Answers to Practice Exam
485
43.
A. Standard access lists should be placed closest to the destination
and extended access lists should be placed closest to the source. See
Chapter 11 for more information.
44.
A, B, D. The cut-through LAN switch method only reads the desti-
nation hardware address of a frame; the FragmentFree reads the first
64 bytes of each frame to make sure there is no fragmentation. Store-
and-forward reads the whole frame, plus runs a CRC on each frame.
See Chapter 4 for more information.
45.
A. The correct answer is found by subtracting 128 from 192, then
converting it to hex, which is 40. See Chapter 9 for more information.
46.
B. Standard access lists should be placed closest to the destination
and extended access lists should be placed closest to the source. See
Chapter 11 for more information.
47.
B. Root ports are determined by using the cost of a link to the root
bridge. The lowest cost wins. See Chapter 4 for more information.
48.
A. A machine with its default gateway set to its own IP address will
ARP for every address. See Chapter 8 for more information.
49.
C. VLAN 0, which cannot be accessed by an administrator, is used to
provide support for the communication between the RSM and the
Catalyst 5000 switch. See Chapter 6 for more information.
50.
B, C. Network loops, broadcast storms, and multiple frame copies
are typically found in a network that has multiple links to remote loca-
tions without some type of loop avoidance scheme. See Chapter 4 for
more information.
51.
D. Should one link in the bundle fail, the Ethernet Bundle Controller
(EBC) informs the Enhanced Address Recognition Logic (EARL)
ASIC of the failure, and the EARL in turn ages out all addresses
learned on that link. See Chapter 5 for more information.
52.
E. Proxy ARP has been around for a while and worked well over the
years. However, as networks have grown, it has been found that
Proxy ARP does not scale well. See Chapter 8 for more information
on Proxy ARP.
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com