Home » SWITCH 642-813 Q&As » Section 6 - Mix Practice Q&As » 642-813 Q&A – Mix Practice Questions (46-50)

642-813 Q&A – Mix Practice Questions (46-50)

Section 6 – Mix Practice Questions

QUESTION NO: 46
Which two statements about a wireless repeater topology are true? (Choose two.)
A. A wireless repeater is an access point that is not connected to the wired LAN.
B. The repeater feature is only available in lightweight access point topologies.
C. The SSID of the root access point must be configured on the repeater access point.
D. This topology requires a 10 – 15 percent overlap between a wired access point and the wireless repeater.
E. This topology requires a 15 – 25 percent overlap between a wired access point and the wireless repeater.
F. To avoid interference, the repeater access point must use a different channel from what the root access point uses.
Answer: AC

QUESTION NO: 47
Which statement best describes implementing a Layer 3 EtherChannel?
A. EtherChannel is a Layer 2 and not a Layer 3 feature.
B. Implementation requires switchport mode trunk and matching parameters between switches.
C. Implementation requires disabling switchport mode.
D. A Layer 3 address is assigned to the channel-group interface.
Answer: C

QUESTION NO: 48
Which two statements about the various implementations of STP are true? (Choose two.)
A. Common Spanning Tree maintains a separate spanning-tree instance for each VLAN configured in the network.
B. The Spanning Tree Protocol (STP) is an evolution of the IEEE 802.1w standard.
C. Per-VLAN Spanning Tree (PVST) supports 802.1Q trunking.
D. Per-VLAN Spanning Tree Plus(PVST+) is an enhancement to 802.1Q specification and is supported only on Cisco devices.
E. Rapid Spanning Tree Protocol (RSTP) includes features equivalent to Cisco PortFast, UplinkFast, and BackboneFast for faster network reconvergence.
F. Multiple Spanning Tree (MST) assumes one spanning-tree instance for the entire Layer 2 network, regardless of the multiple number of VLANs.
Answer: DE

QUESTION NO: 49
You are implementing basic switch security best practices. Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?
A. Make all ports private VLAN ports.
B. Place all unused ports in native VLAN 1 until needed.
C. Proactively configure unused switch ports as access ports.
D. Disable Cisco Discovery Protocol globally.
Answer: C

QUESTION NO: 50
When configuring private VLANs, which configuration task must you do first?
A. Configure the private VLAN port parameters.
B. Configure and map the secondary VLAN to the primary VLAN.
C. Disable IGMP snooping.
D. Set the VTP mode to transparent.
Answer: D

Lead2pass Testking Pass4sure Actualtests Others
$99.99 $124.99 $125.99 $189 $29.99-$49.99
Up-to-Dated
Real Questions
Error Correction
Printable PDF
Premium VCE
VCE Simulator
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back

One thought on “642-813 Q&A – Mix Practice Questions (46-50)

  1. sotocki says:

    For question 48, answer: D. Per-VLAN Spanning Tree Plus(PVST+) is an enhancement to 802.1Q specification and is supported only on Cisco devices
    Should that be 802.1D? How would PVST be an enhancement to trunking?? Is that a typo of the question? ❓ ❓

Comments are closed.