A Yes Traffic can pass either from switch S6 to S3 to S2 to S1 or from switch

A yes traffic can pass either from switch s6 to s3 to

This preview shows page 234 - 237 out of 409 pages.

A. Yes. Traffic can pass either from switch S6 to S3 to S2 to S1, or, from switch S6 to S5 to S2 to S1. B. No. Traffic will pass from switch S6 to S5 and dead-end at interface Gi 0/0. C. No. Traffic will loop back and forth between switch S5 and S2. D. Yes. Traffic will pass from switch S6 to S3 to S2 to S1. E. No. Traffic will either pass from switch S6 to S5 and dead-end, or traffic will pass from switch S6 to S3 to S2 and dead-end. Answer: D Question: 272 Refer to the exhibit. The service provider wants to ensure that switch S1 is the root switch for its own network. On which interfaces should root guard be configured to ensure that this happens?
Image of page 234
A. interfaces 1 and 2 B. interfaces 1, 2, 3, and 4 C. interfaces 1, 3, 5, and 6 D. interfaces 5 and 6 E. interfaces 5, 6, 7, and 8 F. interfaces 11 and 12 Answer: D Question: 273 Which two statements about the Cisco Aironet Desktop Utility (ADU) are true? (Choose two.) A. The Aironet Desktop Utility (ADU) can be used to establish the association between the client adapter and the access point, manage authentication to the wireless network, and enable data encryption. B. The Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can be used at the same time to configure the wireless client adapter. C. The Aironet Desktop Utility (ADU) can support only one wireless client adapter installed and used at a time. D. The Aironet Desktop Utility (ADU) profile manager feature can create and manage only one profile for the wireless client adapter. E. When the user selects a different profile in the Aironet Desktop Utility (ADU), the settings for the wireless client adapter are changed only after a reboot. Answer: A, C Question: 274
Image of page 235
Which description correctly describes a MAC address flooding attack? A. The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device. B. The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device. C. The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device. D. The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device. E. Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
Image of page 236
Image of page 237

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture