Networking Chapter 8
What does a switch maintain to track the location of computers A. A MAC address table B. A routing table C. A layer 3 table D. A managed table
A Switches create MAC tables to map MAC addresses to physical ports. Routers have routing tables to track subnetworks; although it's feasible to call a routing table a layer 3 table, it isn't an actual term, and it would track subnetworks, not computers. There's no such thing as a managed table.
You are looking at a drawing of a 100 Mbps switch and want to identify what device is connected to the first port. How will the port be labeled A. E0 B. F0 C. F1 D. Gi1
B Ports on a 100 Mbps switch are labeled with F or Fa to indicate Fast Ethernet. The first port is 0, and the second port is 1. E is for 10 Mbps ports, and 1000 Mbps ports use Gi.
Your network includes computers connected via hubs. You want to reduce the number of collisions to the least number possible. What should you do A. You should replace the hubs with bridges. B. You should replace the hubs with managed hubs. C. You should replace the hubs with switches. D. You should replace the hubs with firewalls.
C Switches create a separate collision domain for every device connected to the switch. Bridges creates separate collision domains but not one for every device. There's no such thing as a managed hub. Firewalls don't create separate broadcast or collision domains
A switch has 48 ports. How many VLANs can you create with it A. 2 B. 12 C. 24 D. 48
C The minimum number of ports required for a VLAN is two. If the port has 48 ports, you can create as many as 24 VLANs.
True or false. Layer 2 switches create separate broadcast domains
False A layer 2 switch creates separate collision domains, not separate broadcast domains
True or false. A managed switch requires less administrative overhead than an unmanaged switch
False A managed switch needs to be configured by an administrator to take advantage of the capabilities. Unmanaged switches work just by plugging them in.
You want to ensure that only known computers can connect to a switch. What should you implement?
Port security Port security includes configuring the switch with specific MAC addresses and blocking access to unused ports.
A _____________ switch is expandable. You can add ports by adding components
modular switch You can expand a modular switch by adding modules.
A layer 3 switch functions just like a _____________.
router A layer 3 switch provides routing on layer 3 just like a router. It does so using hardware capabilities, so it is quicker than a router that routes using software capabilities.
A 100 Mbps switch is configured to combine five ports using LACP with full-duplex. What is the effective throughput at the uplink A. 100 Mbps B. 500 Mbps C. 600 Mbps D. 1000 Mbps
D The five combined ports give a combined speed of 500 Mbps, and since full-duplex is being used, data can travel both ways, giving an effective throughput of 1000 Mbps (1 Gbps).