Professional Documents
Culture Documents
1
a
b
c
d
d transfer
5 Which of the following commands use the Virtual Router parameter?
a use
b tftp
c edit
d save
6
a
b
c
d
7 How many software images may be stored on the switch at the same time?
a1
b2
c3
d It depends on the amount of free memory
8 Which command enables the system administrator to save the current
configuration to a file named myConfig.cfg that will be stored on the switch?
a store configuration myConfig
b write configuration myConfig
c put configuration myConfig
d save configuration myConfig
11 In the display of the show switch command which field identifies the currently
running software?
a Primary
b Secondary
c Image Selected
d Image Booted
12 XOS core image files typically end with which one of the following extensions?
a .xos
b .xmod
c .xbr
d all of the above
13 The upload command is used for which of the following?
a To transfer a core image to a TFTP server as a binary file.
b To transfer a configuration file to a TFTP server as XML-formatted file.
c To transfer a configuration file to a TFTP server as an ASCII-formatted
command script.
d To transfer a configuration file to a TFTP server as compressed backup
configuration file.
14 Which of the following commands saves the configuration to the secondary
location?
a save configuration secondary
b use configuration secondary
c save image secondary
d use secondary
15 Which of the following commands configures the switch to boot from the
software image in the primary location on the next boot up?
a boot image primary
b use configuration primary
c save image primary
d use image primary
16 The use image primary command does which of the following?
a Causes the switch to load the primary image file in to memory and cause it to
immediately execute without a reboot.
b Causes the switch to load the primary image file in to memory and cause it to
execute on the next reboot.
c Causes the switch to clear the current configuration in memory and then
immediately load the primary configuration image.
d Causes the switch to load the primary configuration image after next
reboot.
17 Which of the following commands copies the primary configuration file to
backup.cfg?
c Standby
d Standalone
5 The functionality of which of the following may be compared to the
functionality of a Master MSM?
a Master Switch Unit
b Backup Master Switch Unit
c Standby Switch Unit
d Standalone Switch Unit
6
a
b
c
d
7 Which of the following traffic types manages the function of the stack?
a Unicast Traffic
b Multicast Traffic
c VLAN Traffic
d Topology Traffic
8 Which of the following statements is true in regards to the way the stack
handles unicast traffic?
a Unicast traffic can be sent and received traffic on both stacking ports.
b Unicast traffic is handled by the switching fabric and not the CPU.
c Unicast traffic may be transmitted by any port in the stack as no ports are
blocked.
d All of the above
9 Which of the following statements is true in regards to the way the stack
handles known multicast traffic?
a Multicast traffic is handled by the CPU when traversing the stack.
b Multicast traffic is only sent out of stack port 1.
c Multicast traffic requires that ports be blocked to prevent loops. The
port that is blocked is based upon the multicast group address.
d All of the above
10 Which of the following parameters are taken into account when electing the
stack master?
a Master capability
b Stacking priority
c Slot number
d All of the above
11 Which of the following is true about how the stack manages its configuration?
a The master unit is responsible for configuring all devices in the stack.
b Each unit in the stack is responsible to manage its own configuration files and
to configure itself.
c The master switch and the backup master switch split configuration
responsibilities. Each
manages half of the units in the stack.
d All of the above
CH-6
1 Which of the following commands configures normal flooding behavior on ports
1 through 6 on a switch?
a flood ports 1-6 all_cast
b enable flooding all_cast ports 1-6
c configure ports 1-6 enable flooding all_cast
d configure all_cast flooding ports 1-6
2 Which of the following commands removes a permanent Layer-2 FDB entry?
a configure fdbentry delete 00:E0:2B:12:34:56 vlan finance
b delete fdbentry 00:E0:2B:12:34:56 vlan finance
c delete fdb permanent 00:E0:2B:12:34:56
d delete fdb 00:E0:2B:12:34:56 permanent
3 Which of the following best describes an Extreme Networks Ethernet switch?
a A remote bridge
b A transparent bridge
c A source route bridge
d A source route transparent bridge
4 What action does the switch take when a packet is received on a port and the
source MAC address does not already exist in the FDB?
a The source MAC address is learned and added to the FDB.
b The switch filters the frame at the port.
c The destination MAC address is learned and added to the FDB.
d The source MAC address is added to the FDB as a black hole entry.
5 Which of the following are the switch functions related to Layer-2 forwarding?
a Flooding, learning, forwarding, and filtering.
b Blocking, learning, forwarding, and filtering.
c Blocking, listening, learning, and forwarding.
d Listening, learning, filtering, and forwarding.
