Assessment Test

1. 

Transparent bridging uses which protocol to stop network loops on layer 2 switched networks?

  1. IP routing

  2. STP

  3. VSTP

  4. UplinkFast Bridging

bthe spanning tree protocol was designed to help stop network loops that can happen with transparent bridge networks running redundant links. see chapter 5 for more information.

2. 

Choose the three components that make MLS implementation possible.

  1. MLS-CP

  2. MLSP

  3. MLS-SE

  4. MLS-RP

b, c, dmlsp is the routing protocol for mls, mls-se is the switching engine, and mls-rp is the route processor. mls-cp is an invalid answer. see chapter 7 for more information.

3. 

Why would you configure VTP version 2 on your network? (Choose all that apply.)

  1. You need to support Token Ring VLANs.

  2. You want to correct TLV errors.

  3. You want to forward VTP domain messages without the switches checking the version.

  4. You have all Cisco switches.

a, b, cif you have token ring, you would want to run vtp version 2. see chapter 3 for more information.

4. 

An interface has been configured to use PIM sparse-dense mode. Which of the following criteria force the interface to operate in dense mode? (Choose all that apply.)

  1. DVMRP neighbors that are directly connected

  2. Non-pruned PIM neighbors

  3. Join request received by a host

  4. Interface connected to a Catalyst 4000 series switch

a, bjoin requests cause the interface to operate in pim sparse mode. if a catalyst is connected, the interface must be configured to use cgmp. see chapter 8 for more information.

5. 

Which of the following is the proper syntax for enabling IP multicast on a router?

  1. multicast ip routing

  2. ip-multicast routing

  3. ip multicast-routing

  4. ip mroute cache

cthe first two are not valid commands. ip mroute cache allows the interface to use fast switching or other types of interface switching for multicast traffic. refer to chapter 8 for more information.

6. 

Which of the following are true regarding the blocking state of an STP switch port? (Choose all that apply.)

  1. Blocking ports do not forward any frames.

  2. Blocking ports listen for BPDUs.

  3. Blocking ports forward all frames.

  4. Blocking ports do not listen for BPDUs.

a, bwhen a port is in blocking state, no frames are forwarded. this is used to stop network loops. however, the blocked port will listen for bpdus received on the port. for more information on stp, see chapter 4 .

7. 

Choose the correct definition of an XTAG.

  1. A value assigned to each packet to assign it to an MLS flow

  2. A value assigned by the router to each MLS-SE in the layer 2 network

  3. A value assigned by each MLS-SE for each MLS-RP in the layer 2 network

  4. A value assigned by the NFFC or PFC to identify each flow

cxtag values are locally significant values that are assigned by the multi-layer switching switch engine (mls-se) to keep track of the multi-layer switching route processors (mls- rps) in the network. see chapter 7 for more information.

8. 

What Cisco Catalyst switches provide distribution layer functions? (Choose all that apply.)

  1. 2950

  2. 3550

  3. 4000

  4. 6000

  5. 8500

b, c, dthe 3550, 4000 series, and 6000 series were specifically designed to provide distribution layer functions. see chapter 1 for more information on the distribution layer and the cisco switches designed to run at the distribution layer.

9. 

What is the difference between a bridge and a layer 2 switch? (Choose all that apply.)

  1. Switches are software based.

  2. Bridges are hardware based.

  3. Switches are hardware based.

  4. Bridges are software based.

c, dbridges are considered software based and switches are considered hardware based. see chapter 4 for more information.

10. 

What would you type at a 2950 console prompt to see the transmit and receive statistics of VTP?

  1. show vtp counters

  2. show vtp status

  3. show vtp domain

  4. show interface e0/9

athe command show vtp counters is used to see vtp updates being sent and received on your switch. for more information, see chapter 3 .

11. 

If you wanted to configure VLAN 6 on an internal route processor with an IP address of 10.1.1.1/24, which of the following commands would you use?

