CCNA 2 Chapter 5: Switch Configuration (v5.0.3 + v6.0) Exam Answers – 100% Result

Certification Answers

Q1. Which statement describes the port speed LED on the Cisco Catalyst 2960 switch?

  • If the LED is green, the port is operating at 100 Mb/s.
  • If the LED is off, the port is not operating.
  • If the LED is blinking green, the port is operating at 10 Mb/s.
  • If the LED is amber, the port is operating at 1000 Mb/s.
Explanation:  The port speed LED indicates that the port speed mode is selected. When selected, the port LEDs will display colors with different meanings. If the LED is off, the port is operating at 10 Mb/s. If the LED is green, the port is operating at 100 Mb/s. If the LED is blinking green, the port is operating at 1000 Mb/s.

Q2. Which command is used to set the BOOT environment variable that defines where to find the IOS image file on a switch?

  • config-register
  • boot system
  • boot loader
  • confreg
Explanation:  The boot system command is used to set the BOOT environment variable. The config-register and confreg commands are used to set the configuration register. The boot loader command supports commands to format the flash file system, reinstall the operating system software, and recover from a lost or forgotten password.

Q3. What is a function of the switch boot loader?

  • to speed up the boot process
  • to provide security for the vulnerable state when the switch is booting
  • to control how much RAM is available to the switch during the boot process
  • to provide an environment to operate in when the switch operating system cannot be found
Explanation:  The switch boot loader environment is presented when the switch cannot locate a valid operating system. The boot loader environment provides a few basic commands that allows a network administrator to reload the operating system or provide an alternate location of the operating system.

Q4. Which interface is the default location that would contain the IP address used to manage a 24-port Ethernet switch?

  • VLAN 1
  • Fa0/0
  • Fa0/1
  • interface connected to the default gateway
  • VLAN 99
Explanation:  Interface VLAN 1 is the default management SVI.

Q5. A production switch is reloaded and finishes with a Switch> prompt. What two facts can be determined? (Choose two.)

  • POST occurred normally.
  • The boot process was interrupted.
  • There is not enough RAM or flash on this router.
  • A full version of the Cisco IOS was located and loaded.
  • The switch did not locate the Cisco IOS in flash, so it defaulted to ROM.
Explanation:  A switch booting to the Switch> prompt indicates that the switch booted normally. This means a the switch successfully completed POST full version of the Cisco IOS was loaded.

Q6. Which two statements are true about using full-duplex Fast Ethernet? (Choose two.)

  • Performance is improved with bidirectional data flow.
  • Latency is reduced because the NIC processes frames faster.
  • Nodes operate in full-duplex with unidirectional data flow.
  • Performance is improved because the NIC is able to detect collisions.
  • Full-duplex Fast Ethernet offers 100 percent efficiency in both directions.
Explanation:  In full-duplex operation, the NIC does not process frames any faster, the data flow is bidirectional, and there are no collisions.

Q7. In which situation would a technician use the show interfaces switch command?

  • to determine if remote access is enabled
  • when packets are being dropped from a particular directly attached host
  • when an end device can reach local devices, but not remote devices
  • to determine the MAC address of a directly attached network device on a particular interface
Explanation:  The show interfaces command is useful to detect media errors, to see if packets are being sent and received, and to determine if any runts, giants, CRCs, interface resets, or other errors have occurred. Problems with reachability to a remote network would likely be caused by a misconfigured default gateway or other routing issue, not a switch issue. The show mac address-table command shows the MAC address of a directly attached device.

Q8. Question

Explanation:  No answer description available for this question

Q9. Question

Explanation:  No answer description available for this question

Q10. If one end of an Ethernet connection is configured for full duplex and the other end of the connection is configured for half duplex, where would late collisions be observed?

  • on both ends of the connection
  • on the full-duplex end of the connection
  • only on serial interfaces
  • on the half-duplex end of the connection
Explanation:  Full-duplex communications do not produce collisions. However, collisions often occur in half-duplex operations. When a connection has two different duplex configurations, the half-duplex end will experience late collisions. Collisions are found on Ethernet networks. Serial interfaces use technologies other than Ethernet.

Q11. What is one difference between using Telnet or SSH to connect to a network device for management purposes?

  • Telnet uses UDP as the transport protocol whereas SSH uses TCP.
  • Telnet does not provide authentication whereas SSH provides authentication.
  • Telnet supports a host GUI whereas SSH only supports a host CLI.
  • Telnet sends a username and password in plain text, whereas SSH encrypts the username and password.
Explanation:  SSH provides security for remote management connections to a network device. SSH does so through encryption for session authentication (username and password) as well as for data transmission. Telnet sends a username and password in plain text, which can be targeted to obtain the username and password through data capture. Both Telnet and SSH use TCP, support authentication, and connect to hosts in CLI.

Q12. Question

Explanation:  No answer description available for this question

Q13. What is the effect of using the switchport port-security command?

  • enables port security on an interface
  • enables port security globally on the switch
  • automatically shuts an interface down if applied to a trunk port
  • detects the first MAC address in a frame that comes into a port and places that MAC address in the MAC address table
Explanation:  Port security cannot be enabled globally. All active switch ports should be manually secured using the switchport port-security command, which allows the administrator to control the number of valid MAC addresses allowed to access the port. This command does not specify what action will be taken if a violation occurs, nor does it change the process of populating the MAC address table.

Q14. Where are dynamically learned MAC addresses stored when sticky learning is enabled with the switchport port-security mac-address sticky command?

  • ROM
  • RAM
  • NVRAM
  • flash
Explanation:  When MAC addresses are automatically learned by using the sticky command option, the learned MAC addresses are added to the running configuration, which is stored in RAM.

Q15. A network administrator configures the port security feature on a switch. The security policy specifies that each access port should allow up to two MAC addresses. When the maximum number of MAC addresses is reached, a frame with the unknown source MAC address is dropped and a notification is sent to the syslog server. Which security violation mode should be configured for each access port?

  • restrict
  • protect
  • warning
  • shutdown
Explanation:  In port security implementation, an interface can be configured for one of three violation modes:
Protect – a port security violation causes the interface to drop packets with unknown source addresses and no notification is sent that a security violation has occurred.
Restrict – a port security violation causes the interface to drop packets with unknown source addresses and to send a notification that a security violation has occurred.
Shutdown – a port security violation causes the interface to immediately become error-disabled and turns off the port LED. No notification is sent that a security violation has occurred.

Q16. Which two statements are true regarding switch port security? (Choose two.)

  • The three configurable violation modes all log violations via SNMP.
  • Dynamically learned secure MAC addresses are lost when the switch reboots.
  • The three configurable violation modes all require user intervention to re-enable ports.
  • After entering the sticky parameter, only MAC addresses subsequently learned are converted to secure MAC addresses.
  • If fewer than the maximum number of MAC addresses for a port are configured statically, dynamically learned addresses are added to CAM until the maximum number is reached.
Explanation:  Dynamically learned secure MAC addresses are lost when the switch reboots. Sticky MAC addresses are learned and added to the running config. These addressess can be retained if the configuration is saved and then rebooted. MAC addresses may also be configured statically (that is, manually). If fewer than the maximum number of MAC addresses for a port are configured statically, dynamically learned addresses are added to CAM until the maximum number is reached.

Q17. Which action will bring an error-disabled switch port back to an operational state?

  • Remove and reconfigure port security on the interface.
  • Issue the switchport mode access command on the interface.
  • Clear the MAC address table on the switch.
  • Issue the shutdown and then no shutdown interface commands.
Explanation:  When a violation occurs on a switch port that is configured for port security with the shutdown violation action, it is put into the err-disabled state. It can be brought back up by shutting down the interface and then issuing the no shutdown command.

Q18. Question

Explanation:  No answer description available for this question

Q19. Question

Explanation:  No answer description available for this question

Q20. Question

Explanation:  No answer description available for this question

Q21. Question

Explanation:  No answer description available for this question

Q22. Fill in the blank.

Explanation:  No answer description available for this question

Q23. Question

Explanation:  No answer description available for this question

Q24. Question

Explanation:  No answer description available for this question

Q25. What is a disadvantage of using router-on-a-stick inter-VLAN routing?

  • does not support VLAN-tagged packets
  • requires the use of more physical interfaces than legacy inter-VLAN routing
  • does not scale well beyond 50 VLANs
  • requires the use of multiple router interfaces configured to operate as access links
Explanation:  No answer description available for this question

Q26. How is traffic routed between multiple VLANs on a multilayer switch?

  • Traffic is routed via physical interfaces.
  • Traffic is routed via internal VLAN interfaces.
  • Traffic is broadcast out all physical interfaces.
  • Traffic is routed via subinterfaces.
Explanation:  No answer description available for this question

Q27. Question

Explanation:  No answer description available for this question

Q28. What is a characteristic of legacy inter-VLAN routing?

  • Only one VLAN can be used in the topology.
  • The router requires one Ethernet link for each VLAN.
  • The user VLAN must be the same ID number as the management VLAN.
  • Inter-VLAN routing must be performed on a switch instead of a router.
Explanation:  No answer description available for this question

Q29. Question

Explanation:  No answer description available for this question

Q30. Question

Explanation:  No answer description available for this question

Q31. Question

Explanation:  No answer description available for this question

Q32. Question

Explanation:  No answer description available for this question

Q33. Question

Explanation:  No answer description available for this question

Q34. Question

Explanation:  No answer description available for this question

Q35. Question

Explanation:  No answer description available for this question

Q36. Inter-VLAN communication is not occurring in a particular building of a school. Which two commands could the network administrator use to verify that inter-VLAN communication was working properly between a router and a Layer 2 switch when the router-on-a-stick design method is implemented? (Choose two.)

  • From the router, issue the show ip route command.
  • From the router, issue the show interfaces trunk command.
  • From the router, issue the show interfaces interface command.
  • From the switch, issue the show interfaces trunk command.
  • From the switch, issue the show interfaces interface command.
Explanation:  No answer description available for this question

Q37. How are IP addressing designs affected by VLAN implementations?

  • VLANs do not support VLSM.
  • VLANs do not use a broadcast address.
  • Each VLAN must have a different network number.
  • Each VLAN must have a different subnet mask.
Explanation:  No answer description available for this question

Q38. While configuring inter-VLAN routing on a multilayer switch, a network administrator issues the no switchport command on an interface that is connected to another switch. What is the purpose of this command?

  • to create a routed port for a single network
  • to provide a static trunk link
  • to create a switched virtual interface
  • to provide an access link that tags VLAN traffic
Explanation:  No answer description available for this question

Q39. What is a disadvantage of using multilayer switches for inter-VLAN routing?

  • Multilayer switches have higher latency for Layer 3 routing.
  • Multilayer switches are more expensive than router-on-a-stick implementations.
  • Spanning tree must be disabled in order to implement routing on a multilayer switch.
  • Multilayer switches are limited to using trunk links for Layer 3 routing.
Explanation:  No answer description available for this question

Q40. What is a characteristic of a routed port on a Layer 3 switch?

  • It supports trunking.
  • It is not assigned to a VLAN.
  • It is commonly used as a WAN link.
  • It cannot have an IP address assigned to it.
Explanation:  No answer description available for this question

Q41. An administrator is attempting to configure a static route on a Cisco 2960 series switch. After the administrator types the command ip route 0.0.0.0 0.0.0.0 10.1.1.1, an error message appears stating that the command is not recognized. What must the administrator do so that this command is accepted?

  • Enter the command no switchport.
  • Enter the command ipv6 unicast-routing.
  • Enter the command ip route 0.0.0.0 0.0.0.0. vlan 10.
  • Enter the command sdm prefer lanbase-routing and reload.
Explanation:  No answer description available for this question

Q42. Which statement describes a disadvantage of using router subinterfaces for inter-VLAN routing?

  • It is more expensive than using individual router interfaces.
  • Routed traffic must contend for bandwidth on a single router interface.
  • Trunking cannot be used to connect the router to the switch.
  • All untagged traffic is dropped.
Explanation:  No answer description available for this question

Q43. Question

Explanation:  No answer description available for this question

Q44. Question

Explanation:  No answer description available for this question

Q45. Question

Explanation:  No answer description available for this question

Q46. What condition is required to enable Layer 3 switching?

  • The Layer 3 switch must have IP routing enabled.
  • All participating switches must have unique VLAN numbers.
  • All routed subnets must be on the same VLAN.
  • Inter-VLAN portions of Layer 3 switching must use router-on-a-stick.
Explanation:  No answer description available for this question

Q47. Question

Explanation:  No answer description available for this question

Q48. Fill in the blank. Do not use abbreviations.

A network engineer is troubleshooting the configuration of new VLANs on a network. ​Which command is used to display the list of VLANs that exists on the switch? show vlan
Explanation:  No answer description available for this question

Q49. Question

Explanation:  No answer description available for this question

Q50. Which type of inter-VLAN communication design requires the configuration of multiple subinterfaces?

  • router on a stick
  • routing via a multilayer switch
  • routing for the management VLAN
  • legacy inter-VLAN routing
Explanation:  No answer description available for this question

Q51. A small college uses VLAN 10 for the classroom network and VLAN 20 for the office network. What is needed to enable communication between these two VLANs while using legacy inter-VLAN routing?

  • A router with at least two LAN interfaces should be used.
  • Two groups of switches are needed, each with ports that are configured for one VLAN.
  • A router with one VLAN interface is needed to connect to the SVI on a switch.
  • A switch with a port that is configured as trunk is needed to connect to a router.
Explanation:  No answer description available for this question

Q52. Question

Explanation:  No answer description available for this question

Q53. Question

Explanation:  No answer description available for this question

Q54. Question

Explanation:  No answer description available for this question

Q55. Question

Explanation:  No answer description available for this question

Q56. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Fill in the blank. Do not use abbreviations. Which command is missing on the Layer 3 switch to restore the full connectivity between PC1 and the web server? (Note that typing no shutdown will not fix this problem.)

  • ip address 192.168.20.1 255.255.255.0
Explanation:  No answer description available for this question

Q57. Packet Tracer activity What the missing command on layer 3 switch which allow communication between PC1 and Web Server?

  • “ip address 192.168.20.1 255.255.255.0” on vlan20
Explanation:  No answer description available for this question