CCNP routing and switching 642-813 SWITCH practice test questions are available. The SWITCH 642-813 exam will certify that the successful candidate has important knowledge and skills necessary to to plan, configure and verify the implementation of complex enterprise switching solutions using Cisco’s Campus Enterprise Architecture.
Share 642-813 SWITCH practice test questions below.
hostname Switch1 interface Vlan10 ip address 172.16.10.32 255.255.255.0 no ip redirects standby 1 ip 172.16.10.110 standby 1 timers msec 200 msec 700 standby 1 preempt hostname Switch2 interface Vlan10 ip address 172.16.10.33 255.255.255.0 no ip redirects standby 1 ip 172.16.10.110 standby 1 timers msec 200 msec 750 standby 1 priority 110 standby 1 preempt hostname Switch3 interface Vlan10 ip address 172.16.10.34 255.255.255.0 no ip redirects standby 1 ip 172.16.10.110 standby 1 timers msec 200 msec 750 standby 1 priority 150 standby 1 preempt Refer to the above.Three switches are configured for HSRP Switch1 remains in the HSRP listen state.What is the most likely cause of this status?
A.This is normal operation
B.The standby group number does not match de VLAN number
C.Ip addressing is incorrect
D.Priority commands are incorrect
E.Standby timers are incorrect
What is the result of entering the command port-channel load-balance src-dst-ip on an EtherChannel link?
A.Packets are distributed across the ports in the channel based on the source and destination MAC addresses
B.Packets are distributed across the ports in the channel based on both the source and destination IP addresses
C.Packets are balanced across the ports in the channel based first on the source MAC address, then on the destination MAC address, then on the IP address
D.Packets are distributed across the access ports in the channel based first on the source IP address and then on the destination IP addresses
When an attacker is using switch spoofing to perform VLAN hopping, how is the attacker able to gather information?
A.The attacking station uses DTP to negotiate trunking with a switch port and captures all traffic that is allowed on the trunk
B.The attacking station tags itself with all usable VLANs to capture data that is passed through the switch, regardless of the VLAN to which the data belongs
C.The attacking station generates frames with two 802.1Q headers to cause the switch to forward the frames to a VLAN that would be inaccessible to the attacker through legitimate means
D.The attacking station uses VTP to collect VLAN information that is sent out and then tags itself with the domain information to capture the data
Get more Cisco 642-813 SWITCH practice questions and answers here.