CCNA 2 v7.0 Final Exam Answers-41-60

Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

12/20/22, 11:31 PM CCNA 2 v7.

0 Final Exam Answers Full - Switching, Routing and Wireless Essentials

Explanation: Mitigating a VLAN attack can be done by disabling Dynamic


Trunking Protocol (DTP), manually setting ports to trunking mode, and by
setting the native VLAN of trunk links to VLANs not in use.

108. Match the DHCP message types to the order of the DHCPv4 process.
(Not all options are used.)

Explanation: The broadcast DHCPDISCOVER message finds DHCPv4


servers on the network. When the DHCPv4 server receives a
DHCPDISCOVER message, it reserves an available IPv4 address to lease to
the client219
and sends the unicast DHCPOFFER message to the requesting
client. When the client receives the DHCPOFFER from the server, it sends

back a DHCPREQUEST. On receiving the DHCPREQUEST message the
server replies with a unicast DHCPACK message. DHCPREPLY and
DHCPINFORMATION-REQUEST are DHCPv6 messages. x

https://itexamanswers.net/ccna-2-v7-0-final-exam-answers-full-switching-routing-and-wireless-essentials.html 41/72
12/20/22, 11:31 PM CCNA 2 v7.0 Final Exam Answers Full - Switching, Routing and Wireless Essentials

Ad
Routers And Switches
Routers And Switches, High speed 3g 4g module, strong wireless
communication ability

fourfaith.com

VISIT SITE

109. In which situation would a technician use the show interfaces switch
command?

to determine if remote access is enabled


when packets are being dropped from a particular directly attached
host
when an end device can reach local devices, but not remote devices
to determine the MAC address of a directly attached network device on a
particular interface

Explanation: The show interfaces command is useful to detect media errors,


to see if packets are being sent and received, and to determine if any runts,
giants, CRCs, interface resets, or other errors have occurred. Problems with
reachability to a remote network would likely be caused by a misconfigured
default gateway or other routing issue, not a switch issue. The show mac
address-table command shows the MAC address of a directly attached
device.

110. What is a drawback of the local database method of securing device


access that can be solved by using AAA with centralized servers?

There is no ability to provide accountability.


User accounts must be configured locally on each device, which is an
unscalable authentication solution.
It is very susceptible to brute-force attacks because there is no username.
The passwords can only be stored in plain text in the running configuration.

Explanation: The local database method of securing device access utilizes


usernames and passwords that are configured locally on the router. This
allows administrators to keep track of who logged in to the device and when.
The passwords can also be encrypted in the configuration. However, the
account information must be configured on each device where that account
should have access, making this solution very difficult to scale.

111. What action does a DHCPv4 client take if it receives more than one
DHCPOFFER from multiple DHCP servers?

It sends a DHCPREQUEST that identifies which lease offer the client is


accepting.
219
It sends a DHCPNAK and begins the DHCP process over again.
It discards both offers and sends a new DHCPDISCOVER. 
It accepts both DHCPOFFER messages and sends a DHCPACK.
112. Refer to the exhibit. The network administrator is configuring the port x
security feature on switch SWC. The administrator issued the command
show port-security interface fa 0/2 to verify the configuration. What can be
concluded from the output that is shown? (Choose three.)

https://itexamanswers.net/ccna-2-v7-0-final-exam-answers-full-switching-routing-and-wireless-essentials.html 42/72
12/20/22, 11:31 PM CCNA 2 v7.0 Final Exam Answers Full - Switching, Routing and Wireless Essentials

Switching, Routing, and Wireless Essentials ( Version 7.00) –


SRWE Final Exam

Three security violations have been detected on this interface.


This port is currently up.
The port is configured as a trunk link.
Security violations will cause this port to shut down immediately.
There is no device currently connected to this port.
The switch port mode for this interface is access mode.

Explanation: Because the security violation count is at 0, no violation has


occurred. The system shows that 3 MAC addresses are allowed on port
fa0/2, but only one has been configured and no sticky MAC addresses have
been learned. The port is up because of the port status of secure-up. The
violation mode is what happens when an unauthorized device is attached to
the port. A port must be in access mode in order to activate and use port
security.

