|
Question 1. You work as the SMS administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com SMS 2.0 hierarchy is configured as a single primary site. All the servers on the ITCertKeys.com network run Windows Server 2003 and the client computers run Windows XP Professional, Windows 2000 Professional, Windows 98, Windows NT 4.0 and Novell Netware 5.0. ITCertKeys.com acquires another company named TestLabs.com. TestLabs.com has a single Active Directory domain named testlabs.com and a single SMS 2003 SP1 site. The client computers on the TestLabs.com network run Windows XP Professional and Windows 2000 Professional. You have been instructed to configure the TestLabs.com SMS site as a child site of the ITCertKeys.com site. You plan to accomplish this by upgrading the ITCertKeys.com site to SMS 2003 SP1. You need to identify the client computers that must be upgraded so that they can be managed by SMS 2003 SP1. Which of the following client computers must be upgraded? A. The Windows NT 4.0 client computers. B. The Windows NT 4.0 and Novell Netware 5.0 client computers. C. The Windows 2000 Professional client computers. D. The Windows 98 and Novell Netware 5.0 client computers Answer: B Explanation: The SMS 2003 does not support all the operating systems, network operating systems, or processor types that were supported by SMS 2.0 and do not support Novell Netware 5.0 and Windows NT 4.0 client computers. These will have to be upgraded. Incorrect Answers: A: SMS 2003 does not support Windows NT 4.0 client computers but it also does not support Novell Netware 5.0 client computers. C: SMS 2003 supports Windows 2000 Professional client computers. D: SMS 2003 supports Windows 98 client computers but does not support Novell Netware 5.0 client computers. Question 2: You work as the SMS administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com SMS 2003 hierarchy is configured as a single primary site. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional with SMS Advanced Client. The ITCertKeys.com network contains 5 Windows Server 2003 servers and 10, 000 Windows XP Professional client computers. One of the servers in the SMS site named ITCertKeys-SR10 is configured as management point, client access point, distribution point, and server located point. To guarantee that the management point is assured of data from the Windows XP Professional computers, you decided to configure another server named ITCertKeys-SR13 with management point and configure a type of clustering designed for stateless Applications in which each node has a duplicate copy of the server data and incoming client requests are distributed among the cluster nodes. When you install the management point on ITCertKeys-SR13, it was unsuccessful. You need to ensure that you can install management point on ITCertKeys-SR13. What should you do? A. On ITCertKeys-SR13, enable Background Intelligent Transfer Service (BITS) and install and enable Internet Information Services (IIS). B. Upgrade ITCertKeys-SR13 to Windows Server 2003 Service Pack1 (SP1) and enable Background Intelligent Transfer Service (BITS). C. On ITCertKeys-SR13, enable WebDAV extensions for IIS and enable Background Intelligent Transfer Service (BITS). D. On ITCertKeys-SR13, ensure that the Task Scheduler and Distributed Transaction Coordinator (DTC) services. Answer: A, D Explanation: To configure a management point, you need IIS and Windows 2000 SP3. You also need ISS and BITS enabled on a Windows Server 2003 computer otherwise the management point will fail. The hard disk of the system must be configured as NTFS to act as a management point. Incorrect Answers: B: BITS is needed when you install a management point on a Windows Server 2003 on a computer. Not just BITS is needed, you need IIS also. Furthermore, to configure management point, you need at least Windows 2000 Server with Service Pack3. With Windows Server 2003 you do not need a Service Pack. C: WebDAV is inappropriate here. WebDAV is used to set up a distribution point. You do need BITS when you install a management point on a Windows Server 2003 on a computer. Not just BITS is needed, in addition you also need IIS. Question 3: You work as the SMS administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. You have been instructed to implement SMS 2003 SP1 for the ITCertKeys.com network. You must list the business and technical requirements on which the SMS sites and the hierarchy will be based. To this end you begin by analyzing the ITCertKeys.com network infrastructure. What should you do? A. Include the Dynamic Host Configuration Protocol (DHCP) in your list. B. Include the Internet Protocol (IP) in your list. C. Include the Cisco Discovery Protocol (CDP) in your list. D. Include the Simple Mail Transfer Protocol (SMTP) in your list Answer: B Explanation: The SMS 2003 requires an IP address. To have a strong deployment strategy for SMS 2003, you need to take into consideration the network infrastructure, organizational structure, server environment, client environment, and security. Incorrect Answers: A: You do not need the DHCP for the SMS 2003 to work. It will perform satisfactory with an IP address. C: The CDP protocol runs on Cisco switches and routers. SMS 2003 does not require CDP. D: SMTP is an application layer protocol to facilitate the transfer of