Routing and switching lab study guide

¡Supera tus tareas y exámenes ahora con Quizwiz!

Your network currently has a single switch, as shown in the diagram. You are getting ready to add additional switches and would like to manually configure trunking on the interfaces where switches will be attached. Complete the following tasks: Manually designate the following ports as trunk ports: Fa0/8, Fa0/23, Fa0/24, Gi0/1, and Gi0/2. For each trunk port, remove the current VLAN assignment, making each port a member of VLAN 1. Manually configure all remaining ports as access ports. Save your changes to the startup-config file.

Bldg2> en conf t int range fa0/8, fa0/23-24, gi0/1-2 switchport mode trunk no switchport mode trunk no switchport access vlan int range fa0/1-7, fa0/9-22 switchport mode access end copy run start

You have configured a small network as shown in the diagram. You now need to configure CDP settings on the Cisco switch in the branch office. Complete the following tasks: Enable CDP on the Branch1 switch. Configure Branch1 to use the following CDP timer settings: Send CDP advertisements every 90 seconds. Hold each advertisement in memory for 250 seconds. Save your changes to the startup-config file.

Branch1> en conf t cdp timer 90 cdp holdtime 250 exit copy run start

You are reviewing the configuration of a router that uses EIGRP for its routing protocol. Shown below is the output from the show ip protocols command: Routing Protocol is "eigrp 1" Outgoing update filter list for all interfaces is not set. Incoming update filter list for all interfaces is not set. EIGRP metric weight K1=1, K2=0, K3=1, K4=0, K5-0 EIGRP maximum hopcount 100 EIGRP maximum metric variance 2 Redistributing: eigrp 1 EIGRP NSF-aware route hold timer is 240s Automatic network summarization is in effect Maximum path: 5 Routing for Networks: 192.168.1.0 192.168.2.0 192.168.3.0 Routing Information Sources: Gateway Distance Last Update 192.168.1.12 90 00:55:50 192.168.2.15 90 00:55:50 Distance: internal 90 external 170 Based on the output, what is true of this configuration?

EIGRP will load balance on up to 5 unequal-cost routes.

Your network consists of two Layer 2 switches, SwitchA and SwitchB, and a Layer 3 switch, L3Switch. After an SVI configuration change on L3Switch by another network administrator, users in VLAN 5 can no longer access the resources on the servers in VLAN 10. Use the following commands to diagnose the problem on L3Switch, and then correct any issues you find: show ip route show vlan brief show run When you are finished, the users in VLAN 5 should be able to access the servers on VLAN 10.

L3switch > en conf t int vlan 10 no shut end copy run start

Which of the following is true of Multiprotocol Label Switching?(select two)

MPLS can carry ATM, SONET, and Ethernet traffic CEF is required for all MPLS-enabled Cisco routers

You are working with an access-layer switch, SwitchC, that is connected to two distribution-layer switches, SwitchA and SwitchB. You would like to gather VLAN information within the network. Use the necessary commands to answer the following questions: Which VLAN ID is tagged to frames sent out SwitchC's FastEthernet 0/9? When frames are received on FastEthernet 0/7 and forwarded out GigabitEthernet 0/1 on SwitchC, which VLAN ID is tagged to the frames? Why is VLAN 30 not allowed to communicate through GigabitEthernet 0/2 on SwitchC? What are the administrative modes for the link between SwitchA and SwitchC?

NONE NONE VLAN 30 is removed from the GI 0/2 trunk Switch A is dynamic auto and switch C is dynamic desirable

You are traveling throughout North America to many metropolitan and rural areas. Which single form of Internet connectivity provides the greatest potential connectivity wherever you travel?

PSTN

Which method is used by the SNMP Manager when it contacts an SNMP Agent and requests information about a monitored network device?

Poll

You are troubleshooting the connections on a switch. The device connected to the switch on fa0/8 is powered on. Which would you do to correct the status of fa0/8?

Replace the cable

You have configured Router A, RouterB and Router C as Shown in the Exhibit. Users in network 10.1.1.0 claim they cannot access resources in network 192.168.2.0. what is the problem?

Router C has been configured with the incorrect AS number.

You are in the process of configuring the SFO router. You have already configured a console password of cisco. You have been assigned to configure the following banners. Be sure to include all punctuation in the banner text, but do not include a hard return in the banner except where noted. Banner Banner text Message of the day banner You have connected to the SFO router. Banner that displays before the login prompt (Place each sentence on a different line) Authorized personnel only. Unauthorized users will be vaporized immediately! Banner that displays after a successful login Beam me up Scotty! Save your changes in the startup-config file. After setting the banner, type the exit command, and then reconnect to the router to test your work.