113. What method of wireless authentication is dependent on a RADIUS


authentication server?

Download
219 Lens Studio Now.
Experience Snap AR. Download Lens Studio now.

Snap Lens Studio Open

WEP
x
WPA Personal
WPA2 Personal
WPA2 Enterprise

https://itexamanswers.net/ccna-2-v7-0-final-exam-answers-full-switching-routing-and-wireless-essentials.html 43/72
12/20/22, 11:31 PM CCNA 2 v7.0 Final Exam Answers Full - Switching, Routing and Wireless Essentials

114. A network administrator has found a user sending a double-tagged


802.1Q frame to a switch. What is the best solution to prevent this type of
attack?

The native VLAN number used on any trunk should be one of the active data
VLANs.
The VLANs for user access ports should be different VLANs than any
native VLANs used on trunk ports.
Trunk ports should be configured with port security.
Trunk ports should use the default VLAN as the native VLAN number.
115. Refer to the exhibit. Which two conclusions can be drawn from the
output? (Choose two.)

The EtherChannel is down.

The port channel ID is 2.


The port channel is a Layer 3 channel.
The bundle is fully operational.
The load-balancing method used is source port to destination port.
116. Match the step number to the sequence of stages that occur during the
HSRP failover
219
process. (Not all options are used.)

https://itexamanswers.net/ccna-2-v7-0-final-exam-answers-full-switching-routing-and-wireless-essentials.html 44/72
12/20/22, 11:31 PM CCNA 2 v7.0 Final Exam Answers Full - Switching, Routing and Wireless Essentials

Explanation: Hot Standby Router Protocol (HSRP) is a Cisco-proprietary


protocol that is designed to allow for transparent failover of a first-hop IPv4
device.

117. On a Cisco 3504 WLC Summary page ( Advanced > Summary ), which
tab allows a network administrator to configure a particular WLAN with a
WPA2 policy?

WLANs
SECURITY
WIRELESS
MANAGEMENT

Explanation: The WLANs tab in the Cisco 3504 WLC advanced Summary
page allows a user to access the configuration of WLANs including security,
QoS, and policy-mapping.

118. Refer to the exhibit. A network engineer is configuring IPv6 routing on


the network. Which command issued on router HQ will configure a default
route to the Internet to forward packets to an IPv6 destination network that
is not listed in the routing table?​

219

https://itexamanswers.net/ccna-2-v7-0-final-exam-answers-full-switching-routing-and-wireless-essentials.html 45/72
12/20/22, 11:31 PM CCNA 2 v7.0 Final Exam Answers Full - Switching, Routing and Wireless Essentials

ipv6 route ::/0 serial 0/0/0


ip route 0.0.0.0 0.0.0.0 serial 0/1/1
ipv6 route ::1/0 serial 0/1/1
ipv6 route ::/0 serial 0/1/1
119. Users are complaining of sporadic access to the internet every
afternoon. What should be done or checked?

Create static routes to all internal networks and a default route to the
internet.
Verify that there is not a default route in any of the edge router routing tables.
Create a floating static route to that network.
Check the statistics on the default route for oversaturation.
120. What action takes place when the source MAC address of a frame
entering a switch appears in the MAC address table associated with a
different port?

The switch purges the entire MAC address table.


The switch replaces the old entry and uses the more current port.
The switch updates the refresh timer for the entry.
The switch forwards the frame out of the specified port.
121. A network administrator is configuring a WLAN. Why would the
administrator use a WLAN controller?

to centralize management of multiple WLANs


to provide privacy and integrity to wireless traffic by using encryption
to facilitate group configuration and management of multiple WLANs
through a WLC
to provide prioritized service for time-sensitive applications
122. A new Layer 3 switch is connected to a router and is being configured
for interVLAN routing. What are three of the five steps required for the
configuration? (Choose three.)
Case 1: 219

installing a static route 


assigning the ports to the native VLAN
entering “no switchport” on the port connected to the router x
modifying the default VLAN
assigning ports to VLANs
enabling IP routing
adjusting the route metric
https://itexamanswers.net/ccna-2-v7-0-final-exam-answers-full-switching-routing-and-wireless-essentials.html 46/72
12/20/22, 11:31 PM CCNA 2 v7.0 Final Exam Answers Full - Switching, Routing and Wireless Essentials

