76. What is the purpose of the command shown below?vtp password Fl0r1da A. It is used to validate the sources of VTP advertisements sent between switches. B. It is used to access the VTP server to make changes to the VTP configuration. C. It allows two VTP servers to exist in the same domain, each configured with different passwords.
D. It is the password required when promoting a switch from VTP client mode to VTP server mode.
E. It is used to prevent a switch newly added to the network from sending incorrect VLAN information to theother switches in the domain.
Answer: A
77. A single 802.11g access point has been configured and installed in the center of a square office. A few wirelessusers are experiencing slow performance and drops while most users are operating at peak efficiency. What arethree likely causes of this problem? (Choose three.)
A. mismatched TKIP encryption B. null SSID C. cordless phones D. mismatched SSID E. metal file cabinets F. antenna type or direction Answer: CEF
78. A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role as root bridge?
A. Establish a direct link from the switch to all other switches in the network.
B. Assign the switch a higher MAC address than the other switches in the network have.
C. Configure the switch so that it has a lower priority than other switches in the network.
D. Configure the switch for full-duplex operation and configure the other switches for half-duplex operation.
E. Connect the switch directly to the MDF router, which will force the switch to assume the role of root bridge.
Answer: C
79. Refer to the exhibit. Given the output of the Floor3 switch, what statement describes the operation of thisswitch?
A. VTP is disabled on this switch.
B. The switch can create, change, and delete VLANs.
C. The switch learns VLAN information but does not save it to NVRAM.
D. The switch can create VLANs locally but will not forward this information to other switches.
E. The switch learns VLAN information and updates the local VLAN data base in NVRAM.
Answer: C
80. What is the effect of the following access list condition? access-list 101 permit ip 10.25.30.0 0.0.0.255 any
A. permit all packets matching the first three octets of the source address to all destinations
B. permit all packets matching the last octet of the destination address and accept all source addresses
C. permit all packets from the third subnet of the network address to all destinations D. permit all packets matching the host bits in the source address to all destinations E. permit all packets to destinations matching the first three octets in the destination address
Answer: A
81. Refer to the exhibit. Hosts on the same VLAN can communicate with each other but are unable tocommunicate with hosts on different VLANs. What is needed to allow communication between VLANs?
A. a switch with a trunk link that is configured between the switches
B. a router with an IP address on the physical interface that is connected to the switch C. a switch with an access link that is configured between the switches
D. a router with subinterfaces configured on the physical interface that is connected to the switch
Answer: D
82. Why would a network administrator configure port security on a switch? A. to prevent unauthorized Telnet access to a switch port
B. to limit the number of Layer 2 broadcasts on a particular switch port C. to prevent unauthorized hosts from accessing the LAN
D. to protect the IP and MAC address of the switch and associated ports
E. to block unauthorized access to the switch management interfaces over common TCP ports
Answer: C
83. The show interfaces serial 0/0 command resulted in the output shown in the graphic. What are possible causesfor this interface status? (Choose three.)
A. The interface is shut down.
B. No keepalive messages are received. C. The clockrate is not set. D. No loopback address is set. E. No cable is attached to the interface.
F. There is a mismatch in the encapsulation type. Answer: BCF
84. Refer to the exhibit. The FMJ manufacturing company is concerned about unauthorized access to the PayrollServer. The Accounting1, CEO, Mgr1, and Mgr2 workstations should be the only computers with access to thePayroll Server. What two technologies should be implemented to help prevent unauthorized access to the server?(Choose two.)
A. access lists
B. encrypted router passwords
C. STP D. VLANs E. VTP
F. wireless LANs Answer: AD
85. A network administrator is troubleshooting the OSPF configuration of routers R1 and R2. The routers cannot establish an adjacency relationship on their common Ethernet link. The graphic shows the output of the show ipospf interface e0 command for routers R1 and R2. Based on the information in the graphic, what is the cause of this problem?
A. The OSPF area is not configured properly. B. The priority on R1 should be set higher. C. The cost on R1 should be set higher.
D. The hello and dead timers are not configured properly. E. A backup designated router needs to be added to the network. F. The OSPF process ID numbers must match. Answer: D
86. On which types of network will OSPF elect a backup designated router? A. point-to-point and multiaccess B. point-to-multipoint and multiaccess C. point-to-point and point-to-multipoint D. nonbroadcast and broadcast multipoint