ICND 2 full

download ICND 2 full

of 59

Transcript of ICND 2 full

  • 7/30/2019 ICND 2 full

    1/59

    Untitled Exam

    Number: 000-000Passing Score: 800Time Limit: 120 minFile Version: 1.0

  • 7/30/2019 ICND 2 full

    2/59

    Exam A

    QUESTION 1

    Refer to the exhibit.R1 knows two routes, Path A and Path B, to the Ethernet network attached to R3. R1 learned Path A to network10.2.0.0/16 from a static route and Path B to network 10.2.0.0/16 from EIGRP. Which route will R1 install in itsrouting table?

    A. Both routes are installed and load balancing occurs across both paths.

    B. The route via Path B is installed because the EIGRP route has the best metric to network 10.2.0.0/16.

    C. The route via Path A is installed because the static route has the best metric to network 10.2.0.0/16.

    D. The route via Path B is installed because the EIGRP route has the lowest administrative distance to network10.2.0.0/16.

    E. The route via Path A is installed because the static route has the lowest administrative distance to network10.2.0.0/16.

    Answer: ESection: (none)

    Explanation/Reference:

    QUESTION 2

  • 7/30/2019 ICND 2 full

    3/59

    Refer to the exhibit.

    The network has three connected routers: R1, R2, and R3. The routes of all three routers are displayed. Allrouters are operational and pings are not blocked on this network.Which ping will fail?

    A. from R1 to 172.16.1.1

    B. from R1 to 192.168.3.1

    C. from R2 to 192.168.1.1

    D. from R2 to 192.168.3.1

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 3

    What are two functions of a router? (Choose two.)

    A. It connects multiple IP networks.

    B. It controls the flow of data via the use of Layer 2 addresses.

    C. It determines the best path to send packets.

    D. It manages the VLAN database.

    E. It increases the size of the broadcast domain

    Answer:ACSection: (none)

    Explanation/Reference:

    QUESTION 4

    Which two statements are true regarding link-state routing protocols? (Choose two.)

  • 7/30/2019 ICND 2 full

    4/59

    A. They are aware of the complete network topology.

    B. They offer rapid convergence times in large networks.

    C. They do not include subnet masks in their routing updates.

    D. They rely on decreasing hop counts to determine the best path.

    E. They do not work well in networks that require special hierarchical designs.

    F. They pass their entire routing tables to their directly connected neighbors only.

    Answer:ABSection: (none)

    Explanation/Reference:

    QUESTION 5

    Which two statements are correct about the split horizon with poison reverse method of routing loopprevention? (Choose two.)Which two statements are correct about the split horizon with poison reverse methodof routing loop prevention? (Choose two.)

    A. It is enabled by default on all Cisco IOS implementations.

    B. It assigns a value that represents an infinite metric to the poisoned route.

    C. It sends back the poisoned route update to the same interface from where it was received.

    D. It instructs routers to hold all changes that might affect routes, for a specified period of time.

    E. It limits the number of hops a packet can traverse through the network before it is discarded.

    Answer: BESection: (none)

    Explanation/Reference:

    QUESTION 6

    Refer to the exhibit.

    Which router is advertising subnet 172.16.1.32/28?

  • 7/30/2019 ICND 2 full

    5/59

    A. Router1

    B. Router2

    C. Router3

    D. Router4

    Answer: DSection:

    (none)

    Explanation/Reference:

    QUESTION 7

    Refer to the exhibit.

    All router interfaces are configured with an IP address and are operational. If no routing protocols or staticroutes are configured, what information will be included in the show ip route command output for router A?

    A. All of the 192.168.x.0 networks will be in the routing table.

    B. Routes to networks 192.168.1.0/24, 192.168.2.0/24, and 192.168.3.0/24 will be in the routing table.

    C. The routing table will be empty because routes and dynamic routes have not been configured.

    D. A default route is automatically installed in the routing table to allow connectivity between the networks.

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 8

    When a router boots, what is the default order to locate the Cisco IOS if there is no boot system command?

    A. ROM, TFTP server, flashB. flash, TFTP server, ROM

    C. flash, NVRAM, TFTP server

    D. NVRAM, TFTP server, flash

    Answer: BSection: (none)

    Explanation/Reference:

  • 7/30/2019 ICND 2 full

    6/59

    QUESTION 9

    Which router component is used to store the routing table?

    A. Flash

    B. NVRAMC. ROM

    D. SDRAM

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 10

    Which three statements describe the operation of routing with EIGRP? (Choose three.)

    A. As new neighbors are discovered, entries are placed in a neighbor table.

    B. If the feasible successor has a higher advertised cost than the current successor route, then it becomes theprimary route.

    C. If hello packets are not received within the hold time, DUAL must recalculate the topology.

    D. The reported distance is the distance to a destination as advertised by a neighbor.

    E. EIGRP maintains full knowledge of the network topology in the topology table and exchanges full routinginformation with neighboring routers in every update.

    F. EIGRP builds one routing table that contains routes for all configured routed protocols.

    Answer:ACD

    Section: (none)

    Explanation/Reference:

    QUESTION 11

    What two routing protocols use a hierarchal network topology? (Choose two.)

    A. IS-IS

    B. EIGRP

    C. OSPF

    D. RIPv1

    E. RIPv2

    Answer:ACSection: (none)

    Explanation/Reference:

    QUESTION 12

  • 7/30/2019 ICND 2 full

    7/59

    Refer to the exhibit.

    All routers are running RIPv1. The two networks 10.1.1.0/29 and 10.1.1.16/29 are unable to access each other.What can be the cause of this problem?

    A. Because RIPv1 is a classless protocol, it does not support this access.

    B. RIPv1 does not support discontiguous networks.

    C. RIPv1 does not support load balancing.

    D. RIPv1 does not support automatic summarization.

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 13

    What command would the network administrator apply to a router that is running OSPF to advertise the entirerange of addresses included in 172.16.0.0/19 in area 0?

