Wednesday, November 16, 2011

640-816 Q & A / Study Guide


QUESTION 1
Which three options can a network administrator utilize by using PPP Layer 2 encapsulation?
(Choose three.)

A. authentication
B. VLAN support
C. compression
D. multilink support

Answer: A,C,D


QUESTION 2
A network administrator is troubleshooting the OSPF configuration of routers R1 and R2. The
routers cannot establish an adjacency relationship on their common Ethernet link. The graphic
shows the output of the show ip ospf interface e0 command for routers R1 and R2. Based on the
information in the graphic, what is the cause of this problem?


A. The hello and dead timers are not configured properly.
B. The OSPF process ID numbers must match.
C. A backup designated router needs to be added to the network
D. The cost on R1 should be set higher.

Answer: A

Explanation:
As can be seen above, the hello interval for R1 has been set to 5 seconds, while it is set to 10 for
R2. Also, the dead interval on R1 is set at 20 seconds while on router CKD2 it is set to 40 seconds.
In order for two routers to establish an OSPF neigh adjacency, the hello and dead timers must
match.


QUESTION 3
Refer to the exhibit. How should the FastEthernet0/1 ports on the 2950 model switches that are
shown in the exhibit be configured to allow connectivity between all devices?


A. The ports only need to be connected by a crossover cable.
B. SwitchX (config)# interface fastethernet 0/1
SwitchX (config-if)# switchport mode access
SwitchX (config-if)# switchport access vlan 1
C. SwitchX (config)# interface fastethernet 0/1
SwitchX (config-if)# switchport mode trunk
SwitchX (config-if)# switchport trunk vlan 1
SwitchX (config-if)# switchport trunk vlan 10
SwitchX (config-if)# switchport trunk vlan 20
D. SwitchX(config)# interface fastethernet 0/1
SwitchX(config-if)# switchport mode trunk

Answer: D


QUESTION 4
Refer to the exhibit. The following commands are executed on interface fa0/1 of 2950Switch.
2950Switch(config-if)# switchport port-security
2950Switch(config-if)# switchport port-security mac-address sticky
2950Switch(config-if)# switchport port-security maximum 1
The Ethernet frame that is shown arrives on interface fa0/1. What two functions will occur when
this frame is received by 2950Switch? (Choose two.)


A. The MAC address table will now have an additional entry of fa0/1 FFFF.FFFF.FFFF.
B. This frame will be discarded when it is received by2950Switch.
C. Only host A will be allowed to transmit frames on fa0/1.
D. All frames arriving on2950Switch with a destination of 0000.00aa.aaaa will be forwarded out
fa0/1.

Answer: C,D

Explanation:
The configuration shown here is an example of port security, specifically port security using sticky
addresses. You can use port security with dynamically learned and static MAC addresses to
restrict a port's ingress traffic by limiting the MAC addresses that are allowed to send traffic into
the port. When you assign secure MAC addresses to a secure port, the port does not forward
ingress traffic that has source addresses outside the group of defined addresses. If you limit the
number of secure MAC addresses to one and assign a single secure MAC address, the device
attached to that port has the full bandwidth of the port.
Port security with sticky MAC addresses provides many of the same benefits as port security with
static MAC addresses, but sticky MAC addresses can be learned dynamically. Port security with
sticky MAC addresses retains dynamically learned MAC addresses during a link-down condition.
If you enter a write memory or copy running- config startup- config command, then port security
with sticky MAC addresses saves dynamically learned MAC addresses in the startup- config file
and the port does not have to learn addresses from ingress traffic after bootup or a restart.
Since the maximum number of MAC addresses has been configured to 1, only host A will be able
to send frames on interface fa 0/1, making choice C correct.


QUESTION 5
A university has a small campus in which 25 faculty members are located. The faculty offices and
student computers are currently on the same network. The faculty are concerned about students
being able to capture packets going across the network and obtain sensitive material. In order to
protect faculty network traffic from student connections ,which action will you take?

