1.
You are implementing basic switch security best practices. Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?
2.
When configuring private VLANs, which configuration task must you do first?
3.
Which of these is true regarding the configuration and application of port access control lists?
4.
Which statement best describes implementing a Layer 3 EtherChannel?
5.
What benefit results from implementation of Layer 3 switching versus Layer 2 switching in a fully meshed campus network?
 
6.
When configuring a routed port on a Cisco multilayer switch, which of these is a required configuration task that you must perform to enable that port to function as a routed port?
7.
What is true of standard access control lists when applied to an interface to control inbound or outbound traffic?
8.
You have configured a Cisco Catalyst switch to perform Layer 3 routing via an SVI and have assigned that interface to VLAN 20. To check the status of the SVI, you issue the show interfaces vlan 20 command at the
CLI prompt. You see from the output display that the interface is in an "up/up" state. What must be true in an SVI configuration to bring the VLAN and line protocol up?
9.
A new building has been added to the enterprise campus network, providing client access for desktop PCs, laptops, and IP phones for employees and guests. During verification, only a few laptops using wireless are
reported to have problems, while other desktops, IP phones, and most other wireless laptops are fully operational. Additional information received about the problem indicates that, while the problematic wireless
laptops cannot reach internal corporate websites, they can reach the Internet. Where should troubleshooting about this connectivity issue be focused?
10.
A new floor has been added to the enterprise campus network, providing client access for desktop PCs, laptops, and IP phones for employees and guests. During verification, a few desktop PCs have limited
corporate access but not Internet access. Most other desktop PCs, all laptops, and IP phones are working correctly. Additional information indicates that the desktop PCs are obtaining IP host addresses from the DHCP
server, which is intended for only the IP phones. Where should troubleshooting about this connectivity issue be focused?