Exam CISCO-640-802 v12(2.93) Part 10

| Thursday, February 28, 2008

91.A single 802.11g access point has been configured and installed in the center of a square office. A few wireless users are experiencing slow performance and drops while most users are operating at peak efficiency. What are three likely causes of this problem? (Choose three.)

A:mismatched TKIP encryption
B:null SSID
C:cordless phones
D:mismatched SSID
E:metal file cabinets
F:antenna type or direction

Correct Answers: C, E, F

92.A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role as root bridge?

A: Establish a direct link from the switch to all other switches in the network.
B: Assign the switch a higher MAC address than the other switches in the network have.
C: Configure the switch so that it has a lower priority than other switches in the network.
D: Configure the switch for full-duplex operation and configure the other switches for half-duplex operation.
E: Connect the switch directly to the MDF router, which will force the switch to assume the role of root bridge.

Correct Answers: C

93.Refer to the exhibit. Given the output of the Floor3 switch, what statement describes the operation of this switch?



A: VTP is disabled on this switch.
B: The switch can create, change, and delete VLANs.
C: The switch learns VLAN information but does not save it to NVRAM.
D: The switch can create VLANs locally but will not forward this information to other switches.
E: The switch learns VLAN information and updates the local VLAN data base in NVRAM.

Correct Answers: C

94.What is the effect of the following access list condition?

access-list 101 permit ip 10.25.30.0 0.0.0.255 any
A: permit all packets matching the first three octets of the source address to all destinations
B: permit all packets matching the last octet of the destination address and accept all source addresses
C: permit all packets from the third subnet of the network address to all destinations
D: permit all packets matching the host bits in the source address to all destinations
E: permit all packets to destinations matching the first three octets in the destination address

Correct Answers: A

95.Refer to the exhibit. Hosts on the same VLAN can communicate with each other but are unable to communicate with hosts on different VLANs. What is needed to allow communication between VLANs?



A: a switch with a trunk link that is configured between the switches
B: a router with an IP address on the physical interface that is connected to the switch
C: a switch with an access link that is configured between the switches
D: a router with subinterfaces configured on the physical interface that is connected to the switch

Correct Answers: D

96.LAB



97.Why would a network administrator configure port security on a switch?

A: to prevent unauthorized Telnet access to a switch port
B: to limit the number of Layer 2 broadcasts on a particular switch port
C: to prevent unauthorized hosts from accessing the LAN
D: to protect the IP and MAC address of the switch and associated ports
E: to block unauthorized access to the switch management interfaces over common TCP ports

Correct Answers: C

98.The show interfaces serial 0/0 command resulted in the output shown in the graphic. What are possible causes for this interface status? (Choose three.)



A:The interface is shut down.
B:No keepalive messages are received.
C:The clockrate is not set.
D:No loopback address is set.
E:No cable is attached to the interface.
F:There is a mismatch in the encapsulation type.

Correct Answers: B, C, F

99.Refer to the exhibit. The FMJ manufacturing company is concerned about unauthorized access to the Payroll Server. The Accounting1, CEO, Mgr1, and Mgr2 workstations should be the only computers with access to the Payroll Server. What two technologies should be implemented to help prevent unauthorized access to the server? (Choose two.)



A:access lists
B:encrypted router passwords
C:STP
D:VLANs
E:VTP
F:wireless LANs

Correct Answers: A, D

100.A network administrator is troubleshooting the OSPF configuration of routers R1 and R2. The routers cannot establish an adjacency relationship on their common Ethernet link. The graphic shows the output of the show ip ospf interface e0 command for routers R1 and R2. Based on the information in the graphic, what is the cause of this problem?



A: The OSPF area is not configured properly.
B: The priority on R1 should be set higher.
C: The cost on R1 should be set higher.
D: The hello and dead timers are not configured properly.
E: A backup designated router needs to be added to the network.
F: The OSPF process ID numbers must match.

Correct Answers: D

0 comments:

eXTReMe Tracker