    A. R1(config-router)# network 172.16.0.0 0.0.0.255 area 0

    B. R1(config-router)# network 172.16.0.0 0.0.3.255 area 0

    C. R1(config-router)# network 172.16.0.0 0.0.15.255 area 0

    D. R1(config-router)# network 172.16.0.0 0.0.31.255 area 0

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 14

  • 7/30/2019 ICND 2 full

    8/59

    Refer to the exhibit.

    Which statement is true concerning the routing configuration?

    A. Using dynamic routing instead of static routing would have required fewer configuration steps.

    B. The 10.1.1.0/24 and 10.1.2.0/24 routes have adjacent boundaries and should be summarized.

    C. Packets routed to the R2 Fast Ethernet interface require two routing table lookups.

    D. The static route will not work correctly.

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 15

    Refer to the exhibit.

    A network administrator has enabled RIP on routers B and C in the network diagram. Which of the following

  • 7/30/2019 ICND 2 full

    9/59

    commands will prevent RIP updates from being sent to Router A?

    A. A(config)# router ripA(config-router)# passive-interface S0/0

    B. B(config)# router ripB(config-router)# network 192.168.25.48B(config-router)# network 192.168.25.64

    C. A(config)# router ripA(config-router)# no network 192.168.25.32

    D. B(config)# router ripB(config-router)# passive-interface S0/0

    E. A(config)# no router rip

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 16

    Refer to the exhibit.

    What information can be determined from the highlighted output?

    A. R1 is originating the route 172.30.200.32/28.

    B. Automatic summarization is disabled.

    C. The 172.30.200.16/28 network is one hop away from R1.

    D. A classful routing protocol is being used.

    Answer:BSection: (none)

    Explanation/Reference:

    QUESTION 17

  • 7/30/2019 ICND 2 full

    10/59

    Refer to the exhibit.

    Given the topology shown in the exhibit, what three commands are needed to configure EIGRP on the Parisrouter? (Choose three.)

    A. Paris(config)# router eigrp 100

    B. Paris(config)# router eigrp

    C. Paris(config-router)# network 192.168.6.0

    D. Paris(config-router)# network 192.168.7.0

    E. Paris(config-router)# network 192.168.8.0

    F. Paris(config-router)# network 192.168.9.0

    Answer:ADESection: (none)

    Explanation/Reference:

    QUESTION 18

    A network administrator needs to assign the very last usable IP address in the 172.24.64.0/18 network range tothe router interface that serves this LAN. Which IP address should the administrator configure on the interface?

    A. 172.16.128.154/18

    B. 172.16.255.254/18

    C. 172.24.64.254/18

    D. 172.24.127.254/18

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 19

  • 7/30/2019 ICND 2 full

    11/59

    Refer to the exhibit.

    Based on the output from the show running-config and debug ip rip commands, what are two of the routes that

    are added to the routing table of R1? (Choose two.)

    A. R 192.168.1.0/24 [120/1] via 172.16.2.1, 00:00:24, Serial0/0/1

    B. R 192.168.100.0/24 [120/1] via 172.16.1.1, 00:00:24, Serial0/0/0

    C. S 192.168.1.0/24 [1/0] via FastEthernet0/0

    D. R 192.168.9.0/24 [120/1] via 172.16.2.1, 00:00:24, Serial0/0/0

    E. R 192.168.2.0/24 [120/1] via 172.16.1.2, 00:00:24, Serial0/0/0

    Answer:ABSection: (none)

    Explanation/Reference:

    QUESTION 20

    Refer to the exhibit.

    The show cdp neighbors command was run at R1. Which two facts about the newly detected device can bedetermined from the output? (Choose two.)

    A. ABCD is a router that is connected to R1.

    B. ABCD is a non-CISCO device that is connected to R1.

    C. The device is connected at the Serial0/0/1 interface of R1

    D. R1 is connected at the S0/0/1 interface of device ABCD.

    E. ABCD does not support switching capability.

  • 7/30/2019 ICND 2 full

    12/59

    Answer:ACSection: (none)

    Explanation/Reference:

    QUESTION 21A network is configured with the IP, IPX, and AppleTalk protocols. Which routing protocol is recommended forthis network?

    A. RIPv1

    B. RIPv2

    C. EIGRP

    D. OSPF

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 22

    Refer to the exhibit.

    The network administrator is planning IP addressing of a new network. What part of this addressing schememust be changed to allow communication between host A and the server?

    A. the IP address of the server

    B. the default gateway of host A

    C. the IP address of host A

    D. the default gateway of the server

    Answer:ASection: (none)

    Explanation/Reference:

  • 7/30/2019 ICND 2 full

    13/59

    QUESTION 23

    Refer to the exhibit.

    Two routers are unable to establish an adjacency. What is the possible cause for this?

    A. The two routers are connected on a multiaccess network.

    B. The hello and dead intervals are different on the two routers.

    C. They have different OSPF router IDs.

    D. They have different process IDs.

    Answer: B

    Section: (none)

    Explanation/Reference:

    QUESTION 24

  • 7/30/2019 ICND 2 full

    14/59

    Refer to the exhibit.

    Both routers are using the RIP protocol. Devices on the 192.168.1.1 network can ping the S0/0/0 interface onR2 but cannot ping devices on the 192.168.2.1 network. What is a possible cause of this problem?

    A. The routers are configured with different versions of RIP.

    B. R2 is not forwarding the routing updates.

    C. The R1 configuration should include the no auto-summary command.

    D. The maximum path number has been exceeded.

    Answer:ASection: (none)

    Explanation/Reference:

    QUESTION 25

    A router has EIGRP configured as the only routing protocol. In what way might EIGRP respond if there is nofeasible successor route to a destination network and the successor route fails?

    A. It broadcasts hello packets to all routers in the network to re-establish neighbor adjacencies.

    B. It sends queries to adjacent neighbors until a new successor route is found.

    C. It immediately sends its entire routing table to its neighbors.

    D. It will set the metric for the failed route to infinity.

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 26

  • 7/30/2019 ICND 2 full

    15/59

    Refer to the exhibit.

    A network administrator is accessing router R1 from the console port. Once the administrator is connected tothe router, which password should the administrator enter at the R1> prompt to access the privileged EXECmode?

    A. Cisco001

    B. Cisco123

    C. Cisco789

    D. Cisco901

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 27

    Which two components are used to determine the router ID in the configuration of the OSPF routing process?(Choose two.)

    A. the IP address of the first FastEthernet interface

    B. the highest IP address of any logical interface

    C. the highest IP address of any physical interface

    D. the default gateway IP address

    E. the priority value of 1 on any physical interface

    Answer: BCSection: (none)

    Explanation/Reference:

    QUESTION 28

  • 7/30/2019 ICND 2 full

    16/59

    Refer to the exhibit.

    Which of the following could describe the devices labeled ? in the graphic? (Choose three.)

    A. DCE

    B. CSU/DSU

    C. LAN switch

    D. modem

    E. hub

    Answer:ABDSection: (none)

    Explanation/Reference:

    QUESTION 29

    Refer to the exhibit.

    Host A is unable to access the Internet, and troubleshooting has revealed that this is due to an addressingproblem. What is incorrectly configured in this network?

    A. the IP address of the Fa0/0 interface of R1

    B. the subnet mask of the S0/0/0 interface of R1

    C. the IP address of the S0/0/0 interface of R1

    D. the subnet mask of the S0/0/0 interface of R2

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 30

    A static route has been configured on a router. However, the destination network no longer exists. What shouldan administrator do to remove the static route from the routing table?

  • 7/30/2019 ICND 2 full

    17/59

    A. Change the routing metric for that route.

    B. Nothing. The static route will go away on its own.

    C. Change the administrative distance for that route.

    D. Remove the route using the no ip route command.

    Answer:DSection: (none)

    Explanation/Reference:

  • 7/30/2019 ICND 2 full

    18/59

    Exam B

    QUESTION 1

    Refer to the exhibit. A network administrator needs to add IP phones to the network. To which devices shouldthe IP phones connect?

    A. AS1 and AS2

    B. DS1 and DS2

    C. DS1, DS2, and CS1

    D. AS1, AS2, DS1, and DS2

    Answer:ASection: (none)

    Explanation/Reference:

    QUESTION 2

    Which CLI mode allows users to access all device commands, such as those used for configuration,management, and troubleshooting?

    A. user EXEC mode

    B. privileged EXEC mode

    C. global configuration mode

    D. interface configuration mode

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 3

  • 7/30/2019 ICND 2 full

    19/59

    Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit data at the same time. Howdo the hosts respond on the network? (Choose two.)

    A. After the end of the jam signal, a backoff algorithm is invoked.

    B. Hosts 1 and 4 are operating full duplex so no collision will exist.

    C. The hub will block the port connected to Host 4 to prevent a collision.

    D. Hosts 1 and 4 are assigned shorter backoff values to provide them priority to access the media.E. If a host has data to transmit after the backoff period of that host, the host checks to determine if the line is

    idle before transmitting.

    Answer:AESection: (none)

    Explanation/Reference:

    QUESTION 4

    Refer to the exhibit. An administrator documented the output of a CAM table from an Ethernet switch as shown.What action will the switch take when it receives the frame shown at the bottom of the exhibit?

    A. discard the frame

    B. forward the frame out port 2

    C. forward the frame out port 3

    D. forward the frame out all ports

    E. forward the frame out all ports except port 3

    F. add station 00-00-3D-1F-11-05 to port 2 in the forwarding table

  • 7/30/2019 ICND 2 full

    20/59

    Answer: ESection: (none)

    Explanation/Reference:

    QUESTION 5

    What two methods can be used to remove MAC address table entries from a switch? (Choose two.)

    A. Power cycle the switch to clear all dynamically learned addresses.

    B. The clear switching-tables command will remove statically configured entries.

    C. The clear mac-address-table command will remove statically and dynamically configured table entries.

    D. The erase flash command will clear all statically configured table entries.

    E. Statically configured MAC addresses will automatically be removed from the address table 300 minutesafter the last activity on a switch port.

    Answer:AC

    Section: (none)

    Explanation/Reference:

    QUESTION 6

    Which three statements are correct concerning the default configuration of a new switch? (Choose three.)

    A. It is configured in VTP server mode.

    B. STP is automatically enabled.

    C. The first VTY line is automatically configured to allow remote connections.

    D. VLAN1 is configured with a management IP address.

    E. All switch ports are assigned to VLAN1.

    F. The enable password is configured as cisco.

    Answer:ABESection: (none)

    Explanation/Reference:

    QUESTION 7

    What will be the effect of the command S1# copy system:running-config tftp://172.16.2.155/tokyo-config?

    A. The IOS will be copied to the TFTP server.

    B. The configuration file named tokyo-config will overwrite the startup configuration file on S1.

    C. The running configuration file on S1 will be saved via TFTP to a file named tokyo-config.

    D. The contents of NVRAM on S1 will become the startup configuration file on the tokyo switch.

    Answer: CSection: (none)

  • 7/30/2019 ICND 2 full

    21/59

    Explanation/Reference:

    QUESTION 8

    Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?

    A. This entry can only be removed from the MAC address table by a network administrator.B. When forwarding a frame to the device with address 0060.5c5b.cd23, the switch does not have to perform a

    lookup to determine the final destination port.

    C. Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18.

    D. The switch learned this MAC address from the source address in a frame received on Fa0/18.

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 9

    Company policy requires disabling the command history buffer on network devices. An administrator entersterminal no history size at the command prompt on a Cisco Catalyst switch and receives no error messagesback, but the command history buffer is still available. What is the problem?

    A. The command contained a syntax error.

    B. The Cisco IOS version does not support disabling the command history buffer.

    C. The command history can only be disabled on a router, not a switch.

    D. The size parameter reset the default buffer size but did not disable access to the buffer.

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 10

  • 7/30/2019 ICND 2 full

    22/59

    Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit.However, hosts B and D cannot ping each other. What is the most likely cause of this problem?

    A. The link between the switches is up but not trunked.

    B. The Fa0/11 interface of Switch1 is not configured as a trunk.

    C. Hosts B and D are configured with IP addresses from different subnets.

    D. VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 11

    A network administrator is implementing VTP in a large campus LAN that contains one hundred switches. Whatare valid considerations for reliability and administration?

    A. Using server mode on a single master switch and client mode on all other switches will provide the most

    fault tolerance for retaining VLAN information in all switches if power is lost on the network.B. Using transparent mode on all switches will allow for efficient administration and prevent VLAN data loss

    from the loss of any single switch.

    C. Configuring several switches in server mode will allow all VLANs to be entered from a single switch andpreserve VLAN data if any of the switches or connections are lost.

    D. Configuring one primary and one backup switch in server mode and all other switches in transparent modewill provide fault tolerance for the VLAN data and allow for efficient distribution of the VLAN configurations toall switches.

  • 7/30/2019 ICND 2 full

    23/59

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 12

    Refer to the exhibit. Switch SW-A is to be used as a temporary replacement for another switch in the VTPStudent domain. What two pieces of information are indicated from the exhibited output? (Choose two.)

    A. The other switches in the domain can be running either VTP version 1 or 2.

    B. There is a risk that the switch may cause incorrect VLAN information to be sent through the domain.

    C. VTP will block frame forwarding on at least one redundant trunk port that is configured on this switch.

    D. VLAN configuration changes made on this switch will be sent to other devices in the VTP domain.

    E. This switch will update its VLAN configuration when VLAN changes are made on a VTP server in the samedomain.

    Answer: BESection: (none)

    Explanation/Reference:

    QUESTION 13

    What is the purpose of issuing the command switchport mode access on a switch interface?

    A. disable port security

    B. make the port operationalC. override the default port behavior

    D. force the port to be a part of a single vlan

    Answer: DSection: (none)

    Explanation/Reference:

  • 7/30/2019 ICND 2 full

    24/59

    QUESTION 14

    Refer to the exhibit. What happens when a frame from a source MAC address different from 00a8.d2e4.ba27reaches switch port 0/5?

    A. The frame is dropped.

    B. The port is shut down.

    C. An error message is displayed.

    D. FastEthernet port 0/5 will show an err-disabled message.

    Answer:ASection: (none)

    Explanation/Reference:

    QUESTION 15

    Refer to the exhibit. What will be the result of the commands that are shown in the exhibit?

    A. Only clients on VLAN 2 will be able to use DHCP for addressing.

    B. DHCP server responses will only be permitted on interface Fa0/2.

    C. Only 100 clients are permitted to request DHCP addresses on VLAN 2.

    D. Client requests for DHCP addresses will be filtered out if the requests are not received on interface Fa0/2.

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 16

    Why is it important that the network administrator consider the spanning-tree network diameter when choosingthe root bridge?

    A. The network diameter limitation is 9.

    B. BPDUs may be discarded because of expiring timers.

    C. The cabling distance between the switches is 100 meters.

  • 7/30/2019 ICND 2 full

    25/59

    D. The network diameter must be set to the number of meters of the cable between the root bridge and itsfarthest connected switch.

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 17

    What is the purpose of the Spanning Tree algorithm?

    A. It propagates VLAN configurations to other switches.

    B. It restricts broadcast packets to a single VLAN.

    C. It segments a network into multiple broadcast domains.

    D. It prevents loops in a switched network with redundant paths.

    Answer: D

    Section: (none)

    Explanation/Reference:

    QUESTION 18

    Refer to the exhibit. What is the result of issuing these commands?

    A. The enable password will be set.

    B. The password will be set for the first Telnet connection.

    C. The password will be set for the console connection.

    D. The password will be set for the auxiliary connection.

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 19

  • 7/30/2019 ICND 2 full

    26/59

    Refer to the exhibit. Each switch is shown with its MAC address. Which switch will be elected as the spanning-tree root bridge if the switches are configured with their default priority values?

    A. switch A

    B. switch B

    C. switch C

    D. switch D

    E. switch EF. switch F

    Answer: FSection: (none)

    Explanation/Reference:

    QUESTION 20

    Refer to the exhibit. All edge ports are configured with the spanning-tree portfast command. Host1 is recentlyconnected to port Fa0/1 on switch SW1 . Which statement is true about the status of port Fa0/1?

    A. The port will transition into blocking state.

    B. The port will transition immediately into forwarding state.

    C. The port will transition into blocking state and then immediately into forwarding state.

    D. The port will transition into blocking state and immediately transition through the listening and learningstates.

    Answer: BSection: (none)

  • 7/30/2019 ICND 2 full

    27/59

    Explanation/Reference:

    QUESTION 21

    Which statement is correct about STP architecture?

    A. Spanning Tree Protocol will guarantee a loop free Layer 2 topology.

    B. Spanning Tree Protocol guarantees the shortest path to destination networks.

    C. The switch with the highest priority will be assigned the lowest BID in the root election.

    D. The first step in the spanning-tree election process is to determine the root port.

    E. To select designated ports, the spanning-tree algorithm must determine the longest contiguous path fromthe root bridge.

    Answer:ASection: (none)

    Explanation/Reference:

    QUESTION 22

    Refer to the exhibit. All switches are configured with the default bridge priority. Which port will act as a non-designated port if all links are operating at the same bandwidth?

    A. Fa0/1 interface of switch A

    B. Fa0/2 interface of switch A

    C. Fa0/1 interface of switch B

    D. Fa0/2 interface of switch B

    E. Fa0/1 interface of switch C

    F. Fa0/2 interface of switch C

    Answer:ASection: (none)

    Explanation/Reference:

  • 7/30/2019 ICND 2 full

    28/59

    QUESTION 23

    Refer to the exhibit. Which Spanning Tree Protocol version is in effect?

    A. Per VLAN Spanning Tree (PVST)

    B. Per VLAN Spanning Tree + (PVST+)

    C. Common Spanning Tree (CST)

    D. Rapid Spanning Tree Protocol (RSTP)

    E. Multiple Spanning Tree Protocol (MSTP)

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 24

  • 7/30/2019 ICND 2 full

    29/59

    Refer to the exhibit. Each switch is configured to participate in STP for VLANs 1, 10, 20, and 30. Which switchwill become the root for VLAN 20?

    A. A

    B. B

    C. C

    D. D

    Answer:

    Section: (none)

    Explanation/Reference:

    QUESTION 25

  • 7/30/2019 ICND 2 full

    30/59

    Refer to the exhibit. R1 is configured for traditional inter-VLAN routing. R1 can ping computer 3 but cannot pingcomputer 1. What is a possible cause for this failure?

    A. S1 port Fa0/11 is in the wrong VLAN.

    B. R1 does not have an active routing protocol.

    C. The IP address of computer 1 is in the wrong logical network.

    D. Router interface Fa0/0 has the wrong trunk encapsulation type configured.

    Answer:ASection: (none)

    Explanation/Reference:

    QUESTION 26

    What is an efficient and cost effective way to minimize the frequency and effects of broadcast storms on anEthernet LAN?

    A. Connect each PC directly to a router port.

    B. Use access control lists to filter broadcasts from the network.

    C. Divide the computers into separate VLANs on the existing switches.

    D. Divide the computers into separate workgroups using different physical switches.

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 27

  • 7/30/2019 ICND 2 full

    31/59

    Refer to the exhibit. What would happen if the network administrator moved the network cable of Host A frominterface Fa0/1 to Fa0/3 on switch SW1?

    A. Host A remains a member of VLAN 10, because the router is routing traffic between VLANs.

    B. Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30.

    C. Host A remains a member of VLAN 10, because the switch provides dynamic VLAN assignment for the

    port.D. Host A maintains connectivity to all members of VLAN 10, because it is connected to the same physical

    network.

    E. Host A is no longer a member of VLAN 10, but because port Fa0/3 was unused, it is now a member ofVLAN 1.

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 28

  • 7/30/2019 ICND 2 full

    32/59

    Refer to the exhibit. What is the maximum number of VLANs that can be deleted from the Switch as it isconfigured?

    A. zero

    B. four C. five

    D. eight

    E. nine

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 29

  • 7/30/2019 ICND 2 full

    33/59

    Refer to the exhibit. Router R1 is properly configured for router on a stick inter-VLAN routing, but PC1 is unableto ping PC2. What needs to be done to resolve the problem?

    A. Rename VLAN1.

    B. Connect one more port of S1 to R1.

    C. Configure the Fa0/1 port of S1 as a trunk port.

    D. Move the Fa0/0 interface of R1 to another VLAN.

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 30

  • 7/30/2019 ICND 2 full

    34/59

    Refer to the exhibit. A network administrator has segmented the network into two VLANs and configuredRouter1 for inter-VLAN routing. A test of the network, however, shows that hosts on each VLAN can onlyaccess local resources and not resources on the other VLAN. What is the most l ikely cause of this problem?

    A. Switch port Fa0/1 is not trunking.B. Router interface Fa0/0 is possibly down.

    C. No routing protocol is configured on Router1.

    D. One of the router subinterfaces is possibly down.

    Answer:ASection: (none)

    Explanation/Reference:

    QUESTION 31

  • 7/30/2019 ICND 2 full

    35/59

    Refer to the exhibit. Hosts that are connected to switch SW1 are not able to communicate with hosts in thesame VLAN that are connected to switch SW2. What should be done to fix the problem?

    A. Introduce a Layer 3 device in the topology.

    B. Configure both switches in VTP transparent mode to allow them to share VLAN information.

    C. Reconfigure the fa0/1 interface on switch SW1 with a static trunk configuration.

    D. Apply IP addresses that are in the same subnet to FastEthernet 0/1 on SW1 and FastEthernet 0/2 on SW2.

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 32What is the purpose of VLAN trunking?

    A. It improves network performance by reducing broadcast traffic.

    B. It selects the best path to transmit data in a switched network.

    C. It carries the traffic of multiple VLANs through a single link.

    D. It avoids spanning tree loops in a switched network.

    Answer: C

  • 7/30/2019 ICND 2 full

    36/59

    Section: (none)

    Explanation/Reference:

    QUESTION 33

    Refer to the exhibit. Router R-West and switch S-West1 are connected via a single ethernet cable between the

    router interface fa0/0 and the switch interface fa0/1. The router and switch have been configured with thecommands that are displayed in the exhibit. The network administrator enters the show interfaces trunkcommand and receives the output as shown. What is the cause of the not-trunking status for switch portFa0/1?

    A. The trunk is established, but no VLANs have been configured to use it.

    B. The router is missing the dynamic trunking protocol statements necessary to form a trunk.

    C. Because the router does not support Dynamic Trunking Protocol, the trunk has not been established.

    D. The router, the switch, or both must be configured with the dynamic desirable option for Dynamic TrunkingProtocol to establish a trunk.

    Answer: C

    Section: (none)

    Explanation/Reference:

    QUESTION 34

  • 7/30/2019 ICND 2 full

    37/59

    Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and host B are on the defaultVLAN but are not able to exchange traffic. What should be done to fix the problem?

    A. Allow all VLANs on the trunk link.

    B. Remove the native VLAN from the trunk.

    C. Include a router or switch with Layer 3 capabilities.

    D. Configure the same native VLAN on both ends of the trunk.

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 35

  • 7/30/2019 ICND 2 full

    38/59

    Refer to the exhibit. If switch SW1 is configured with the four VLANs as shown in the exhibit, how manyphysical interfaces are needed on router R1 to configure inter-VLAN routing using subinterfaces?

    A. 0B. 1

    C. 2

    D. 4

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 36

    Refer to the exhibit. A new host needs to be connected to VLAN 3. Which IP address should be assigned tothis new host?

    A. 192.168.1.22 /28

    B. 192.168.1.31 /28

    C. 192.168.1.32 /28

    D. 192.168.1.52 /28

    E. 192.168.1.63 /28

  • 7/30/2019 ICND 2 full

    39/59

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 37

    Refer to the exhibit. Which three options correctly describe the router configuration that is shown? (Choosethree.)

    A. An IEEE standard trunking protocol is in use.

    B. Interface Fa0/1 has been configured with subinterfaces.

    C. The shutdown command has been applied to interface Fa0/1.

    D. Interface Fa0/1.3 is mapped to the default management VLAN.

    E. The configuration is appropriate for a router-on-a-stick network design.

    F. An IP address should be applied to interface Fa0/1 for routing to occur.

    Answer:ABESection: (none)

    Explanation/Reference:

    QUESTION 38

  • 7/30/2019 ICND 2 full

    40/59

    Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destinationaddress of 192.168.1.161. What will the router do with this packet?

    A. The router will drop the packet.

    B. The router will forward the packet out interface FastEthernet 0/1.1.

    C. The router will forward the packet out interface FastEthernet 0/1.2.

    D. The router will forward the packet out interface FastEthernet 0/1.3.

    E. The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.

    Answer:ASection: (none)

    Explanation/Reference:

    QUESTION 39

  • 7/30/2019 ICND 2 full

    41/59

    Refer to the exhibit. Which two statements are true about the operation of the interfaces? (Choose two.)

    A. Incoming traffic with VLAN ID 0 is processed by interface fa0/0.

    B. Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.C. Both subinterfaces remain up with line protocol up, even if fa0/0 line protocol is down.

    D. Subinterfaces use unique MAC addresses by adding the 802.1Q VLAN ID to the hardware address.

    E. Traffic inbound on this router is processed by different subinterfaces, depending on the VLAN from whichthe traffic originated.

    Answer: BESection: (none)

    Explanation/Reference:

    QUESTION 40

    In which mode is a VTP switch operating if it has been configured to only forward VTP advertisements?

    A. client

    B. root

    C. server

    D. transparent

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 41

  • 7/30/2019 ICND 2 full

    42/59

    Refer to the exhibit. Switches S2 and S3 are properly connected using an ethernet cable. A networkadministrator has configured both switches with VTP, but S3 is unable to propagate VLANs to S2. What couldbe the reason for this?

    A. The VTP configuration revision is different on both switches.

    B. The VTP domains are different on both switches.

    C. VTP pruning is disabled.D. VTP v2 is disabled.

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 42

    Which configuration changes will increment the configuration revision number on the VTP server?

    A. configuring trunk links on the VTP serverB. configuring or changing the VTP password

    C. configuring or changing the VTP domain name

    D. configuring or changing the VTP version number

    E. configuring or deleting a VLAN or creating a VLAN name

    Answer: ESection: (none)

  • 7/30/2019 ICND 2 full

    43/59

    Explanation/Reference:

    QUESTION 43

    Refer to the exhibit. Switch SW2 was tested in a lab environment and then inserted into a production networkwithout reloading its configuration. After the trunk link between SW1 and SW2 was brought up, all users lostconnectivity to the network. What could be the source of the problem?

    A. All the VLANs were pruned from the trunk port between SW1 and SW2.

    B. SW1 and SW2 cannot be both set as VTP servers in the same VTP domain

    C. VTP configuration revision number of SW2 was higher than the configuration revision number of SW1.

    D. The additional VLANs from SW2 created more VLANs than the VLAN database of SW1 could contain.

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 44

  • 7/30/2019 ICND 2 full

    44/59

    Refer to the exhibit. The network administrator is planning five additional VLANs to be shared throughout theVTP domain on S3. What action should the administrator take before creating the additional VLANs?

    A. Create the VLANs on a switch in VTP server mode and allow them to propogate to the other switches in thedomain.

    B. Modify the configuration revision to 10 to support the additional VLANs.C. Enable the VTP pruning mode in order to create the VLANs on S3

    D. Enable the VTP v2 mode.

    Answer:ASection: (none)

    Explanation/Reference:

    QUESTION 45

    Refer to the exhibit. What does FORWARDING mean in the command output shown?

    A. The switch is sending and receiving data frames.

    B. The switch is receiving BPDUs, but not sending data frames.

    C. The switch is participating in an election process by forwarding the BPDUs it receives.

    D. The switch is receiving BPDUs and populating the MAC address table, but not sending data.

  • 7/30/2019 ICND 2 full

    45/59

    Answer:ASection: (none)

    Explanation/Reference:

    QUESTION 46Which parameter is used to uniquely identify one wireless network from another?

    A. SSID

    B. OFDM

    C. WEP

    D. DSSS

    Answer:ASection: (none)

    Explanation/Reference:

    QUESTION 47

    Why is MAC address filtering considered a poor choice in securing a WLAN?

    A. Available bandwidth is reduced.

    B. MAC addresses are easily spoofed.

    C. APs are more susceptible to DoS attacks.

    D. The payload encryption is easily broken.

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 48

    Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installation surveysshowed strong signal strength from the AP locations to the client locations. Outside electrical interference hasbeen eliminated. What will fix the problem?

  • 7/30/2019 ICND 2 full

    46/59

    A. Relocate the APs closer to each other.

    B. Increase the distance between the clients.

    C. Change the channel on AP-B to 6 or 11.

    D. Place AP-A and AP-B on the same wireless channel.

    Answer: CSection:

    (none)

    Explanation/Reference:

    QUESTION 49

    Which combination is required to establish a connection to initially configure the Linksys WRT300N wirelessaccess device?

    A. a computer with a console connection to the WRT300N

    B. a computer with a wireless connection to the WRT300N

    C. a computer with an AUX port connection to the WRT300N

    D. a computer configured in the same IP subnet as the WRT300N and a direct cable connection to it

    Answer:

    Section: (none)

    Explanation/Reference:

    QUESTION 50

    A wireless access point can function as which type of shared medium, wired LAN device?

    A. hub

    B. switch

    C. router

    D. gateway

    Answer:ASection: (none)

    Explanation/Reference:

    QUESTION 51

    What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?

    A. only the management VLAN

    B. all VLANs except the extended range VLANs

    C. all VLANs except 1 and 1002-1005

    D. all VLANs

    Answer: DSection: (none)

  • 7/30/2019 ICND 2 full

    47/59

    Explanation/Reference:

    QUESTION 52

    A wireless client is attempting to establish a connection with a wireless access point. What process does theclient use to discover the access points which are available to it?

    A. probing

    B. beaconing

    C. association

    D. authentication

    Answer:ASection: (none)

    Explanation/Reference:

  • 7/30/2019 ICND 2 full

    48/59

    Exam C

    QUESTION 1

    A network administrator can ping the Perth router, but gets a Password Required but None Set message whentrying to connect remotely via Telnet. Which command sequence must be applied to the Perth router to allowremote access?

    A. Router(config)# line console 0Router(config-line)# loginRouter(config-line)# password cisco

    B. Router(config)# line vty 0 4Router(config-line)# loginRouter(config-line)# password cisco

    C. Router(config)# line virtual terminalRouter(config-line)# enable loginRouter(config-line)# password cisco

    D. Router(config)# line vty 0 4Router(config-line)# enable secretRouter(config-line)# password cisco

    E. outer(config)# enable secret cisco

    Router(config)# enable cisco

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 2

    When Frame Relay encapsulation is used, what feature provides flow control and exchanges information aboutthe status of virtual circuits?

    A. LCP

    B. LMI

    C. DLCI

    D. Inverse ARP

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 3

    Refer to the exhibit. What is the meaning of the term dynamic in the output of the command?

    A. The bandwidth capability of the interface increases and decreases automatically based on BECNs

  • 7/30/2019 ICND 2 full

    49/59

    B. The Serial0/0/1 interface acquired 172.16.3.1 from a DHCP server.

    C. The mapping between DLCI 100 and 172.16.3.1 was learned through Inverse ARP.

    D. DLCI 100 will automatically adapt to changes in the Frame Relay cloud.

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 4

    Refer to the exhibit. Every time the administrator reboots this router, the boot process ends in setup

    mode. What is a possible problem?

    A. There is insufficient RAM for the IOS to load on this router.

    B. A password recovery process should be done on this router.

    C. The bootstrap version and the version of the IOS are different.

    D. The IOS image is damaged and must be reloaded using tftpdnld.

    E. The configuration register is set to ignore the startup configuration.

    Answer: ESection: (none)

    Explanation/Reference:

    QUESTION 5

  • 7/30/2019 ICND 2 full

    50/59

    Refer to the exhibit. R1 is performing NAT overload for the 10.1.1.0/24 inside network. Host A has sent a

    packet to the web server. What is the destination IP address of the return packet from the web server?

    A. 10.1.1.2:1234

    B. 172.30.20.1:1234

    C. 172.30.20.1:3333D. 192.168.1.2:80

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 6

    Which option correctly defines the capacity through the local loop guaranteed to a customer by the

    service provider?

    A. BE

    B. DE

    C. CIR

    D. CBIR

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 7

  • 7/30/2019 ICND 2 full

    51/59

    Refer to the exhibit. A host connected to Fa0/0 is unable to acquire an IP address from the DHCP

    server. The output of the debug ip dhcp server command shows DHCPD: there is no address pool for

    10.1.1.1. What is the problem?

    A. The 10.1.1.1 address is already configured on Fa0/0.

    B. The default router for the 10Network pool is incorrect.

    C. The ip helper-address must be added to Fa0/0 interface.

    D. The pool of addresses for the 10Network pool is incorrect.

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 8

    Which data link layer encapsulation protocol is used by default for serial connections between two

    Cisco routers?

    A. ATM

    B. Frame Relay

    C. HDLC

    D. PPP

    E. SDLC

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 9

  • 7/30/2019 ICND 2 full

    52/59

    Refer to the exhibit. Which statement correctly describes how Router1 processes an FTP request that

    enters interface s0/0/0 and is destined for an FTP server at IP address 192.168.1.5?

    A. The router matches the incoming packet to the statement that was created by the access-list 201 deny icmp192.168.1.0 0.0.0.255 any command, continues comparing the packet to the remaining statements in ACL201 to ensure that no subsequent statements allow FTP, and then the router drops the packet.

    B. The router reaches the end of ACL 101 without matching a condition and drops the packet because there isno statement that was created by the access-list 101 permit ip any any command.

    C. The router matches the incoming packet to the statement that was created by the access-list 101 permit ipany 192.168.1.0 0.0.0.255 command and allows the packet into the router.

    D. It matches the incoming packet to the statement that was created by the access-list 201 permit ip any anycommand and allows the packet into the router.

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 10

    Which three guidelines would help contribute to creating a strong password policy? (Choose three.)

    A. Once a good password is created, do not change it.B. Deliberately misspell words when creating passwords.

    C. Create passwords that are at least 8 characters in length.

    D. Use combinations of upper case, lower case, and special characters.

    E. Write passwords in locations that can be easily retrieved to avoid being locked out.

    F. Use long words found in the dictionary to make passwords that are easy to remember.

    Answer: BCDSection: (none)

  • 7/30/2019 ICND 2 full

    53/59

    Explanation/Reference:

    QUESTION 11

    Compared with IDS systems, what can IPS systems do to provide further protection of computer

    systems?

    A. detect potential attacks

    B. stop the detected attack from executing

    C. update OS patches for computer systems

    D. scan computer systems for viruses and spyware

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 12

    Which IEEE 802.16 broadband wireless technology allows users to connect to the ISP at speeds

    comparable to DSL and cable?

    A. Wi-Fi

    B. satellite

    C. WiMAX

    D. Metro Ethernet

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 13

    A network administrator has changed the VLAN configurations on his network switches over the past

    weekend. How can the administrator determine if the additions and changes improved performance

    and availability on the company intranet?

    A. Conduct a performance test and compare with the baseline that was established previously.

    B. Interview departmental secretaries and determine if they think load time for web pages has improved.

    C. Determine performance on the intranet by monitoring load times of company web pages from remote sites.D. Compare the hit counts on the company web server for the current week to the values that were recorded in

    previous weeks.

    Answer:ASection: (none)

    Explanation/Reference:

  • 7/30/2019 ICND 2 full

    54/59

    QUESTION 14

    Which type of ACL will permit traffic inbound into a private network only if an outbound session has

    already been established between the source and destination?

    A. extended

    B. reflexive

    C. standard

    D. time-based

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 15

    A router does not load its configuration after a power failure. After running the show startup-

    configuration command, the adminstrator finds that the original configuration is intact. What is the

    cause of this problem?

    A. The configuration register is set for 02100.

    B. The configuration register is set for 02101.

    C. The configuration register is set for 02102.

    D. The configuration register is set for 02142.

    E. Boot system commands are not configured.

    F. Flash memory is empty causing the router to bypass the configuration in NVRAM

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 16

  • 7/30/2019 ICND 2 full

    55/59

    Refer to the exhibit. A network administrator is trying to connect R1 remotely to make configuration

    changes. Based on the exhibited command output, what will be the result when attempting to connect

    to R1?

    A. failure to connect due to Telnet not being enabled

    B. failure to connect due to incomplete configuration for Telnet

    C. a successful connection and ability to make configuration changes

    D. a successful connection but inability to make configuration changes because of the absence of an enablesecret password

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 17

    A company is looking for a WAN solution to connect its headquarters site to four remote sites. What

    are two advantages that dedicated leased lines provide compared to a shared Frame Relay solution?

    (Choose two.)

    A. reduced jitter

    B. reduced costs

    C. reduced latency

    D. the ability to burst above guaranteed bandwidth

    E. the ability to borrow unused bandwidth from the leased lines of other customers

    Answer:ACSection: (none)

    Explanation/Reference:

  • 7/30/2019 ICND 2 full

    56/59

    QUESTION 18

    What are two effective measures for securing routers? (Choose two.)

    A. Protect all active router interfaces by configuring them as passive interfaces.

    B. Configure remote administration through VTY lines for Telnet access.C. Use quotes or phrases to create pass phrases.

    D. Disable the HTTP server service.

    E. Enable SNMP traps.

    Answer:ABSection: (none)

    Explanation/Reference:

    QUESTION 19Which two statements are true about IPv6 link local addresses? (Choose two.)

    A. They begin with the 2000::/3 prefix.

    B. They begin with the FE80::/10 prefix.

    C. They are assigned by IANA to an organization.

    D. They must be manually configured by the administrator.

    E. They are assigned to a host by a stateless autoconfiguration process.

    Answer:ACSection: (none)

    Explanation/Reference:

    QUESTION 20

    An issue of response time has recently arisen on an application server. The new release of a software

    package has also been installed on the server. The configuration of the network has changed recently.

    To identify the problem, individuals from both teams responsible for the recent changes begin to

    investigate the source of the problem. Which statement applies to this situation?

    A. Scheduling will be easy if the network and software teams work independently.

    B. It will be difficult to isolate the problem if two teams are implementing changes independently.

    C. Results from changes will be easier to reconcile and document if each team works in isolation.

    D. Only results from the software package should be tested as the network is designed to accommodate theproposed software platform.

    Answer: BSection: (none)

    Explanation/Reference:

  • 7/30/2019 ICND 2 full

    57/59

    QUESTION 21

    Refer to the exhibit. From the output of the show interfaces and ping commands, at which layer of the

    OSI model is a fault indicated?

    A. application

    B. transport

    C. network

    D. data link

    E. physical

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 22

    A network administrator is tasked with maintaining two remote locations in the same city. Both

    locations use the same service provider and have the same service plan for DSL service. When

    comparing download rates, it is noticed that the location on the East side of town has a faster

    download rate than the location on the West side of town. How can this be explained?

    A. The West side has a high volume of POTS traffic.

    B. The West side of town is downloading larger packets.

    C. The service provider is closer to the location on the East side.

    D. More clients share a connection to the DSLAM on the West side.

    Answer: CSection: (none)

  • 7/30/2019 ICND 2 full

    58/59

    Explanation/Reference:

    QUESTION 23

    Where does a service provider assume responsibility from a customer for a WAN connection?

    A. local loopB. DTE cable on router

    C. demarcation point

    D. demilitarized zone

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 24

    Which technology is used to dynamically map next hop, network layer addresses to virtual circuits in a

    Frame Relay network?

    A. Inverse ARP

    B. LMI

    C. DLCI

    D. FECN

    Answer:ASection: (none)

    Explanation/Reference:

    QUESTION 25

    An administrator learns of an e-mail that has been received by a number of users in the company. This

    e-mail appears to come from the office of the administrator. The e-mail asks the users to confirm their

    account and password information. Which type of security threat does this e-mail represent?

    A. cracking

    B. phishing

    C. phreaking

    D. spamming

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 26

  • 7/30/2019 ICND 2 full

    59/59

    Refer to the exhibit. Results of the show vlan and show vtp status commands for switches S1 and S2

    are displayed in the exhibit. VLAN 11 was created on S1. Why is VLAN 11 missing from S2?

    A. There is a Layer 2 loop.

    B. The VTP domain names do not match.

    C. Only one switch can be in server mode.

    D. S2 has a higher spanning-tree priority for VLAN 11 than S1 does.

    Answer: BSection: (none)

    Explanation/Reference: