Professional Documents
Culture Documents
Part 3 - IP Routing, Layer 2 Switching, VLAN & Inter-Vlan Routing, NAT (Questions + Answer) PDF
Part 3 - IP Routing, Layer 2 Switching, VLAN & Inter-Vlan Routing, NAT (Questions + Answer) PDF
17 May 2019
Staff Name :
Exam Topics : • IP Routing
• Layer 2 Switching
• VLAN & Inter-Vlan Routing
• NAT
Instruction : There are several exam question categories. Please refer to below guide for answer
these questions
• Multiple – choice single answer, you need to choose one answer only
• Multiple – choice multiple answer, you need to choose more than one answer
• Match, you need to draw line to match item from the left to the right
Score :
=============================================================================
1. Which command sequence can you enter to create VLAN 20 and assign it to an interface on
a switch?
A. Switch(config)#vlan 20
Switch(config)#Interface gig x/y
Switch(config-if)#switchport access vlan 20
C. Switch(config)#vlan 20
Switch(config)#Interface vlan 20
Switch(config-if)#switchport trunk native vlan 20
D. Switch(config)#vlan 20
Switch(config)#Interface vlan 20
Switch(config-if)#switchport access vlan 20
E. Switch(config)#vlan 20
Switch (config)#Interface vlan 20
Switch(config-if)#switchport trunk allowed vlan 20
2. Refer to the exhibit. What is the most appropriate summarization for these routes?
A. 10.0.0.0 /21
B. 10.0.0.0 /22
C. 10.0.0.0 /23
D. 10.0.0.0 /24
Explanation/Reference: The 10.0.0.0/22 subnet mask will include the 10.0.0.0, 10.0.1.0,
10.0.2.0, and 10.0.3.0 networks, and only those four networks.
3. Which set of commands is recommended to prevent the use of a hub in the access layer?
Explanation/Reference: Port security is only used on access port (which connects to hosts)
so we need to set that port to “access” mode, then we need to specify the maximum number of
hosts which are allowed to connect to this port -> C is correct. Note: If we want to allow a
fixed MAC address to connect, use the “switchport port-security mac-address ” command
4. What will be the result if the following configuration commands are implemented on a Cisco
switch?
Switch(config-if)# switchport port-security
Switch(config-if)# switchport port-security mac-address sticky
6. Which two commands can be used to verify a trunk link configuration status on a given Cisco
switch interface? (Choose two.)
8. How to create a trunk port and allow VLAN 20? (Choose Three.)
A. switchport trunk encapsulation dot1q
B. switchport mode trunk
C. switchport trunk allowed vlan 20
D. switchport trunk native vlan 20
E. switchport mode dynamic desirable
Explanation/Reference: In switches that support both InterSwitch Link (ISL) and 802.1Q
trunking encapsulations, we need to specify an trunking protocol so we must use the
command “switchport trunk encapsulation dot1q” command first to set the trunk mode to
802.1Q. Then we configure trunking interface with the “switchport mode trunk” command.
Then we explicitly allow vlan 20 with the command “switchport trunk allowed vlan 20”
command. By default all VLANs are allowed to pass but after entering this command, only
VLAN 20 is allowed.
9. Which mode is compatible with Trunk, Access, and desirable ports?
A. Trunk Ports
B. Access Ports
C. Dynamic Auto
D. Dynamic Desirable
Explanation/Reference: Maybe this question wanted to ask “if the other end is configured
with trunk/access/desirable mode” then which mode is compatible so that the link can work.
In that case both “dynamic auto” and “dynamic desirable” mode are correct. The difference
between these two modes is “dynamic auto” is passively waiting for the other end to request
to form a trunk while “dynamic desirable” will actively attempt to negotiate to convert the
link into a trunk.
10. Two hosts are attached to a switch with the default configuration. Which statement about the
configuration is true?
12. A network administrator needs to configure port security on a switch. Which two statements
are true? (Choose two.)
A. The network administrator can apply port security to dynamic access ports
B. The network administrator can configure static secure or sticky secure mac addresses in
the voice vlan.
C. The sticky learning feature allows the addition of dynamically learned addresses to the
running configuration.
D. The network administrator can apply port security to EtherChannels.
E. When dynamic mac address learning is enabled on an interface, the switch can learn new
addresses up to the maximum defined.
Explanation/Reference Follow these guidelines when configuring port security:
+ Port security can only be configured on static access ports, trunk ports, or 802.1Q tunnel
ports.
+ A secure port cannot be a dynamic access port.
+ A secure port cannot be a destination port for Switched Port Analyzer (SPAN).
+ A secure port cannot belong to a Fast EtherChannel or Gigabit EtherChannel port group.
+ You cannot configure static secure or sticky secure MAC addresses on a voice VLAN.
+ When you enable port security on an interface that is also configured with a voice VLAN,
you must set the maximum allowed secure addresses on the port to at least two.
+ If any type of port security is enabled on the access VLAN, dynamic port security is
automatically enabled on the voice VLAN.
+ When a voice VLAN is configured on a secure port that is also configured as a sticky
secure port, all addresses seen on the voice VLAN are learned as dynamic secure addresses,
and all addresses seen on the access VLAN (to which the port belongs) are learned as sticky
secure addresses.
+ The switch does not support port security aging of sticky secure MAC addresses.
+ The protect and restrict options cannot be simultaneously enabled on an interface.
(Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3550/soft
ware/release/12 1_19_ea1/configuration/guide/3550scg/swtrafc.html#wp1038546)
Note: Dynamic access port or Dynamic port VLAN membership must be connected to an end
station. This type of port can be configured with the “switchport access vlan dynamic
command in the interface configuration mode. Please read more about Dynamic access port
here:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3550/software/release/12-
1_19_ea1/configuration/guide/3550scg/swvlan.html#wp1103064
13. Which switching method duplicates the first six bytes of a frame before making a switching
decision?
A. fragment-free switching
B. store-and-forward switching
C. cut-through switching
D. ASIC switching
Explanation/Reference: In cut-through switching, the switch copies into its memory only the
destination MAC address (first six bytes of the frame) of the frame. After processing these
first six bytes, the switch had enough information to make a forwarding decision and move
the frame to the appropriate switchport. This switching method is faster than store-and-
forward switching method. In store-and-forward switching, the switch copies each complete
Ethernet frame into the switch memory and computes a Cyclic Redundancy Check (CRC) for
errors. If a CRC error is found, the Ethernet frame is dropped. If no CRC error is found then
that frame is forwarded
14. Which type of device can be replaced by the use of subinterfaces for VLAN routing?
A. Layer 2 bridge
B. Layer 2 switch
C. Layer 3 switch
D. router
15. What are two benefits of using NAT? (Choose two.)
A. NAT protects network security because private networks are not advertised.
B. NAT accelerates the routing process because no modifications are made on the packets.
C. Dynamic NAT facilitates connections from the outside of the network.
D. NAT facilitates end-to-end communication when IPsec is enable.
E. NAT eliminates the need to re-address all host that require external access.
F. NAT conserves addresses through host MAC-level multiplexing.
Explanation/Reference: By not reveal the internal IP addresses, NAT adds some security to
the inside network -> A is correct.
NAT has to modify the source IP addresses in the packets -> B is not correct.
Connection from the outside to a network through “NAT” is more difficult than a normal
network because IP addresses of inside hosts are hidden -> C is not correct.
In order for IPsec to work with NAT we need to allow additional protocols, including
Internet Key Exchange (IKE), Encapsulating Security Payload (ESP) and Authentication
Header (AH) -> more complex -> D is not correct.
By allocating specific public IP addresses to inside hosts, NAT eliminates the need to re-
address the inside hosts -> E is correct.
NAT does conserve addresses but not through host MAC-level multiplexing. It conserves
addresses by allowing many private IP addresses to use the same public IP address to go to
the Internet -> F is not correct.
16. Which two commands correctly verify whether port security has been configured on port
FastEthernet 0/12 on a switch? (Choose two.)
Explanation/Reference: We can verify whether port security has been configured by using
the “show running-config” or “show port-security interface ” for more detail.
17. Refer to the exhibit. A junior network administrator was given the task of configuring port
security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If
any other device is detected, the port is to drop frames from this device. The administrator
configured the interface and tested it with successful pings from PC_A to RouterA, and then
observes the output from these two show commands. Which two of these changes are
necessary for SwitchA to meet the requirements? (Choose two.)
SwitchA(config-if)#switchport port-security
Also from the output, we learn that the switch is allowing 2 devices to connect to it
(switchport portsecurity maximum 2) but the question requires allowing only PC_A to
access the network so we need to reduce the maximum number to 1
18. Which three statements about static routing are true? (Choose three.)
A. Routing
B. Hairpinning
C. Encapsulation
D. Switching
20. Refer to the exhibit. Switch-1 needs to send data to a host with a MAC address of
00b0.d056.efa4. What will Switch-1 do with this data?
A. Switch-1 will drop the data because it does not have an entry for that MAC address.
B. Switch-1 will flood the data out all of its ports except the port from which the data
originated.*
C. Switch-1 will send an ARP request out all its ports except the port from which the data
originated.
D. Switch-1 will forward the data to its default gateway.
Explanation/Reference: The MAC address of 00b0.d056.efa4 has not been learned in its
MAC address table so Switch-1 will broadcast the frame out all of its ports except the port
from which the data originated
A. LACP
B. PAGP
C. PRP
D. REP
A. Preamble
B. TTL
C. Type/length
D. Frame check sequence
E version
F. others
Explanation/Reference: At the end of each frame there is a Frame Check Sequence (FCS)
field. FCS can be analyzed to determine if errors have occurred. FCS uses cyclic redundancy
check (CRC) algorithm to detect errors in the transmitted frames. Before sending data, the
sending host generates a CRC based on the header and data of that frame. When this frame
arrives, the receiving host uses the same algorithm to generate its own CRC and compare
them. If they do not match then a CRC error will occur.
Preamble is used to indicate the start of the frame by arranging the first 62 bits as
alternating “1/0s” and the last two bits as “1”s. Like so,
010101010101010………………………10101011. Therefore when the receiving end sees the “11” it
knows where the actual Ethernet header starts. The alternating 1s and 0s will also allow the
two endpoints to sync their internal clocks. In summary, preamble is used for
synchronization.
The “Type/Length” field is used to indicate the “Type”of the payload (Layer 3 protocol)
which is indicated as a Hexadecimal value.
Note: Ethernet II uses “Type” while the old Ethernet version use “Length
23. Which three options are switchport config that can always avoid duplex mismatch error
between the switches? (Choose Three.)
Explanation/Reference: http://www.pathsolutions.com/network-enemy-1-duplex-
mismatch/
24. Which two of these are characteristics of the 802.1Q protocol? (Choose two.)
A. It is used exclusively for tagging VLAN frames and does not address network
reconvergence following switched network topology changes.
B. It modifies the 802.3 frame header, and thus requires that the FCS be recomputed.
C. It is a Layer 2 messaging protocol which maintains VLAN configurations across networks.
D. It includes an 8-bit field which specifies the priority of a frame.
E. It is a trunking protocol capable of carrying untagged frames.
If a switch receives untagged frames on a trunk port, it believes that frame is a part of the
native VLAN. Also, frames from a native VLAN are not tagged when exiting the switch via a
trunk port.
The 802.1q frame format is same as 802.3. The only change is the addition of 4 bytes fields.
That additional header includes a field with which to identify the VLAN number. Because
inserting this header changes the frame, 802.1Q encapsulation forces a recalculation of the
original FCS field in the Ethernet trailer.
Note: Frame Check Sequence (FCS) is a four-octet field used to verify that the frame was
received without loss or error. FCS is based on the contents of the entire frame.
25. Which port security mode can assist with troubleshooting by keeping count of violations?
A. access.
B. protect.
C. restrict.
D. shutdown.
26. Which two steps must you perform to enbale router- on- stick on a switch?
27. Which two statements about data VLANs on access ports are true? (Choose two)
28. Which three statements correctly describe Network Device A? (Choose three.)
A. With a network wide mask of 255.255.255.128, each interface does not require an IP
address.
B. With a network wide mask of 255.255.255.128, each interface does require an IP address
on a unique IP subnet.
C. With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to
communicate with each other.
D. With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to
communicate with each other.
E. With a network wide mask of 255.255.254.0, each interface does not require an IP
address.
Explanation/Reference: The principle here is if the subnet mask makes two IP addresses
10.1.0.36 and 10.1.1.70 in the same subnet then the Network device A does not need to have
IP addresses on its interfaces (and we don’t need a Layer 3 device here).
A quick way to find out the correct answers is notice that all 255.255.255.x subnet masks will
separate these two IP addresses into two separate subnets so we need a Layer 3 device here
and each interface must require an IP address on a unique IP subnet -> A, C are not correct
while B, D are correct.
With 255.255.254.0 subnet mask, the increment here is 2 in the third octet -> the first subnet
is from 10.1.0.0 to 10.1.1.255, in which two above IP addresses belong to -> each interface of
Network device A does not require an IP address -> E is correct.
29. If router R1 knows a static route to a destination network and then learns about the same
destination network through a dynamic routing protocol, how does R1 respond?
30. Refer to the exhibit. If R1 receives a packet destined to 172.16.1.1, to which IP address does
it send the packet?
A. 192.168.14.4
B. 192.168.12.2
C.192.168.13.3
D. 192.168.15.5
Explanation/Reference: It can't find the address 172.16.1.1 so it will be directed to the Gate of
last resort 192.168.14.4
31. What is the danger of the permit any entry in a NAT access list?
32. Which path does a router choose when it receives a packet with multiple possible paths to the
destination over different routing protocols?
A. the path with both the lowest administrative distance and the highest metric
B. the path with the lowest administrative distance
C. the path with the lowest metric
D. the path with both the lowest administrative distance and lowest metric
33. On which type of port can switches interconnect for multi-VLAN communication?
A. interface port
B. access port
C. switch port
D. trunk port
34. Refer to exhibit. Which command can you enter to verify link speed and duplex setting on the
interface?
R1(config)#interface gigabitEthernet0/1
R1(config-if)#ip address 192.168.1.1. 255.255.255.0
R1(config-if)#speed 100
R1(config-if)#duplex full
A. router#show ip protocols
B. router#show startup-config
C. router#show line
D. router#show interface gig 0/1
35. Which DTP switch port mode allows the port to create a trunk link if the neighboring port is in
trunk mode, dynamic desirable mode, or desirable auto mode?
A. trunk
B. access
C. dynamic desirable
D. dynamic auto
Explanation/Reference: The Dynamic Trunking Protocol (DTP) is a proprietary networking
protocol developed by Cisco for the purpose of negotiating trunking on a link between two
switches, and for negotiating the type of trunking encapsulation to be used.
In dynamic auto mode, the interface is able to convert the link to a trunk link. The interface
becomes a trunk interface if the neighboring interface is set to trunk or desirable mode. The
default switchport mode for newer Cisco switch Ethernet interfaces is dynamic auto. Note
that if two Cisco switches are left to the common default setting of auto, a trunk will never
form.
In dynamic desirable mode, the interface actively attempt to convert the link to a trunk link.
The interface becomes a trunk interface if the neighboring interface is set to trunk, desirable,
or auto mode. This is the default switchport mode on older switches, such as the Catalyst
2950 and 3550 Series switches -> This is the best answer in this question.
36. Which method does a connected trunk port use to tag VLAN traffic?
A. IEEE 802 1w
B. IEEE 802 1D
C. IEEE 802 1Q
D. IEEE 802 1p
Explanation/Reference: IEEE 802.1Q is the networking standard that supports virtual LANs
(VLANs) on an Ethernet network. When a frame enters the VLAN-aware portion of the
network (a trunk link, for example), a VLAN ID tag is added to represent the VLAN
membership of that frame. The picture below shows how VLAN tag is added and removed
while going through the network.
37. Which NAT type is used to translate a single inside address to a single outside address?
A. dynamic NAT
B. NAT overload
C. PAT
D Static NAT
Explanation/Reference: There are two types of NAT translation: dynamic and static.
Static NAT: Designed to allow one-to-one mapping between local and global addresses.
This flavor requires you to have one real Internet IP address for every host on your network
In this question we only want to translate a single inside address to a single outside address
so static NAT should be used
A. 8
B. 2
C. 1
D. 0
Explanation/Reference: By default, port security limits the MAC address that can connect to
a switch port to one. If the maximum number of MAC addresses is reached, when another
MAC address attempting to access the port a security violation occurs
40. When enabled, which feature prevents routing protocols from sending hello messages on an
interface?
A. virtual links
B. passive-interface
C. directed neighbors
D. OSPF areas
Explanation/Reference: You can use the passive-interface command in order to control the
advertisement of routing information.
The command enables the suppression of routing updates over some interfaces while it
allows updates to be exchanged normally over other interfaces. With most routing protocols,
the passive-interface command restricts outgoing advertisements only.
41. Which route source code represents the routing protocol with a default administrative distance
of 90 in the routing table?
A. S
B. E
C. D
D. R
F. O
Explanation/Reference: Default Administrative distance of EIGRP protocol is 90 then
answer is C
A. administrative distance
B. next hop
C. metric
D. routing protocol code
45. For what two purposes does the Ethernet protocol use physical addresses? (Choose two.)
Layer 2 frame and Layer 3 packet can be recognized via headers. Layer 3 packet also
contains physical address -> C is not correct.
