Topic 1: Exam Pool A
desc about topic
When a switch receives a frame for a known destination MAC address, how is the frame handed?
A.
sent to the port identified for the known MAC address
B.
broadcast to all ports
C.
forwarded to the first available port
sent to the port identified for the known MAC address
What are two functions of a server on a network? (Choose two)
A.
achieves redundancy by exclusively using virtual server clustering
B.
runs applications that send and retrieve data for workstations that make requests
C.
handles requests from multiple workstations at the same time
D.
runs the same operating system in order to communicate with other servers
E.
housed solely in a data center that is dedicated to a single client
runs applications that send and retrieve data for workstations that make requests
handles requests from multiple workstations at the same time
How are VLAN hopping attacks mitigated?
A.
enable dynamic ARP inspection
B.
manually implement trunk ports and disable DTP
C.
activate all ports and place in the default VLAN
D.
configure extended VLANs
manually implement trunk ports and disable DTP
What is the default behavior of a Layer 2 switch when a frame with an unknown destination MAC address is received?
A.
The Layer 2 switch drops the received frame
B.
The Layer 2 switch floods packets to all ports except the receiving port in the given VLAN.
C.
The Layer 2 switch sends a copy of a packet to CPU for destination MAC address learning.
D.
The Layer 2 switch forwards the packet and adds the destination MAC address to its
The Layer 2 switch floods packets to all ports except the receiving port in the given VLAN.
Explanation: If the destination MAC address is not in the CAM table (unknown destination
MAC address), the switch sends the frame out all other ports that are in the same VLAN as
the received frame. This is called flooding. It does not flood the frame out the same port on
which the frame was received.
In QoS, which prioritization method is appropriate for interactive voice and video?
A.
expedited forwarding
B.
traffic policing
C.
round-robin scheduling
D.
low-latency queuing
low-latency queuing
Page 11 out of 173 Pages |
Previous |