642-812 - BCMSN - Building Converged Cisco Multilayer Switched Networks

Go back to Cisco

Example Questions

What is needed to verify that a newly implemented security solution is performing as expected? Select the best response. Which two statements are true about port security? (Choose two.) Select 2 response(s). What is a critical piece of information that you should have when creating a VLAN-based implementation plan? Select the best response. Many security administrators don't think of security when it comes to Layer 2 of the network infrastructure (where switches operate), and it's one of the most overlooked aspects of network security and reliability. Which statement is true about Layer 2 security threats? A switch has been configured with PVLANs. With what type of PVLAN port should the default gateway be configured? Select the best response. Port security is being used to control access to a switch port. Which command will place the port into the errdisable state if an unauthorized station connects? A workstation has a Link-local IPv6 address FE80::A1:56C2:1102 and is setting a global unicast IPv6 address via stateless auto-configuration. The router connected to the LAN has a global IPv6 address of 2001:AAAA:BBBB:CCCC:DDDD::1/64. What will your workstation set its IPv6 address to once it detects the router advertisements? The Cisco Aironet cards only work in peer to peer mode. On an Aironet card, LED 0 and LED 1 are blinking alternately. What does this mean? Which statement is true about IP telephony calls? Select the best response. What is one method that can be used to prevent VLAN hopping? Select the best response. When planning high availability, which two components are important to minimize the effect of outages? (Choose two.) Select 2 response(s). The users in a department are using various host platforms, some old and some new. All of them have been approved with a user ID in a RADIUS server database. Which feature could be used to restrict access to the switch ports in the building? A change of the spanning tree network is being propagated to all STP devices. How are STP timers and state transitions affected when a topology change occurs in an STP environment? As a network technician ,you should know the VLAN hopping, can you tell me which two statements about VLAN hopping are true? (Choose two.) Which statement is true regarding the configuration of ISL trunks? Select the best response. Which two codecs are supported by Cisco VoIP equipment? Select the best response. Which command most likely makes a switch become the Root Bridge for VLAN 5, assuming that all switches have the default STP parameters? Which two table types are CEF components?(Choose two.) Select 2 response(s). When a switch receives a UDLD message on a link, what must it do? Which two statements are true about trust boundaries? (Choose two.) Select 2 response(s). When configuring port security on a Cisco Catalyst switch port, what is the default action taken by the switch if a violation occurs? Select the best response. Which three statements are correct about the Link Aggregation Control Protocol (LACP)? (Choose three.) A standalone wireless AP solution is being installed into the campus infrastructure. The access points appear to boot correctly, however, wireless clients are not obtaining correct access. You verify that the local switch configuration connected to the access point appears as the following: interface ethernet 0/1 switchport access vlan 10 switchport mode access spanning-tree portfast mls qos trust dscp What is the most likely issue causing the problem? Select the best response. To initiate testing, which port does a Cisco IOS IP SLA source use to send a control message to an IP SLA responder? Select the best response. What is the effect of configuring the following command on a switch? Switch(config) # spanning-tree portfast bpdufilter default Select the best response. You are planning a new VLAN-based network solution. What is one item you should consider when creating your implementation plan as it concerns VLANs? Select the best response. Which statement is correct about 802.1Q trunking? Select the best response. What are two differences between the Autonomous WLAN solution and the Lightweight WLAN solution? (Choose two.) Select 2 response(s). What is the objective of the Cisco Compatible Extensions program? Select the best response. Which two statements correctly describe UDLD? (Choose two.) Select 2 response(s). You are requested to configure a new switch for trunking. Which switch command enables a trunking protocol that appends a four byte CRC to the packet? Which statement is true about the Lightweight Access Point Protocol (LWAPP)? Select the best response. Why is BPDU guard an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of a network? Select the best response. For the following items, which EtherChannel mode does not send or receive any negotiation frames? You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution? Select the best response. Which two statements about the Cisco Aironet Desktop Utility (ADU) are true? (Choose two.) Select 2 response(s). Which statement is true about 802.1x port-based authentication? Select the best response. You need to verify the operation of the BPDU enhancements that were added to the switches. Which two statements are true about BPDU port-guard and BPDU filtering? (Choose two.) Which set of statements about Spanning Tree Protocol default timers is true? Select the best response. What are two methods of mitigating MAC address flooding attacks? (Choose two.) Select 2 response(s). What action should you be prepared to take when verifying a security solution? Select the best response. What is the effect of applying the switchport trunk encapsulation dot1q command to a port on a Cisco Catalyst switch? Select the best response. Which two descriptions about voice packets in a LAN are correct? (Choose two.) MAC addresses can be put into the CAM table, but no data can be sent or received if a switch port is in which of the following STP states? Which statement is true about voice VLANs? Select the best response. Which set of statements describes the correct order and process of a wireless client associating with a wireless access point? Select the best response. Which statement is true about the data traffic between the access point and controller? Select the best response. On a multilayer Catalyst switch, which interface command is used to convert a Layer 3 interface to a Layer 2 interface? Select the best response. A campus infrastructure supports wireless clients via Cisco Aironet AG Series 1230, 1240, and 1250 access points. With DNS and DHCP configured, the 1230 and 1240 access points appear to boot and operate normally; however, the 1250 access points do not seem to operate correctly. What is the most likely issue causing this problem? Select the best response. Which statement describes the function of a trust boundary? Select the best response.

Study Guides