Case 2:

establishing adjacencies
adjusting the route metric
assigning ports to VLANs
implementing a routing protocol
creating SVI interfaces
installing a static route
creating VLANs
Case 3:

assigning ports to VLANs


assigning the ports to the native VLAN
modifying the default VLAN
deleting the default VLAN
enabling IP routing
installing a static route
entering “no switchport” on the port connected to the router
Case 4:

installing a static route


enabling IP routing
modifying the default VLAN
implementing a routing protocol
assigning ports to VLANs
assigning the ports to the native VLAN
creating SVI interfaces
Case 5:

assigning ports to VLANs


assigning the ports to the native VLAN
enabling IP routing
modifying the default VLAN
installing a static route
implementing a routing protocol
creating SVI interfaces
Case 6:

establishing adjacencies
enabling IP routing
assigning the ports to the native VLAN
adjusting the route metric
modifying the default VLAN
entering “no switchport” on the port connected to the router
assigning ports to VLANs

Explanation: Steps to configure Layer 3 switch to route with a router:


Step 1. Configure the routed port.
Step 2. Enable
219
routing.
Step 3. Configure routing.
Step 4. Verify routing. 
Step 5. Verify connectivity.
Reference: 4.3.8 Packet Tracer Configure Layer 3 Switching and inter VLAN
x
Routing

https://itexamanswers.net/ccna-2-v7-0-final-exam-answers-full-switching-routing-and-wireless-essentials.html 47/72
12/20/22, 11:31 PM CCNA 2 v7.0 Final Exam Answers Full - Switching, Routing and Wireless Essentials

123. Which three statements accurately describe duplex and speed settings
on Cisco 2960 switches? (Choose three.)

An autonegotiation failure can result in connectivity issues.


When the speed is set to 1000 Mb/s, the switch ports will operate in full-
duplex mode.
The duplex and speed settings of each switch port can be manually
configured.
Enabling autonegotiation on a hub will prevent mismatched port speeds
when connecting the hub to the switch.
By default, the speed is set to 100 Mb/s and the duplex mode is set to
autonegotiation.
By default, the autonegotiation feature is disabled.
124. Refer to the exhibit. A network administrator configures R1 for inter-
VLAN routing between VLAN 10 and VLAN 20. However, the devices in VLAN
10 and VLAN 20 cannot communicate. Based on the configuration in the
exhibit, what is a possible cause for the problem?

A. The port Gi0/0 should be configured as trunk port.


B. The encapsulation is misconfigured on a subinterface.
C. A no shutdown command should be added in each subinterface
configuration.
D. The command interface gigabitEthernet 0/0.1 is wrong.
125. A network administrator uses the spanning-tree portfast bpduguard
default global configuration command to enable BPDU guard on a switch.
However, BPDU guard is not activated on all access ports. What is the cause
of the issue?

BPDU guard needs to be activated in the interface configuration command


mode.
Access ports configured with root guard cannot be configured with BPDU
guard.
Access ports belong to different VLANs.
PortFast is not configured on all access ports.
126. Which two types of spanning tree protocols can cause suboptimal
traffic flows because they assume only one spanning-tree instance for the
entire bridged network? (Choose two.)

MSTP219
RSTP 
Rapid PVST+
PVST+
STP x
127. Refer to the exhibit. A network administrator is configuring the router
R1 for IPv6 address assignment. Based on the partial configuration, which

https://itexamanswers.net/ccna-2-v7-0-final-exam-answers-full-switching-routing-and-wireless-essentials.html 48/72
12/20/22, 11:31 PM CCNA 2 v7.0 Final Exam Answers Full - Switching, Routing and Wireless Essentials

IPv6 global unicast address assignment scheme does the administrator


intend to implement?

