Which of the following solutions would you implement to eliminate switching loops?

  1. You have implemented a network where hosts are assigned specific roles, such as file sharing and printing roles. Other hosts access those resources, but do not host services of their own. What type of network do you have? Peer-to-peer Client­server Intranet Extranet

  2. You have implemented a network where each device provides all other devices on the network with access to shared files. What type of network do you have? Peer­to­peer Client-server Polling Multiple access

  3. Your manager has asked you to implement a wired network infrastructure that will accommodate failed connections. You don't have a large budget, so you decide to provide redundancy for only a handful of critical devices. Which of the following network topologies should you implement? Full mesh Bus Star Partial mesh

  4. What is the binary format for the following decimal IP address? 131.9. 10000011.00001001. 10000110.00001011. 10000111.00001101. 10000001.00001010.

  5. What is the decimal format of the following binary IP address? 11001110.00111010. 206.58. 205.57. 238.90. 190.42.

  6. Which of the following connectors is used with Ethernet 100BaseT networks? ST BNC RJ RJ

  7. Which of the following connector types would you most likely use to connect to a T WAN service? RJ RJ48c GG RJ

  8. Which type of optical fiber is normally used to connect two buildings that are several kilometers apart? Single­mode Dual-mode Multi-mode Fibre Channel mode

  9. Which device sends signals from a computer onto a network? Transceiver Router Cable Gateway

  10. Which of the following best describes how a switch functions? It connects multiple cable segments (or devices) and forwards frames to the appropriate segment. It connects multiple cable segments (or devices) and broadcasts frames to all of its ports. It connects multiple segments of different architectures. It translates frames and forwards them to the appropriate segment. It connects multiple segments of different architectures. It translates frames and broadcasts them to all of its ports.

  11. Which of the following devices does not segment the network? Hub Switch Router Firewall

  12. Which of the following use the CSMA/CD access method? 1000BaseT 10BaseFL Token Ring FDDI

  13. The media access control method of all Ethernet networks is. CSMA/CD CSMA/CA Token passing Polling

  14. Ethernet 100BaseFX networks use what type of cabling? Fiber optic Coaxial Unshielded twisted pair Shielded twisted pair

  15. What type of cabling is used with 100BaseTX Fast Ethernet networks? Cat5 or higher Fiber optic Cat Cat

  16. Which of the following standards is typically used in a rollover cable? RS232 RG6 RG58 RJ

  17. What is the default subnet mask for the IP address 203.111.3? 255.255. 255.255. 255.0. 255.255.

26 command would you use on a switch to enable management from a remote network? ip default­gateway 192.168. ip address dhcp ip address 192.168.10 255.255. no shutdown

27 you configure VLANs on a switch, which of the following is used to identify a device's VLAN membership? Switch port MAC address IP address Host name

  1. Which of the following solutions would you implement to eliminate switching loops? Inter-VLAN routing Spanning tree Auto-duplex CSMA/CD

  2. What does the ip address dhcp command allow you to do? Configure the switch to obtain an IP address from a DHCP server. Specify the DHCP relay server for forwarding DHCP packets. Configure the switch to act as a DHCP server. Send the DHCP server address to all connected devices.

  3. Which of the following connectivity hardware is used to create a VLAN? Bridge Switch

Router Hub

  1. Which of the following routing protocols uses relative link cost as the metric? OSPF EIGRP RIP BGP

  2. What are the main differences between the OSPF and IS-IS routing protocols? OSPF is a link state protocol, while IS­IS is not. OSPF requires an area 0, while IS-IS does not. OSPF is an IGP routing protocol, while IS-IS is a BGP routing protocol. OSPF is a classful protocol, while IS-IS is a classless protocol.

  3. Which of the following utilities would you use to view the routing table? Traceroute tracert mtr dig route

  4. Your computer has an IP address of 161.13.5. Your computer is on a? Public network Private network Class C network Multi-cast network

  5. Which of the following associates a port number with a host on a private network?

Session ID Username and password

  1. Which firewall implementation creates a buffer network that can be used to host email or web servers? DMZ ACL Perimeter firewall Host-based firewall

  2. Which VoIP device helps establish the connection between two VoIP phones? VoIP server VoIP gateway VoIP endpoint VoIP codec

42 of the following protocols is an open source protocol used by most manufacturers of VoIP systems? Session initiation protocol (SIP) Stream control transmission protocol (SCTP) User datagram protocol (UDP) Transmission control protocol (TCP)

  1. What type of virtualization completely simulates a real physical host? Full virtualization

Partial virtualization Paravirtualization Semi-virtualization

  1. Which component is most likely to allow physical and virtual machines to communicate with each other? Virtual switch VHD Host operating system Virtual desktop

  2. Which of the following cloud computing solutions will deliver software applications to a client either over the internet or on a local area network? IaaS PaaS SaaS DaaS

What is used to stop switching loops in a switched network with redundant paths?

Explanation: The Spanning Tree Protocol is used to stop switching loops in a switched network with redundant paths.

Which problem does the Spanning Tree Protocol prevent?

The Spanning Tree Protocol (STP) is a network protocol that is used to eliminate bridge loops in Ethernet LANs. STP prevents network loops and associated network outage by blocking redundant links or paths. The redundant paths can be used to keep the network operational if the primary link fails.

How can you guarantee that switch C becomes the root bridge?

How can you guarantee that switch C becomes the root bridge? Configure switch C with a lower port priority value.

Which feature ensures there is only a single active path between any two switches?

Spanning Tree Protocol (STP) is a link management protocol that provides path redundancy while preventing undesirable loops in the network. When it comes to ethernet networks, only one active path can exist between two stations in order for them to function properly.