  1. set vlan6 ip address 10.1.1.1 255.255.255.0

  2. configure terminal, vlan6 ip address 10.1.1.1 255.255.255.0

  3. configure terminal, interface vlan 6, ip address 10.1.1.1 255.255.255.0

  4. set interface vlan6, ip address 10.1.1.1 255.255.255.0

cthe command interface vlan # is used to create a vlan interface. the ip address of the interface is then configured with the ip address command. see chapter 6 for more information on internal and external route processors.

12. 

Which of the following is the correct multicast MAC address if it is mapped from the multicast IP address 224.127.45.254?

  1. 01-00-5e-7f-2d-fe

  2. 01-00-5e-7e-2d-fe

  3. 00-00-e0-7f-2d-fe

  4. 01-00-e0-7f-2d-fe

a23 bits allows us to use the 127 value in the second octet. the mac prefix is always 01-00-5e. see chapter 8 for more information.

13. 

Which of the following describes local VLAN services?

  1. Users do not cross layer 3 devices, and the network services are in the same broadcast domain as the users. This type of traffic never crosses the backbone.

  2. Users cross the backbone to log in to servers for file and print services.

  3. Users would have to cross a layer 3 device to communicate with the network services, but they might not have to cross the backbone.

  4. Layer 3 switches or routers are required in this scenario because the services must be close to the core and would probably be based in their own subnet.

alocal vlan services are network services that are located in the same vlan as the user trying to access them. packets will not pass through a layer 3 device. see chapter 1 for more information.

14. 

What is the command used to set the enable password to terry on a 2950 switch?

  1. enable secret terry

  2. set password terry

  3. enable password terry

  4. set password enable terry

cthe 2950 uses cisco ios software, so the commands are the same as for a router. see chapter 2 for more information.

15. 

Which of the following protocols is used to determine the locations of data loops and the election of a root bridge?

  1. STP

  2. VSTP

  3. BPDU

  4. BackboneFast

cbridge protocol data units are sent out every two seconds by default and provide information to switches throughout the internetwork. this includes finding redundant links, electing the root bridge, monitoring the links in the spanning tree, and notifying other switches in the network about link failures. see chapter 5 for more information.

16. 

What is the syntax for configuring a router to be an RP Mapping Agent?

  1. ip multicast mapping-agent scope

  2. ip pim send-rp-discovery scope

  3. ip rp-mapping-agent scope

  4. ip auto-rp mapping-agent scope

bthe router uses pim to distribute rp information to multicast routers. the other syntax options are not valid. see chapter 8 for more information.

17. 

Which of the following is an IEEE standard for frame tagging?

  1. ISL

  2. 802.3z

  3. 802.1Q

  4. 802.3u

ccisco s proprietary version of frame tagging is isl. however, if you do not have all cisco switches, the ieee 802.1q version would be used. see chapter 3 for more information.

18. 

How do you set the enable mode password to terry on a 4000 series switch?

  1. set sco password terry

  2. set user password terry

  3. set password terry

  4. set enablepass

  5. set enable password terry

dthe command set enablepass will set the password on a 4000 series switch. see chapter 2 for more information on configuring the 4000 series switches.

19. 

Which of the following is true?

  1. The 3550 uses CEF for layer 3 switching.

  2. The 3550 requires an external route processor to achieve layer 3 switching.

  3. The 3550 does not perform layer 3 switching without enhanced software.

  4. The 3550 integrates with the 2600 router to achieve layer 3 switching.

athe 3550 uses cisco express forwarding (cef) to maintain tables that allow layer 3 switching to be carried out. see chapter 6 for more information on layer 3 switching.

20. 

Which version of IGMP is the Cisco proprietary version?

  1. IGMPv1

  2. IGMPv2

  3. CGMP

  4. None

dcgmp is not a version of igmp but was developed by cisco systems. see chapter 8 for more information.

21. 

If you wanted to set a default route on a 4000 series switch, which of the following commands would you use?

  1. route add 0.0.0.0 0.0.0.0 172.16.1.1

  2. set route default 0.0.0.0 172.16.1.1

  3. set route default 172.16.1.1

  4. set route 0.0.0.0 0.0.0.0 172.16.1.1

cthe command set route default and the command set route 0.0.0.0 are the same command and can be used to set a default gateway on a 4000 series switch. see chapter 6 for more information on configuring a 4000 series switch.