Ad
Routers And Switches
Routers And Switches, High speed 3g 4g module, strong wireless
communication ability

fourfaith.com

VISIT SITE

stateful
stateless
manual configuration
SLAAC
128. A WLAN engineer deploys a WLC and five wireless APs using the
CAPWAP protocol with the DTLS feature to secure the control plane of the
network devices. While testing the wireless network, the WLAN engineer
notices that data traffic is being exchanged between the WLC and the APs in
plain-text and is not being encrypted. What is the most likely reason for
this?

DTLS only provides data security through authentication and does not
provide encryption for data moving between a wireless LAN controller (WLC)
and an access point (AP).
Although DTLS is enabled by default to secure the CAPWAP control
channel, it is disabled by default for the data channel.
DTLS is a protocol that only provides security between the access point (AP)
and the wireless client.
Data encryption requires a DTLS license to be installed on each access point
(AP) prior to being enabled on the wireless LAN controller (WLC).

Explanation: DTLS is a protocol which provides security between the AP and


the WLC. It allows them to communicate using encryption and prevents
eavesdropping or tampering.
DTLS is enabled by default to secure the CAPWAP control channel but is
disabled by default for the data channel. All CAPWAP management and
219 exchanged between an AP and WLC is encrypted and secured
control traffic
by default to provide control plane privacy and prevent Man-In-the-Middle 
(MITM) attacks.

x
129. A new switch is to be added to an existing network in a remote office.
The network administrator does not want the technicians in the remote
office to be able to add new VLANs to the switch, but the switch should
receive VLAN updates from the VTP domain. Which two steps must be
https://itexamanswers.net/ccna-2-v7-0-final-exam-answers-full-switching-routing-and-wireless-essentials.html 49/72
12/20/22, 11:31 PM CCNA 2 v7.0 Final Exam Answers Full - Switching, Routing and Wireless Essentials

performed to configure VTP on the new switch to meet these conditions?


(Choose two.)

Configure the new switch as a VTP client.


Configure the existing VTP domain name on the new switch.
Configure an IP address on the new switch.
Configure all ports of both switches to access mode.
Enable VTP pruning.

Explanation: Before the switch is put in the correct VTP domain and in client
mode, the switch must be connected to any other switch in the VTP domain
through a trunk in order to receive/transmit VTP information.

130. Refer to the exhibit. Consider that the main power has just been
restored. PC3 issues a broadcast IPv4 DHCP request. To which port will SW1
forward this request?​

to Fa0/1, Fa0/2, and Fa0/3 only


to Fa0/1, Fa0/2, Fa0/3, and Fa0/4
to Fa0/1 only​
to Fa0/1, Fa0/2, and Fa0/4 only​
to Fa0/1 and Fa0/2 only
131. What action takes place when the source MAC address of a frame
entering a switch is not in the MAC address table?

The switch adds a MAC address table entry for the destination MAC address
and the egress port.
The switch adds the MAC address and incoming port number to the
table.
The switch replaces the old entry and uses the more current port.
219 updates the refresh timer for the entry.
The switch
132. Employees are unable to connect to servers on one of the internal 
networks. What should be done or checked?

Use the “show ip interface brief” command to see if an interface is x


down.
Verify that there is not a default route in any of the edge router routing tables.

https://itexamanswers.net/ccna-2-v7-0-final-exam-answers-full-switching-routing-and-wireless-essentials.html 50/72
12/20/22, 11:31 PM CCNA 2 v7.0 Final Exam Answers Full - Switching, Routing and Wireless Essentials

Create static routes to all internal networks and a default route to the
internet.
Check the statistics on the default route for oversaturation.
133. What is the effect of entering the ip dhcp snooping configuration
command on a switch?

It enables DHCP snooping globally on a switch.


It enables PortFast globally on a switch.
It disables DTP negotiations on trunking ports.
It manually enables a trunk link.
134. An administrator notices that large numbers of packets are being
dropped on one of the branch routers. What should be done or checked?

Create static routes to all internal networks and a default route to the
internet.
Create extra static routes to the same location with an AD of 1.
Check the statistics on the default route for oversaturation.
Check the routing table for a missing static route.
135. What are two switch characteristics that could help alleviate network
congestion? (Choose two.)

fast internal switching


large frame buffers
store-and-forward switching
low port density
frame check sequence (FCS) check
136. What is a result of connecting two or more switches together?

The number of broadcast domains is increased.


The size of the broadcast domain is increased.
The number of collision domains is reduced.
The size of the collision domain is increased.

Explanation:: When two or more switches are connected together, the size of
the broadcast domain is increased and so is the number of collision domains.
The number of broadcast domains is increased only when routers are added.

138. Branch users were able to access a site in the morning but have had no
connectivity with the site since lunch time. What should be done or
checked?

Verify that the static route to the server is present in the routing table.
Use the “show ip interface brief” command to see if an interface is
down.
Check the configuration on the floating static route and adjust the AD.
Create a floating static route to that network.
139. What is the effect of entering the switchport port-security configuration
command on a switch?
219
It dynamically learns the L2 address and copies it to the running

configuration.
It enables port security on an interface.
It enables port security globally on the switch. x
It restricts the number of discovery messages, per second, to be received on
the interface.

https://itexamanswers.net/ccna-2-v7-0-final-exam-answers-full-switching-routing-and-wireless-essentials.html 51/72
12/20/22, 11:31 PM CCNA 2 v7.0 Final Exam Answers Full - Switching, Routing and Wireless Essentials

140. A network administrator is configuring a WLAN. Why would the


administrator use multiple lightweight APs?

to centralize management of multiple WLANs


to monitor the operation of the wireless network
to provide prioritized service for time-sensitive applications
to facilitate group configuration and management of multiple WLANs
through a WLC
141. Refer to the exhibit. PC-A and PC-B are both in VLAN 60. PC-A is unable
to communicate with PC-B. What is the problem?

The native VLAN should be VLAN 60.


The native VLAN is being pruned from the link.
The trunk has been configured with the switchport nonegotiate command.
The VLAN that is used by PC-A is not in the list of allowed VLANs on the
trunk.

Explanation: Because PC-A and PC-B are connected to different switches,


traffic between them must flow over the trunk link. Trunks can be configured
so that they only allow traffic for particular VLANs to cross the link. In this
scenario, VLAN 60, the VLAN that is associated with PC-A and PC-B, has not
been allowed across the link, as shown by the output of show interfaces
trunk.

142. A network administrator is configuring a WLAN. Why would the


administrator use RADIUS servers on the network?

to centralize management of multiple WLANs


to restrict access to the WLAN by authorized, authenticated users only
to facilitate group configuration and management of multiple WLANs through
a WLC
to monitor
219 the operation of the wireless network
143. What is the effect of entering the switchport mode access configuration

command on a switch?

It enables BPDU guard on a specific port.


x
It manually enables a trunk link.
It disables an unused port.
It disables DTP on a non-trunking interface.

https://itexamanswers.net/ccna-2-v7-0-final-exam-answers-full-switching-routing-and-wireless-essentials.html 52/72
12/20/22, 11:31 PM CCNA 2 v7.0 Final Exam Answers Full - Switching, Routing and Wireless Essentials

144. A network administrator has configured a router for stateless DHCPv6


operation. However, users report that workstations are not receiving DNS
server information. Which two router configuration lines should be verified
to ensure that stateless DHCPv6 service is properly configured? (Choose
two.)

The domain-name line is included in the ipv6 dhcp pool section.


The dns-server line is included in the ipv6 dhcp pool section.
The ipv6 nd other-config-flag is entered for the interface that
faces the LAN segment.
The address prefix line is included in the ipv6 dhcp pool section.
The ipv6 nd managed-config-flag is entered for the interface that
faces the LAN segment.

Explanation: To use the stateless DHCPv6 method, the router must inform
DHCPv6 clients to configure a SLAAC IPv6 address and contact the DHCPv6
server for additional configuration parameters, such as the DNS server
address. This is done through the command ipv6 nd other-config-flag
entered at the interface configuration mode. The DNS server address is
indicated in the ipv6 dhcp pool configuration.

145. A network administrator is configuring a WLAN. Why would the


administrator disable the broadcast feature for the SSID?

to eliminate outsiders scanning for available SSIDs in the area


to centralize management of multiple WLANs
to facilitate group configuration and management of multiple WLANs through
a WLC
to provide prioritized service for time-sensitive applications
146. Refer to the exhibit. An administrator is attempting to install an IPv6
static route on router R1 to reach the network attached to router R2. After
the static route command is entered, connectivity to the network is still
failing. What error has been made in the static route configuration?

The next hop address is incorrect.


The interface
219 is incorrect.
The destination network is incorrect.
The network prefix is incorrect. 

Explanation: In this example the interface in the static route is incorrect. The x
interface should be the exit interface on R1, which is s0/0/0.

https://itexamanswers.net/ccna-2-v7-0-final-exam-answers-full-switching-routing-and-wireless-essentials.html 53/72
12/20/22, 11:31 PM CCNA 2 v7.0 Final Exam Answers Full - Switching, Routing and Wireless Essentials

Ad
Routers And Switches
Routers And Switches, High speed 3g 4g module, strong wireless
communication ability

fourfaith.com

VISIT SITE

147. What action takes place when a frame entering a switch has a unicast
destination MAC address that is not in the MAC address table?

The switch updates the refresh timer for the entry.


The switch resets the refresh timer on all MAC address table entries.
The switch replaces the old entry and uses the more current port.
The switch will forward the frame out all ports except the incoming
port.
148. A junior technician was adding a route to a LAN router. A traceroute to a
device on the new network revealed a wrong path and unreachable status.
What should be done or checked?

Create a floating static route to that network.


Check the configuration on the floating static route and adjust the AD.
Check the configuration of the exit interface on the new static route.
Verify that the static route to the server is present in the routing table.
149. What is the effect of entering the ip arp inspection vlan 10 configuration
command on a switch?

It specifies the maximum number of L2 addresses allowed on a port.


It enables DAI on specific switch interfaces previously configured with
DHCP snooping.
It enables DHCP snooping globally on a switch.

It globally enables BPDU guard on all PortFast-enabled ports.


150. What protocol or technology manages trunk negotiations between
switches?

VTP
EtherChannel
DTP 219
STP

151. A network administrator is configuring a WLAN. Why would the
administrator apply WPA2 with AES to the WLAN?
x
to reduce the risk of unauthorized APs being added to the network
to centralize management of multiple WLANs
to provide prioritized service for time-sensitive applications

https://itexamanswers.net/ccna-2-v7-0-final-exam-answers-full-switching-routing-and-wireless-essentials.html 54/72
12/20/22, 11:31 PM CCNA 2 v7.0 Final Exam Answers Full - Switching, Routing and Wireless Essentials

to provide privacy and integrity to wireless traffic by using encryption


152. Users on a LAN are unable to get to a company web server but are able
to get elsewhere. What should be done or checked?

Ensure that the old default route has been removed from the company edge
routers.
Verify that the static route to the server is present in the routing table.
Check the configuration on the floating static route and adjust the AD.
Create a floating static route to that network.
153. What IPv6 prefix is designed for link-local communication?

2001::/3

Pass IT Exams Guaranteed


Exam-Labs

ff00::/8
fc::/07
fe80::/10
154. What is the effect of entering the ip dhcp snooping limit rate 6
configuration command on a switch?

It displays the IP-to-MAC address associations for switch interfaces.


It enables port security globally on the switch.
It restricts the number of discovery messages, per second, to be
received on the interface.
It dynamically learns the L2 address and copies it to the running
configuration.
155. A network administrator is configuring a WLAN. Why would the
administrator change the default DHCP IPv4 addresses on an AP?

to eliminate outsiders scanning for available SSIDs in the area


to reduce the risk of unauthorized APs being added to the network
to reduce outsiders intercepting data or accessing the wireless network
219
by using a well-known address range
to reduce the risk of interference by external devices such as microwave 
ovens
156. What is the effect of entering the ip arp inspection validate src-mac x
configuration command on a switch?

