Which Action Is Taken by A Switch Port Enabled For Poe Power Classification Override?

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 16

67.

Which action is taken by a switch port enabled for PoE power classification
override?
 A. When a powered device begins drawing power from a PoE switch port a
syslog message is generated.
 B. As power usage on a PoE switch port is checked data flow to the
connected device is temporarily paused.
 C. If a switch determines that a device is using less than the minimum
configured power it assumes the device has failed and disconnects.
 D. If a monitored port exceeds the maximum administrative value for
power, the port is shutdown and err disabled.
Correct Answer: D
Section: Network Fundamentals
Explanation/Reference: PoE monitoring and policing compares the power
consumption on ports with the administrative maximum value (either a configured
maximum value or the port’s default value). If the power consumption on a
monitored port exceeds the administrative maximum value, the following actions
occur:
– A syslog message is issued.
– The monitored port is shut down and error-disabled.
– The allocated power is freed.
Reference: Click here

25. Drag the descriptions of IP protocol transmissions from the left onto the IP
traffic types on the right.

Answer
TCP
 1. Sends tranmissions in sequence
 3. Transmits packets as a stream
 6. Uses a lower transmission rate to ensure relability
UDP
 2. Transmissions include an 8-byte header
 4. Transmits packets individually
 5. Uses a higher transmission rate to support latency-sensitive application

23. Match the functions to the corresponding layers. (Not all options are used.)
Answer
access layer
 provides network access to the user
 represents the network edge
distribution layer
 implements network access policy
 establishes Layer 3 routing boundaries
core layer
 provides high-speed backbone connectivity
 functions as an aggregator for all the campus blocks
Not use:
 implements personal firewalls on the client computers
20. Drag and drop the networking parameters from the left on to the correct values
on the right.

Answer:

Explanation/Reference: SSH uses TCP port 22 while SNMP uses UDP port 161
and 162.

18. Drag and drop the application protocols from the left onto the transport
protocols that is uses on the right.
Answer:
361. How does the dynamically-learned MAC address feature function?
 A. The CAM table is empty until ingress traffic arrives at each port
 B. Switches dynamically learn MAC addresses of each connecting CAM
table.
 C. The ports are restricted and learn up to a maximum of 10 dynamically-
learned addresses
 D. It requires a minimum number of secure MAC addresses to be filled
dynamically
Answer: A

354. What is the purpose of traffic shaping?


 A. to mitigate delays over slow links
 B. to provide fair queuing for buffered flows
 C. to limit the bandwidth that a flow can use to
 D. be a marking mechanism that identifies different flows
Correct Answer: B
Explanation: Traffic shaping retains excess packets in a queue and then
schedules the excess for later transmission over increments of time.

346. What is the same for both copper and fiber interfaces when using SFP
modules?
 A. They support an inline optical attenuator to enhance signal strength
 B. They provide minimal interruption to services by being hot-swappable
 C. They offer reliable bandwidth up to 100 Mbps in half duplex mode
 D. They accommodate single-mode and multi-mode in a single module
Correct Answer: B

336. What is the primary function of a Layer 3 device?


 A. to analyze traffic and drop unauthorized traffic from the Internet
 B. to transmit wireless traffic between hosts
 C. to pass traffic between different networks
 D. forward traffic within the same broadcast domain
Correct Answer: C

335. What are two functions of a server on a network? (Choose two)


 A. achieves redundancy by exclusively using virtual server clustering
 B. runs applications that send and retrieve data for workstations that make
requests
 C. handles requests from multiple workstations at the same time
 D. runs the same operating system in order to communicate with other
servers
 E. housed solely in a data center that is dedicated to a single client
Correct Answer: B,C

327. What is the function of a server?


 A. It transmits packets between hosts in the same broadcast domain.
 B. It provides shared applications to end users.
 C. It routes traffic between Layer 3 devices.
 D. It Creates security zones between trusted and untrusted networks
Correct Answer: B

311. A device detects two stations transmitting frames at the same time. This
condition occurs after the first 64 bytes of the frame is received interface counter
increments?
 A. collision
 B. CRC
 C. runt
 D. late collision
Correct Answer: D

310. How do TCP and UDP differ in the way they guarantee packet delivery?
 A. TCP uses checksum, acknowledgement, and retransmissions, and UDP
uses checksums only.
 B. TCP uses retransmissions, acknowledgement and parity checks and
UDP uses cyclic redundancy checks only.
 C. TCP uses checksum, parity checks, and retransmissions, and UDP
uses acknowledgements only.
 D. TCP uses two-dimensional parity checks, checksums, and cyclic
redundancy checks and UDP uses retransmissions only.
Correct Answer: A

303. Router R2 is configured with multiple routes to reach network 10 1.1.0/24 from
router R1. What protocol is chosen by router R2 to reach the destination network
10.1.1.0/24?
 A. eBGP
 B. static
 C. OSPF
 D. EIGRP
Correct Answer: B
290. Refer to the exhibit Which outcome is expected when PC_A sends data to
PC_B?