22. 

Which of the following is a type of access policy that you can apply at the core layer?

  1. Port security

  2. Access lists

  3. High reliability

  4. Physical security

ca high level of reliability, including redundancy, is encouraged at the core layer. see chapter 1 for more information on policies.

23. 

Which of the following defines remote VLAN services?

  1. Users do not cross layer 3 devices, and the network services are in the same broadcast domain as the users. This type of traffic never crosses the backbone.

  2. Users cross layer 2 devices only to find the network file and print services needed to perform their job function.

  3. Users would have to cross a layer 3 device to communicate with the network services, but they might not have to cross the backbone.

  4. Layer 3 switches or routers are required in this scenario because the services must be close to the core and would probably be based in their own subnet.

cto communicate with another vlan, packets must cross a layer 3 device. see chapter 1 for more information on local and remote vlan services.

24. 

If you want to clear the VTP prune eligibility from all VLANs except VLAN 2, what command would you type in on a set-based switch?

  1. delete pruneeligible 3, 4, 5,and so on

  2. delete vtp pruneeligible 1, 3-1005

  3. clear vtp pruneeligible 3-1005

  4. clear vtp pruneeligible 1, 3-1005

cyou cannot turn off pruneeligible for vlan 1, which makes clear vtp pruneeligible 3-1005 the only correct answer. see chapter 3 for more information.

25. 

Which of the following are valid QoS mechanisms? (Choose all that apply.)

  1. Differentiated services

  2. First in, first out

  3. Integrated services

  4. Best efforts

a, c, dfirst in, first out is a queuing mechanism. all the others are genuine models for qos implementation. see chapter 9 for more information.

26. 

When must you run IGMPv1?

  1. When using Auto-RP

  2. When running DVMRP tunnels

  3. When hosts use IGMPv1

  4. You never have to use IGMPv1.

cuse igmpv1 when the clients subscribing are using igmpv1. see chapter 8 for more information.

27. 

If you wanted to have a 4000 switch supervisor module in a VLAN other than the default of VLAN 1, what should you type?

  1. set interface slo 3

  2. set interface sc0 2

  3. set sco2 3

  4. set vlan management 2

bthe command set interface sc0 vlan# changes the default vlan for the supervisor module to the specified vlan. see chapter 2 for more information.

28. 

What does a switch do with a multicast frame received on an interface?

  1. Forwards the switch to the first available link

  2. Drops the frame

  3. Floods the network with the frame looking for the device

  4. Sends back a message to the originating station asking for a name resolution

cthe switch will flood the network with the frame looking for the device. for more information on lan switching, see chapter 4 .

29. 

Choose the effects of configuring PIM SM on an interface.

  1. Enabling IGMP

  2. Enabling CGMP

  3. Enabling IGMP and CGMP

  4. Enabling Auto-RP

aadding the pim configuration to the interface enables only internet group management protocol (igmp) in addition to pim. auto-rp and cisco group management protocol (cgmp) must be configured separately. see chapter 8 for more information.

30. 

Choose the three basic steps in establishing a shortcut cache (MLS cache) entry.

  1. Identification of the MLS-RP

  2. Identification of the MLS-SE

  3. Identification of a candidate packet

  4. Identification of an enable packet

  5. Identification of ISL trunking

a, c, dthe multi-layer switching switch engine (mls-se) needs to know three things to create an entry: the multi-layer switching route processor (mls-rp), a candidate packet, and an enable packet. see chapter 7 for more information.

31. 

What is the default VLAN on all switches?

  1. VLAN 64

  2. VLAN 1005

  3. VLAN 1

  4. VLAN 10

cvlan 1 is a default vlan and used for management by default. see chapter 5 for more information.

32. 

Which of the following is a type of policy that you can apply at the distribution layer? (Choose all that apply.)

  1. Port security

  2. Access lists

  3. Distribute lists

  4. Physical security

b, caccess lists can be configured at the distribution layer for packet filtering purposes, and a distribute list controls how routing traffic is forwarded. see chapter 1 for more information on policies at each layer.

33. 

Which of the following is true regarding the Cisco 2950-24 switch?

  1. Runs the Standard Image software version of IOS

  2. Supports a large number of connections and also supports an internal route processor module

  3. Supports MLS

  4. Recommended for use at the distribution layer

athe 2950-24 is an entry-level switch. running the si ios image, it is suitable for use at the access layer only. see chapter 1 for more information.

34. 

How many bits are available for mapping a layer 3 IP address to a multicast MAC address?

  1. 16

  2. 32

  3. 23

  4. 24

cdue to the prefix length and the high order bit already in use in the multicast mac address, only 23 bits are left for mapping. see chapter 8 for more information.

35. 

What command will set spanning to the per-VLAN mode (PVST) on a 2950 switch?

  1. spanning-tree mode pvst

  2. spanningtree mode pvst+

  3. spanning-tree pvst

  4. spanning-tree pvst mode

athe command to set spanning tree to the pvst mode on a 2950 switch is spanning-tree mode pvst . see chapter 5 for more information.

36. 

What does the PVST protocol provide?

  1. One instance of spanning tree per network

  2. One instance of STP per VLAN

  3. Port Aggregation Protocol support

  4. Routing between VLANs

bthe cisco proprietary protocol per-vlan spanning tree (pvst) uses a separate instance of spanning tree for each and every vlan. see chapter 5 for more information.

37. 

What is the purpose of the IEEE 802.1p protocol?

  1. It is an extension to 802.1D (STP), providing PVST options.

  2. It is an extension to 802.1Q, providing CoS options.

  3. It is an extension to 802.1Q, providing faster STP convergence.

  4. It is an extension to 802.3, providing QoS options.

b802.1p uses 3 bits in the 802.1q field to set class of service. see chapter 9 for more information.

38. 

Which of the following are examples of ways to directly connect to a switch? (Choose all that apply.)

  1. Console port

  2. VTY line

  3. Auxiliary port

  4. Telnet

a, cconnecting to the console port or auxiliary port is out-of-band management because you are not accessing the equipment from within the network. instead, you are connecting directly to the switch. see chapter 2 for more information on basic switch setup.

39. 

Which of the following IP address ranges is the valid multicast address range?

  1. 127.0.0.0–127.255.255.255

  2. 223.0.0.1–237.255.255.255

  3. 224.0.0.1–239.0.0.0

  4. 224.0.0.0–239.255.255.255

dthe first answer is a class b range of addresses. 223.0.0.1 does not have the proper mask. the third answer is within the valid range, but it is not all-inclusive. see chapter 8 for more information.

40. 

Which of the following defines enterprise services?

  1. Users do not cross layer 3 devices, and the network services are in the same broadcast domain as the users. This type of traffic never crosses the backbone.

  2. No layer 3 switches or devices are used in this network.

  3. The users would have to cross a layer 3 device to communicate with the network services, but they might not have to cross the backbone.

  4. Layer 3 switches or routers are required in this scenario because the services must be close to the core and would probably be based in their own subnet.

denterprise services are defined as services that are provided to all users on the internetwork. see chapter 1 for more information.

41. 

What is the command to enable trunking on interface fa0/1 on a 2950 switch?

  1. Terry_2950(config-if)#switchport trunk

  2. Terry_2950(config-if)#switchport trunk mode

  3. Terry_2950(config-if)#switchport mode trunk

  4. Terry_2950(config-if)#mode trunk switchport

cthe command to set an interface to trunk mode on an ios-based switch is switchport mode trunk . see chapter 3 for more information on trunking configurations.

42. 

Which of the following is true regarding IGMPv2?

  1. It can be used only on Ethernet LANs.

  2. It is used to update multicast caches on workstations.

  3. IGMP works only with Unix devices.

  4. It enables clients to inform routers of their intent to leave.

dinternet group management protocol (igmp) version 2 is used by igmp routers to enable clients to send messages, telling the router that they no longer want to subscribe to the multicast stream. see chapter 8 for more information regarding igmp.