It checks the source L2 address in the Ethernet header against the


sender L2 address in the ARP body.

https://itexamanswers.net/ccna-2-v7-0-final-exam-answers-full-switching-routing-and-wireless-essentials.html 55/72
12/20/22, 11:31 PM CCNA 2 v7.0 Final Exam Answers Full - Switching, Routing and Wireless Essentials

It disables all trunk ports.


It displays the IP-to-MAC address associations for switch interfaces.
It enables portfast on a specific switch interface.
157. What protocol or technology is a Cisco proprietary protocol that is
automatically enabled on 2960 switches?

DTP
STP
VTP
EtherChannel
158. What address and prefix length is used when configuring an IPv6
default static route?

::/0
FF02::1/8
0.0.0.0/0
::1/128
159. What are two characteristics of Cisco Express Forwarding (CEF)?
(Choose two.)

When a packet arrives on a router interface, it is forwarded to the control


plane where the CPU matches the destination address with a matching routing
table entry.
This is the fastest forwarding mechanism on Cisco routers and
multilayer switches.
With this switching method, flow information for a packet is stored in the fast-
switching cache to forward future packets to the same destination without CPU
intervention.
Packets are forwarded based on information in the FIB and an
adjacency table.

219

When a packet arrives on a router interface, it is forwarded to the control


plane where the CPU searches for a match in the fast-switching cache.

https://itexamanswers.net/ccna-2-v7-0-final-exam-answers-full-switching-routing-and-wireless-essentials.html 56/72
12/20/22, 11:31 PM CCNA 2 v7.0 Final Exam Answers Full - Switching, Routing and Wireless Essentials

160. Which term describes the role of a Cisco switch in the 802.1X port-
based access control?

agent
supplicant
authenticator
authentication server
161. Which Cisco solution helps prevent ARP spoofing and ARP poisoning
attacks?

Dynamic ARP Inspection


IP Source Guard
DHCP Snooping
Port Security
162. What is an advantage of PVST+?

PVST+ optimizes performance on the network through autoselection of the


root bridge.
PVST+ reduces bandwidth consumption compared to traditional
implementations of STP that use CST.
PVST+ requires fewer CPU cycles for all the switches in the network.
PVST+ optimizes performance on the network through load sharing.

PVST+ results in optimum load balancing. However, this is accomplished by


manually configuring switches to be elected as root bridges for different
VLANs on the network. The root bridges are not automatically selected.
Furthermore, having spanning-tree instances for each VLAN actually
consumes more bandwidth and it increases the CPU cycles for all the
switches in the network.

Ad
Routers And Switches
Routers And Switches, High speed 3g 4g module, strong wireless
communication ability

fourfaith.com

VISIT SITE

163. What protocol or technology uses a standby router to assume packet-


forwarding responsibility if the active router fails?

EtherChannel
DTP
HSRP
VTP
164. What is the effect of entering the show ip dhcp snooping binding
configuration command on a switch?

It switches a trunk port to access mode.


219 the source L2 address in the Ethernet header against the sender
It checks
L2 address in the ARP body. 
It restricts the number of discovery messages, per second, to be received on
the interface.
It displays the IP-to-MAC address associations for switch interfaces. x
165. What action takes place when the source MAC address of a frame
entering a switch is in the MAC address table?

https://itexamanswers.net/ccna-2-v7-0-final-exam-answers-full-switching-routing-and-wireless-essentials.html 57/72
12/20/22, 11:31 PM CCNA 2 v7.0 Final Exam Answers Full - Switching, Routing and Wireless Essentials

The switch forwards the frame out of the specified port.


The switch updates the refresh timer for the entry.
The switch replaces the old entry and uses the more current port.
The switch adds a MAC address table entry for the destination MAC address
and the egress port.

166. A small publishing company has a network design such that when a
broadcast is sent on the LAN, 200 devices receive the transmitted
broadcast. How can the network administrator reduce the number of devices
that receive broadcast traffic?

Add more switches so that fewer devices are on a particular switch.


Replace the switches with switches that have more ports per switch. This will
allow more devices on a particular switch.
Segment the LAN into smaller LANs and route between them.*
Replace at least half of the switches with hubs to reduce the size of the
broadcast domain.

Explain: By dividing the one big network into two smaller network, the
network administrator has created two smaller broadcast domains. When a
broadcast is sent on the network now, the broadcast will only be sent to the
devices on the same Ethernet LAN. The other LAN will not receive the
broadcast.

167. What defines a host route on a Cisco router?

The link-local address is added automatically to the routing table as an IPv6


host route.
An IPv4 static host route configuration uses a destination IP address of
a specific device and a /32 subnet mask.
A host route is designated with a C in the routing table.
A static IPv6 host route must include the interface type and the interface
number of the next hop router.
168. What else is required when configuring an IPv6 static route using a
next-hop link-local address?
219

https://itexamanswers.net/ccna-2-v7-0-final-exam-answers-full-switching-routing-and-wireless-essentials.html 58/72
12/20/22, 11:31 PM CCNA 2 v7.0 Final Exam Answers Full - Switching, Routing and Wireless Essentials

administrative distance
ip address of the neighbor router
network number and subnet mask on the interface of the neighbor router
interface number and type
169. A technician is configuring a wireless network for a small business
using a SOHO wireless router. Which two authentication methods are used,
if the router is configured with WPA2? (Choose two.)

personal
AES
TKIP
WEP
enterprise
170. Which mitigation technique would prevent rogue servers from
providing false IPv6 configuration parameters to clients?

enabling DHCPv6 Guard


enabling RA Guard
implementing port security on edge ports
disabling CDP on edge ports

Explanation: DHCPv6 Guard is a feature designed to ensure that rogue


DHCPv6 servers are not able to hand out addresses to clients, redirect client
traffic, or starve out the DHCPv6 server and cause a DoS attack. DHCPv6
Guard requires a policy to be configured in DHCP Guard configuration mode,
and DHCPv6 Guard is enabled on an interface-by-interface basis.

Ad
Routers And Switches
Routers And Switches, High speed 3g 4g module, strong wireless
communication ability

fourfaith.com

VISIT SITE

171. A PC has sent an RS message to an IPv6 router attached to the same


network. Which
219 two pieces of information will the router send to the client?
(Choose two.)

prefix length
subnet mask in dotted decimal notation
domain name x
administrative distance
prefix
DNS server IP address

https://itexamanswers.net/ccna-2-v7-0-final-exam-answers-full-switching-routing-and-wireless-essentials.html 59/72
12/20/22, 11:31 PM CCNA 2 v7.0 Final Exam Answers Full - Switching, Routing and Wireless Essentials

Explanation: Router is part of the IPv6 all-routers group and received the RS
message. It generates an RA containing the local network prefix and prefix
length (e.g., 2001:db8:acad:1::/64)

172. While attending a conference, participants are using laptops for


network connectivity. When a guest speaker attempts to connect to the
network, the laptop fails to display any available wireless networks. The
access point must be operating in which mode?

mixed
passive
active
open

Explanation: Active is a mode used to configure an access point so that


clients must know the SSID to connect to the access point. APs and wireless
routers can operate in a mixed mode meaning that that multiple wireless
standards are supported. Open is an authentication mode for an access point
that has no impact on the listing of available wireless networks for a client.
When an access point is configured in passive mode, the SSID is broadcast
so that the name of wireless network will appear in the listing of available
networks for clients.

173. Which three components are combined to form a bridge ID?

extended system ID
cost
IP address
bridge priority
MAC address
port ID

Explanation: The three components that are combined to form a bridge ID


are bridge priority, extended system ID, and MAC address.

← Previous Article Next Article →


CCNA 2 (Version 7.00) SRWE Practice CCNA 3 – ENSA Practice PT Skills
Final Exam Answers Assessment (PTSA) Answers

Advertisement
Ad
Routers And Switches
Routers And Switches, High speed 3g 4g module, strong wireless
communication ability

fourfaith.com
219
VISIT SITE 
report this ad

https://itexamanswers.net/ccna-2-v7-0-final-exam-answers-full-switching-routing-and-wireless-essentials.html 60/72

You might also like