 A. The switch rewrites the source and destination MAC addresses with its
own
 B. The source and destination MAC addresses remain the same
 C. The source MAC address is changed
 D. The destination MAC address is replaced with ffff.ffff.ffff
Correct Answer: B

276. A company needs to interconnect several branch offices across a metropolitan


area. The network engineer is seeking a solution that provides high-speed converged
traffic, including voice, video, and data on the same network infrastructure. The
company also wants easy integration to their existing LAN infrastructure in their
office locations. Which technology should be recommended?
 A. VSAT
 B. ISDN
 C. Frame Relay
 D. Ethernet WAN
Correct Answer: D
Explanation: Ethernet WAN uses many Ethernet standards and it connects easily
to existing Ethernet LANs. It provides a switched, high-bandwidth Layer 2
network capable of managing data, voice, and video all on the same
infrastructure. ISDN, while capable of supporting both voice and data, does not
provide high bandwidth. VSAT uses satellite connectivity to establish a private
WAN connection but with relatively low bandwidth. Use of VSAT, ISDN, and
Frame Relay require specific network devices for the WAN connection and data
conversion between LAN and WAN.

271. What is the name of the layer in the Cisco borderless switched network design
that is considered to be the backbone used for high-speed connectivity and fault
isolation?
 A. data link
 B. access
 C. core
 D. network
 E. network access
Correct Answer: C

244. What is the difference regarding reliability and communication type between
TCP and UDP?
 A. TCP is reliable and is a connection-oriented protocol; UDP is not
reliable and is a connectionless protocol
 B. TCP is not reliable and is a connection-oriented protocol; UDP is
reliable and is a connectionless protocol
 C. TCP is not reliable and is a connectionless protocol; UDP is reliable and
is a connection-oriented protocol
 D. TCP is reliable and is a connectionless protocol; UDP is not reliable and
is a connection-oriented protocol
Correct Answer: A

231. How do TCP and UDP differ in the way they provide reliability for delivery of
packets?
 A. TCP is a connectionless protocol that does not provide reliable delivery
of data, UDP is a connection-oriented protocol that uses sequencing to provide
reliable delivery.
 B. TCP does not guarantee delivery or error checking to ensure that there
is no corruption of data UDP provides message acknowledgement and
retransmits data if lost.
 C. TCP provides flow control to avoid overwhelming a receiver by sending
too many packets at once, UDP sends packets to the receiver in a continuous
stream without checking for sequencing
 D. TCP uses windowing to deliver packets reliably; UDP provides reliable
message transfer between hosts by establishing a three-way handshake
Correct Answer: C

228. What are two differences between optical-fiber cabling and copper cabling?
(Choose two)
 A. Light is transmitted through the core of the fiber
 B. A BNC connector is used for fiber connections
 C. The glass core component is encased in a cladding
 D. Fiber connects to physical interfaces using Rj-45 connections
 E. The data can pass through the cladding
Correct Answer: AC

21. A frame that enters a switch fails the Frame Check Sequence. Which two
interface counters are incremented? (Choose two)
 A. runts
 B. giants
 C. frame
 D. CRC
 E. input errors
Correct Answer: DE
Section: Network Fundamentals
Explanation/Reference: Whenever the physical transmission has problems, the
receiving device might receive a frame whose bits have changed values. These
frames do not pass the error detection logic as implemented in the FCS field in
the Ethernet trailer. The receiving device discards the frame and counts it as
some kind of input error.
Cisco switches list this error as a CRC error. Cyclic redundancy check (CRC) is a
term related to how the FCS math detects an error.
The “input errors” includes runts, giants, no buffer, CRC, frame, overrun, and
ignored counts.
The output below show the interface counters with the “show interface s0/0/0”
command:
22. How do TCP and UDP differ in the way that they establish a connection between
two endpoints?
 A. TCP uses synchronization packets, and UDP uses acknowledgment
packets.
 B. UDP uses SYN, SYN ACK and FIN bits in the frame header while TCP
uses SYN, SYN ACK and ACK bits.
 C. UDP provides reliable message transfer and TCP is a connectionless
protocol.
 D. TCP uses the three-way handshake and UDP does not guarantee
message delivery.
Correct Answer: D
Section: Network Fundamentals

