CCNA 640-802 Ver 22-09-2008 page10

QUESTION 91
Part of the Certkiller network is shown below:











Based on the diagram shown above, what kind of cable should be used to make each connection that is identified by the numbers shown?
A. 1 - Ethernet crossover cable
2 - Ethernet straight-through cable
3 - fiber optic cable
4 - rollover cable
B. 1 - Ethernet rollover cable
2 - Ethernet crossover cable
3 - serial cable
4 - null modem cable
C. 1 - Ethernet straight-through cable
2 - Ethernet straight-through cable
3 - serial cable
4 - rollover cable
D. 1 - Ethernet straight-through cable
2 - Ethernet crossover cable
3 - serial cable
4 - rollover cable
E. 1 - Ethernet straight-through cable
2 - Ethernet crossover cable
3 - serial cable
4 - Ethernet straight-through cable
Answer: C
Explanation:
When connecting other devices to a switch, such as a router or workstations, a straight through cable is used. The only exception to this rule is when you are connecting another switch to a switch, in which case a cross over cable should be used. For a serial connection to another router or to a WAN, a serial cable should be used. Finally, when connecting directly to the console port of a Cisco device, a rollover cable should be used. This cable is also commonly referred to as a console cable.

QUESTION 92
What kind of cable should be used to establish a trunked line between two Catalyst switches?
A. A straight-through cable
B. An EIA/TIA-232 serial cable
C. An auxiliary cable
D. A modem cable
E. A cross-over cable
Answer: E
Explanation:
A crossover cable is used to connect two of the same device types, or devices from the same OSI layer.

QUESTION 93
The Certkiller network Topology is displayed in the exhibit below:

















A switch has been configured for three different VLANs: VLAN 2, VLAN 3, and VLAN 4. For the purposes of communication between VLANs a router is to be added. Host from one VLAN should be able to reach the hosts in the other VLANs. Based on this requirement, what type of connection is acceptable between the router
and switch?
A. 10 Mbps Ethernet
B. 56 kbps serial
C. 100 Mbps Ethernet
D. 1,544 Mbps serial
E. 1000 Mbps Ethernet
Answer: C, E
Explanation:
For all hosts to be able to reach each other, inter-VLAN routing will need to be configured. In order to provide Inter-VLAN routing between the router and the switch, a trunk will need to be set up. This trunk can be either ISL or 802.1Q. On a router, the interface that is to be used as the trunk can be 100 Mbps Ethernet, Gigabit Ethernet, or 10 Gigabit Ethernet. Therefore, only choices C or E are correct.

QUESTION 94
Part of the Certkiller LAN is shown below:










Based on the diagram shown above, which set of terms correctly identifies the cable types shown in the exhibit? (Assume that none of the switches are set to
autoconfigure)
A. A: straight-through
B: straight-through
C: rollover
B. A: crossover
B: crossover
C: rollover
C. A: crossover
B: straight-through
C: straight-through
D. A: crossover
B: straight-through
C: rollover
E. A: straight-through
B: crossover
C: rollover
Answer: D
Explanation:
Crossover Cables are Used to Connect :
Host to Host (Peer to Peer) Networking
Switch to Switch
Hub to Hub
Computer to Router's Ethernet Port
Straight through Cable:
Host to Switch
Host to Hub
Switch to Router
Serial Cable:
Router's Serial Port to Serial Port
Rollover Cable :
To connect Router/Switch Console port.
Here one switch is connected with another switch using a crossover cable. The switch connected with the router uses a straight through cable and the PC Connects to the router's console port using the console rollover cable.

QUESTION 95
The Certkiller network administrator is connecting PC hosts Certkiller A and Certkiller B directly through their Ethernet interfaces as shown in the graphic. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity between the hosts? (Choose two.)









A. The subnet masks should be set to 255.255.255.0.
B. The hosts must be reconfigured to use private IP addresses for direct connections of this type.
C. A default gateway needs to be set on each host.
D. A rollover cable should be used in place of the straight-through cable
E. A crossover cable should be used in place of the straight-through cable.
F. The subnet masks should be set to 255.255.255.192.
Answer: A, E
Explanation:
This problem is due to the misconfiguration of subnet mask as well as the fact that a straight-through cable is used to connect the two devices. To ensure connectivity, the correct subnet mask needs to be used so that the two devices are in the same subnet and when connecting two PC's back to back a crossover cable should be used.

QUESTION 96
Assuming you build networks to exact specifications, what is the recommended maximum length a 10BaseT cable can be before it has to be segmented or repeated?
A. 100 meters
B. 100 feet
C. 100 yards
D. 200 meters
E. None of the above
Answer: A
Explanation:
The distance standards are in meters and 10BaseT has a distance restriction of 100 meters. If you go further then that, you compromise data integrity. 10BastT is the predominant cable type used in Ethernet networks.

QUESTION 97
Exhibit:
















You need to connect the network devices in a new Certkiller office. What types of cables should you use to make the connections that are shown?
A.
A-rollover
B-straight-through
C-straight-through
D-rollover
E-crossover
B.
A-straight-through
B-straight-through
C-rollover
D-straight-through
E-straight-through
C.
A-straight-through
B-crossover
C-rollover
D-straight-through
E-straight-through
D.
A-crossover
B-straight-through
C-crossover
D-straight-through
E-crossover
E.
A-crossover
B-straight-through
C-rollover
D-straight-through
E-straight-through
Answer: E
Explanation:
Crossover Cables are Used to Connect :
Host to Host (Peer to Peer) Networking
Switch to Switch
Hub to Hub
Computer to Router's Ethernet Port
Straight through Cable:
Host to Switch
Host to Hub
Switch to Router
Serial Cable:
Router's Serial Port to Serial Port
Rollover Cable :
To connect Router/Switch Console port.

QUESTION 98
Exhibit:


















Host Certkiller A has just been added to the network. Which type of cable should be used between Switch Certkiller 2 and host Certkiller A?
A. Crossover cable
B. Rollover cable
C. Straight-through cable
D. Console cable
E. Fiber optic cable
F. None of the above
Answer: C
Explanation:
Straight-through cables are used to connect hosts to a switch (or hub) and routers to a switch (or hub). See the table below:










QUESTION 99
The Certkiller LAN is upgrading all devices to operate in full duplex. Which statement is true about full-duplex Ethernet in comparison to half-duplex Ethernet?
A. Full-duplex Ethernet uses two wires to send and receive. Half-duplex Ethernet uses one wire to send and receive
B. Full-duplex Ethernet consists of a shared cable segment. Half-duplex Ethernet provides a point-to-point link
C. Full-duplex Ethernet can provide higher throughout than can half-duplex Ethernet of the same bandwidth
D. Full-duplex Ethernet uses a loopback circuit to detect collisions. Half-duplex ethernet uses a jam signal
E. None of the above
Answer: C

QUESTION 100
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?
A. BPDU
B. Port security
C. RSTP
D. STP
E. VTP
F. Blocking mode
Answer: B
Explanation:
Understanding How PortSecurity Works: You can use port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different from any of the MAC addresses specified for that port. Alternatively, you can use port security to filter traffic destined to or received from a specific host based on the host MAC address. When a secure port receives a packet, the source MAC address of the packet is compared to the list of secure source addresses that were manually configured or autoconfigured (learned) on the port. If a MAC address of a device attached to the port differs from the list of secure addresses, the port either shuts down permanently (default mode), shuts down for the time you have specified, or drops incoming packets from the insecure host. The port's behavior depends on how you configure it to respond to a security violation. If a security violation occurs, the Link LED for that port turns orange, and a link-down trap is sent to the Simple Network Management Protocol (SNMP) manager. An SNMP trap is not sent if you configure the port for restrictive violation mode. A trap is sent only if you configure the port to shut down during a security violation.

  © Blog dEsiGn by aalovesiti 2009

Back to TOP