e-mail. It is not needed by SMS 2003. Question 4: You work as the SMS administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com SMS 2.0 SP4 hierarchy is configured as a single primary site. All the servers on the ITCertKeys.com network run Windows Server 2003 and the client computers run Windows XP Professional, Windows 2000 Professional, Windows 98, Windows 95, and Windows XP Home Edition. Due to security concerns, you need to improve the security of the single SMS 2.0 SP4 site and upgrade the site to SMS 2003 SP1. What should you do? A. Run the SMS software inventory feature to determine which client computers do not support SMS 2003 SP1. B. Run the SMS hardware inventory feature to determine which client computers do not support SMS 2003 SP1. C. Run the Systems Management Installation Wizard to determine which client computers do not support SMS 2003 SP1. D. Run the Deployment Readiness Wizard to determine which client computers do not support SMS 2003 SP1. Answer: D Explanation: This wizard, the Deployment Readiness Wizard allows you to verify the steps that you should carry out to prepare the site for an upgrade. This wizard will also show if the site meets the required requirements. Incorrect Answers: A: You should not use the SMS software inventory. This is used to collect detailed file information. It is also used to copy files from the client computer to the SMS site or SMS site server. B: You should not use the SMS hardware inventory. This will give you the information of the hardware characteristics of the client computer in an SMS hierarchy. It will not identify the client computers that is not supported by SMS 2003 SP1 C: The Systems Management Installation Wizard is used to install the Legacy client software. Question 5: You work as the SMS administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com SMS 2003 hierarchy is configured as a single primary site. The ITCertKeys.com network contains a Windows 2000 Server SP1 computer named ITCertKeys-SR15 which is the SMS site server and a Microsoft SQL Server 7.0 SP3 computer named ITCertKeys-SR16. You have configured a standard security mode for the SMS site. You have been instructed to improve the security of the SMS site. To this end you decide to migrate the site from the standard security mode to the advance security mode. You want to accomplish this task using the minimum administrative effort. What should you do? A. Migrate the SMS site to advanced security mode. No further action is required B. Upgrade ITCertKeys-SR16 to SQL Server 2000 with Service Pack3 (SP3) and migrate the SMS site to advanced security mode. C. Upgrade ITCertKeys-SR15 to Windows 2000 Server with Service Pack3 (SP3) and migrate the SMS site to advanced security mode. D. Upgrade ITCertKeys-SR15 to Windows Server 2003 and migrate the SMS site to advanced security mode. Answer: B Explanation: To configure an advanced security mode, you need to upgrade from the SQL Server to SQL Server 2000 with SP3. Before you migrate to the advanced security mode, you need to assign the appropriate rights to the relevant computer accounts. Incorrect Answers: A: You cannot migrate from the standard security to the advanced security mode. You first need to upgrade to SQL 2000 Server SP3 as the minimum requirements. C: You should not upgrade ITCertKeys-SR15 to Windows 2000 Server SP3. You need to upgrade CertK NG-SR16 to SQL Server 2000 SP3 or better to migrate for a standard security mode to an advanced security mode. D: You should not upgrade ITCertKeys-SR15 to Windows Server 2003. You need to upgrade ITCertK NG-SR16 to SQL Server 2000 SP3 or better to migrate for a standard security mode to an advanced security mode. Question 6: You work as the SMS administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com SMS 2003 hierarchy is configured as a single primary site. The ITCertKeys.com SMS 2003 site is not configured to use Active Directory. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a server named ITCertKeys-SR32 that contains the SMS site database. The SMS site is configured to use advance security mode. You have been given the instruction to configure the SMS to publish data in Active Directory. Which group membership is needed? A. SMS Admins group is needed to extend the Active Directory schema for SMS. B. Schema Admins group in the local domain where SMS is located is needed to extend the Active Directory schema for SMS. C. SMS Admins group in the root domain is needed to extend the Active Directory schema for SMS. D. Domain Administrators group in the local domain where SMS is located is needed to extend the Active Directory schema for SMS. Answer: C Explanation: To publish data in Active Directory, you should extend the Active Directory schema to enable SMS to use Active Directory. Incorrect Answers: A: To publish data in Active Directory, you should extend the Active Directory schema to enable SMS to use Active Directory. B: You should not extend the Schema Admins group in the local domain where SMS is located. You should extend the Active Directory schema to enable SMS to use Active Directory. D: You should not extend the Domain Administrators group in the local domain where SMS is located. You should extend the Active Directory schema to enable SMS to use Active Directory. Question 7: You work as the SMS administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com SMS 2003 hierarchy is configured as a single primary site. All servers on the ITCertKeys.com network run Windows Server 2003. Half the client computers run Windows 2000 Professional, and the rest run Windows XP Professional. The SMS site is configured to use advance security mode with the all the roles enabled on ITCertKeys-SR42. You need to deploy the Client Push Installation method to install the Advanced Client on all the client computers on the network. You create an account with the appropriate rights to install software on all the client computers. You need to prepare the client computers so that the Advanced Client software can be installed using the Client Push Installation method. What should you do? (Each correct answer presents part of the solution. Choose two.) A. Start the Server service and enable file sharing. B. Start the Telnet service and enable file sharing. C. Create and specify an installation script to run the SMSMan.exe file as the startup script for all the new computers. D. Make sure that the ADMIN$ share exists. Answer: A, D Explanation: You need to enable file sharing and ensue that the ADMIN$ share exists, to start the Server services on the client computers. The Client Push Installation should be created manually, in Active Directory and must have the appropriate permissions to install software. If you want ITCertKeys-SR42 to install the SMS client software, you need to create an account with the suitable rights to install software on the client computers. Incorrect Answers: B: You do need to enable file sharing to guarantee that the ADMIN$ share exists. Telnet services enable a remote client to log on to a client computer. Client Push Installation needs the Server services. C: The SMSMan.exe file runs the System Management Installation Wizard to install Legacy Client software. You cannot use this file to start the Client Push Installation method. Question 8: You work as the SMS administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com SMS 2003 hierarchy is configured as a single primary site. All servers on the ITCertKeys.com network run Windows Server 2003. Half the client computers run Windows 2000 Professional, and the rest run Windows XP Professional. The SMS site is configured to use Advanced Security mode. The SMS site server is named ITCertKeys-SR89. All the roles on the SMS site server are enabled. To enable the Client Push Installation method to install the Advanced Client on all the computers on the network, you created an account and assign it the required rights to install software on all client computers. You need to ensure that ITCertKeys-SR89 will install the Advanced Client on new client computers as soon as they are discovered. What should you do? A. Use the Heartbeat Discovery method and run SMSMan.exe as the startup script for all new computers. B. Use the Active Directory System Discovery method and run Active Directory Discovery to poll data. C. Use the Active Directory System Group Discovery method and run SMSMan.exe as the startup script for all new computers. D. Use the Windows User Account Discovery method and run Active Directory Discovery to poll data. Answer: B Explanation: You should use the Active Directory System Discovery to discover computers by polling active directory containers. With this you can collect the computer name, IP address and Active Directory sites. Incorrect Answers: A: Heartbeat Discovery is used to refresh SMS client computer discovery data in the SMS site directory. Furthermore, the SMSMan.exe file is used to install Legacy Client, not Advanced Client. C: Active Directory System Group Discovery is used to discover groups of computer systems. Furthermore, the SMSMan.exe file is used to install Legacy Client, not Advanced Client. D: You cannot use the Windows user account Discovery to discover client computers. Question 9: You work as the SMS administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com SMS 2003 hierarchy is configured as a single primary site. All servers on the ITCertKeys.com network run Windows Server 2003. Half the client computers run Windows 2000 Professional, and the rest run Windows XP Professional. You need to configure the SMS discovery method for the SMS site and ensure that the client computers which are on the network are discovered when they are powered on. What should you do? A. Use the Heartbeat Discovery method and the Active Directory System Discovery method so that the client computers must be turned on, to be discovered. B. Use the Active Directory System Group Discovery method so that the client computers must be turned on, to be discovered. C. Use the Windows User Account Discovery so that the client computers must be turned on, to be discovered. D. Use the Network Discovery method so that the client computers must be turned on, to be discovered. Answer: A Explanation: You need to use the client computers needs to be turned on to be discovered. Heartbeat Discovery method and the Active Directory System Discovery method Heartbeat Discovery method can also be used to refresh SMS client computer discovery data in the SMS site directory. The Active Directory System Discovery is use to discover computers by polling active directory containers Incorrect Answers: B: The Active Directory Group Discovery method is used to discover system groups for computer systems. The information you will get is organizational units, global groups, universal groups, nested groups and Windows distribution groups. C: You cannot use the Windows user account Discovery to discover client computers. D: The Network Discovery method allows you to discover computers on the network, even when not turned on. Question 10. You work as the SMS administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all the client computers running Windows XP Professional. The ITCertKeys.com network contains a server named ITCertKeys-SR22. The SMS site is configured to use advanced security mode with the entire roles on ITCertKeys-SR22. ITCertKeys.com has its head office in London and branch offices in Paris, Berlin and Athens. The head office in London has a primary SMS site server and each branch office have a secondary SMS site server. The SMS Advanced Client is installed on all client computers in the ITCertKeys.com network. During routine monitoring you find out that SMS Advanced Client at the branch offices are consuming large amounts of network bandwidth by sending client status and inventory data to the London office. You need to make sure that the Advanced Clients send inventory, software metering data and status data to the SMS site server located at their branch offices respectively. What should you? A. Configure each secondary SMS site server as a server locator point to ensure that the Advanced Clients send inventory, software metering data and status data to the local SMS site server. B. Configure each secondary SMS site server as a Client Access Point (CAP) to ensure that the Advanced Clients send inventory, software metering data and status data to the local SMS site server. C. Configure each secondary SMS site server as a distribution point to ensure that the Advanced Clients send inventory, software metering data and status data to the local SMS site server. D. Configure each secondary SMS site server as a proxy management point to ensure that the Advanced Clients send inventory, software metering data and status data to the local SMS site server to ensure that the Advanced Clients send inventory, software metering data and status data to the local SMS site server. Answer: D Explanation: It is best to configure each SMS site server as a proxy management point. The role that there is in SMS 2003 is: client access point, distribution point, server locator point and reporting point. Incorrect Answers: A: You can use the server locator point to deploy Legacy Clients or Advanced Clients or to assign automatically Advanced Clients to sites. The server locator point can also be used to locate Client Access Point (CAP) for Legacy Clients. B: The server locator point is the point of contact between Legacy Clients and SMS site server. You should not configure it. C: You should not configure a distribution point; it is installed on a site server by default.
|
Question 1. Switches ITK1 and ITK2 are connected as shown below: Study the Exhibit carefully. Which ports could safely be configured with Port Fast? (Choose two) A. Switch ITK1 - port Fa1/2 B. Switch ITK2 - port Fa1/2 C. Switch ITK1 - port Fa1/3 D. Switch ITK2 - port Fa1/3 E. Switch ITK1 - port Fa1/1 F. None of the ports should use port fast Answer: C, D Explanation: Using Port Fast: 1. Immediately brings an interface configured as an access or trunk port to the forwarding state from a blocking state, bypassing the listening and learning states 2. Normally used for single server/workstation can be enabled on a trunk So, Port fast can only be enabled to a switch port attaching to workstation or a server. Reference: http://www.911networks.com/node/273 Question 2. You need to configure two ITCertKeys switches to exchange VLAN information. Which protocol provides a method of sharing VLAN configuration information between these two switches? A. STP B. 802.1Q C. VLSM D. ISL E. VTP F. HSRP G. None of the above Answer: E Explanation: VLAN Trunking Protocol (VTP) is a Cisco proprietary Layer 2 messaging protocol that manages the addition, deletion, and renaming of VLANs on a network-wide basis. Virtual Local Area Network (VLAN) Trunk Protocol (VTP) reduces administration in a switched network. When you configure a new VLAN on one VTP server, the VLAN is distributed through all switches in the domain. This reduces the need to configure the same VLAN everywhere. To do this VTP carries VLAN information to all the switches in a VTP domain. VTP advertisements can be sent over ISL, 802.1q, IEEE 802.10 and LANE trunks. VTP traffic is sent over the management VLAN (VLAN1), so all VLAN trunks must be configured to pass VLAN1. VTP is available on most of the Cisco Catalyst Family products. Question 3. ITCertKeys has implemented the use of the Virtual Trunking Protocol (VTP). Which statement below accurately describes a benefit of doing this? A. VTP will allow physically redundant links while preventing switching loops B. VTP will allow switches to share VLAN configuration information C. VTP will allow a single port to carry information to more than one VLAN D. VTP will allow for routing between VLANs E. None of the above Answer: B Question 4. Two ITCertKeys switches are connected together as shown in the diagram below: Exhibit: Based on the information shown above, what will be the result of issuing the following commands: Switch1(config)# interface fastethernet 0/5 Switch1(config-if)# switchport mode access Switch1(config-if)# switchport access vlan 30 A. The VLAN will be added to the database, but the VLAN information will not be passed on to the Switch2 VLAN database. B. The VLAN will be added to the database and VLAN 30 will be passed on as a VLAN to add to the Switch2 VLAN database. C. The VLAN will not be added to the database, but the VLAN 30 information will be passed on as a VLAN to the Switch2 VLAN database. D. The VLAN will not be added to the database, nor will the VLAN 30 information be passed on as a VLAN to the Switch2 VLAN database. E. None of the above Answer: A Explanation: The three VTP modes are described below: Server: This is the default for all Catalyst switches. You need at least one server in your VTP domain to propagate VLAN information throughout the domain. The switch must be in server mode to be able to create, add, or delete VLANs in a VTP domain. You must also change VTP information in server mode, and any change you make to a switch in server mode will be advertised to the entire VTP domain. Client: In client mode, switches receive information from VTP servers; they also send and receive updates, but they can't make any changes. Plus, none of the ports on a client switch can be added to a new VLAN before the VTP server notifies the client switch of the new VLAN. Here's a hint: if you want a switch to become a server, first make it a client so that it receives all the correct VLAN information, then change it to a server-much easier! Transparent: Switches in transparent mode don't participate in the VTP domain, but they'll still forward VTP advertisements through any configured trunk links. These switches can't add and delete VLANs because they keep their own database-one they do not share with other switches. Transparent mode is really only considered locally significant. In our example, the switch is configured for transparent mode. In transparent mode the local VLAN information can be created but that VLAN information will not be advertised to the other switch. Question 5. A ITCertKeys switch is configured with all ports assigned to VLAN 2. In addition, all ports are configured as full-duplex FastEthernet. What is the effect of adding switch ports to a new VLAN on this switch? A. The additions will create more collisions domains. B. IP address utilization will be more efficient. C. More bandwidth will be required than was needed previously. D. An additional broadcast domain will be created. E. The possibility that switching loops will occur will increase dramatically. Answer: D Explanation: A VLAN is a group of hosts with a common set of requirements that communicate as if they were attached to the same wire, regardless of their physical location. A VLAN has the same attributes as a physical LAN, but it allows for end stations to be grouped together even if they are not located on the same LAN segment. Networks that use the campus-wide or end-to-end VLANs logically segment a switched network based on the functions of an organization, project teams, or applications rather than on a physical or geographical basis. For example, all workstations and servers used by a particular workgroup can be connected to the same VLAN, regardless of their physical network connections or interaction with other workgroups. Network reconfiguration can be done through software instead of physically relocating devices. Cisco recommends the use of local or geographic VLANs that segment the network based on IP subnets. Each wiring closet switch is on its own VLAN or subnet and traffic between each switch is routed by the router. The reasons for the Distribution Layer 3 switch and examples of a larger network using both the campus-wide and local VLAN models will be discussed later. A VLAN can be thought of as a broadcast domain that exists within a defined set of switches. Ports on a switch can be grouped into VLANs in order to limit unicast, multicast, and broadcast traffic flooding. Flooded traffic originating from a particular VLAN is only flooded out ports belonging to that VLAN, including trunk ports, so a switch that connects to another switch will normally introduce an additional broadcast domain. Question 6. A new switch is installed in the ITCertKeys network. This switch is to be configured so that VLAN information will be automatically distributed to all the other Cisco Catalyst switches in the network. Which of the conditions below have to be met in order for this to occur? (Choose all that apply). A. The switch that will share the VLAN information must be in the VTP Server mode. B. The switches must be in the same VTP domain. C. The switch that will share the VLAN information must be configured as the root bridge. D. The switches must be configured to use the same VTP version. E. The switches must be configured to use the same STP version. F. The switches must be configured to use the same type of ID tagging. G. The switches must be connected over VLAN trunks. Answer: A, B, F, G Explanation: For the VLAN information to pass automatically throughout the network, VTP must be set up correctly. In order for VTP to work, a VTP server is needed, the VLAN's must be in the same VTP domain, and the encapsulation on each end of the trunk must both set to either 802.1Q or ISL. Incorrect Answers: C. Root bridges and other functions of the Spanning Tree Protocol (STP) have no impact of the VTP configuration. D, E. There is only one version of VTP and STP. Question 7. A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role of the Root Bridge? A. Configure the switch so that it has a lower priority than other switches in the network. B. Assign the switch a higher MAC address than the other switches in the network have. C. Configure the switch for full-duplex operation and configure the other switches for half-duplex operation. D. Connect the switch directly to the MDF router, which will force the switch to assume the role of root bridge. E. Establish a direct link from the switch to all other switches in the network. F. None of the above Answer: A Explanation: For all switches in a network to agree on a loop-free topology, a common frame of reference must exist. This reference point is called the Root Bridge. The Root Bridge is chosen by an election process among all connected switches. Each switch has a unique Bridge ID (also known as the bridge priority) that it uses to identify itself to other switches. The Bridge ID is an 8-byte value. 2 bytes of the Bridge ID is used for a Bridge Priority field, which is the priority or weight of a switch in relation to all other switches. The other 6 bytes of the Bridge ID is used for the MAC Address field, which can come from the Supervisor module, the backplane, or a pool of 1024 addresses that are assigned to every Supervisor or backplane depending on the switch model. This address is hardcoded, unique, and cannot be changed. The election process begins with every switch sending out BPDUs with a Root Bridge ID equal to its own Bridge ID as well as a Sender Bridge ID. The latter is used to identify the source of the BPDU message. Received BPDU messages are analyzed for a lower Root Bridge ID value. If the BPDU message has a Root Bridge ID (priority) of the lower value than the switch's own Root Bridge ID, it replaces its own Root Bridge ID with the Root Bridge ID announced in the BPDU. If two Bridge Priority values are equal, then the lower MAC address takes preference. Question 8. Which of the protocols below, operates at Layer 2 of the OSI model, and is used to maintain a loop-free network? A. RIP B. STP C. IGRP D. CDP E. VTP F. None of the above Answer: B Explanation: STP (spanning tree protocol) operates on layer 2 to prevent loops in switches and bridges. Incorrect Answers: A, C. RIP and IGRP are routing protocols, which are used at layer 3 to maintain a loop free routed environment. D. CDP does indeed operate at layer 2, but it doest not provide for a loop free topology. CDP is used by Cisco devices to discover information about their neighbors. E. VTP is the VLAN Trunking Protocol, used to pass VLAN information through switches. It relies on the STP mechanism to provide a loop free network. Question 9. By default, which of the following factors determines the spanning-tree path cost? A. It is the individual link cost based on latency B. It is the sum of the costs based on bandwidth C. It is the total hop count D. It is dynamically determined based on load E. None of the above Answer: B Explanation: "The STP cost is an accumulated total path cost based on the available bandwidth of each of the links." Reference: Sybex CCNA Study Guide 4th Edition (Page 323) Note: A path cost value is given to each port. The cost is typically based on a guideline established as part of 802.1d. According to the original specification, cost is 1,000 Mbps (1 gigabit per second) divided by the bandwidth of the segment connected to the port. Therefore, a 10 Mbps connection would have a cost of (1,000/10) 100. To compensate for the speed of networks increasing beyond the gigabit range, the standard cost has been slightly modified. The new cost values are: You should also note that the path cost can be an arbitrary value assigned by the network administrator, instead of one of the standard cost values. Incorrect Answers: A, D: The STP process does not take into account the latency or load of a link. STP does not recalculate the link costs dynamically. C. Hop counts are used by RIP routers to calculate the cost of a route to a destination. The STP process resides at layer 2 of the OSI model, where hop counts are not considered. Question 10. What is the purpose of the spanning-tree algorithm in a switched LAN? A. To provide a monitoring mechanism for networks in switched environments. B. To manage VLANs across multiple switches. C. To prevent switching loops in networks with redundant switched paths. D. To segment a network into multiple collision domains. E. To prevent routing loops in networks. Answer: C Explanation: STP is used in LANs with redundant paths or routes to prevent loops in a layer 2 switched or bridged LAN. Incorrect Answers: A, B: The primary purpose of STP is to prevent loops, not for monitoring or management of switches or VLANs. D. VLANs are used to segment a LAN into multiple collision domains, but the STP process alone does not do this. E. Routers are used to prevent routing loops at layer 3 of the OSI model. STP operates at layer 2.
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.