36. What are two reasons that cause late collisions to increment on an Ethernet
interface? (Choose two)
 A. when the sending device waits 15 seconds before sending the frame
again
 B. when the cable length limits are exceeded
 C. when one side of the connection is configured for half-duplex
 D. when Carriner Sense Multiple Access/Collision Detection is used
 E. when a collision occurs after the 32nd byte of a frame has been
transmitted
Correct Answer: BC
Section: Network Fundamentals
Explanation/Reference: A late collision is defined as any collision that occurs after
the first 512 bits (or 64th byte) of the frame have been transmitted. The usual
possible causes are full-duplex/half-duplex mismatch, exceeded Ethernet cable
length limits, or defective hardware such as incorrect cabling, noncompliant
number of hubs in the network, or a bad NIC.
Late collisions should never occur in a properly designed Ethernet network. They
usually occur when Ethernet cables are too long or when there are too many
repeaters in the network.
Reference: Click here
39. What is the default behavior of a Layer 2 switch when a frame with an unknown
destination MAC address is received?
 A. The Layer 2 switch drops the received frame.
 B. The Layer 2 switch floods packets to all ports except the receiving port
in the given VLAN.
 C. The Layer 2 switch sends a copy of a packet to CPU for destination
MAC address learning.
 D. The Layer 2 switch forwards the packet and adds the destination MAC
address to its MAC address table.
Correct Answer: B
Section: Network Fundamentals
Explanation/Reference: If the destination MAC address is not in the CAM table
(unknown destination MAC address), the switch sends the frame out all other
ports that are in the same VLAN as the received frame. This is called flooding. It
does not flood the frame out the same port on which the frame was received.
68. Which 802.11 frame type is association response?
 A. management
 B. protected frame
 C. control
 D. action
Correct Answer: A
Section: Network Fundamentals
Explanation/Reference: There are three main types of 802.11 frames: the Data
Frame, the Management Frame and the Control Frame. Association Response
belongs to Management Frame. Association response is sent in response to an
association request.
Reference: Click here
131. Which three statements about MAC addresses are correct? (Choose three.)
 A. To communicate with other devices on a network, a network device
must have a unique MAC address.
 B. The MAC address is also referred to as the IP address.
 C. The MAC address of a device must be configured in the Cisco IOS CLI
by a user with administrative privileges.
 D. A MAC address contains two main components, the first of which
identifies the manufacturer of the hardware and the second of which uniquely
identifies the hardware.
 E. An example of a MAC address is 0A:26:B8:D6:65:90.
 F. A MAC address contains two main components, the first of which
identifies the network on which the host resides and the second of which
uniquely identifies the host on the network.
Correct Answer: ADE
132. Which three statements about network characteristics are true? (Choose three.)
 A. Speed is a measure of the data rate in bits per second of a given link in
the network.
 B. Scalability indicates how many nodes are currently on the network.
 C. The logical topology is the arrangement of cables, network devices, and
end systems.
 D. Availability is a measure of the probability that the network will be
available for use when it is required.
 E. Reliability indicates the dependability of the components that make up
the network.
Correct Answer: ADE
133. Which two statements about the purpose of the OSI model are accurate?
(Choose two.)
 A. Defines the network functions that occur at each layer
 B. Facilitates an understanding of how information travels throughout a
network
 C. Changes in one layer do not impact other layer
 D. Ensures reliable data delivery through its layered approach
Correct Answer: AB
44. Which component of an Ethernet frame is used to notify a host that traffic is
coming?
 A. start of frame delimiter
 B. Type field
 C. preamble
 D. Data field
Correct Answer: C
62. What is the destination MAC address of a broadcast frame?
 A. 00:00:0c:07:ac:01
 B. ff:ff:ff:ff:ff:ff
 C. 43:2e:08:00:00:0c
 D. 00:00:0c:43:2e:08
 E. 00:00:0c:ff:ff:ff
Correct Answer: B

You might also like