43. 

What type of cable must you use to connect between two switch uplink ports?

  1. Straight

  2. Rolled

  3. Crossover

  4. Fiber

ca crossover cable is used to connect switches to switches and hubs to hubs. see chapter 2 for more information on the catalyst 4000 configuration.

44. 

Which LAN switch methods have a fixed latency time? (Choose all that apply.)

  1. Cut-through

  2. Store-and-forward

  3. FragmentCheck

  4. FragmentFree

a, dcut-through and fragmentfree always read only a fixed amount of a frame. for more information on lan switch types, see chapter 4 .

45. 

Which of the following are true regarding a 2950T-24 switch? (Choose all that apply.)

  1. It is recommended for use primarily at the distribution layer.

  2. It supports frame classification and marking to create QoS options.

  3. It uses the Enhanced Image version of the IOS software.

  4. It supports rudimentary layer 3 switching.

b, cthe 2950t-24 uses the ei image of ios and supports both frame classification and marking, but like all 2950 series, it is primarily used at the access layer and does not support layer 3 switching. see chapter 9 for more information.

46. 

What is the relationship between frame CoS (Class of Service) and IP ToS (Type of Service)?

  1. There is no relationship unless you configure it to be so.

  2. They are the same thing.

  3. Conceptually, the 3 bits aim to identify the same prioritization.

  4. They are a direct map to each other.

calthough cos is configured at layer 2 and tos at layer 3, both of them are mechanisms to identify different traffic priorities, and thus are conceptually the same in their meaning. see chapter 9 for more information.

47. 

How do you set the usermode password to terry on a 4000 switch?

  1. set sco password terry

  2. set user password terry

  3. set password

  4. set enable password terry

cthe command set password sets the usermode password on a 4000 series switch. see chapter 2 for more information on configuring 4000 series switches.

48. 

What are the three problems that are associated with layer 2 switching and are solved by STP?

  1. Address learning

  2. Routing

  3. Forwarding and filtering frames

  4. Forwarding and filtering packets

  5. Loop avoidance

  6. IP addressing

a, c, elayer 2 features include address learning, forwarding and filtering of the network, and loop avoidance. see chapter 4 for more information.

49. 

When will a switch update its VTP database?

  1. Every 60 seconds.

  2. When a switch receives an advertisement that has a higher revision number, the switch will overwrite the database in NVRAM with the new database being advertised.

  3. When a switch broadcasts an advertisement that has a lower revision number, the switch will overwrite the database in NVRAM with the new database being advertised.

  4. When a switch receives an advertisement that has the same revision number, the switch will overwrite the database in NVRAM with the new database being advertised.

bonly when a vtp update is received with a higher data vtp revision number will a switch update its vtp database. see chapter 3 for more information.

50. 

What is the typical time that it takes a switch port to go from blocking to forwarding state?

  1. 5 seconds

  2. 50 seconds

  3. 10 seconds

  4. 100 seconds

bfifty seconds is the default time for changing from blocking to forwarding state. this is to allow enough time for all switches to update their stp database. see chapter 4 for more information on stp.

51. 

Which topology scenario(s) support Multi-Layer Switching (MLS)? (Choose all that apply.)

  1. Router on a stick

  2. Multiple switches connected via ISL trunks with only one switch connected to a router

  3. Multiple switches connected to a router

  4. Multiple routers connected to one switch

a, b, dthe router on a stick is the typical and simplest topology for multi-layer switching (mls). multiple switches connected to each other can use mls if only one switch is connected to the router. multiple routers can be connected to one switch as long as each router has only one link to the switch. see chapter 7 for more information.

52. 

Which of the following commands is used to view the configuration of an external route processor?

  1. show vlan-config

  2. show config

  3. show running-config

  4. show port slot/type

cthe command show running-config is used to view the current configuration. see chapter 6 for more information on internal and external route processors.

53. 

To configure a root bridge on a set-based switch, what command would be used?

  1. set spanning tree backup

  2. set spantree secondary

  3. set spantree root

  4. spanning tree 2

cthe set spantree root command enables you to configure a root bridge. see chapter 5 for more information.

54. 

What are the two types of distribution trees?

  1. RP trees

  2. Multicast trees

  3. Shared root trees

  4. Source root trees

c, dmulticast trees don t exist. some protocols that are based in shared root trees can create rpts (or rp trees) that are parallel to the shortest path tree, but this is a flavor of shared root tree distribution. see chapter 8 for more information.

55. 

When setting the VLAN port priority, what are the available values that you can use?

  1. 0–63

  2. 1–64

  3. 0–255

  4. 1–1005

aa priority from 0 to 63 can be set for each vlan. see chapter 3 for more information.

56. 

What are valid ways that an administrator can configure VLAN memberships? (Choose all that apply.)

  1. DHCP server

  2. Static

  3. Dynamic

  4. VTP database

b, cstatic vlans are set port by port on each interface or port. dynamic vlans can be assigned to devices via a server. see chapter 3 for more information.

57. 

What is the distance that you can run an MMF, 62.5-micron Gigabit Ethernet cable?

  1. 400 meters

  2. 25 meters

  3. 260 meters

  4. 3 kilometers

  5. 10 kilometers

cthe maximum distance a multi-mode fiber, 62.5-micron gigabit ethernet link can run is 260 meters. see chapter 2 for more information.

58. 

You have just been hired as a consultant for a small company that has users distributed across many floors in the same building. Servers for the company are all located on the first floor, and 30 users access them from various parts of the building. What switch would you install for the access layer connection?

  1. 2900 series

  2. 3550 series

  3. 4000 series

  4. 6000 series

abecause the question involves a small company and no growth was specified, a couple of 2950s would be the most cost-effective solution. see chapter 1 for more information.

59. 

Which of the following commands will display XTAG information on a switch?

  1. show mls entry

  2. show mls statistics

  3. show mls

  4. show mls rp ip

cthe show mls rp ip command is used on routers and doesn t provide xtag information. neither do any of the other switch commands. see chapter 7 for more information.

60. 

Which statement about the 4000 series switches is true?

  1. They run CatOS, but can be upgraded to run IOS.

  2. The supervisor can be upgraded to run IOS, but CatOS remains on the switch cards.

  3. IOS is supported only for the layer 3 switching portion of the configurations.

  4. They can be upgraded to IOS from CatOS, but there is no mechanism to revert to CatOS.

athe default os for older 4000 switches is catos, but they can be upgraded to ios. newer switches may be purchased with ios already running. see chapter 10 for more information.

Answers

1. 

B The Spanning Tree Protocol was designed to help stop network loops that can happen with transparent bridge networks running redundant links. See Chapter 5 for more information.

2. 

B, C, D MLSP is the routing protocol for MLS, MLS-SE is the switching engine, and MLS-RP is the route processor. MLS-CP is an invalid answer. See Chapter 7 for more information.

3. 

A, B, C If you have Token Ring, you would want to run VTP version 2. See Chapter 3 for more information.

4. 

A, B Join requests cause the interface to operate in PIM sparse mode. If a Catalyst is connected, the interface must be configured to use CGMP. See Chapter 8 for more information.

5. 

C The first two are not valid commands. ip mroute cache allows the interface to use fast switching or other types of interface switching for multicast traffic. Refer to Chapter 8 for more information.

6. 

A, B When a port is in blocking state, no frames are forwarded. This is used to stop network loops. However, the blocked port will listen for BPDUs received on the port. For more information on STP, see Chapter 4.

7. 

C XTAG values are locally significant values that are assigned by the Multi-Layer Switching Switch Engine (MLS-SE) to keep track of the Multi-Layer Switching Route Processors (MLS- RPs) in the network. See Chapter 7 for more information.

8. 

B, C, D The 3550, 4000 series, and 6000 series were specifically designed to provide distribution layer functions. See Chapter 1 for more information on the distribution layer and the Cisco switches designed to run at the distribution layer.

9. 

C, D Bridges are considered software based and switches are considered hardware based. See Chapter 4 for more information.

10. 

