Data Communication and Networking 2 Prelim Examination

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

 TRIMESTRALEXAM 2233   Gian Carlo Cresencio

 UGRD-IT6201D-2233T
UGRD-IT6201D Data Communications and
 Participants
Networking 2
 Badges
Home / My courses / UGRD-IT6201D-2233T / PRELIM EXAMINATION / PRELIM EXAMINATION

 Competencies

 Grades Started on Saturday, 17 June 2023, 10:18 PM


State Finished
 General
Completed on Saturday, 17 June 2023, 10:56 PM
Time taken 38 mins 23 secs
 PRELIM EXAMINATION
Marks 40.00/50.00
Grade 80.00 out of 100.00
 MIDTERM EXAMINATION

Question 1
 FINAL EXAMINATION A switch is configured with all ports assigned to VLAN 2 with full duplex FastEthernet
Correct

Mark 1.00 out of


 Home
1.00

Flag question
 Dashboard a. More collision domains will be created.

 Calendar

b. An additional broadcast domain will be created.


 Private files

 My courses
c. More bandwidth will be required than was needed previously.

 UGRD-DSC6100-2233T

 UGRD-IT6201D-2233T d. IP address utilization will be more efficient.

 UGRD-IT6204-2233T

 UGRD-IT6302A-2233T
Your answer is correct.
 UGRD-ITE6202B-2233T

Question 2
Which is not a valid mode for a switch port used as a VLAN trunk?
Correct

Mark 1.00 out of


1.00

Flag question a. auto

b. forwarding

c. desirable

d. on

Your answer is correct.

Question 3
What is a potential drawback to leaving VLAN 1 as the native VLAN?
Correct

Mark 1.00 out of


1.00

Flag question a. Gratuitous ARPs might be able to conduct a man-in-the-middle attack

b. The CAM might be overloaded, effectively turning the switch into a hub

c. VLAN 1 might be vulnerable to IP address spoofing

d. It may be susceptible to a VLAN hoping attack.

Your answer is correct.

Question 4
In which situation should you use in-band management?
Correct

Mark 1.00 out of


1.00

Flag question a. 
when management applications need concurrent access to the device

b. when the control plane fails to respond

c. when you require ROMMON access

d. when a network device fails to forward packets

Your answer is correct.

Question 5
Which statement is wrong at describing Layer 2 Ethernet switches?
Correct

Mark 1.00 out of


1.00

Flag question a. Establishing VLANs increases the number of broadcast domains

b. Microsegmentation decreases the number of collisions on the network

c. Switches that are configured with VLANs make forwarding decisions based on both

d. In a properly functioning network with redundant switched paths, each switched

Your answer is correct.

Question 6
If you change the native VLAN on the trunk port to an unused VLAN, what happens if an a
Correct

Mark 1.00 out of


1.00

Flag question
a. A VLAN hopping attack would be successful

b. The attacked VLAN will be pruned.

c. 
A VLAN hopping attack would be prevented

d. The trunk port would go into an error-disabled state

Your answer is correct.

Question 7
Why will a switch never learn a broadcast address?
Correct

Mark 1.00 out of


1.00

Flag question a. 
A broadcast address will never be the source address of a frame.

b. Broadcasts only use network layer addressing.

c. Broadcast frames are never sent to switches.

d. A broadcast frame is never forwarded by a switch.

Your answer is correct.

Question 8
Which command can be used to verify a trunk link configuration status on a given Cisco
Correct

Mark 1.00 out of


1.00

Flag question
a. show ip interface brief

b. show interface interface

c. 
show interface switchport

d. show interface vlan

Your answer is correct.

Question 9
On a corporate network, hosts on the same VLAN can communicate with each other, but the
Correct

Mark 1.00 out of


1.00

Flag question
a. a router with subinterfaces configured on the physical interface that is connec

b. a switch with a trunk link that is configured between the switches

c. a switch with an access link that is configured between the switches

d. a router with an IP address on the physical interface connected to the switch

Your answer is correct.

Question 10
A company's corporate policy has been updated to require that stateless, 1-to-1, and IP
Correct

Mark 1.00 out of


1.00

Flag question
a. NAT44

b. NPTv6

c. NPTv4

d. NAT64

Your answer is correct.

Question 11
Which command causes a Layer 2 switch interface to operate as a Layer 3 interface?
Incorrect

Mark 0.00 out of


1.00

Flag question a. no switchport

b. no switchport nonnegotiate

c. no switchport mode dynamic auto

d. switchport 

Your answer is incorrect.

Question 12
When you create a network implementation for a VLAN solution, what is one procedure tha
Correct

Mark 1.00 out of


1.00

Flag question
a. 
Perform an incremental implementation of components.

b. Test the solution on the production network in off hours.

c. Implement trunking of all VLANs to ensure that traffic is crossing the network

d. Implement the entire solution and then test end-to-end to make sure that it is

Your answer is correct.

Question 13
Under what circumstances should an administrator prefer local VLANs over end-to-end VLA
Incorrect

Mark 0.00 out of


1.00

Flag question
a. Eighty percent of a workgroup’s traffic is to the workgroup’s own local server.

b. Users are grouped into VLANs independent of physical location.

c. Eighty percent of traffic on the network is destined for Internet sites.

d. There are common sets of traffic filtering requirements for workgroups located

Your answer is incorrect.

Question 14
Which statement about VLAN operation on Cisco Catalyst switches is true?
Correct

Mark 1.00 out of


1.00

Flag question
a. Ports between switches should be configured in access mode so that VLANs can sp

b. Broadcast and multicast frames are retransmitted to ports that are configured o

c. Unknown unicast frames are retransmitted only to the ports that belong to the s

d. When a packet is received from an 802.1Q trunk, the VLAN ID can be determined f

Your answer is correct.

Question 15
What hash type does Cisco use to validate the integrity of downloaded images?
Correct

Mark 1.00 out of


1.00

Flag question a. Sha2

b. Md1

c. 
Md5

d. Sha1

Your answer is correct.

Question 16
Assuming the default switch configuration, which VLAN range can be added, modified, and
Correct

Mark 1.00 out of


1.00

Flag question

a. 1 through 1001

b. 2 through 1005

c. 1 through 1002

d. 2 through 1001

Your answer is correct.

Question 17
Which set of commands is recommended to prevent the use of a hub in the access layer?
Incorrect

Mark 0.00 out of


1.00

Flag question a. switch(config-if)#switchport mode trunk switch(config-if)#switchport port-secur

b. switch(config-if)#switchport mode access switch(config-if)#switchport port-secu

c. switch(config-if)#switchport mode trunk switch(config-if)#switchport port-secur

d. switch(config-if)#switchport mode access switch(config-if)#switchport port-secu

Your answer is incorrect.

Question 18
What is the Cisco preferred countermeasure to mitigate CAM overflows?
Correct

Mark 1.00 out of


1.00

Flag question a. Root guard

b. Dynamic port security

c. Port security

d. IP source guard

Your answer is correct.

Question 19
Which of these statements is not an advantage of VLANs?
Incorrect

Mark 0.00 out of


1.00

Flag question a. VLANs allow access to network services based on department, not physical locati

b. VLANs utilize packet filtering to enhance network security.

c. 
VLANs can greatly simplify adding, moving, or changing hosts on the network.

d. VLANs establish broadcast domains in switched networks.

Your answer is incorrect.

Question 20
Which statement about IOS privilege levels is true?
Correct

Mark 1.00 out of


1.00

Flag question a. Privilege-level commands are set explicitly for each user.

b. Each privilege level supports the commands at its own level and all levels abov

c. Each privilege level supports the commands at its own level and all levels belo

d. Each privilege level is independent of all other privilege levels

Your answer is correct.

Question 21
What is not a benefit of implementing VLANs?
Incorrect

Mark 0.00 out of


1.00

Flag question a. Broadcast storms can be mitigated by increasing the number of broadcast domains

b. A more efficient use of bandwidth can be achieved allowing many logical network

c. A higher level of network security can be reached by separating sensitive data

d. A more efficient use of bandwidth can be achieved allowing many physical groups

Your answer is incorrect.

Question 22
When a VLAN port configured as a trunk receives an untagged frame, what will happen?
Incorrect

Mark 0.00 out of


1.00

Flag question a. The frame will first be tagged, then processed as a native VLAN frame.

b. The frame will be dropped. 

c. The frame will be processed as a native VLAN frame

d. The frame will cause an error message to be sent.

Your answer is incorrect.

Question 23
Which link protocols is used to carry multiple VLANs over a single link?
Correct

Mark 1.00 out of


1.00

Flag question a. VTP

b. 802.1q

c. IGP

d. 802.3u

Your answer is correct.

Question 24
A router has two Fast Ethernet interfaces and needs to connect to four VLANs in the loc
Correct

Mark 1.00 out of


1.00

Flag question
a. Use a hub to connect the four VLANS with a Fast Ethernet interface on the route

b. Implement a router-on-a-stick configuration.

c. Add a second router to handle the VLAN traffic.

d. Add two more Fast Ethernet interfaces.

