CCNP Practice Exam 2

Advertisements

Which of the following devices performs transparent bridging?

 
 
 
 

What does a switch do if a MAC address cannot be found in the CAM table?

 
 
 
 

Which two of the following methods should you use to secure inbound CLI sessions to a switch?

 
 
 
 

Which of the following private VLANs is the most restrictive?

 
 
 
 

Which answer describes multilayer switching with CEF?

 
 
 
 

The users in a department are using a variety of host platforms, some old and some new. All of them have been approved with a user ID in a RADIUS server database.Which one of these features should be used to restrict access to the switch ports in the building?

 
 
 
 

Suppose an LAP/WLC combination is used to provide connectivity from SSID “staff’’ to VLAN 17. Which one of the following is the correct extent for the VLAN?

 
 
 
 

The vlan 100 command has just been entered. What is the next command needed to configure VLAN 100 as a secondary isolated VLAN?

 
 
 
 

Which one of the following methods can be used to prevent a VLAN hopping attack?

 
 
 
 

In what part of a Catalyst switch are VLAN ACLs implemented?

 
 
 
 

In the Catalyst 6500, frames can be filtered with access lists for security and QoS purposes. This filtering occurs according to which of the following?

 
 
 
 

Suppose you need to disable CDP advertisements on a switch port so that untrusted devices cannot learn anything about your switch. Which one of the following interface configuration commands should be used?

 
 
 
 

Which one of the following represents the spoofed information an attacker sends in a VLAN hopping attack?

 
 
 
 

Which of the following show interface output information can you use to diagnose a switch port problem?

 
 
 
 
 

Which one of the following should be configured as a trusted port for dynamic ARP inspection?

 
 
 
 

Multilayer switches using CEF are based on which of these techniques?

 
 
 

In a switch spoofing attack, an attacker makes use of which one of the following?

 
 
 
 

What type of port configuration should you use for private VLAN interfaces that connect to a router?

 
 
 
 

In a switch, frames are placed in which buffer after forwarding decisions are made?

 
 
 
 

Which of these is not a standard type of gigabit interface converter (GBIC) or small form factor pluggable (SFP) module?

 
 
 
 

What does the IEEE 802.3 standard define?

 
 
 
 

Promiscuous ports must be ______________ to primary and secondary VLANs, and host ports must be ________________.

 
 
 
 

Which two of the following methods does a switch use to detect spoofed addresses
when IP Source Guard is enabled?

 
 
 
 
 

Ethernet autonegotiation determines which of the following?

 
 
 
 

At what layer are traditional 10-Mbps Ethernet, Fast Ethernet, and Gigabit Ethernet the same?

 
 
 
 

What is the maximum cable distance for a Category 5 100BASE-TX connection?

 
 
 
 

When a PC is connected to a Layer 2 switch port, how far does the collision domain spread?

 
 
 
 

What information is used to forward frames in a Layer 2 switch?

 
 
 
 

Which one of the following commands can be used to prevent a switch spoofing attack on an end-user port?

 
 
 
 

Access list rules are compiled as TCAM entries. When a packet is matched against an access list, in what order are the TCAM entries evaluated?

 
 
 
 


Shopping Cart
Select your currency
USD United States (US) dollar
Scroll to Top