web analytics

Quality PassLeader Oracle 200-120 Practice Tests With 100 Precent Real Exam Questions (31-40)

QUESTION 31
Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?

A.    pingaddress
B.    tracertaddress
C.    tracerouteaddress
D.    arpaddress

Answer: A
Explanation:
ICMP pings are used to verify connectivity between two IP hosts. Traceroute is used to verify the router hop path traffic will take but in this case since the hosts are in the same LAN there will be no router hops involved.

QUESTION 32
Which two of these are characteristics of the 802.1Q protocol? (Choose two.)

A.    It is used exclusively for tagging VLAN frames and does not address network reconvergence following switched network topology changes.
B.    It modifies the 802.3 frame header, and thus requires that the FCS be recomputed.
C.    It is a Layer 2 messaging protocol which maintains VLAN configurations across networks.
D.    It includes an 8-bit field which specifies the priority of a frame.
E.    It is a trunking protocol capable of carrying untagged frames.

Answer: BE
Explanation:
802.1Q protocol, or Virtual Bridged Local Area Networks protocol, mainly stipulates the realization of the VLAN. 802.1Q is a standardized relay method that inserts 4 bytes field into the original Ethernet frame and re-calculate the FCS. 802.1Q frame relay supports two types of frame: marked and non-marked. Non-marked frame carries no VLAN identification information.

QUESTION 33
What is one benefit of PVST+?

A.    PVST+ supports Layer 3 load balancing without loops.
B.    PVST+ reduces the CPU cycles for all the switches in the network.
C.    PVST+ allows the root switch location to be optimized per VLAN.
D.    PVST+ automatically selects the root bridge location, to provide optimized bandwidth usage.

Answer: C
Explanation:
The PVST+ provides Layer 2 load-balancing for the VLAN on which it runs. You can create different logical topologies by using the VLANs on your network to ensure that all of your links are used but that no one link is oversubscribed. Each instance of PVST+ on a VLAN has a single root switch. This root switch propagates the spanning-tree information associated with that VLAN to all other switches in the network. Because each switch has the same information about the network, this process ensures that the network topology is maintained and optimized per VLAN.
Reference:
http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/12.2_55_se/configuration/guide/swstp.html

QUESTION 34
Which are valid modes for a switch port used as a VLAN trunk? (Choose three.)

A.    transparent
B.    auto
C.    on
D.    desirable
E.    blocking
F.    forwarding

Answer: BCD

QUESTION 35
Which three of these statements regarding 802.1Q trunking are correct? (Choose three.)

A.    802.1Q native VLAN frames are untagged by default.
B.    802.1Q trunking ports can also be secure ports.
C.    802.1Q trunks can use 10 Mb/s Ethernet interfaces.
D.    802.1Q trunks require full-duplex, point-to-point connectivity.
E.    802.1Q trunks should have native VLANs that are the same at both ends.

Answer: ACE
Explanation:
By default, 802.1Q trunk defined Native VLAN in order to forward unmarked frame. Switches can forward Layer 2 frame from Native VLAN on unmarked trunks port. Receiver switches will transmit all unmarked packets to Native VLAN. Native VLAN is the default VLAN configuration of port. Note for the 802.1Q trunk ports between two devices, the same Native VLAN configuration is required on both sides of the link. If the Native VLAN in 802.1Q trunk ports on same trunk link is properly configured, it could lead to layer 2 loops. The 802.1Q trunk link transmits VLAN information through Ethernet.


PassLeader[17]

http://www.passleader.com/200-120.html

QUESTION 36
Which term describes a spanning-tree network that has all switch ports in either the blocking or fowarding state?

A.    converged
B.    redundant
C.    provisioned
D.    spanned

Answer: A
Explanation:
Spanning Tree Protocol convergence (Layer 2 convergence) happens when bridges and switches have transitioned to either the forwarding or blocking state. When layer 2 is converged, root bridge is elected and all port roles (Root, Designated and Non-Designated) in all switches are selected.

QUESTION 37
What are the possible trunking modes for a switch port? (Choose three.)

A.    transparent
B.    auto
C.    on
D.    desirable
E.    client
F.    forwarding

Answer: BCD

QUESTION 38
Which two of these statements regarding RSTP are correct? (Choose two.)

A.    RSTP cannot operate with PVST+.
B.    RSTP defines new port roles.
C.    RSTP defines no new port states.
D.    RSTP is a proprietary implementation of IEEE 802.1D STP.
E.    RSTP is compatible with the original IEEE 802.1D STP.

Answer: BE
Explanation:
When network topology changes, rapid spanning tree protocol (IEEE802.1W, referred to as RSTP) will speed up significantly the speed to re-calculate spanning tree. RSTP not only defines the role of other ports: alternative port and backup port, but also defines status of 3 ports: discarding status, learning status, forwarding status. RSTP is 802.1D standard evolution, not revolution. It retains most of the parameters, and makes no changes.

QUESTION 39
Three switches are connected to one another via trunk ports. Assuming the default switch configuration, which switch is elected as the root bridge for the spanning-tree instance of VLAN 1?

A.    the switch with the highest MAC address
B.    the switch with the lowest MAC address
C.    the switch with the highest IP address
D.    the switch with the lowest IP address

Answer: B
Explanation:
Each switch in your network will have a Bridge ID Priority value, more commonly referred to as a BID. This BID is a combination of a default priority value and the switch’s MAC address, with the priority value listed first. The lowest BID will win the election process. For example, if a Cisco switch has the default priority value of 32,768 and a MAC address of 11- 22-33-44-55-66, the BID would be 32768:11-22-33-44-55-66. Therefore, if the switch priority is left at the default, the MAC address is the deciding factor in the root bridge election.

QUESTION 40
What are three advantages of VLANs? (Choose three.)

A.    VLANs establish broadcast domains in switched networks.
B.    VLANs utilize packet filtering to enhance network security.
C.    VLANs provide a method of conserving IP addresses in large networks.
D.    VLANs provide a low-latency internetworking alternative to routed networks.
E.    VLANs allow access to network services based on department, not physical location.
F.    VLANs can greatly simplify adding, moving, or changing hosts on the network.

Answer: AEF
Explanation:
VLAN technology is often used in practice, because it can better control layer2 broadcast to improve network security. This makes network more flexible and scalable. Packet filtering is a function of firewall instead of VLAN.


Quality PassLeader Oracle 200-120 Practice Tests With 100 Precent Real Exam Questions

http://www.passleader.com/200-120.html