A The command show vtp counters is used to see VTP updates being sent and received on your switch. For more information, see Chapter 3.

11. 

C The command interface vlan # is used to create a VLAN interface. The IP address of the interface is then configured with the ip address command. See Chapter 6 for more information on internal and external route processors.

12. 

A 23 bits allows us to use the 127 value in the second octet. The MAC prefix is always 01-00-5e. See Chapter 8 for more information.

13. 

A Local VLAN services are network services that are located in the same VLAN as the user trying to access them. Packets will not pass through a layer 3 device. See Chapter 1 for more information.

14. 

C The 2950 uses Cisco IOS software, so the commands are the same as for a router. See Chapter 2 for more information.

15. 

C Bridge Protocol Data Units are sent out every two seconds by default and provide information to switches throughout the internetwork. This includes finding redundant links, electing the root bridge, monitoring the links in the spanning tree, and notifying other switches in the network about link failures. See Chapter 5 for more information.

16. 

B The router uses PIM to distribute RP information to multicast routers. The other syntax options are not valid. See Chapter 8 for more information.

17. 

C Cisco’s proprietary version of frame tagging is ISL. However, if you do not have all Cisco switches, the IEEE 802.1Q version would be used. See Chapter 3 for more information.

18. 

D The command set enablepass will set the password on a 4000 series switch. See Chapter 2 for more information on configuring the 4000 series switches.

19. 

A The 3550 uses Cisco Express Forwarding (CEF) to maintain tables that allow layer 3 switching to be carried out. See Chapter 6 for more information on layer 3 switching.

20. 

D CGMP is not a version of IGMP but was developed by Cisco Systems. See Chapter 8 for more information.

21. 

C The command set route default and the command set route 0.0.0.0 are the same command and can be used to set a default gateway on a 4000 series switch. See Chapter 6 for more information on configuring a 4000 series switch.

22. 

C A high level of reliability, including redundancy, is encouraged at the core layer. See Chapter 1 for more information on policies.

23. 

C To communicate with another VLAN, packets must cross a layer 3 device. See Chapter 1 for more information on local and remote VLAN services.

24. 

C You cannot turn off pruneeligible for VLAN 1, which makes clear vtp pruneeligible 3-1005 the only correct answer. See Chapter 3 for more information.

25. 

A, C, D First in, first out is a queuing mechanism. All the others are genuine models for QoS implementation. See Chapter 9 for more information.

26. 

C Use IGMPv1 when the clients subscribing are using IGMPv1. See Chapter 8 for more information.

27. 

B The command set interface sc0 vlan# changes the default VLAN for the supervisor module to the specified VLAN. See Chapter 2 for more information.

28. 

C The switch will flood the network with the frame looking for the device. For more information on LAN switching, see Chapter 4.

29. 

A Adding the PIM configuration to the interface enables only Internet Group Management Protocol (IGMP) in addition to PIM. Auto-RP and Cisco Group Management Protocol (CGMP) must be configured separately. See Chapter 8 for more information.

30. 

A, C, D The Multi-Layer Switching Switch Engine (MLS-SE) needs to know three things to create an entry: the Multi-Layer Switching Route Processor (MLS-RP), a candidate packet, and an enable packet. See Chapter 7 for more information.

31. 

C VLAN 1 is a default VLAN and used for management by default. See Chapter 5 for more information.

32. 

B, C Access lists can be configured at the distribution layer for packet filtering purposes, and a distribute list controls how routing traffic is forwarded. See Chapter 1 for more information on policies at each layer.

33. 

A The 2950-24 is an entry-level switch. Running the SI IOS image, it is suitable for use at the access layer only. See Chapter 1 for more information.

34. 

C Due to the prefix length and the high order bit already in use in the multicast MAC address, only 23 bits are left for mapping. See Chapter 8 for more information.

35. 

A The command to set spanning tree to the pvst mode on a 2950 switch is spanning-tree mode pvst. See Chapter 5 for more information.

36. 

B The Cisco proprietary protocol Per-VLAN Spanning Tree (PVST) uses a separate instance of spanning tree for each and every VLAN. See Chapter 5 for more information.

37. 

B 802.1p uses 3 bits in the 802.1Q field to set Class of Service. See Chapter 9 for more information.

38. 

A, C Connecting to the console port or auxiliary port is out-of-band management because you are not accessing the equipment from within the network. Instead, you are connecting directly to the switch. See Chapter 2 for more information on basic switch setup.

39. 

D The first answer is a Class B range of addresses. 223.0.0.1 does not have the proper mask. The third answer is within the valid range, but it is not all-inclusive. See Chapter 8 for more information.

40. 

D Enterprise services are defined as services that are provided to all users on the internetwork. See Chapter 1 for more information.

41. 

C The command to set an interface to trunk mode on an IOS-based switch is switchport mode trunk. See Chapter 3 for more information on trunking configurations.

42. 

D Internet Group Management Protocol (IGMP) version 2 is used by IGMP routers to enable clients to send messages, telling the router that they no longer want to subscribe to the multicast stream. See Chapter 8 for more information regarding IGMP.

43. 

C A crossover cable is used to connect switches to switches and hubs to hubs. See Chapter 2 for more information on the Catalyst 4000 configuration.

44. 

A, D Cut-through and FragmentFree always read only a fixed amount of a frame. For more information on LAN switch types, see Chapter 4.

45. 

B, C The 2950T-24 uses the EI image of IOS and supports both frame classification and marking, but like all 2950 series, it is primarily used at the access layer and does not support layer 3 switching. See Chapter 9 for more information.

46. 

C Although CoS is configured at layer 2 and ToS at layer 3, both of them are mechanisms to identify different traffic priorities, and thus are conceptually the same in their meaning. See Chapter 9 for more information.

47. 

C The command set password sets the usermode password on a 4000 series switch. See Chapter 2 for more information on configuring 4000 series switches.

48. 

A, C, E Layer 2 features include address learning, forwarding and filtering of the network, and loop avoidance. See Chapter 4 for more information.

49. 

B Only when a VTP update is received with a higher data VTP revision number will a switch update its VTP database. See Chapter 3 for more information.

50. 

B Fifty seconds is the default time for changing from blocking to forwarding state. This is to allow enough time for all switches to update their STP database. See Chapter 4 for more information on STP.

51. 

A, B, D The router on a stick is the typical and simplest topology for Multi-Layer Switching (MLS). Multiple switches connected to each other can use MLS if only one switch is connected to the router. Multiple routers can be connected to one switch as long as each router has only one link to the switch. See Chapter 7 for more information.

52. 

C The command show running-config is used to view the current configuration. See Chapter 6 for more information on internal and external route processors.

53. 

C The set spantree root command enables you to configure a root bridge. See Chapter 5 for more information.

54. 

C, D Multicast trees don’t exist. Some protocols that are based in shared root trees can create RPTs (or RP trees) that are parallel to the shortest path tree, but this is a flavor of shared root tree distribution. See Chapter 8 for more information.

55. 

A A priority from 0 to 63 can be set for each VLAN. See Chapter 3 for more information.

56. 

B, C Static VLANs are set port by port on each interface or port. Dynamic VLANs can be assigned to devices via a server. See Chapter 3 for more information.

57. 

C The maximum distance a Multi-Mode Fiber, 62.5-micron Gigabit Ethernet link can run is 260 meters. See Chapter 2 for more information.

58. 

A Because the question involves a small company and no growth was specified, a couple of 2950s would be the most cost-effective solution. See Chapter 1 for more information.

59. 

C The show mls rp ip command is used on routers and doesn’t provide XTAG information. Neither do any of the other switch commands. See Chapter 7 for more information.

60. 

A The default OS for older 4000 switches is CatOS, but they can be upgraded to IOS. Newer switches may be purchased with IOS already running. See Chapter 10 for more information.



CCNP. Building Cisco Multilayer Switched Networks Study Guide (642-811)
CCNP: Building Cisco Multilayer Switched Networks Study Guide (642-811)
ISBN: 078214294X
EAN: 2147483647
Year: 2002
Pages: 174
Authors: Terry Jack

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net