A. Remove the student computers from the network and put them on a peer-to-peer network.
B. Put the faculty computers in a separate VLAN.
C. Power down the switches that connect to faculty computers when they are not in use.
D. Install anti-virus software on the student computers.

Answer: B


QUESTION 6
Running both IPv4 and IPv6 on a router simultaneously is known as dual-stack routing.

A. False
B. True

Answer: B


QUESTION 7
You are a network administrator. You configure a workgroup switch with all ports assigned to
VLAN 2. And you configure all ports as full-duplex FastEthernet. What is the effect of adding
switch ports to a new VLAN on this switch?

A. The additions will create more collisions domains.
B. IP address utilization will be more efficient.
C. The possibility that switching loops will occur will increase dramatically.
D. An additional broadcast domain will be created.

Answer: D

Explanation:
A VLAN is a group of hosts with a common set of requirements that communicate as if they were
attached to the same wire, regardless of their physical location. A VLAN has the same attributes
as a physical LAN, but it allows for end stations to be grouped together even if they are not located
on the same LAN segment.
Networks that use the campus-wide or end-to-end VLANs logically segment a switched network
based on the functions of an organization, project teams, or applications rather than on a physical
or geographical basis. For example, all workstations and servers used by a particular workgroup
can be connected to the same VLAN, regardless of their physical network connections or
interaction with other workgroups. Network reconfiguration can be done through software instead
of physically relocating devices.
Cisco recommends the use of local or geographic VLANs that segment the network based on IP
subnets. Each wiring closet switch is on its own VLAN or subnet and traffic between each switch is
routed by the router. The reasons for the Distribution Layer 3 switch and examples of a larger
network using both the campus-wide and local VLAN models will be discussed later.
A VLAN can be thought of as a broadcast domain that exists within a defined set of switches.
Ports on a switch can be grouped into VLANs in order to limit unicast , multicast, and broadcast
traffic flooding. Flooded traffic originating from a particular VLAN is only flooded out ports
belonging to that VLAN, including trunk ports, so a switch that connects to another switch will
normally introduce an additional broadcast domain.


QUESTION 8
Which technology helps prevent frames from looping continuously through this switched network?


A. EIGRP
B. VTP
C. STP
D. ARP

Answer: C


QUESTION 9
What ports on Sw-AC3 are operating as trunks?(Choose three)

Sw-AC3#show int trunk


A. Fa0/1
B. Fa0/9
C. Fa0/12
D. Fa0/3

Answer: B,C,D


QUESTION 10
You are a network administrator. You want to add a line to an access list that will block only Telnet
access by the hosts on subnet 192.168.1.128/28 to the server at 192.168.1.5. To accomplish this
task, what command should be used?

A. access-list 101 denyip 192.168.1.128 0.0.0.15 192.168.1.5 0.0.0.0 eq 23
access-list 101 permit ip any any
B. access-list 1 denytcp 192.168.1.128 0.0.0.15 host 192.168.1.5 eq 23
access-list 1 permit ip any any
C. access-list 1 denytcp 192.168.1.128 0.0.0.255 192.168.1.5 0.0.0.0 eq 21
access-list 1 permit ip any any
D. access-list 101 denytcp 192.168.1.128 0.0.0.15 192.168.1.5 0.0.0.0 eq 23
access-list 101 permit ip any any

Answer: D

Explanation:
Only choice specifies the correct TCT port and wildcard mask, and uses a valid access list
number.
Incorrect Answers:
A: IP is specified as the protocol, when it should be TCP.
B: Access list 1 is used for these choices, which is a standard access list. In this example, an
extended access list is required. Choice C also specifies port 21, which is used by FTP not Telnet.
C: Access list 1 is used for these choices, which is a standard access list. In this example, an
extended access list is required. Choice C also specifies port 21, which is used by FTP not Telnet.