SFO > en conf t banner motd *You have connected to the SFO router* banner login &Authorized personnel only. Unauthorized users will be vaporized immediately!& banner exec (Beam me up Scotty!( exit copy run start

One method of preventing routing loops is to not send information about a route back to the router from which the information came. What is this technique called?

Split horizon

You are configuring a new switch before you connect it to your network. You want to create two VLANs and assign several ports as members of each VLAN. Create the two VLANs as indicated, and then assign the following switch ports as members of that VLAN: VLAN number VLAN name Member ports 25 Payroll_VLAN Fa0/12, Fa0/13, Fa0/14, Fa0/15, Fa0/23, Fa0/24 35 Research_VLAN Fa0/10, Fa0/11, Fa0/20, Fa0/21, Fa0/22

Switch> en conf t vlan 25 name Payroll_VLAN int range fa0/12-15, fa0/23-24 switchport access vlan 25 end conf t vlan 35 name Research_VLAN int range fa0/10-11, fa0/20-22 switchport access vlan 35

You recently removed a Cisco switch, SwitchB, from another building. SwitchB served as an access-layer switch with Ethernet hubs connected to FastEthernet 0/1 and 0/2 and workstations connected to the remaining FastEthernet ports. You are now connecting SwitchB to a non-Cisco distribution-layer switch, SwitchA. You need to prepare SwitchB for four redundant connections as an EtherChannel. Because only one of the switches supports PAgP, you will need to configure SwitchB to use LACP as the EtherChannel protocol. In addition, you need to ensure that all of SwitchB's FastEthernet ports used in the EtherChannel are operating in full-duplex. Complete the following tasks: On SwitchB, configure FastEthernet 0/1-0/4 as follows: Enable Full-duplex data transmission Enable each interface as a trunk link For each interface configuration, use channel group 6. Configure the interfaces to actively initiate the

SwitchB > en conf t int range fa 0/1-4 duplex full switchport mode trunk channel-group 6 mode active exit copy run start

You have configured two routers, LondonA and LondonB for OSPF routing. Serial0/0 on LondonA is connected to Serial0/1 on LondonB. The partial configuration of each router is shown below. When you check the routing table on LondonA, you find that it has bot learned about network 172.17.1.16 from LondonB. What is the problem?

Wildcard mask values for the network statements are incorrect

You are configuring ACLs for a router. You need to create a standard IP access list that permits all traffic except from the 192.168.1.0/24 network. To verify that the ACL is configured correctly and functioning as intended, you want to view extended information about matches for each line in the ACL as packets are processed by the router. Which two commands are needed to view the information you need to see?

access-list 1 deny 192.168.1.0 0.0.0.255 log access-list 1 permit any log

You are in the process of configuring the Branch1 switch. Complete the following configuration tasks: Configure the switch with the following IP address: 192.168.11.250 with a mask of 255.255.255.0. Configure the switch to use the SFO router as the default gateway. Save your changes to the startup-config file.

branch1> ena show cdp neighbors detail (note ip address for the SFO router) conf t int vlan1 ip address 192.168.11.250 255.255.255.0 exit ip default-gateway 192.168.11.254 exit copy run start

You have just received a new Cisco 2960 series switch and need to complete an initial configuration. Complete the following configuration tasks: Set the hostname to NYOffice2960. Set the privileged EXEC password to Cisco1 (use the most secure method). Require CiscoCon1 as the password when connecting through the console. Require the password CiscoVTY$ to connect to VTY 0. Require the password CiscoVTY#@ to connect to VTY 1-4. Prevent access through the remaining VTY lines (5-15). Configure the following interface descriptions:

en conf t hostname NYOffice2960 enable secret Cisco1 line con 0 password CiscoCon1 login line vty 0 password CiscoVTY$ login line vty 1 4 password CiscoVTY#@ login line vty 5 15 login int fa 0/1 description Srv1 ... ... copy run start

You would like to require a password when connecting to the Branch1 switch through the console or through a VTY line. You have already configured cisco as the enable secret. Complete the following tasks: Configure the following passwords: Line Password Console 0 tp89jy5$ VTY 0 ak73#pt VTY 1-4 pj61@bb4 Make sure login is allowed on the console and the VTY lines with a password. Prevent access through the remaining VTY lines (5-15). Save your changes to the startup-config file.

Branch > 1 conf t line con 0 password tp89jy5$ login line vty 0 password ak73#pt login line vty 1 4 password pj61@bb4 login line vty 5 15 login end copy run start

Your branch office is expanding and you have added a new subnet. The new subnet currently has a single switch, Branch4. The switch connects through its FastEthernet0/24 interface to the FastEthernet0/1 interface on the router. The new subnet will use 192.168.12.0 as the subnet address, using the default subnet mask. Complete the configuration of the Branch4 switch by doing the following: Assign the switch the fourth available IP address on the subnet. Configure the SFO router (192.168.12.254) as the default gateway. Add a description to the FastEthernet0/24 interface as follows: Link to SFO Save your changes.

Branch4>en conf t interface Vlan1 ip address 192.168.12.4 255.255.255.0 int fa0/24 description Link to SFO exit ip default-gateway 192.168.12.254 end copy run start

You are configuring a Cisco router as a DSL PPPoE client as shown in the image. You have already configured interface e0/0 for the local network but have not configured anything else. Which of the following is not a requirement in configuring the Cisco router as a PPPoE client?

Configure a route map

You recently connected two Layer 2 switches, SwitchA and SwitchB, and a Layer 3 switch, L3Switch, to your network. Now you need to configure Switch Virtual Interfaces (SVIs) on L3Switch for inter-VLAN routing between workstations on VLAN 5 and servers on VLAN 10. In addition, you need to change the management VLAN on L3Switch to VLAN 11. All three switches have 802.1Q as their default trunk encapsulation and VLAN 1 as the native VLAN. The workstation, server, and management VLANs are already configured on SwitchA and SwitchB and have interfaces assigned to the respective VLANs; however, the VLANs do not exist in L3Switch's VLAN database. Complete the following tasks: Configure the following on L3Switch: Configure GigabitEthernet 0/1 and GigabitEthernet 0/2 as trunk ports. Create VLANs 5, 10, and 11. For VLAN 5, configure 172.16.5.1 255.255.255.0 as the IP address and subnet mask.

L3Switch > en conf t int range gi0/1-2 switchport mode trunk exit vlan 5 vlan 10 vlan 11 int vlan 5 ip address 172.16.5.1 255.255.255.0 no shutdown int vlan 10 ip address 172.16.10.1 255.255.255.0 no shutdown int vlan 11 ip address 172.16.11.1 255.255.255.0 no shutdown end copy run start SwitchA&B> ena conf t int gi 0/1 switchport mode trunk exit ip default-gateway 172.16.11.1 end copy run start

You recently connected two Layer 2 switches, SwitchA and SwitchB, and a Layer 3 switch, L3Switch, to your network. Now you need to configure Switch Virtual Interfaces (SVIs) on L3Switch for inter-VLAN routing between VLANs 2 and 4. All three switches have 802.1Q as their default trunk encapsulation and VLAN 1 as the native VLAN. Both VLANs are already configured on all three switches, and SwitchA and SwitchB have physical interfaces assigned to the respective VLANs. Complete the following tasks: Configure the following on L3Switch: Configure GigabitEthernet 0/1 and GigabitEthernet 0/2 as trunk ports. For VLAN 2, configure 192.168.2.1 255.255.255.0 as the IP address and subnet mask. For VLAN 4, configure 192.168.4.1 255.255.255.0 as the IP address and subnet mask. Enable the VLAN 2 and VLAN 4 interface.

L3switch > en conf t int range gi 0/1-2 switchport mode trunk exit int vlan 2 ip address 192.168.2.1 255.255.255.0 no shut int vlan 4 ip address 192.168.4.1 255.255.255.0 no shut end copy run start SwitchA>en conf t int gi0/1 switchport mode trunk end copy run start

You recently connected two Catalyst 2960 access-layer switches, SwitchA and SwitchB, and an external router to your network. Now you need to use the external router for a router-on-a-stick configuration for inter-VLAN routing between VLANs 2 and 4. Both VLANs are already configured on SwitchA and SwitchB and have interfaces assigned to the respective VLANs. You have also configured subinterfaces on the external router. Complete the following tasks: Configure GigabitEthernet 0/1 on SwitchA and GigabitEthernet 0/1 on SwitchB as trunk ports. Configure FastEthernet 0/24 on SwitchA as a trunk port. Save your changes to the startup-config file on each device. Use the show run and show ip route commands to verify the configurations.

Router>en conf t nt fa 0/1 no shutdown int fa 0/1.2 encapsulation dot1 q 2 ip address 192.168.2.1 255.255.255.0 int fa 0/1.4 encapsulation dot1 q 4 ip address 192.168.4.1 255.255.255.0 ctrl+z copy run start switchA>en conf t int range fa 0/24, gi0/1 switchport mode trunk end ctrl+z copy run start switchb>en conf t int gi0/1 switchport mode trunk end ctrl+z copy run start

You have four switches connected in your network. Spanning tree has prevented bridging loops between the four switches for VLAN 1. All the links are using 100 Mbps connections. Use the necessary commands to answer the following questions: Which switch is the root bridge? What is the root bridge's priority and MAC address? What is the state of port FastEthernet 0/1 on SwitchA? What is the state of port FastEthernet 0/1 on SwitchD? What is the role of port FastEthernet 0/2 on SwitchC?

Switch B 32769:000e:8411:68c0 Forwarding Blocking root

Your network has two distribution-layer switches, SwitchA and SwitchB, connected through trunk ports on each of their respective Gi 0/1 interfaces. In addition, you recently connected an access-layer switch to the network, SwitchC. SwitchC has several workstations and a server belonging to VLAN 20. Because the resources on VLAN 20 are exclusive to the local workstations, you would like to restrict VLAN 20's traffic from passing though the network on the trunk ports of SwitchC. Complete the following tasks: Remove only VLAN 20 from the allowed VLANs on SwitchC's GigabitEthernet 0/1 and GigabitEthernet 0/2 interfaces. Save your changes to the startup-config file. After configuring SwitchC, use the show run or show interfaces trunk command to confirm that the VLAN is not permitted to communicate over the trunk ports.

SwitchC> en conf t int range gi0/1-2 switchport trunk allowed vlan remove 20 end copy run start

You are working with an access-layer switch, SwitchC, that is connected to two distribution-layer switches, SwitchA and SwitchB. After you returned SwitchA to its default trunk configurations, an accounting department employee called and explained he can no longer access a particular accounting server. The server is connected to FastEthernet 0/2 on SwitchA, and the employee's workstation is connected to FastEthernet 0/8 on SwitchC. Use the following commands to diagnose the problem and then correct any issues you find on the access-layer switch: show interface trunk show interface [type number] trunk show interface [type number] switchport When you are finished, the employee should be able to access the accounting server on SwitchA. Save the configuration changes made on the access-layer switch.

SwitchC>en conf t int gi0/1 switchport trunk native vlan 1 end copy run start

You are in the process of configuring the switch ports on the Branch1 switch. Devices are currently attached to the switch as shown in the diagram. Complete the following tasks: You will soon add an older server to switch port Fa0/6 that uses 10BaseT Ethernet. Manually configure the switch port to use 10 Mbps. You will be adding a hub to switch port Fa0/7 that will be used for a lab for developers. Manually configure the switch port to use half-duplex communications. Make sure that ports Fa0/6 and Fa0/7 are enabled and can be used. Be aware that you have not yet connected devices to those ports. Disable all unused interfaces: Fa0/4 and Fa0/5 Fa0/8 through Fa0/23 Gi0/1 and Gi0/2 Verify that all remaining ports that are in use are configured to automatically detect speed and duplex settings and are enabled.

branch1>en conf t int fa0/6 speed 10 int fa0/7 duplex half int range fa0/4-5, fa0/8-23, gi0/1-2 shutdown (ctl +z) show int status conf t int fa0/24 no shutdown int fa0/2 speed auto int fa0/3 duplex auto end copy run start

You are implementing port security within your network. You have two IP phone daisy chains connected to the switch's Fast Ethernet 0/5 and 0/6 interfaces. The interfaces are configured as access ports. Voice VLANs and the trusted boundary feature have already been configured on both of the interfaces. You need to configure the port security settings to have the switch interface accept the MAC addresses of the IP phone and the workstation.

en conf t int range fa0/5-6 switchport mode access switchport port-security switchport port-security maximum 3 switchport port-security mac-address sticky switchport port-security violation restrict copy run start

You are configuring a switch that has three hosts attached to FastEthernet 0/2 through 0/4. All three hosts are part of a public kiosk display that allows guests to access the Internet. You would like to implement port security to prevent guests from removing Ethernet cables from the hosts and connecting them to the Ethernet ports on their personal laptops. If guests attempt to connect through their personal laptops, you would like the switch to drop the frames. Complete the following tasks: Configure FastEthernet 0/2 through 0/4 as access ports. On the FastEthernet 0/2 through 0/4, configure port security to learn and retain the MAC addresses of the connected hosts. Configure the port security violation as protect on each applicable interface. Save your changes to the startup-config file. The switch is currently configured with the default port security settings. Use the show run command to verify the configurations.

switch > ena conf t int range fa 0/2-4 switchport mode access switchport port-security switchport port-security mac-address sticky switchport port-security violation protect end copy run start

You recently configured a switch that has three hosts attached to FastEthernet 0/2 through 0/4. All three hosts are part of a public kiosk display that allows guests to access the Internet. You implemented port security to prevent guests from removing Ethernet cables from the hosts and connecting them to the Ethernet ports on their personal laptops. Now, you will add an additional host to the kiosk display this afternoon through FastEthernet 0/5. The additional host's MAC address is 5ab9.001d.b5ac. If guests attempt to connect through FastEthernet 0/5 to their personal laptops, you would like the switch to drop the frames. Complete the following tasks: Configure FastEthernet 0/5 as an access port. On FastEthernet 0/5, configure port security to retain 5ab9.001d.b5ac as the only allowed MAC address on the interface. Configure the port security violation as protect on each applicable interface. Save your changes to the startup-config file.

switch >en conf t interface fa 0/5 switchport mode access switchport port-security switchport port-security mac-address sticky switchport port-security mac-address sticky 5ab9.001d.b5ac switchport port-security violation protect end copy run start

You are in the process of configuring the switch so it can be managed from a Telnet or Web session. The switch is currently connected to the router as shown in the diagram. In this lab, you will only be able to work with the switch console. Complete the following configuration tasks: Configure the switch with the third IP address on the subnet. Configure the switch to use the router as the default gateway. Save your changes to the startup-config file.

switch> en conf t int Vlan1 ip address 192.168.20.3 255.255.255.0 exit ip default-gateway 192.168.20.1 end copy run start

You are configuring a new switch before you connect it to your network. You want to create two VLANs and assign several ports as members of each VLAN. Create the two VLANs as indicated, and then assign the following switch ports as members of that VLAN: VLAN number VLAN name Member ports 25 Payroll_VLAN Fa0/12, Fa0/13, Fa0/14, Fa0/15, Fa0/23, Fa0/24 35 Research_VLAN Fa0/10, Fa0/11, Fa0/20, Fa0/21, Fa0/22

switch> en conf t vlan 25 name Payroll_VLAN int range fa0/12-15, fa0/23-24 switchport access vlan 25 end conf t vlan 35 name Research_VLAN int range fa0/10-11, fa0/20-22 switchport access vlan 35 end copy run start

You have been assigned to manage a small branch office as shown in the network diagram. You have connected all devices. You now need to configure the hostname and interface descriptions on the Cisco switch. Complete the following tasks: Set the hostname on the switch to the name indicated in the diagram (Branch1). Configure the following interface descriptions: Device Interface Description text Branch1 FastEthernet0/1 Wrk1 FastEthernet0/2 Wrk2 FastEthernet0/3 Wrk3 FastEthernet0/24 Default gateway Save your changes to the startup-config file.

switch>en conf t hostname Branch1 int Fa0/1 description Wrk1 int fa0/2 description Wrk2 int fa0/3 description Wrk3 int fa0/24 description default gateway exit exit copy run start

You are working with an access-layer switch, SwitchC, which is connected to two distribution-layer switches, SwitchA and SwitchB. After you implemented new configurations on each switch, an accounting department employee called and explained he can no longer access a particular accounting server. The server is connected to FastEthernet 0/2 on SwitchA, and the employee's workstation is connected to FastEthernet 0/8 on SwitchC. Use the following commands to diagnose the problem, and then correct any issues you find: show interface trunk show interface [type number] trunk show interface [type number] switchport When you are finished, the employee should be able to access the accounting server on SwitchA. Save the configuration changes made on each device.

switch>en conf t int gi0/1 switchport trunk allowed vlan add 30 end copy run start

You are implementing port security within your network. You have two IP phone daisy chains connected to the switch's FastEthernet 0/5 and 0/6 interfaces. The interfaces are configured as access ports. Voice VLANs and the trusted boundary feature have already been configured on both of the interfaces. You need to configure the port security settings to have the switch interface accept the MAC addresses of the IP phone and the workstation. Complete the following tasks: Configure FastEthernet 0/5 and 0/6 with port security to learn the MAC address of the IP phone and workstation. Set the maximum allowed MAC addresses to 3. Configure the port security violation as restrict. Save your changes to the startup-config file. Use the show run command to verify the configurations.

switch>ena conf t int range fa0/5-6 switchport mode access switchport port-security switchport port-security maximum 3 switchport port-security mac-address sticky swithcport port-security violation restrict end copy run start

You have created redundant paths between 4 switches in the executive office building and would like to manually determine which switch will serve as the root bridge. The switches have the following MAC addresses: Switch MAC Address SwitchA 00C0.1940.8B80 SwitchB 000E.8411.68C0 SwitchC 00B0.64FA.C265 SwitchD 0019.E744.7400 Complete the following tasks: Configure SwitchA to be the root bridge for VLAN 1. Save your changes to the startup-config file on each switch that has configuration changes. Each switch has the default spanning tree configuration. After applying the correct configuration, SwitchA's Fa 0/1-3 interfaces will be in the designated state. Use the show spanning-tree vlan 1 command to verify the configuration. The spanning-tree vlan 1 root primary

switchA> en conf t spanning-tree vlan 1 priority 4096 exit copy run start

You have connected two access-layer switches, SwitchA and SwitchB, to a distribution-layer switch, SwitchC. All three are Cisco IOS-based switches with default configurations. Both access-layer switches have redundant connections to the distribution-layer switch. Instead of using the connections solely for redundant purposes, you would like to bundle the redundant connections to increase the available traffic bandwidth between the access-layer switches and the distribution-layer switch. Complete the following tasks: Configure the following interfaces as trunk links: On SwitchA, configure GigabitEthernet 0/1 and 0/2. On SwitchB, configure GigabitEthernet 0/1 and 0/2. On SwitchC, configure GigabitEthernet 0/1 through 0/4. Configure the SwitchA and SwitchB interfaces to actively initiate the negotiation of a PAgP EtherChannel.

switchA>en conf t int range gi0/1-2 switchport mode trunk channel-group 2 mode desirable end copy run start SwitchB>en conf t int range gi0/1-2 switchport mode trunk channel-group 4 mode desirable end copy run start SwitchC>en conf t int range gi0/1-2 switchport mode trunk channel-group 2 mode auto int range gi0/3-4 switchport mode trunk channel-group 4 mode auto end copy run start

In this lab, you have redundant paths between three switches and would like to configure Rapid PVST+ on each switch, as well as a root bridge for VLAN 1. The switches have the following MAC addresses: Switch MAC Address SwitchA 00C0.1940.8B80 SwitchB 000E.8411.68C0 SwitchC 00B0.64FA.C265 Complete the following tasks: Configure each switch to use Rapid PVST+. Configure SwitchC to be the root bridge for VLAN 1. Save your changes to the startup-config file on each switch. Each switch has the default spanning tree configurations. After applying the correct configuration, SwitchC's Fa 0/1 and Fa 0/2 interfaces will be in the designated state. Use the show spanning-tree vlan 1 command to verify the configuration. The spanning-tree vlan 1 root

switchC> en conf t spanning-tree mode rapid-pvst spanning-tree vlan 1 priority 4096 exit copy run start SwitchA>en conf t spanning-tree vlan 1 priority 8192 end copy run start

You have four switches connected in your network. Spanning tree has prevented bridging loops between the four switches for VLAN 1. All the links are using 100 Mbps connections. Use the necessary commands to answer the following questions: Which switch is the root bridge? What is the root bridge's priority and MAC address? What is the state of port FastEthernet 0/1 on SwitchA? What is the spanning tree mode for VLAN 1? What is the role of port FastEthernet 0/3 on SwitchC?

switchC>en conf t int gi0/1 switchport trunk native vlan 1

You are troubleshooting the connections on a switch. Which would you do to correct the status shown for Fa0/12? You will not be able to use the show run or show start commands in this lab. Use the no shutdown command. Replace the cable. Disable port security. Nothing. The interface is working correctly.

use the no shutdown command


Conjuntos de estudio relacionados

3.04/3.05 Quiz: Culture and Human Impact of SE Asia and Pacific

View Set

Real Estate- section 1 (chapter 6)

View Set

A. The study of political science

View Set

Real Estate Law - UNIT ELEVEN - INVOLUNTARY LIENS AND HOMESTEADS

View Set

Safety and Protection: Infection Control

View Set

Google Analytics Practice: Cookies and Sessions

View Set