Docstoc

Take Assessment CCNP BCMSN Final _Version 5.0_

Document Sample
Take Assessment CCNP BCMSN Final _Version 5.0_ Powered By Docstoc
					           Take Assessment CCNP BCMSN Final 3 (Version 5.0)
1.   In a bridged environment, which protocol provides subsecond reconvergence of blocked bridging loops
     after the failure of one of the uplinks?
     IEEE 802.1Q (CST)
     IEEE 802.1w (RSTP)
     Cisco PVST+
     IEEE 802.1D (STP)

2.   What are three benefits of end-to-end VLANs? (Choose three.)
     Traffic from a given VLAN can be assigned a higher or lower priority throughout a Campus.
     Layer-2 failures are isolated to a small subset of users.
     VLAN membership remains the same as the user moves throughout a Campus.
     Problem isolation and resolution are expedited within the switch block.
     Traffic can traverse multiple switches without being routed.
     High availability results from a deterministic traffic flow and a finite failure domain.




3.
Refer to the exhibit. Which statement is true, given the output generated by the show interfaces fastethernet
     0/1 switchport command?
     Interface Fa0/1 is configured for ISL trunking.
     Interface Fa0/1 is configured as an access port.
     Interface Fa0/1 is configured as an SVI.
     Interface Fa0/1 is configured for 802.1Q trunking.

4.   A network administrator wants to prevent users from adding additional devices to the switchport they
     are currently connected to. Which Cisco Catalyst feature will accomplish this?
     MAC filtering
     port security
     MAC access lists
     port-based authentication
     port-based access lists

5.   Which three statements are benefits of local VLANs in the Enterprise Composite Model? (Choose three.)
     deterministic traffic flow expediting problem isolation and resolution within the switch block
     ease of management since local VLANs are typically confined to the Building Access submodule
     high availability since redundant paths exist at all infrastructure levels
     broad expansion domain since the number of devices on each VLAN can easily be added to
     IP address conservation since address blocks can be allocated to VLANs
     wide coverage since a VLAN can be geographically dispersed throughout the network



Note: Module not for cheating. This is use to practice for your course                                          1
           Take Assessment CCNP BCMSN Final 3 (Version 5.0)
6.   Which two statements describe Cisco best practices for VLAN design? (Choose two.)
     Local VLANs should extend no further than the local core router.
     Local VLANs should extend no further than the local distribution-layer switch.
     Local VLANs eliminate the need for redundant access to distribution-layer links.
     Local VLANs provide a simpler design that is easier to troubleshoot.

7.   Which three statements regarding RSTP are true? (Choose three.)
     An RSTP BPDU carries information about port roles and is sent to neighbor switches only.
     RSTP elects a root bridge in exactly the same way as 802.1D.
     RSTP is capable of reverting back to 802.1D while still maintaining the benefits of 802.1w.
     RSTP is recognized as the IEEE 802.1w standard.
     There are only three RSTP port states: discarding, listening, and forwarding.
     UplinkFast and BackboneFast are compatible with RSTP.

8.   Which statement is true about the Spanning-Tree Protocol (STP)?
     Each switch determines a designated port that provides the best path to the root switch.
     The designated port will be on the switch with the best path to the root switch.
     With each network change, the STP algorithm is run on all switches that have a root port.
     A topology change will cause the switch where the change occurred to send messages throughout the
         tree regarding the topology change.

9.   Which statement is true about UDLD?
     It is automatically enabled.
     It allows devices to transmit traffic one way.
     It allows a switch to detect a unidirectional link and shut down the affected interface.
     It will disable an EtherChannel bundle if one link has failed.

10. What is a best practice when implementing failover strategies at the access and distribution layers?
    Align failover timers between STP and HSRP.
    Enable ICMP redirects with the ip redirects command on interfaces that are involved with HSRP.
    Disable RSTP on all access and distribution switches.
    Span VLANs across all switches or switch stacks for fault redundancy.




11.
Refer to the exhibit. What statement is true concerning the output of the show standby command?
     The current priority of this router is 120.
     The router is currently forwarding packets.
     This router is tracking two properly operating interfaces.
     This router is in the HSRP down state because its tracked interfaces are down.




Note: Module not for cheating. This is use to practice for your course                                     2
           Take Assessment CCNP BCMSN Final 3 (Version 5.0)




12.
Refer to the exhibit. What action does the command standby 1 track Serial0 on router R1 perform?
     It links the default gateway virtual address 192.168.21.10 to the IP address 192.168.31.1 on interface
     Serial 0.
     It links the default gateway virtual address 192.168.21.10 to the IP address 192.168.42.2 on interface
     Serial 0.
     It links the HSRP process to multi-homed BGP on R1 and R2.
     It tracks the state of the Serial 0 interface and brings down the priority of standby group 1 if the
     interface goes down.
     In the event of an outage on interface Serial 0, this command triggers route-map HSRP on router R2,
     appending AS 100 to the BGP updates sent to AS 400, to make it a backup for the ISP-A to R1 path.
     In the event of an outage on interface Serial 0, this command triggers route-map HSRP on router R2,
     appending AS 100 to the BGP updates sent to AS 400, to make it a backup for the ISP-B to R2 path.

13. Which of the following is true regarding the 3550 switch command shown below?
    CAT3550(config-if)# ip route-cache cef
    globally enables CEF switching
    enables CEF to be enabled by default on the switch
    disables process switching on the interface
    required if CEF has been previously disabled on an interface




Note: Module not for cheating. This is use to practice for your course                                        3
             Take Assessment CCNP BCMSN Final 3 (Version 5.0)




14.
      Refer to the exhibit. Which command can be used to identify the nine adjacencies referred to in the
           exhibit?
       show ip cef *
       show adjacency detail
       show mls entry cef ip
       show arp

15. What are two benefits of implementing VLANs on a switched network? (Choose two.)
    VLANs enable all users on the network to communicate with each other without restriction.
    VLANs create a single broadcast domain for all the users of a switched network.
    VLANs break up broadcast domains within an organization.
    Communication between VLANs requires use of Layer 2 devices.
    VLANs do not require additional management to control the traffic over the network.
    VLANs separate the systems with sensitive data from the rest of the network to provide security.




16.
Refer to the exhibit. A network administrator is reviewing a customer trouble ticket containing the output
     displayed in the exhibit. What command would generate this output?
     show arp | include port security
     show mac-address-table | include port security
     show privilege | include port security
     show dot1x interface
     show port-security interface
     show class-map | include security




Note: Module not for cheating. This is use to practice for your course                                       4
            Take Assessment CCNP BCMSN Final 3 (Version 5.0)




17.
      Refer to the exhibit. Switch2 is not receiving updated VLAN information from Switch1. What is the
      problem?
      The VTP domains are different.
      The VTP modes are different.
      The VTP passwords are different.
      Switch2 is in server mode.
      Switch2 is in client mode.
      Switch2 is in transparent mode.




18.
Refer to the exhibit. Switch Sw_F recently joined the network. What will happen once STP has finished its
     convergence?
     Switch Sw_F will take over the root bridge role from switch Sw_C.
     Switch Sw_F will take over the root bridge role from switch Sw_D.
     Switch Sw_C will remain the root bridge.
     Switch Sw_D will remain the root bridge.
     Switch Sw_F will become the backup root bridge.
     Switch Sw_C will become the backup root bridge.

19. A network administrator is tasked with protecting a server farm by implementing Private VLANs. A server
    is only allowed to communicate with its default gateway and other related servers. Which type of PVLAN
    should be configured on the switch ports connecting the servers?
    isolated
    promiscuous
    ISL
    community
    802.1Q


Note: Module not for cheating. This is use to practice for your course                                      5
           Take Assessment CCNP BCMSN Final 3 (Version 5.0)




20.
Refer to the exhibit. Switch A is the root switch. The port on Switch A that connects to Switch B is half duplex.
The port on Switch B that connects to Switch A is full duplex. What are three problems that this scenario
could create? (Choose three.)
     Switch A is performing carrier sense and collision detection, while Switch B is not.
     Autonegotiation results in both Switch A and Switch B failing to perform carrier sense.
     Switch B will become the root switch.
     BPDUs may not successfully negotiate the link between Switch A and Switch B.
     Switch B may unblock its port to Switch C, thereby creating a loop.
     Spanning-tree will keep re-calculating, consuming all the CPU normally used for traffic.

21. Which two statements are true about the RSTP negotiations between switches? (Choose two.)
    UplinkFast must be configured on all designated switches.
    BackboneFast must be configured on all root switches.
    Switches must be connected by a point-to-point link.
    All ports that are directly connected to end stations must be enabled as designated ports.
    All ports connected to end stations must be configured as edge ports.

22. Which wireless data technology is used for WLANs?
    spread spectrum
    narrowband
    personal communication system (PCS)
    3G
    microwave
    cellular

23. Which of the following agencies tests and certifies the interoperability of wireless equipment with the
    IEEE 802.11a, 802.11b, and 802.11g standards?
    FCC
    ANSI
    WiFi
    IEEE
    ETSI
    ISO

24. What is used to separate WLANs logically and is also used as a name for a wireless cell?
    BSS
    IBSS
    SSID
    VLAN
    VLAN ID
    WVLAN ID



Note: Module not for cheating. This is use to practice for your course                                              6
            Take Assessment CCNP BCMSN Final 3 (Version 5.0)
25. Which IP address, username, and password must be used when initially configuring a Cisco 4400 Series
    WLAN controller using a Web browser?
    192.168.1.1/24, Username: admin, Password: (none)
    192.168.1.1/24, Username: admin, Password: admin (esta es la respuesta correcta)
    192.168.1.1/24, Username: Cisco, Password: cisco (esta es la respuesta que aparece en cisco como
    correcta.)
    192.168.2.1/24, Username: admin, Password: (none)
    192.168.2.1/24, Username: admin, Password: admin
    192.168.2.1/24, Username: Cisco, Password: cisco

26. What are two responsibilities of the standby router in an HSRP group? (Choose two.)
    to quickly assume packet-forwarding responsibility if the active router becomes inoperable.
    to respond to traffic for the virtual router.
    to reply with the virtual router MAC address in the event an SRP request is received.
    to monitor the operational status of the HSRP group.




27.
      Refer to the exhibit. Switch DSw1 is the Active Virtual Gateway (AVG) and DSw2 is an Active Virtual
      Forwarder (AVF). Based on this information, which two GLBP statements are true? (Choose two.)
      GLBP is a Cisco proprietary protocol and is supported on all Cisco Catalyst and Cisco router platforms.
      None of the switches have had their priority configured.
      Switch DSw1 assigns the virtual IP addresses to switch DSw2.
      Switch DSw2 has been configured with the glbp 1 priority 95 command.
      Two more multilayer switches could join this group.
      When Host A sends an ARP message for the gateway IP address, switch DSw1 returns the physical MAC
      address of switch DSw2.

28. Which statement is true about the configuration of voice VLANs?
    Static secure MAC addresses can be configured in conjunction with voice VLANs.
    PortFast is automatically enabled when voice VLANs are configured.
    PortFast must be manually configured when voice VLANs are configured.
    Voice VLANs are typically configured on uplink ports.




Note: Module not for cheating. This is use to practice for your course                                          7
            Take Assessment CCNP BCMSN Final 3 (Version 5.0)




29.                                                                                         Refer to the exhibit.
      Based on the outputs displayed, what will happen when Switch2 joins the VTP
      domain?
      Switch2 will negotiate to become the VTP server.
      Switch1 will learn all VLAN information from Switch2 because Switch2 is the VTP client.
      Switch2 will learn all VLAN information from Switch1 because Switch1 is the VTP server.
      Switch1 will overwrite the Switch2 VLAN database.
      Switch2 will overwrite the Switch1 VLAN database.

30. A switch is configured as a VTP client and then connected to the rest of the network. The instant the
    trunk link is brought up to the rest of the network, the whole network goes down. What could have
    happened?
    The switch was inserted into the network using an incorrect VTP domain name.
    The switch should have been placed into VTP Transparent Mode prior to being inserted into the network.
    The switch should have been placed into VTP Server Mode in order to correctly propagate the new VLAN
    information.
    The configuration revision number of the inserted switch was higher than the configuration revision
    of the VTP domain.
    The configuration revision number of the inserted switch was lower than the configuration revision of
        the VTP domain.

31. Which two statements about designing an STP topology are true? (Choose two.)
    The physical topology can be misleading. Therefore, the traceroute command should be used to reveal
    the Layer 2 topology.
    Assuming that all switches have the same default priority value, the STP root will be the switch with the
    highest MAC address.
    Assuming that all switches have the same default priority value, the STP root will be the switch with the
    lowest MAC address.
    Switches that provide access ports for server farms or the Internet gateway should be configured with
        the lowest bridge priority numerical value.
    Switches that provide access ports for server farms or the Internet gateway should be configured with
        the highest bridge priority numerical value.
    Switches that provide access ports for server farms or the Internet gateway should be configured with a
    bridge priority numerical value of 32768.




Note: Module not for cheating. This is use to practice for your course                                          8
           Take Assessment CCNP BCMSN Final 3 (Version 5.0)




32.
In the figure above, users connected to Switch D have reported symptoms of high latency and poor
throughput when connecting to Server A. The network administrator's Layer 2 mapping tool reveals that
traffic from Switch D to Server A uses a suboptimal path through Switch C. What may be causing this
suboptimal path to be chosen?
      Switch B is configured as the STP root.
      Switch C is configured as the STP root.
      Switch D is configured as the STP root.
      UDLD on Switch D has detected a unidirectional link to Switch A.
      UDLD on Switch D has detected a unidirectional link to Switch C.

33. On a switch that has STP enabled, which command can be used to detect a unidirectional link before a
forwarding loop is created?
    spanning-tree portfast on both sides of the link
    spanning-tree rootguard on both sides of the link
    udld enable on both sides of the link
    port protected on both sides of the link




34.
Refer to the exhibit. The network administrator noticed this console message coming from switch SW_C:
UDLD-3-DISABLE: Unidirectional link detected on port 3/8. Port disabled
What could cause this message?
     The UDLD protocol placed port 3/8 on SW_C in a listening state.
     The UDLD protocol shut down port 3/8 on SW_C to prevent a forwarding loop.
     STP placed port 3/8 on SW_C in a blocking state.
     STP shut down port 3/8 on SW_C to prevent a forwarding loop.




Note: Module not for cheating. This is use to practice for your course                                     9
           Take Assessment CCNP BCMSN Final 3 (Version 5.0)




 35.
Refer to the exhibit. Switch SW_A is the root switch. Switch SW_B is the designated switch for the SW_B to
SW_C link. Because of unidirectional link failure on the link between SW_B and SW_C, SW_C is not
receiving BPDUs from SW_B. What symptoms would be associated with the failure of the link?
     The connectivity will be reestablished through the redundant link.
     A console message will report MAC address learning activity on the blocking port.
     The STP blocking port on SW_C will be automatically placed into an ErrDisable state.
     The STP blocking port on SW_C will transition to the forwarding state.
     The STP blocking port on SW_C will remain in blocking state.




