New Updated Cisco ICND1 100-101 Real Exam Download 251-260

Ensurepass

QUESTION 251

A Catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased? (Choose three.)

 

A.        Erase flash.

B.        Restart the switch.

C.        Delete the VLAN database.

D.        Erase the running configuration.

E.         Erase the startup configuration.

F.         Modify the configuration register.

 

Correct Answer: BCE

 

 

QUESTION 252

The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?

 

A.       Lower the bridge priority number.

B.       Change the MAC address of the switch.

C.       Increase the VTP revision number for the domain.

D.       Lower the root path cost on the switch ports.

E.        Assign the switch an IP address with the lowest value.

 

Correct Answer: A

 

 

QUESTION 253

Refer to the exhibit. Why has this switch not been elected the root bridge for VLAN1?

 

clip_image001

 

A.       It has more than one interface that is connected to the root network segment.

B.       It is running RSTP while the elected root bridge is running 802.1d spanning tree.

C.       It has a higher MAC address than the elected root bridge.

D.       It has a higher bridge ID than the elected root bridge.

 

Correct Answer: D

 

 

QUESTION 254

At the end of an RSTP election process, which port and on which Access Layer Switch will assume the discarding role?

 

clip_image003

 

A.        Switch3, port fa0/1

B.        Switch3, port fa0/12

C.        Switch4, port fa0/11

D.        Switch4, port fa0/2

E.         Switch3, port Gi0/1

F.         Switch3, port Gi0/2

 

Correct Answer: C

 

 

QUESTION 255

Select the action that results from executing these commands:

 

Switch(config-if)# switchport port-security

Switch(config-if)# switchport port-security mac-address sticky

 

A.       A dynamically learned MAC address is saved in the startup-configuration file.

B.       A dynamically learned MAC address is saved in the running-configuration file.

C.       A dynamically learned MAC address is saved in the VLAN database.

D.       Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.

E.        Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.

 

Correct Answer: B

 

 

QUESTION 256

Refer to the exhibit. The following commands are executed on interface fa0/1 of 2950Switch.

 

2950Switch(config-if)# switchport port-security

2950Switch(config-if)# switchport port-security mac-address sticky

2950Switch(config-if)# switchport port-security maximum 1

 

The Ethernet frame that is shown arrives on interface fa0/1. What two functions will occur when this frame is received by 2950Switch? (Choose two.)

 

clip_image004

 

A.       The MAC address table will now have an additional entry of fa0/1 FFFF.FFFF.FFFF.

B.       Only host A will be allowed to transmit frames on fa0/1.

C.       This frame will be discarded when it is received by 2950Switch.

D.       All frames arriving on 2950Switch with a destination of 0000.00aa.aaaa will be forwarded out fa0/1.

E.        Hosts B and C may forward frames out fa0/1 but frames arriving from other switches will not be forwarded out fa0/1.

F.        Only frames from source 0000.00bb.bbbb, the first learned MAC address of 2950Switch, will be forwarded out fa0/1.

 

Correct Answer: BD

 

 


QUESTION 257

Refer to the exhibit. Some 2950 series switches are connected to the conference area of the corporate headquarters network. The switches provide two to three jacks per conference room to host laptop connections for employees who visit the headquarters office. When large groups of employees come from other locations, the network administrator often finds that hubs have been connected to wall jacks in the conference area although the ports on the access layer switches were not intended to support multiple workstations. What action could the network administrator take to prevent access by multiple laptops through a single switch port and still leave the switch functional for its intended use?

 

clip_image006

 

A.        Configure static entries in the switch MAC address table to include the range of addresses used by visiting employees.

B.        Configure an ACL to allow only a single MAC address to connect to the switch at one time.

C.        Use the mac-address-table 1 global configuration command to limit each port to one source MAC address.

D.        Implement Port Security on all interfaces and use the port-security maximum 1 command to limit port access to a single MAC address.

E.         Implement Port Security on all interfaces and use the port-security mac-address sticky command to limit access to a single MAC address.

F.         Implement Port Security at global configuration mode and use the port-security maximum 1 command to allow each switch only one attached hub.

 

Correct Answer: D

 

 

QUESTION 258

Refer to the exhibit. A network administrator wants Switch3 to be the root bridge. What could be done to ensure Switch3 will be the root?

 

clip_image007

 

A.       Configure the IP address on Switch3 to be higher than the IP addresses of Switch1 and Switch2.

B.       Configure the priority value on Switch3 to be higher than the priority values of Switch 1 and Switch2.

C.       Configure the BID on Switch3 to be lower than the BIDs of Switch1 and Switch2.

D.       Configure the MAC address on Switch3 to be higher than the Switch1 and Switch2 MAC addresses.

E.        Configure a loopback interface on Switch3 with an IP address lower than any IP address on Switch1 and Switch2.

 

Correct Answer: C

 

 

QUESTION 259

Refer to the exhibit. What switch proves the spanning-tree designated port role for the network segment that services the printers?

 

clip_image008

 

A.       Switch1

B.       Switch2

C.       Switch3

D.       Switch4

 

Correct Answer: C

 

 

QUESTION 260

What is valid reason for a switch to deny port access to new devices when port security is enabled?

 

A.       The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.

B.       The denied MAC address are statically configured on the port.

C.       The minimum MAC threshold has been reached.

D.       The absolute aging times for the denied MAC addresses have expired.

 

Correct Answer: B

 

Download Latest Complete Collection of ICND1 100-101 Real Exam ,help you to pass exam 100%.

Ensurepass Cisco Certifications Exam Questions and Answers
Ensurepass CCNA Exams Questions and Answers
Ensurepass CCNA Security Exams Questions and Answers
Ensurepass CCNA Service Provider Operations Exams Questions and Answers
Ensurepass CCNA Voice Exams Questions and Answers
Ensurepass CCNA Wireless Exams Questions and Answers

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.