408
Appendix
■
Answers to Practice Test Questions
37. B. When a link in a Link Aggregation (LAG) fails, the remaining traffic will be migrated
over to the active link. No packet loss should be noticed, except for the initial failover.
The links will not enter an err-disabled mode or be administratively disabled; this can
only happen if there is a mismatch of protocols or the interfaces are shut down manually.
All traffic is migrated to the active link, so no degradation should be seen on the active
interface unless it is at peak capacity.
38. D. The TACACS+ protocol will encrypt the entire packet from the switch or router to the
AAA server. This is performed with the use of a pre-shared key (PSK) that is configured
on both the TACACS+ device and the AAA server. 802.1X will not encrypt the entire
packet from the switch or router to the AAA server. IPsec is an open standard for
encryption of packets, but it is not commonly used to encrypt the transmission of a switch
or router to an AAA server. A Remote Authentication Dial-In User Service (RADIUS)
server is an AAA server, and therefore, it is an invalid answer.
39. D. The Secure Copy Protocol (SCP) will encrypt the IOS over the network during an
upgrade from the client computer. The HyperText Transfer Protocol (HTTP) is an
unencrypted protocol normally used to transfer web pages across the Internet. The Trivial
File Transfer Protocol (TFTP) is an unencrypted protocol for transferring files without
any security. TFTP is often used to copy configuration or upgrade firmware on network
devices. The File Transfer Protocol (FTP) is a legacy protocol used to transfer files between
hosts. FTP operates in clear text and provides no encryption for the file transfers.
40. B. When you configure a WLAN and use the default QoS settings, the effective QoS is
silver. Gold is used for video application on a wireless network. Bronze is the lowest level
of traffic for unimportant traffic. Platinum is the highest level of traffic, and it is usually
reserved for voice traffic over wireless.
41. D. Your packets are most likely making it to the destination host. However, there is no
route back to your host on the other network’s router. You must enter a network route on
Router B to get to Network A. You would not have been able to configure a route if the
ip
routing command was needed. The hosts on Network A and Network B are most likely
not the problem.
42. A. Enhanced Interior Gateway Routing Protocol (EIGRP) has the lowest administrative
distance (AD) of the three protocols. Therefore, regardless of the metric, the lowest AD
will always be chosen. All of the other options are incorrect.
43. A. Serial interfaces are point-to-point connections. Any traffic directed down the interface
will automatically appear on the adjacent router. Routers will not process traffic normally
unless Proxy ARP is configured for the interface. All of the other options are incorrect.
44. B. The administrative distance (AD) can be added to the end of the route statement. Since RIP
has an administrative distance of 120, 130 will be chosen if the RIP route is not present.
The command
ip route 192.168.2.0 255.255.255.0 192.168.4.1 110 is incorrect.
The command
ip route 110 192.168.2.0 255.255.255.0 192.168.4.1 is incorrect.
The command
ip route 130 192.168.2.0 255.255.255.0 192.168.4.1 is incorrect.
Chapter 8: Practice Exam 2
Do'stlaringiz bilan baham: |