Your answer is correct.

Question 25
Which command can be used from a PC to verify the connectivity between hosts that conne
Correct

Mark 1.00 out of


1.00

Flag question
a. 
ping address

b. traceroute address

c. tracert address

d. arp address

Your answer is correct.

Question 26
Which of these statements regarding 802.1Q trunking is wrong?
Correct

Mark 1.00 out of


1.00

Flag question a. 802.1Q trunks can use 10 Mb/s Ethernet interfaces.

b. 802.1Q trunks should have native VLANs that are the same at both ends.

c. 802.1Q native VLAN frames are untagged by default.

d. 802.1Q trunking ports can also be secure ports.

Your answer is correct.

Question 27
Which commands correctly verify whether port security has been configured on port FastE
Correct

Mark 1.00 out of


1.00

Flag question
a. SW1#show port-secure interface FastEthernet 0/12

b. SW1#show switchport port-security interface FastEthernet 0/12

c. 
SW1#show port-security interface FastEthernet 0/12

d. SW1#show switchport port-secure interface FastEthernet 0/12

Your answer is correct.

Question 28
Which is a benefit provided by creating VLANs?
Correct

Mark 1.00 out of


1.00

Flag question a. dedicated bandwidth

b. contains collisions

c. 
provides segmentation

d. allows switches to route traffic between subinterfaces

Your answer is correct.

Question 29
A router has learned three possible routes that could be used to reach a destination ne
Correct

Mark 1.00 out of


1.00

Flag question
a. 
the EIGRP route

b. the OSPF and RIPv2 routes

c. the OSPF route

d. the RIPv2 route

Your answer is correct.

Question 30
What is the actual IOS privilege level of User Exec mode?
Correct

Mark 1.00 out of


1.00

Flag question a. 0

b. 15

c. 5

d. 1

Your answer is correct.

Question 31
Which of the following is not a benefit of VLANs?
Correct

Mark 1.00 out of


1.00

Flag question a. They allow logical grouping of users by function.

b. They can enhance network security.

c. 
They increase the size of collision domains.

d. They increase the number of broadcast domains while decreasing the size of the

Your answer is correct.

Question 32
VLAN 3 is not yet configured on your switch. What happens if you set the switchport acc
Incorrect

Mark 0.00 out of


1.00

Flag question
a. The command is rejected.

b. The port turns amber

c. 
The command is accepted and you must configure the VLAN manually.

d. The command is accepted and the respective VLAN is added to vlan.dat.

Your answer is incorrect.

Question 33
In which circumstance are multiple copies of the same unicast frame likely to be transm
Correct

Mark 1.00 out of


1.00

Flag question
a. 
in an improperly implemented redundant topology

b. after broken links are re-established

c. when upper-layer protocols require high reliability

d. during high traffic periods

Your answer is correct.

Question 34
Cisco Catalyst switches CAT1 and CAT2 have a connection between them using ports FA0/13
Correct

Mark 1.00 out of


1.00

Flag question
a. VLAN 10 on CAT1 and VLAN 1 on CAT2 will send untagged frames.

b. VLAN 10 on CAT1 and VLAN 1 on CAT2 will send tagged frames.

c. 802.1Q giants frames could saturate the link.

d. A native VLAN mismatch error message will appear.

Your answer is correct.

Question 35
By default, which statement is correct when an IEEE 802.1Q trunk port receives an untag
Correct

Mark 1.00 out of


1.00

Flag question
a. The frame is broadcast on all ports regardless of VLAN association.

b. The frame is encapsulated and tagged as in the native VLAN.

c. The frame is considered in the native VLAN and forwarded to the ports associate

d. The frame is dropped.

Your answer is correct.

Question 36
After reloading a router, you issue the dir command to verify the installation and obse
Correct

Mark 1.00 out of


1.00

Flag question
a. The confreg 0x24 command is configured.

b. The secure boot-image command is configured.

c. The secure boot-comfit command is configured.

d. The reload command was issued from ROMMON

Your answer is correct.

Question 37
In which type of attack does the attacker attempt to overload the CAM table on a switch
Correct

Mark 1.00 out of


1.00

Flag question
a. 
MAC flooding

b. DoS

c. MAC spoofing

d. gratuitous ARP

Your answer is correct.

Question 38
A network administrator enters the following switch commands: Switch(config)#interface
Incorrect

Mark 0.00 out of


1.00

Flag question
a. One new vlan is created with the vlan number 2

b. One new vlan is created on five switch ports 

c. Six new vlans are created on six switch ports

d. Two new vlans are created on six switch ports

Your answer is incorrect.

Question 39
Which IEEE standard protocol is initiated as a result of successful DTP completion in a
Correct

Mark 1.00 out of


1.00

Flag question

a. 802.1D

b. 802.3ad

c. 
802.1Q

d. 802.1w

Your answer is correct.

Question 40
Three switches are connected to one another via trunk ports. Assuming the default switc
Correct

Mark 1.00 out of


1.00

Flag question
a. the switch with the highest IP address

b. the switch with the highest MAC address

c. the switch with the lowest IP address

d. the switch with the lowest MAC address

Your answer is correct.

Question 41
How can you protect CDP from reconnaissance attacks?
Correct

Mark 1.00 out of


1.00

Flag question a. 
Disable CDP on ports connected to endpoints.

b. Enable dynamic ARP inspection on all untrusted ports.

c. Disbale CDP on trunk ports.

d. Enable dot1x on all ports that are connected to other switches.

Your answer is correct.

Question 42
Which is an advantages of static routing when compared to dynamic routing?
Incorrect

Mark 0.00 out of


1.00

Flag question a. An efficient algorithm is used to build routing tables, using automatic updates

b. Routing tables adapt automatically to topology changes.

c. Security increases because only the network administrator may change the routing table.

d. Route summarization is computed automatically by the router.

Your answer is incorrect.

Question 43
You want to allow all of your company's users to access the Internet without allowing o
Correct

Mark 1.00 out of


1.00

Flag question
a. Assign the same IP address to all users.

b. Install a Web content filter to hide users' local IP addresses.

c. 
Configure a proxy server to hide users' local IP addresses

d. Assign unique IP addresses to all users.

Your answer is correct.

Question 44
What is the function of the command switchport trunk native vlan 999 on a Cisco Catalys
Correct

Mark 1.00 out of


1.00

Flag question

a. It creates a VLAN 999 interface

b. It blocks VLAN 999 traffic from passing on the trunk.

c. It designates VLAN 999 as the default for all unknown tagged traffic.

d. It designates VLAN 999 for untagged traffic.

Your answer is correct.

Question 45
In a switched environment, what does the IEEE 802.1Q standard describe?
Correct

Mark 1.00 out of


1.00

Flag question a. 
a method of VLAN trunking

b. the process for root bridge selection

c. an approach to wireless LAN communication

d. the operation of VTP

Your answer is correct.

Question 46
If the native VLAN on a trunk is different on each end of the link, what is a potential
Correct

Mark 1.00 out of


1.00

Flag question
a. The interface on both switches may shut down

b. The interface with the lower native VLAN may shut down

c. 
STP loops may occur

d. The switch with the higher native VLAN may shut down

Your answer is correct.

Question 47
What does a Layer 2 switch use to decide where to forward a received frame?
Correct

Mark 1.00 out of


1.00

Flag question a. source switch port

b. destination IP address

c. 
destination MAC address

d. source MAC address

Your answer is correct.

Question 48
You have just created a new VLAN on your network. What is one step that you should incl
Incorrect

Mark 0.00 out of


1.00

Flag question
a. Verify that different native VLANs exist between two switches for security purp

b. Verify that the switch is configured to allow for trunking on the switch ports.

c. Verify that the VLAN was added on all switches with the use of the show vlan co

d. Verify that each switch port has the correct IP address space assigned to it fo

Your answer is incorrect.

Question 49
Which is a characteristics of the 802.1Q protocol?
Correct

Mark 1.00 out of


1.00

Flag question a. It modifies the 802.3 frame header, and thus requires that the FCS be recompute

b. It is a trunking protocol capable of carrying untagged frames.

c. It includes an 8-bit field which specifies the priority of a frame.

d. It is used exclusively for tagging VLAN frames and does not address network rec

Your answer is correct.

Question 50
Which command is needed to enable SSH support on a Cisco Router?
Correct

Mark 1.00 out of


1.00

Flag question a. crypto key lock rsa

b. crypto key unlock rsa

c. crypto key zeroize rsa

d. crypto key generate rsa

Your answer is correct.

Finish review

◄ Announcements Jump to... Prelim Lab Exam ►

Quiz navigation
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22

23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44

45 46 47 48 49 50

Show one page at a time

Finish review

You are logged in as Gian Carlo Cresencio (Log out)


UGRD-IT6201D-2233T
Data retention summary
Get the mobile app

You might also like