6 What part of the Ethernet packet does a transparent bridge use to make
forwarding decisions?
a The destination Layer-3 address
b The Layer-3 protocol type field
c The Layer-2 protocol type field
d The destination MAC address
c Unknown Unicast
d All of the above
19 Which of the following describes how MAC addresses from unknown stations
are handled after the limit-learning threshold has been reached?
a MAC addresses are ignored and packets originated by these stations are
dropped
b MAC addresses are learned and packets originated by these stations are
dropped
c MAC addresses are learned as black hole entries and packets originated by
these stations are dropped
d MAC addresses are learned as black hole entries and packets
originating from these stations are forwarded
20 Which of the following commands enable you to view the Layer 2 forwarding
database?
a show Layer 2 forwarding table
b display L2 table
c show fdb
d L2 view
Layer 2 Forwarding
21 Which of the following commands enable you to add an entry to the Layer 2
forwarding database?
a add fdbentry
b create fdbentry
c fdbentry create
d fdbentry add
22 Which two commands of the following list enable you to remove entries from
the Layer 2
forwarding database?
a delete fdbentry / clear fdb
b clear fdbentry / delete fdb
c remove fdbentry / unconfigure fdb
d unconfigure fdbentry / remove fdb
23 Which of the following networking devices defines the boundary of a collision
domain?
a Hub
b Bridge
c Repeater
d All of the above
Introduction to VLANs
CH-7
1 Which of the following commands configures the green VLAN with a tag of 54?
a
b
c
d
d 4095
9 A VLAN defines which type of domain?
a The collision domain
b The broadcast domain
c The routing domain
d The physical topology
10 What is the IEEE specification for VLAN tagging?
a 802.1Q
b 802.1W
c 802.1D
d 802.1p
11 Which types of packets are flooded throughout the VLAN?
a known unicast
b broadcast
c PING
d collision detection
12 Port-based VLANs are also known by which other name?
a MAC-Based VLANs
b Tagged VLANs
c Protocol VLANs
d Untagged VLANs
Introduction to VLANs
13 What is VLAN tagging primarily used for?
a To transparently interconnect existing VLANs in separate locations across a
Metropolitan Area Network.
b To dynamically determine VLAN membership based on the MAC address of the
end stations connected to the physical port.
c To dynamically determine VLAN membership based on a specified protocol.
d To create VLANs that span multiple switches using uplinks.
14 Which of the following best describes protocol-based VLANs?
a Dynamically assigns end stations to a VLAN based on the MAC address.
b Dynamically assigns end stations to a VLAN based on the Layer-3 address.
c Dynamically forwards packets within a VLAN based on a protocol filter.
d Dynamically forwards packets within a VLAN based on the physical layer.
15 Which command displays the configuration of VLAN Blue?
a show VLAN Blue
b display VLAN Blue
c confirm VLAN Blue
d show VLAN Blue config
Spanning Tree
CH-8
1 What is the spanning tree protocol used for?
a To provide fast protection switching for Layer 2 switches interconnected in an
Ethernet ring topology.
b To prevent loops in a redundant network topology.
c To use a group of ports to carry traffic in parallel between switches.
d To guarantee packet sequencing across redundant links.
2
a
b
c
d
8 Which of the following commands activates the default spanning tree domain?
a create stpd s0
b enable stpd s0
c create stpd s1
d enable stpd default
9 Which of the following commands configures the spanning tree bridge port
cost?
a configure stp port cost 15 6
b configure port cost 15 6
c configure stpd s0 port cost 15 6
d configure stpd bridgeport cost 15 6
10 Which of the following commands displays the configuration of the default
spanning tree?
a show stpd s0
b show stp
c show stp default
d show stpd default
11 Which of the following commands configures the spanning tree bridge
priority?
a configure stp bridge priority 4
b configure bridge priority 4
c configure stpd s0 priority 4
d configure stpd default priority 4
Spanning Tree
12 Which of the following commands configures the VLAN blue to participate in
the spanning tree protocol?
a configure vlan blue add stpd s0
b configure stpd s0 add vlan blue port 1,2,3
c configure stpd default add vlan blue port 1,2,3
d configure stpd default add vlan blue
13 Which of the following spanning tree parameters is used to influence which
port is elected as the designated port?
a The port priority
b The hello timer
c The bridge cost
d The bridge priority
Ethernet Automatic Protection Switc
CH-9
1 Which of the following blocks the secondary port for all non-control traffic
belonging to a specific EAPS domain?
a Master Node
b Transport Node
c Primary Node
d Transit Node
2
a
b
c
d
8 The switch cannot route statically until which of the following happens?
a The VLAN is assigned an IP address, neighbor gateways establish adjacencies,
the VLAN is
configured to use static routes, and the router interface is active.
b The VLAN is assigned an IP address, neighbor gateways establish adjacencies,
the VLAN is
configured to use static routes, and IP forwarding is enabled globally.
c The VLAN is assigned an IP address, IP forwarding is enabled, the VLAN is
active, and neighbor gateways establish adjacencies.
d The VLAN is assigned an IP address, IP forwarding is enabled, the
VLAN is configured to use static routes, and the router interface is
active.
