of trunk links on the switch.
B. The VLAN ID of all known VLANs, a 1-bit canonical format (CF1 Indicator), and the switch configuration revision number.
C. The management domain name, the switch configuration revision number, the known VLANs, and their specific parameters.
D. A 2-byte TPID with a fixed value of 0x8100 for the management domain number, the switch configuration revision number, the known VLANs, and their specific parameters. Answer: C
QUESTION 96 Network topology exhibit:
Workstation 1 traffic is cos 5. Switch Cisco HighwayA sends workstation 1 traffic to Switch Cisco HighwayB. Not all traffic from Switch Cisco HighwayA is from workstation 1. Switch Cisco HighwayA configurations Switch Cisco HighwayB Configuration: mis qos mis qos interface fa0/1 interface fa0/1 switchport mode trunk switchport trunk mode switchport trunk encapsulation dot 1q switchport trunk encapsulation dot 1q switchport trunk native vlan 1 switchport trunk native vlan 1 Frames from Workstation 1 are given the proper priority through Switch Cisco HighwayA, but Switch Cisco HighwayB handles Workstation 1 frames as if they have no precedence. Which of the following actions will allow traffic from Workstation 1 to be given the proper priority?
A. Configure qos all command under Switch Cisco HighwayB fa0/1 interface.
B. Configure mis qos trust cos command under Switch Cisco HighwayB fa0/1 interface.
C. Configure mis qos trust cos 5 command under Switch Cisco HighwayB fa0/1 interface.
D. Configure qos cos 5 command under Switch Cisco HighwayB fa0/1 interface.
E. Configure mis qos trust cos command under Switch Cisco HighwayA fa0/1 interface.
F. Configure qos cos 5 command under Switch Cisco HighwayA fa0/1 interface. Answer: B Explanation: The default action is for a switch with QoS features activated not to trust edge devices and any frames that enter the switch have their CoS re-written to the lowest priority of zero. If the edge device can be trusted, this default
behavior must be overridden and the access switch must be configured to switch the frame, leaving the CoS bits untouched. The trust is configured on the switch port using the command: switch(config-if)#mls qos trust cos
QUESTION 97 Which device is required to pass traffic between VLANs?
A. hub
B. switch
C. router
D. bridge Answer: C
QUESTION 98 Which protocol is an open standard for transporting traffic from multiple VLANs between connected Layer 2 devices?
A. 802.11B B. spanning-tree
C. 802.1Q
D. ISL
E. VTP
F. Q.921 Answer: C
QUESTION 99 What effect can IGMP snooping have on a Catalyst 2950 switch?
A. Low performance when inbound bandwidth is exceeded.
B. Low performance when outbound bandwidth is exceeded.
C. Low performance when heavy traffic is present.
D. IGMP wire speed snooping does not affect switch performance. Answer: A, B Explanation: IGMP snooping should not be used on a low end switch because of increased CPU utilization.) Every packet is inspected when using IGMP snooping.
QUESTION 100 Which implementation of SPAN is designed to support source ports, source VLANs, and destination ports across different switches?
A. RVSPAN
B. MSPAN
C. VSPAN
D. RSPAN Answer: D Explanation: RSPAN is an implementation of SPAN designed to support source ports, source VLANs, and destination ports across different switches.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment