CCNA 100-150 - 2 126. Refer to the exhibit. What is the maximum number of VLANs that can be deleted from the Switch as it is configured? maxlovell2 published on January 21, 2013 Stacked 1/25 126. Refer to the exhibit. What is the maximum number of VLANs that can be deletedfrom the Switch as it is configured? zero four five eight nine 2/25 127. Refer to the exhibit. A new switch, SW3, has been added to the network. Thenetwork administrator determines that VLAN information is not propagating to SW3.Which command will remedy the problem? SW1(config)# vtp version 1 SW2(config)# vtp mode client SW3(config)# vtp domain Cisco1 SW3(config)# vtp mode transparent 3/25 128. What advantage does cut-through switching provide? It enables QoS It forwards frames quickly. It provides an analysis of frames. It allows reduction of traffic by using error checking to drop corrupt frames. 4/25 129. Why is MAC address filtering considered a poor choice in securing a WLAN? Available bandwidth is reduced. MAC addresses are easily spoofed. APs are more susceptible to DoS attacks. The payload encryption is easily broken. 5/25 130. Refer to the exhibit. The commands are entered into switch SW1 as shown, and an802.1q trunk is successfully established. How does switch SW1 handle the untaggedtraffic that is destined for the trunk? SW1 will drop all untagged traffic. SW1 will send all untagged traffic to VLAN 1. SW1 will send all untagged traffic to VLAN 25. SW1 will send untagged traffic to all VLANs that are configured on the trunk. 6/25 131. Which type of traffic can still be received on a switch interface that is in STPblocking mode? BPDU frames multicast frames broadcast frames Layer 3 packets 7/25 132. In a three-layer hierarchical network design, which distribution layer functiondelineates broadcast domains? routing between VLANs aggregating traffic flows providing redundant links reducing the network diameter 8/25 133. Why is it advisable that a network administrator use SSH instead of Telnet whenmanaging switches? SSH uses TCP whereas Telnet does not. SSH encrypts only the username and password when logging in. SSH encrypts all remote management communications whereas Telnet does not. SSH sends a clear text message steam which reduces the bandwidth use for management. 9/25 134. Which service should be disabled on a Cisco switch or router to prevent packetsniffers from capturing information about the device? SSH VTP CDP SNMP 10/25 135. Which switch forwarding method should be used on a network that employs frameclassification based on an assigned Quality of Service (QoS) value? cut-through fast-forward fragment-free store-and-forward 11/25 136. Refer to the exhibit. The broadcast traffic from PC1 is consuming bandwidth on theinterswitch trunks. What should be done to prevent this from happening? Move PC1 to a port on SW3. Move PC2 to a port on SW3. Move PC1 to a port on SW2. Enable pruning for VLAN10 on the VTP server. Associate PC1 as a member of a new VLAN. 12/25 137. Refer to the exhibit. All switch interfaces are members of the same VLAN. Whatinformation is used by Switch1 to determine if incoming frames from the hosts shouldbe forwarded to Router1? the source address field in the IP header the destination port number in the TCP header the destination address field in the Layer 3 header the destination address field in the Ethernet header 13/25 138. Refer to the exhibit. Switch SWB is not responding to VTP updates from switchSWA. What is a possible cause of the problem? The VTP revision numbers are different. The number of existing VLANs is different. There is a password set on one of the switches. the enable passwords are not set on the switches. 14/25 139. Which IEEE trunking protocol is used to encapsulate data traffic over a trunk linkon a Cisco switch? STP DTP VTP 802.1Q 15/25 140. When an access point is placed near the outside wall of a building, whichimplementation design procedure should be used? Disable SSID cloaking. Lower the encryption level. Decrease the power setting. Disable MAC address filtering. Modify the Network Mode to Wireless-G. 16/25 141. A network technician is attempting to configure 802.1q trunking on switch portsFa0/5 through Fa0/10. Which set of commands will accomplish this task? Image 1 Image 2 Image 3 Image 4 17/25 142. Refer to the exhibit. Although they are directly connected, switch SWA is notexchanging VLAN information with switch SWC. What can be done to correct thisproblem? Change the hostname of SWA to SWC. Change the hostname of SWC to SWA. Change the VTP version of SWA to version 1. Change the VTP operating mode of SWA to transparent. 18/25 143. Refer to the exhibit. A technician is troubleshooting a trunk problem betweenswitches SW1 and SW2. What should be done to remedy the problem? “Negotiation of Trunking” on both switches should be turned off. “Administrative Mode” on switch SW1 should be configured as dynamic auto. “Trunking Native Mode VLAN” on switch SW2 should be configured as VLAN 100. “Operational Mode” on both switches should be configured as static access. 19/25 144. What allows WLAN clients to learn which networks and access points are availablein an area? SSID probes beacons association 20/25 145. What technique is a security attack that depletes the pool of IP addresses availablefor legitimate hosts? reconnaissance attack DHCP spoofing DHCP snooping DHCP starvation 21/25 146. Refer to the exhibit. All edge ports are configured with the spanning-tree portfastcommand. Host1 is recently connected to port Fa0/1 on switch SW1. Which statement istrue about the status of port Fa0/1? The port will transition into blocking state. The port will transition immediately into forwarding state. The port will transition into blocking state and then immediately into forwarding state. The port will transition into blocking state and immediately transition through the listening andlearning states. 22/25 147. Which two devices can cause interference with the operation of a WLAN becausethey operate on similar frequencies? (Choose two.) Hint: 2 choices copier AM radio television MP3 player cordless phone microwave oven 23/25 148. What is a result of improperly implementing a network with redundancy at Layer 2? an increase of unicast and multicast errors at Layer 3 a decrease in the amount of broadcast traffic end device malfunction because of broadcast storms an increase in throughput at all points in the network 24/25 149. Which statement is correct about STP architecture? Spanning Tree Protocol will guarantee a loop free Layer 2 topology. Spanning Tree Protocol guarantees the shortest path to destination networks. The switch with the highest priority will be assigned the lowest BID in the root election. The first step in the spanning-tree election process is to determine the root port. To select designated ports, the spanning-tree algorithm must determine the longest contiguouspath from the root bridge. 25/25 150. What is a function or characteristic of the native VLAN? It is the VLAN that supports untagged traffic on an 802.1Q trunk. It is always assigned to VLAN 1 for backward compatibility. It is always the same VLAN number for all trunks within an organization. It is used as the management VLAN throughout the entire switched network.