4 The switch cannot route using RIP until which of the following happens?
a The VLAN is assigned an IP address, neighbor gateways establish adjacencies,
RIP is enabled globally, the VLAN is configured to use RIP, and the router
interface is active.
b The VLAN is assigned an IP address, RIP is enabled globally, neighbor gateways
establish
adjacencies, the VLAN is configured to use RIP, and IP forwarding is enabled
globally.
c The VLAN is assigned an IP address, IP forwarding is enabled, the VLAN is
active, and RIP is enabled globally.
d The VLAN is assigned an IP address, IP forwarding is enabled, the
VLAN is configured to use RIP, the router interface is active, and RIP is
enabled globally.
5 Which of the following is true when using RIP?
a Upon expiration of the garbage timeout, the route is no longer valid; however,
it is retained in the routing table until the expiration of the route timer.
b Upon expiration of the route timeout, the route is no longer valid;
however, it is retained in the routing table until the expiration of the
garbage timer.
c Upon expiration of the route timeout, the route is marked suspect; however, it
is retained in the routing table until the expiration of the hello timer.
d Upon expiration of the hello timeout, the route is marked suspect; however, it
is retained in the routing table until the expiration of the route timer.
6 Which of the following commands displays the state of the Split Horizon
feature?
a show ipconfig
b show rip
c show iproute
d show fdb
7 Which of the following commands show the RIP peer routers?
a show ipconfig
b show iproute
c show rip interface
d show rip routes
8 In a distance-vector routing algorithm, what is the name of the condition when
a router believes it has two routes to the target network when only one actually
exists?
a Routing loop.
b Split horizon.
c Poison reverse.
d Slow convergence
CH-11
1
a
b
c
d
2
a
b
c
d
8 Which of the following commands shows the OSPF link state identifiers and
router ID for all reachable subnetworks?
a
b
c
d
show ipconfig
show ospf
show ospf lsdb
show ospf area 0.0.0.0
d configure ospf dr 1
15 How many levels of hierarchy does OSPF support?
a One
b Two
c Three
d Sixteen
16 Which of the following best describes the unique requirements of OSPF area
0?
a It must be connected to all areas in an OSPF autonomous system.
b External route information is not distributed in this area.
c It is connected to other areas through ABRs.
d External routes originating from an ASBR connected to this type of area can be
propagated to
other areas.
17 What do OSPF routers use to discover their neighbors?
a Router Link-state Advertisements.
b Router discovery packets.
c Extreme Discovery Protocol packets.
d Hello packets.
18 What is the relationship between autonomous systems and areas?
a One autonomous systems can contain multiple areas.
b One area can contain multiple autonomous systems.
19 What types of networks use an OSPF designated router?
a Point-to-Point
b Point-to-Multipoint
c Broadcast
d Asynchronous
Network Login Using Local MAC-Based Authentica
CH-12
1 Which of the following is NOT an advantage of using local MAC-based
authentication?
a Works with any operating system or network enabled device.
b Works silently. The user, client, or device does not know that it gets
authenticated.
c Is easy to implement. A set of devices can easily be grouped by the vendor part
of the MAC address.
d MAC address database administration can incur a great deal of
overhead.
2 Which of the following scenarios describes when it is appropriate to use MACbased authentication?
c RIP
d EAPS
3 Which of the Profile rules stated below is NOT true?
a Profiles are non-persistent by default
b Profiles are stored on the RADIUS server
c Profiles cannot exceed 5000 characters
d There is a limit of 128 Universal Port profiles per switch
4
a
b
c
d
5
a
b
c
d
6 What command shows you the Universal Port event triggers and profiles on an
Extreme Networks'
switch?
a show upm profiles
b show log match upm
c show lldp neighbors
d show history
CH-13
1 Which of the following provides a definition of QoS?
a QoS is a set of protocols and mechanisms that facilitate the delivery
of delay and bandwidth sensitive material across data networks.
b QoS provides a means of securing bandwidth against potential attackers.
c QoS provides an absolute guarantee that all high-priority traffic will be
delivered to the
destination.
d QoS ensures that all voice and video traffic will be sent ahead of nonmultimedia traffic.
2 Which one of the following is not a goal of traffic engineering?
a Optimize network usage
b Ensure user authentication prior to granting network access.
c Increase the robustness of the network infrastructure
d Optimize network performance
3 Which of the following statements indicates a need for QoS?
Switch Diagnostics
Review Questions
1 Which of the following is not included as a part of the ExtremeXOS diagnostic
tool set?
a Power-on self-test (POST)
b Switch-wide communication-path packet error health checker.
c On-demand system hardware diagnostics
d Oscilloscope
2 Which of the following indicates how often the Power-on self-test (POST) is run?
a The Power-on self-test (POST) runs every time the system is booted.
Which of the following LED states indicates that the link is down?
Solid green
Green blinking
Of
Solid Amber