36.
Refer to the exhibit. Router RTA has been configured as the active HSRP router. Router RTB is to be the
standby HSRP router. However, once the indicated configuration was applied to router RTB, the console
began to display the message %HSRP-4-DIFFVIP1. What is the cause of the message?
     The command standby preempt should only be configured on the active router.
     The subnet mask is missing from the standby 50 ip 10.1.1.10 command.
     The group number is not the same as the active router.
     The virtual IP address is not the same as the active router.
     The ports on the switch must be configured with the spanning-tree PortFast feature.




Note: Module not for cheating. This is use to practice for your course                                       10
           Take Assessment CCNP BCMSN Final 3 (Version 5.0)




37.
Refer to the exhibit. The indicated configuration was established on the HSRP standby router RTB.
However, the console message %IP-4-DUPADDR started appearing almost immediately on the RTB router.
Given the output of the show standby brief command on RTA, what is the cause of the problem?
     The command standby preempt should only be configured on the active router.
     The subnet mask is missing from the standby ip 10.1.1.1 command.
     The group number 50 is missing in the Router RTB configuration commands.
     The priority number 150 is missing in the Router RTB configuration commands.
     The virtual IP address should be the same as the active router.
     The ports on the switch must be configured with the spanning-tree PortFast feature.

38. Which two requirements should be considered when implementing VLANs in the large campus
environment?(Choose two.)
     STP implementation
     Layer 3 device placement
     flat network topology design
     single broadcast domain design

39. Which two items are recommended when mapping VLANs in an Enterprise Composite Model? (Choose
    two.)
    Associate a VLAN to each building.
    Associate a VLAN to each department.
    Associate a VLAN to each subnet.
    Configure routing between VLANs at the access layer.
    Configure routing between VLANs at the distribution layer.
    Configure routing between VLANs at the core layer.

40. Which protocol should an administrator recommend to manage bridged links when the customer requires
    a fully redundant network that can utilize load balancing technologies and reconverge on link failures in
    less than a second?
    IEEE 802.1Q (CST)
    IEEE 802.1s (MST)
    Cisco PVST+
    IEEE 802.1D(STP)

41. Which protocol is a Cisco-proprietary STP mode that allows CST and PVST to exist on the same network?

Note: Module not for cheating. This is use to practice for your course
    IEEE 802.1w (RSTP)
                                                                                                            11
            Take Assessment CCNP BCMSN Final 3 (Version 5.0)
      IEEE 802.1Q (CST)
      Cisco PVST+
      IEEE 802.1D (STP)

42. Which statement is true about Multiple Spanning Tree (MST) implementations?
    MST provides one instance of spanning tree per VLAN.
    MST provides one instance of spanning tree for all VLANs.
    MST provides a single instance of spanning tree per multiple VLANs.
    MST provides a single MST region for switches with different MST configurations.

43. Which two statements are true regarding the operation of RSTP? (Choose two.)
    An alternate port assumes a forwarding state in a stable, active topology.
    An alternate port is a switch port that offers another path toward the root bridge.
    An edge port only connects to another RSTP switch.
    A switch port participating in the RSTP topology can be defined as a root port, designated port, alternate
    port, backup port, or disabled port.
    A switch port participating in the RSTP topology can be in the blocking, listening, learning, or forwarding
    state.

44. What three fields are included in a BPDU? (Choose three.)
    bridge ID
    STP ID
    port ID
    VLAN ID
    cost of path

 45. An EtherChannel is configured between SW_A and SW_B. The network administrator received a console
message reporting that the ports on SW_B are rapidly learning MAC addresses. What could be the
problem?
     There is underlying network problems such as STP loop and route flapping.
     There is unusually high backplane utilization because of the large number of forwarded frames.
     The EtherChannel on SW_A should be configured in a separate VLAN to stop the broadcast traffic.
     The ports on the EtherChannel on SW_A are not bundled together.
     The EtherChannel on SW_A has encountered a duplex mismatch problem.

46. Which two STP features will protect the network against forwarding loops? (Choose two.)
    PortFast
    UplinkFast
    BackboneFast
    Loop Guard
    Unidirectional Link Detection (UDLD)

47. Which protocol defines a single instance of spanning tree for all VLANs and transmits BPDUs over VLAN 1?
    IEEE 802.1w (RSTP)
    IEEE 802.1Q (CST)
    Cisco PVST+
    IEEE 802.1D (STP)




Note: Module not for cheating. This is use to practice for your course
48.

                                                                                                                  12
            Take Assessment CCNP BCMSN Final 3 (Version 5.0)
      Refer to the exhibit. Traffic sourced from a device on Switch1 leaves on VLAN 10, and the return traffic
      arrives on VLAN 20. What is this an example of?
      an external router using a single trunk for interVLAN routing
      an external router using multiple trunks for interVLAN routing
      an external router using multiple physical interfaces for interVLAN routing
      an external router using multiple physical interfaces for interVLAN switching
      a multilayer switch using multiple trunks for interVLAN routing
      a multilayer switch using multiple trunks for interVLAN switching




49.
      Refer to the exhibit and the partial configuration taken on router RTA. Users on VLAN 5 cannot
      communicate with the users on VLAN 10. What should be done to fix the problem?
      Dynamic routing protocol should be configured on the router.
      Two static routes should be configured on the router pointing to each subnet.
      The subinterfaces of both routers should be configured with ISL encapsulation.
      The subinterfaces of both routers should be configured with 802.1Q encapsulation.
      Fa0/0 interface should be configured with a primary IP address of 10.10.5.1/24 and a secondary IP address
      of 10.10.10.1/24.

50. Which two statements are true regarding switched virtual interfaces (SVI) on a multilayer switch? (Choose
    two.)
    An SVI behaves like a regular router interface but does not support VLAN subinterfaces.
    An SVI is a physical switchport with Layer 3 capability.
    By default, an SVI is created for the default VLAN (VLAN1)
    Only one SVI can be associated with a VLAN.
    To create an SVI requires removal of Layer 2 port functionality with the no switchport interface
    configuration command.

51. Which three statements regarding a routed switch interface are true? (Choose three.)
    A routed switchport is a physical device that is associated with several VLANs.
    A routed switchport is created by configuring a Layer 2 port with the no switchport interface
    configuration command and assigning an IP address.
    A routed switchport is created by entering VLAN interface configuration mode and assigning an IP
    address.
    A routed switchport is a virtual Layer 3 interface that can be configured for any VLAN that exists on a
    Layer 3 switch.
    A routed switchport provides an interface that serves as the default gateway to a router.
    A routed switchport serves as a default gateway for devices out that switch port.



Note: Module not for cheating. This is use to practice for your course
52. Which two statements are true about flooding in a switch? (Choose two.)
                                                                                                              13
           Take Assessment CCNP BCMSN Final 3 (Version 5.0)
    The show mac-address-table can be used to display the flooding statistics.
    Flooding indicates that the content addressable memory (CAM) of the switch is corrupt.
    Flooding may cause STP Topology Change Notification (TCN).
    Flooding may be caused by asymmetric routing.

53. Refer to the exhibit. A network administrator attempts to ping the IP address 172.16.20.1 from RouterA.
    What will the router output be?
    Sending 5, 100-byte ICMP Echos to 172.16.20.1, timeout is 2 seconds:
       !!!!!
    Sending 5, 100-byte ICMP Echos to 172.16.20.1, timeout is 2 seconds:
       .....
    Sending 5, 100-byte ICMP Echos to 172.16.20.1, timeout is 2 seconds:
       U.U.U
    %network or host unreachable, TTL exceeded
    %Unrecognized host or address, or protocol not running
    %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/13, changed state to down




Note: Module not for cheating. This is use to practice for your course                                    14

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:5
posted:12/3/2011
language:English
pages:14