QUESTION 11
Refer to the exhibit. What will be the result of issuing the following commands?
Switch1(config)# interface fastethernet 0/5
Switch1(config-if)# switchport mode access
Switch1(config-if)# switchport access vlan 30


A. The VLAN will not be added to the database, but the VLAN 30 information will be passed on as
a VLAN to theSwitch2 VLAN database.
B. The VLAN will not be added to the database, nor will the VLAN 30 information be passed on as
a VLAN to theSwitch2 VLAN database.
C. The VLAN will be added to the database and VLAN 30 will be passed on as a VLAN to add to
theSwitch2 VLAN database.
D. The VLAN will be added to the database, but the VLAN information will not be passed on to
theSwitch2 VLAN database.

Answer: D

Explanation:
The three VTP modes are described below:
Server: This is the default for all Catalyst switches. You need at least one server in your VTP
domain to propagate VLAN information throughout the domain. The switch must be in server
mode to be able to create, add, or delete VLANs in a VTP domain. You must also change VTP
information in server mode, and any change you make to a switch in server mode will be
advertised to the entire VTP domain.
Client: In client mode, switches receive information from VTP servers; they also send and receive
updates, but they can't make any changes. Plus, none of the ports on a client switch can be added
to a new VLAN before the VTP server notifies the client switch of the new VLAN. Here's a hint: if
you want a switch to become a server, first make it a client so that it receives all the correct VLAN
information, then change it to a server-much easier!
Transparent: Switches in transparent mode don't participate in the VTP domain, but they'll still
forward VTP advertisements through any configured trunk links. These switches can't add and
delete VLANs because they keep their own database-one they do not share with other switches.
Transparent mode is really only considered locally significant.
In our example, the switch is configured for transparent mode. In transparent mode the local
VLAN information can be created but that VLAN information will not be advertised to the other
switch.


QUESTION 12
S0/0 on R1 is configured as a multipoint interface to communicate with R2 and R3 in the hub-andspoke
Frame Relay topology shown in the exhibit. Originally, static routes were configured
between these routers to successfully route traffic between the attached networks. What will need
to be done in order to use RIP v2 in place of the static routes?


A. Change the 172.16.2.0/25 and 172.16.2.128/25subnetworks so that at least two bits are
borrowed from the last octet.
B. Configure the noip subnet-zero command on R1, R2, and R3.
C. Configure the s0/0 interface on R1 as two sub interfaces and configure point-to-point links toR2
and R3.
D. Dynamic routing protocols such as RIP v2 cannot be used across Frame Relay networks.

Answer: C


QUESTION 13
An access list has been designed to prevent HTTP traffic from the Accounting Department from
reaching the HR server attached to the Holyoke router. Which of the following access lists will
accomplish this task when grouped with the e0 interface on the Chicopee router?


A. denytcp 172.16.16.0 0.0.0.255 172.17.17.252 0.0.0.0 eq 80 permit ip any any
B. permitip any any deny tcp 172.16.16.0 0.0.0.255 172.17.17.252 0.0.0.0 eq 80
C. permitip any any deny tcp 172.17.17.252 0.0.0.0 172.16.16.0 0.0.0.255 eq 80
D. denytcp 172.17.17.252 0.0.0.0 172.16.16.0 0.0.0.255 eq 80 permit ip any any

Answer: A


QUESTION 14
Which three benefits are of VLANs? (Choose three.)

A. They can enhance network security.
B. They allow logical grouping of users by function.
C. They simplify switch administration.
D. They increase the number of broadcast domains while decreasing the size of the broadcast
domains.

Answer: A,B,D

Explanation:
VLANs are used to segment a LAN into multiple, smaller LANs. This can be used to enhance
security as local traffic from one VLAN will not be passed to users in other VLANS.


QUESTION 15
A network administrator would configure port security on a switch, why?

A. to prevent unauthorized Telnet from accessing to a switch port
B. to protect the IP and MAC address of the switch and associated ports
C. to prevent unauthorized hosts from accessing the LAN
D. to block unauthorized access to the switch management interfaces over common TCP ports

Answer: C

Explanation:
You can use the port security feature to restrict input to an interface by limiting and identifying
MAC addresses of the stations allowed to access the port. When you assign secure MAC
addresses to a secure port, the port does not forward packets with source addresses outside the
group of defined addresses. If you limit the number of secure MAC addresses to one and assign a
single secure MAC address, the workstation attached to that port is assured the full bandwidth of
the port.
If a port is configured as a secure port and the maximum number of secure MAC addresses is
reached, when the MAC address of a station attempting to access the port is different from any of
the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure
MAC address configured or learned on one secure port attempts to access another secure port, a
violation is flagged.

Reference:
http://www.cisco.com/en/US/products/hw/switches/ps628/products_configuration_guide_chapter0
9186a00800d6a38.html#86378

Monday, November 14, 2011

Facebook vs. Google+ vs. Twitter vs. LinkedIn

Facebook and Twitter continue their momentum, while LinkedIn and Google Plus show there is plenty of social networking to go around

Cisco CCNA Training, Cisco CCNA Certification

Best CCIE Training and CCIE Exams and more Cisco exams log in to Certkingdom.com



Much has changed since we examined the ongoing war between Facebook and Twitter in the spring of 2010. The stakes are higher, the competition has increased, and we see LinkedIn and Google roaring into the social networking arena like never before.

A year and a half ago, you might have thought the reverse would have happened - that Facebook and/or Twitter would have crushed any remaining competitors and that would be the end of it.

Instead, what happened was that LinkedIn and Google were able to find unfilled niches, and we now have four different major social networks, each with its own specialty, but with major overlaps.

LinkedIn was always around, but in recent months it has stepped up its efforts to be more relevant to its users. These efforts appear to be successful, with monthly unique visitors rising more than 80% to 23.8 million, according to Compete.

LinkedIn's niche is its business focus. More than Facebook and Twitter, it's still the place you go to build your virtual Rolodex. You post your resume there and you can see others' resumes. If you belong to any groups, they are likely related to your job focus. (Plug: Network World's LinkedIn group)

So what accounts for the rise? LinkedIn ratcheted up its efforts on sharing news. Now, the most-shared news gets delivered to your email inbox via newsletters, or you can seek out the news on LinkedIn's site. The key differentiator for LinkedIn is not the personal factor (that's Facebook), or the immediacy factor (that's Twitter). Instead, LinkedIn's goal is to bring you content that is most relevant to whatever industry you are in.

Anonymity vs. real names on social networks

Last of the big four is Google+, and it is the wildest wild card here. There was tremendous excitement when Google was sending out select invitations earlier this year. Everyone saw huge potential, and everyone wanted to be a part of this next big thing. In September, Google+ launched to the general public, and Compete says its unique visitors hit 13.4 million in that month alone. Google is now saying it has 40 million signed up, and it is shutting down a more halfhearted effort, Buzz.

However, the backlash is already happening, with anecdotal evidence suggesting that people - including Google CEO Larry Page - are using Google+ less now than they did initially. Industry watchers are saying it's no Facebook and never will be. Even a Google engineer publicly called Google+ "pathetic" (though he didn't mean to be so public about it).

And yet, you can't count Google out. Google remains the most-visited site on the Web. Page recently said, if I may paraphrase, you ain't seen nothin' yet. He indicated that the real value of Google+ is yet to come, with even more relevance in your search results and your ads. The identity you create with Google+, wittingly or unwittingly, will inform your overall Google experience. Google will be all up in your stuff in ways you never dreamed possible.
Which social network would you use more?
Google +FacebookTwitterLinkedIn
VoteView ResultsShare ThisPolldaddy.com

Will users choose one of these four over the other three? The answer may be different for each user. You may have a favorite. That favorite may change over time. But most people will probably have their fingers in two or more of these sites at any one time. For now, these four social network providers have proven that there is enough interest to go around.