You are on page 1of 2

What are three benefits of implementing VSS in a network? (Choose three.

)
-Single management point
-Neighbors see the VSS as a single switch
-Interchassis stateful failover

A network administrator is designing a network with redundancy features such SSO with
NSF. What protocol is should the administrator avoid while designing the routing
topology?
RIP

What are two characteristics of the StackWise technology? (Choose two.)


-Multiple switches can create an EtherChannel connection.
-Unites multiple access switches in the same rack.

What is considered a best practice for an optimal redundant network?


Access switches should have redundant connections to redundant distribution switches.
What is the main purpose of implementing Cisco NSF?
to continue forwarding IP packets following an RP switchover
Which one of the following features provides the fastest failover for supervisor or route
processor redundancy?
SSO

When using RPR, what two events can trigger a switchover from the active to the
standby Supervisor Engine? (Choose two.)
-clock synchronization failure between the Supervisor Engines.
-an RP or SP crash on the active Supervisor Engine

What are three characteristics of the VSS technology? (Choose three.)


-VSS combines a pair of physical switches into a virtual switch.
-Once the VSS is formed, only the control plan of one of the member's is active.
-VSS increases system bandwidth capacity.

Which three redundancy modes are supported by Catalyst 6500 Series switches?
(Choose three.)
-Route Processor Redundancy (RPR)
-Single Router Mode with Stateful Switchover (SRM with SSO)
-Nonstop Forwarding (NSF) with SSO

What is the expected failover time for SSO mode for Layer 2 switching on the Catalyst
4500 family of switches?
Subsecond

Which command can be used to verify StackWise configuration to include their stack
number, stack role, MAC address, hardware priority, hardware version and current
state?
show switch
To display configuration and status information for a VSS, which show command can be
used?
show switch virutal

Which one is NOT a valid supervisor redundancy mode?


NSF

Which two technologies can be used to reduce the number of logical network devices
and simplify Layer 2 and Layer 3 network toplogies? (Choose two.)
VSS

Which supervisor redundancy mode offers the fastest failover time?


SSO

How should unused ports on a switch be configured in order to prevent VLAN hopping
attacks?
Configure them as access ports and associate them with an unused VLAN.

What are two purposes for an attacker launching a MAC table flood? (Choose two.)
-to initiate a denial of service (DoS) attack
-to capture data from the network

A network administrator is tasked with protecting a server farm by implementing private


VLANs. Each server should only be allowed to communicate with the default gateway.
Which type of pVLAN should be configured on the switch port that connects to a server?
isolated

What is one way to mitigate spanningtree compromises?


Statically configure the primary and backup root bridge.

How does MAC address flooding cause a vulnerability in the network?


The CAM table will be full, causing legitimate frames to be forwarded out all ports within
the VLAN and allowing unauthorized users to capture data.

What can be used to mitigate MAC table flooding attacks?


port security

You might also like