121.Refer to the exhibit. Which two statements are true about interVLAN routing in the topology that is shown in the exhibit? (Choose two.)
A:Host E and host F use the same IP gateway address.
B:Router1 and Switch2 should be connected via a crossover cable.
C:Router1 will not play a role in communications between host A and host D.
D:The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.
E:Router1 needs more LAN interfaces to accommodate the VLANs that are shown in the exhibit.
F:The FastEthernet 0/0 interface on Router1 and Switch2 trunk ports must be configured using the same encapsulation type.
Correct Answers: D, F
122.Refer to the exhibit. For what two reasons has the router loaded its IOS image from the location that is shown? (Choose two.)
A:Router1 has specific boot system commands that instruct it to load IOS from a TFTP server.
B:Router1 is acting as a TFTP server for other routers.
C:Router1 cannot locate a valid IOS image in flash memory.
D:Router1 defaulted to ROMMON mode and loaded the IOS image from a TFTP server.
E:Cisco routers will first attempt to load an image from TFTP for management purposes.
Correct Answers: A, C
123.At which OSI layer is a logical path created between two host systems?
A: session
B: transport
C: network
D: data link
E: physical
Correct Answers: C
124.What functions do routers perform in a network? (Choose two.)
A:packet switching
B:access layer security
C:path selection
D:VLAN membership assignment
E:bridging between LAN segments
F:microsegmentation of broadcast domains
Correct Answers: A, C
125.Refer to the exhibit. The show vtp status command is executed at a switch that is generating the exhibited output. Which statement is true for this switch?
A: The switch forwards its VLAN database to other switches in the ICND VTP domain.
B: The configuration revision number increments each time the VLAN database is updated.
C: The switch forwards VTP updates that are sent by other switches in the ICND domain.
D: The VLAN database is updated when VTP information is received from other switches.
Correct Answers: C
126.Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)
A:It specifies use of a static encryption key that must be changed frequently to enhance
security.
B:It requires use of an open authentication method.
C:It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
D:It requires that all access points and wireless devices use the same encryption key.
E:It includes authentication by PSK.
Correct Answers: C, E
127.Refer to the exhibit. The network shown in the exhibit is running the RIPv2 routing protocol. The network has converged, and the routers in this network are functioning properly. The FastEthernet0/0 interface on R1 goes down. In which two ways will the routers in this network respond to this change? (Choose two.)
A:All routers will reference their topology database to determine if any backup routes to the 192.168.1.0 network are known.
B:Routers R2 and R3 mark the route as inaccessible and will not accept any further routing updates from R1 until their hold-down timers expire.
C:Because of the split-horizon rule, router R2 will be prevented from sending erroneous information to R1 about connectivity to the 192.168.1.0 network.
D:When router R2 learns from R1 that the link to the 192.168.1.0 network has been lost, R2 will respond by sending a route back to R1 with an infinite metric to the 192.168.1.0 network.
E:R1 will send LSAs to R2 and R3 informing them of this change, and then all routers will send periodic updates at an increased rate until the network again converges.
Correct Answers: C, D
128.What is the function of the command switchport trunk native vlan 999 on a Cisco Catalyst switch?
A: It creates a VLAN 999 interface.
B: It designates VLAN 999 for untagged traffic.
C: It blocks VLAN 999 traffic from passing on the trunk.
D: It designates VLAN 999 as the default for all unknown tagged traffic.
Correct Answers: B
129.Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?
A: denial of service
B: brute force
C: reconnaissance
D: Trojan horse
Correct Answers: A
130.LAB
Exam CISCO-640-802 v12(2.93) Part 13
| Labels: CCNA TEST
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment