Home » SWITCH 642-813 Q&As » Section 6 - Mix Practice Q&As » 642-813 Q&A – Mix Practice Questions (16-20)

642-813 Q&A – Mix Practice Questions (16-20)

Section 6 – Mix Practice Questions

Based on the configuration shown, which two statements are correct regarding this Layer 3 security configuration example? (Choose two.)

A. Static IP source binding can only be configured on a routed port.
B. Source IP and MAC filtering on VLANs 10 and 11 will occur.
C. DHCP snooping will be automatically enabled on the access VLANs.
D. IP Source Guard is enabled.
E. The switch will drop the configured MAC and IP address source bindings and forward all other traffic.
Answer: BD

Which three statements best describe routed ports on a multilayer switch? Select three.
A. A routed port is a physical interface on the multilayer switch.
B. A routed port is a only associated with one VLAN.
C. A routed port can be configured with routing protocols.
D. A routed port will take an IP address assignment.
E. A routed port is a virtual interface on the multilayer switch.
F. A routed port can support VLAN subinterfaces.
Answer: ACD

Which three statements are true about CEF? (Select three.)
A. The FIB table is derived from the IP routing table.
B. The adjacent table is derived from the ARP table.
C. CEF IP destination prefixes are stored in the TCAM table, from the least specific to the most specific entry.
D. When the CEF TCAM table is full, packets are dropped.
E. When the adjacency table is full, a CEF TCAM table entry points to the Layer 3 engine to redirect the adjacency.
F. The FIB lookup is based on the Layer 3 destination address prefix (shortest match).
Answer: A,B,E

When configuring port security on a Cisco Catalyst switch port, what is the default action taken by the switch if a violation occurs?
A. protect (drop packets with unknown source addresses)
B. restrict (increment SecurityViolation counter)
C. shut down (access or trunk port)
D. transition (the access port to a trunking port)
Answer: C

Which two table types are CEF components?(Choose two.)
A. forwarding information base
B. adjacency tables
C. neighbor tables
D. caching tables
E. route tables
Answer: AB