642-813 Implementing Cisco Switched Networks (Exam 27)

642-813 Implementing Cisco Switched Networks (Exam 27)

created by Fisher BRink (@fisher) at Feb. 8, 2016
  • What are two methods of mitigating MAC address flooding attacks? (Choose two.)

  • Refer to the exhibit.What information can be derived from the output?

  • What two steps can be taken to help prevent VLAN hopping? (Choose two.)

  • Refer to the exhibit.Assume that Switch_A is active for the standby group and the ...

  • When an attacker is using switch spoofing to perform VLAN hopping, how is theattac...

  • Refer to the exhibit.GLBP has been configured on the network. When the interface s...

  • Refer to the exhibit.DHCP snooping is enabled for selected VLANs to provide securi...

  • Refer to the exhibit and the partial configuration on routers R1 and R2.HSRP is co...

  • Which three statements about routed ports on a multilayer switch are true? (Choose...

  • Why are users from VLAN 100 unable to ping users on VLAN 200?

  • Which three statements about Dynamic ARP Inspection are true? (Choose three.)

  • The following command was issued on a router that is being configured as the activ...

  • Which two characteristics apply to Cisco Catalyst 6500 Series Switch supervisorred...

  • You are tasked with designing a security solution for your network. What informati...

  • Which two components should be part of a security implementation plan? (Choose two.)

  • Refer to the exhibit.From the configuration shown, what can be determined?

  • hostname Switch1interface Vlan10ip address ip redirec...

  • Which statement about the configuration and application of port access control lis...

  • Refer to the exhibit.Which statement about the command output is true?

  • Which statement best describes implementing a Layer 3 EtherChannel?

Be the first to review
Login and Review
  • info
    Quiz Info
  • date_range
    Feb. 8, 2016, 3:38 a.m.
    20 questions
    1 completed
    1 takers

  • 642-813 Implementing Cisco Switched Networks (Exam 27) QR code