On Ethernet, each frame has the same priority to transmit by default -> D is not correct.
All devices need a physical address to identify itself. If not, they can not communicate -> F is
not correct.
46. What is the effect of the overload keyword in a static NAT translation configuration?
http://www.firewall.cx/networking-topics/network-address translation-nat/233-
nat-overload-part-1.html
A. It is defined globally
B. It identifies the location of source addresses for outgoing packets to be translated using
access or route maps.
C. It must be configured if static NAT is used
D. It identifies the public IP address that traffic will use to reach the internet.
Explanation/Reference: When we specify a NAT “inside” interface (via the “ip nat inside”
command under interface mode), we are specifying the source IP addresses. Later in the “ip
nat” command under global configuration mode, we will specify the access or route map for
these source addresses.
For example, the command:
Router(config)# ip nat inside source list 1 pool PoolforNAT
after the keyword “source” we need to specify one of the three keywords:
+ list: specify access list describing local addresses (but this command does not require an
“inside” interface to be configured)
+ route-map: specify route-map
+ static: specify static local -> global mapping
49. Refer to the exhibit. Which two statements are true about interVLAN routing in the topology
that is shown in the exhibit? (Choose two.)
51. Refer to the exhibit. All switch ports are assigned to the correct VLANs, but none of the hosts
connected to SwitchA can communicate with hosts in the same VLAN connected to SwitchB.
Based on the output shown, what is the most likely problem?
Explanation/Reference: Only the “show cdp neighbor detail” gives us information about the
IP address of the connected device.
53. Which technology can enable multiple vlan to communicate with one another?
54. Which DTP switch port mode allows the port to create a trunk link if the neighboring port is in
trunk mode, dynamic desirable mode, or desirable or auto mode?
A. Dynamic Auto
B. Dynamic Desirable
C. Access
D. Trunk
55. Refer to the exhibit. Assuming that the entire network topology is shown, what is the
operational status of the interfaces of R2 as indicated by the command output shown?
56. Which configuration can be used with PAT to allow multiple inside address to be translated to
a single outside address?
A. Dynamic Routing
B. DNS
C. Preempt
D. Overload
57. Which two types of information are held in the MAC address table? (Choose two)
A. MAC address
B. soure IP address
C. destination IP address
D. Protocols
E. Port numbers
Explanation/Reference: We can check the MAC address table with the command “show mac
address-table”: As we can see here, the “MAC address” field is the source MAC address and
the “Ports” field are the ports of the switch from which the frames (with corresponding
source MAC address) were received.
58. Which three are valid modes for a switch port used as a VLAN trunk? (choose three)
A. Desirable
B. Auto
C. On
D. Blocking
E. Transparent
F. Forwarding
59. Refer to the exhibit. What set of commands was configured on interface Fa0/3 to produce the
given the output?
60. To enable router on a router subinterface,which two steps must you perform?(choose two)
61. Assuming the default switch configuration which vlan range can be added modified and
removed on a cisco switch?
A. 2 through 1001
B. 1 through 1001
C. 1 through 1002
D. 2 through 1005
62. Refer to the exhibit. Which two statements are true of the interfaces on switch1?(choose two)
A. PAgP
B. LACP
C. Cisco Discovery Protocol
D. DTP
Explanation/Reference: LACP is the IEEE Standard (IEEE 802.3ad) and is the most common
dynamic Etherchannel protocol, whereas PAgP is a Cisco proprietary protocol and works
only between supported vendors and Cisco devices
64. Which two types of NAT addresses are used in a Cisco NAT device? (Choose two.)
A. inside local
B. inside global
C. inside private
D. outside private
E. external global
F. external local
* Outside local address – The IP address of an outside host as it is known to the hosts on the
inside network.
* Outside global address – The IP address assigned to a host on the outside network. The
owner of the host assigns this address.
65. Which two statements about configuring an Ether Channel on a Cisco switch are
true?(Choose two)
A. The interfaces configured in the Ether Channel must have the same STP port path cost
B. The interfaces configured in the Ether Channel must be on the same physical switch
C. An Ether Channel can operate in Layer 2 mode only
D. The interfaces configured in the Ether Channel must operate at the same speed and
duplex mode
E. The interfaces configured in the Ether Channel must be part of the same VLAN or trunk
66. Which two cable specifications can support 1-Gbps Ethernet? (choose two)
A. Category 5e
B. RG11
C. RG-6
D. Category 6
E. Category 3
67. Refer to the exhibit.What is the effect of the configuration?
Explanation/Reference: A VLAN does not need to be assigned to any port -> B is not correct.
An access port can only receive traffic from one VLAN -> C is not correct. If not assigned to a
specific VLAN, an access port carries traffic for VLAN 1 by default -> D is not correct. An
access port will drop packets with 802.1Q tags -> A is correct. Notice that 802.1Q tags are
used to packets moving on trunk links.
69. Technician has installed SwitchB and needs to configure it for remote access from the
management workstation connected SwitchA. Which set of commands is required to
accomplish this task?
A. SwitchB(config)#interface FastEthernet 0/1
SwitchB(config-if)#ip address 192.168.8.252 255.255.255.0
SwitchB(config-if)#no shutdown
C. SwitchB(config)#interface vlan 1
SwitchB(config-if)#ip address 192.168.8.252 255.255.255.0
SwitchB(config-if)#ip default-gateway 192.168.8.254 255.255.255.0
SwitchB(config-if)#no shutdown
71. When a packet is routed across a network, the_________________ in the packet changes at
every hop while the__________ does not.
72. Which two of the following are true regarding the distance-vector and link-state routing
protocols? (Choose two.)
A. Link state sends its complete routing table out of all active interfaces at periodic time
intervals.
B. Distance vector sends its complete routing table out of all active interfaces at periodic time
intervals.
C. Link state sends updates containing the state of its own links to all routers in the
internetwork.
D. Distance vector sends updates containing the state of its own links to all routers in the
internetwork.
Explanation/Reference: The distance-vector routing protocol sends its complete routing
table out of all active interfaces at periodic time intervals. Link-state routing protocols send
updates containing the state of their own links to all routers in the internetwork.
73. What type(s) of route is the following? (Choose all that apply.)
S* 0.0.0.0/0 [1/0] via 172.16.10.5
A. Default
B. Subnetted
C. Static
D. Local
Explanation/Reference: The S* shows that this is a candidate for default route and that it
was configured manually.
75. If your routing table has a static, an RIP, and an EIGRP route to the same network, which
route will be used to route packets by default?
76. Which command will create a dynamic pool named Todd that will provide you with 30 global
addresses?
77. Which command would you place on an interface connected to the Internet?
A. ip nat inside
B. ip nat outside
C. ip outside global
D. ip inside local
Explanation/Reference: You must configure your interfaces before NAT will provide any
translations. On the inside networks you would use the command ip nat inside. On the
outside network interfaces, you will use the command ip nat outside.
78. Which of the following statements are true regarding the command ip route 172.16.4.0
255.255.255.0 192.168.4.2? (Choose two.)
Explanation/Reference: Since the routing table shows no route to the 192.168.22.0 network,
the router will discard the packet and send an ICMP destination unreachable message out of
interface FastEthernet 0/0, which is the source LAN from which the packet originated
80. On which default interface have you configured an IP address for a switch?
A. int fa0/0
B. int vty 0 15
C. int vlan 1
D. int s/0/0
81. In the diagram shown, what will the switch do if a frame with a destination MAC address of
000a.f467.63b1 is received on Fa0/4? (Choose all that apply.)
Explanation/Reference: Since the MAC address is not present in the table, it will send the
frame out of all ports in the same VLAN with the exception of the port on which it was
received.
82. Based on the configuration shown here, what statement is true?
S1(config)#ip routing
S1(config)#int vlan 10
S1(config-if)#ip address 192.168.10.1 255.255.255.0
S1(config-if)#int vlan 20
S1(config-if)#ip address 192.168.20.1 255.255.255.0
Explanation/Reference: With a multilayer switch, enable IP routing and create one logical
interface for each VLAN using the interface vlan number command and you’re now doing
inter VLAN routing on the backplane of the switch
83. In the diagram, what should be the default gateway address of Host 4?
A. 192.168.10.1
B. 192.168.1.65
C. 192.168.1.129
D. 192.168.1.2
Explanation/Reference: Ports Fa0/15–18 are not present in any VLANs. They are trunk
ports.
85. If your routing table has a static, an RIP, and an EIGRP route to the same network, which
route will be used to route packets by default?
A. Any available route
B. RIP route
C. Static route
D. EIGRP route
E. They will all load-balance.