• If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.
Xin chào ! Nếu đây là lần đầu tiên bạn đến với diễn đàn, xin vui lòng danh ra một phút bấm vào đây để đăng kí và tham gia thảo luận cùng VnPro.

Announcement

Collapse
No announcement yet.

SWITCH (642-813): Drag and Drop Questions

Collapse
This is a sticky topic.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • SWITCH (642-813): Drag and Drop Questions

    Question 1:

    Place the DTP mode with its correct description:

    Answer:

    1) Trunk: Set the switch port to trunk mode and negotiate to become a trunk.
    2) Nonegotiate: Specify that the DTP packets are not sent out of this interface.
    3) Access: Set a switch port to permanent nontrunking mode.
    4) Dynamic Auto: Set the switch port to respond, but not actively send DTP frames.
    5) Dynamic Desirable: Make the interface actively attempt to convert the link to a trunk link. (This means the interface is ready to autonegotiate trunking encapsulation and form a trunk link (using DTP) with a neighbor port in desirable, auto, or on mode.)
    Explanation:

    Dynamic Trunking Protocol (DTP) is the Cisco-proprietary that actively attempts to negotiate a trunk link between two switches. Below is the switchport modes (or DTP modes) for easy reference:
Mode Function
Dynamic Auto Creates the trunk based on the DTP request from the neighboring switch.
Dynamic Desirable Communicates to the neighboring switch via DTP that the interface would like
to become a trunk if the neighboring switch interface is able to become a trunk.
Trunk Automatically enables trunking regardless of the state of the neighboring switch
and regardless of any DTP requests sent from the neighboring switch.
Access Trunking is not allowed on this port regardless of the state of the neighboring
switch interface and regardless of any DTP requests sent from the neighboring
switch.
Nonegotiate Prevents the interface from generating DTP frames. This command can be
used only when the interface switchport mode is access or trunk. You must
manually configure the neighboring interface as a trunk interface to establish a
trunk link.

Question 2:


This is a drag and drop question which is about the correct sequence of steps that a wireless client takes during the process of association with an access point (AP). Drag the items to the proper locations.

Answer:


Explanation:

Any wireless client attempting to use the wireless network must first arrange a membership with the AP. Membership with the AP is called an association. The client must send an association request message, and the AP grants or denies the request by sending an association reply message. Once associated, all communications to and from the client must pass through the AP. Clients associate with access points as follows:
1) The client sends a probe request.
2) The AP sends a probe response.
3) The client initiates an association to an AP. Authentication and any other security information is sent to the AP.
4) The AP accepts the association.
5) The AP adds the client’s MAC address to its association table.

Question 3:

Drag and drop question. Drag the items to the proper locations.
Answer:


1) Listening: sends and receives BPDUs to determine root, but does not update the MAC address table.
2) Disabled: does not participate in frame forwarding or in STP.
3) Blocking: does not participate in frame forwarding.
4) Fowarding: sends and receives data frames.
5) Learning: populates the MAC address table, but will not forward user data.
Notice: A port begins its life in a Disabled state, moving through several passive states and, finally, into an active state if allowed to forward traffic.
Question 4

Drag the choices on the left to the boxes on the right that should be included when creating a VLAN-based implementation plan. Not all choices will be used.

Answer:

+ reference to design documents
+ roll back guidelines
+ detailed implementation plans
+ time required to perform the implementation

(In this question we don’t need to sort in the correct order)
Explanation

An implementation plan requires:
+ A description of the task
+ References to design documents
+ Detailed implementation guidelines
+ Detailed rollback guidelines in case of failure
+ The estimated time required for implementation


Question 5

You have a VLAN implementation that requires inter-vlan routing using layer 3 switches. Drag the steps on the left that should be part of the verification plan to the spaces on the right. Not all choices will be used.

Answer:

+ Verify that there is inter-switch connectivity
+ Verify that the data and voice VLANs are NOT assigned a trunk’s native VLAN
+ Verify that the needed Switch Virtual interfaces have been created
+ Verify that the proper ports are assigned to the VLAN
Explanation
“The data and voice VLANs are NOT assigned a trunk’s native VLAN”: Voice VLAN configuration is only supported on switch access ports; voice VLAN configuration is not supported on trunk ports.


Question 6

Match the SNMP versions and associated features

Answer:

v1:
+ get next request
+ unsolicited alert msg
v2:
+ informed request
+ incremental 64 bit of new data

v4:
+ user name
+ security level


Question 7

Categorize the high availability network resource or feature with the management level, network level, or system level used.
Answer:

Management Level:
+ IP SLA responder
+ NTP
Network Level:
+ RSTP
+ NSF
System Level:
+ Dual Power Supplies
+ SSO

Question 8


Match the HSRP states on the left with the correct definition on the right.


Answer:

+ Initial: State from which the router begin the HSRP process
+ Standby: A candidate to become the next active router
+ Learn: The router is still waiting to hear from the active router
+ Active: The router is currently forwarding packets
+ Listen: Listens for hello messages from the active and standby router
+ Speak: Participates in the election for the active or standby router

Question 9

Syslog information can generate messages up to and including the configured severity level. Organize the levels by dragging each name from the left to the right. Put the highest level at the top and lowest at the bottom.

Answer:

1) emergency
2) alert
3) critical
4) error
5) warning
6) notice
7) informational
8) debug

Explanation

The syslog levels and descriptions are listed below:
Code Severity Description
0 Emergency system is unusable (such as an imminent system crash)
1 Alert action must be taken immediately (such as a corrupted system database)
2 Critical Critical conditions (such as a hardware error)
3 Error Error conditions
4 Warning Warning conditions
5 Notice normal but significant condition. It is not an error, but possibly should be handled in a special way
6 Informational Informational message
7 Debug Debug-level message

Question 10


Match the Attributes on the left with the types of VLAN designs on right.

Answer:

End-to-End VLANs:
+ As a user moves through a campus, the VLAN membership of the user remains the same, regardless of the physical switch this user attaches to.
+ Users are grouped into each VLAN regardless of the physical locations.

Local VLANs:
+ Create with Physical boundaries in mind rather then the departments or organization of the users on the devices.
+ VLANs on one switch are not advertised to all other switches in the network, nor do they need to be created in the VLAN database of any other switch.


Question 11

You have been tasked with planning a VLAN solution that will connect a seiver in one buliding to several hosts in another building. The solution should be built using the local vlan model and layer 3 switching at the distribution layer. Identify the questions related to this vlan solution that would ask the network administrator before you start the planning by dragging them into the target zone one the right. Not all questions will be used.
Answer:

+ Is there inter-switch connectivity?
+ What routing protocol will be used?
+ What VLANs are available on each switch?
+ What switch ports are available in each building?
+ What IP addresses are available on each subnet?


Question 12

Answer:

Local vlan:
+ 20/80 rule
+ leverages on stp
+ leverages on routing
+ locally significant

Distributed vlan:
+ 80/20 rule
+ leverages on vtp
+ leverages on switching
+ globally significant

the data and voice VLANs are NOT assigned a trunk’s native VLAN


Question 13

Prioritize the traffic types by dragging them from the left to the appropriate Cisco priority level on the right. Put the highest priority at the top and lowest priority at the bottom.
Answer:

+ voice
+ video interactive
+ video streaming
+ call signaling
+ ip routing
+ network management



Question 14

Drag and drop the appropriate characteristics of Local VLANs and End-to-end VLANs

Answer:

Local VLANs:
+ easy to maintain
+ users are based on geographic boundaries or their physical location

End-to-end VLANs:
+ users are grouped into VLANs independent of a physical location
+ each VLAN has a common set of security and resource
+ users are assigned to the vlan regardless of their physical location within the campus n/w
+ Based on port security
Explanation

End-to-end VLAN: VLAN members reside on different switches throughout the network. They are used when hosts are assigned to VLANs for policy reasons, rather than physical location.
Local VLAN: Hosts are assigned to VLANs based on their location, such as a floor in a building. This design is more scalable and easier to troubleshoot because the traffic flow is more deterministic. It enables more redundancy and minimizes failure domains.

(Reference: CCNP SWITCH 642-813 Quick Reference Guide)

Question 15

Drag the steps on the left that should be part of a VLAN-based verification plan to the spaces on the right. Not all choices will be used.

Answer:
+ Verify that there is inter-switch connectivity
+ Verify that switchports are properly pruned
+ Verify that creation of the virtual interface
+ Verify that the VLAN is assigned to the proper port


Question 16

Wireless LWAPP Association and Discovery Process Drag & Drop. Note not all options are used
Answer:
+ The IP Address is statically configured on the Lightweight AP
+ The Lightweight AP requests an IP address via DHCP
+ The Lightweight AP searches for a wireless LAN controller using LWAPP in Layer 2 Mode
+ The Lightweight AP sends a LWAPP Discovery request to the management IP address of the Wireless LAN Controller via Broadcast
+ The Wireless LAN Controller responds with a Discovery Response from the Manager IP address
+ The Lightweight AP chooses the AP Manager with the least number of associated access points and sends the join request

Explanation

This sequence of events must occur in order for an LAP to register to a WLC:
1. The LAPs issue a DHCP discovery request to get an IP address, unless it has previously had a static IP address configured.
2. The LAP sends LWAPP discovery request messages to the WLCs.
3. Any WLC that receives the LWAPP discovery request responds with an LWAPP discovery response message.
4. From the LWAPP discovery responses that the LAP receives, the LAP selects a WLC to join.
5. The LAP then sends an LWAPP join request to the WLC and expects an LWAPP join response.
6. The WLC validates the LAP and then sends an LWAPP join response to the LAP.
7. The LAP validates the WLC, which completes the discovery and join process. The LWAPP join process includes mutual authentication and encryption key derivation, which is used to secure the join process and future LWAPP control messages.
8. The LAP registers with the controller.


Tags:

Working...
X