Ch 4,5,6 Quiz's Routing and Switching
Which two characteristics describe a converged network? (Choose two.)
1. support of voice and video both using the same switch 2. affordability for small and medium businesses
A network administrator has configured VLAN 99 as the management VLAN and has configured it with an IP address and subnet mask. The administrator issues the show interface vlan 99 command and notices that the line protocol is down. Which action can change the state of the line protocol to up?
Connect a host to an interface associated with VLAN 99. - An SVI interface will be active when the SVI VLAN has an active port associated with it.
When the appropriate switch form factor for a network is being determined, what type of switch should be selected when future expansion is important and cost is not a limiting factor?
Modular switch - A modular switch provides fault tolerance and features for bandwidth availability and future expansion by using line cards but is rather costly to implement.
Which function is supplied by the access layer in a three-layer network design?
Network access - The main purpose of devices in the access layer is to supply network access to end users. - Distribution layer devices provide services such as routing and policy functions. - The core layer provides high-speed backbone connectivity.
The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link?
No collisions will occur on this link. -
An attacker has bypassed physical security and was able to connect a laptop to a Ethernet interface on a switch. If all the switch ports are configured with port security and the violation mode is set to factory-default, which action is taken against the attacker?
Packets with unknown source addresses are dropped and the interface becomes error-disabled and turns off the port LED. -The default violation mode is shutdown. In this mode, a port security violation causes the interface to immediately become error-disabled and turns off the port LED. - It also sends an SNMP trap, logs a syslog message, and increments the violation counter.
When an appropriate switch form factor for a network is being determined, what should be selected when fault tolerance and bandwidth availability are desired but the budget is limited?
Stackable switches - stackable switches provide fault tolerance and bandwidth availability by using special cables between switches and are less costly to implement than modular switches. A non-stackable switch does not provide these features
activates the current interface as trunk
Switch(config-if)# switchport mode trunk
prohibits VLAN 10 on the trunk interface
Switch(config-if)# switchport mode trunk allowed vlan remove 10
assigns VLAN 10 for untagged traffic
Switch(config-if)# switchport trunk native vlan 10
A network administrator plugs a new PC into a switch port. The LED for that port changes to solid green. What statement best describes the current status of the port?
The port is operational and ready to transmit packets.
What are the three layers of the switch hierarchical design model? (Choose three.)
access , core , distribution - access layer is the lowest layer and it provides network access to users. - distribution layer has many functions, but it aggregates data from the access layer, provides filtering, policy control, and sets Layer 3 routing boundaries. - core layer provides high speed connectivity.
Which switching method describes a switch that transfers a frame as soon as the destination MAC address is read?
cut-through switching
Which cost-effective physical network topology design is recommended when building a three-tier campus network that connects three buildings?
extended star - or efficiency, scalability, and cost-effectiveness, building an extended star topology from a centralized site to all other campus sites is recommended. - mesh topology is much more expensive - bus and dual ring topologies are more difficult to troubleshoot and maintain.
In which location are the normal range VLANs stored on a Cisco switch by default?
flash memory - Normal range VLANs are stored in a file called vlan.dat and located in the flash memory.
What is the first action in the boot sequence when a switch is powered on?
load a power-on self-test program -POST performs tests on the CPU, memory, and flash in preparation for loading the boot loader.
What is a possible cause of runt Ethernet frames when a switch is being used?
malfunctioning NIC - A runt frame is a frame that is smaller than 64 bytes, the minimum allowed Ethernet frame. This type of frame is usually due to a malfunctioning NIC or excessive collisions. - Duplex misconfiguration can cause connectivity issues. - Excessive cable length can generate CRC errors and/or late collisions.
Which distinct type of VLAN is used by an administrator to access and configure a switch?
management vlan - A management VLAN is used to remotely access and configure a switch. - Data VLANs are used to separate a network into groups of users or devices. - The default VLAN is the initial VLAN all switch ports are placed in when loading the default configuration on a switch.
In an Ethernet network, frames smaller than 64 bytes are called
runt frames - giants are greater than max
The first step a switch does when processing a frame is to
see if the source MAC address is in the MAC address table. If the address is not there, the switch adds it. - The switch then examines the destination MAC address and compares it to the MAC address table. - If the address is in the table, the switch forwards the frame out the corresponding port. If the address is missing from the table, the switch will broadcast the frame to all ports except the port through which the frame arrived.
Which option correctly describes a switching method?
store-and-forward: ensures that the frame is free of physical and data-link errors - Store-and-forward switching performs an error check on an incoming frame after receiving the entire frame on the ingress port. - Switches which use this method have the flexibility to support any mix of Ethernet speeds. - cut-through method begins the forwarding process after the destination MAC address of an incoming frame is looked up and the egress port has been determined.
When would a network designer be concerned with RUs?
when purchasing a specific number of switches for a network rack - A rack unit or RU is a specific measurement related to the height of the switch. A switch with a 1 RU rating is smaller than a 2 RU switch.
router on a stick
- With router on a stick, subinterfaces are used on one physical router interface.One subinterface per VLAN is used in this design. - When multiple interfaces are used on a router, each physical interface such as Gi0/0 and Gi0/1 is assigned one IP address. - Each VLAN would require a physical interface. When routing via a multilayer switch, one SVI is assigned an IP address for each VLAN.
Refer to the exhibit. A switch receives a Layer 2 frame that contains a source MAC address of 000b.a023.c501 and a destination MAC address of 0050.0fae.75aa. Place the switch steps in the order they occur. (Not all options are used.)
1. The switch adds the source MAC address to the MAC address table. 2.Because the destination is not known, the switch forwards the frame out all ports except the port through which the frame arrived.
What is the bandwidth utilization efficiency of full-duplex Ethernet?
100% - Full-duplex communication allows for an effective bandwidth efficiency of 100% by allowing both ends of a connection to transmit and receive data simultaneously without collisions.
Using legacy inter-VLAN routing, how many physical router interfaces have to be configured to support 5 VLANs?
5 -Legacy inter-VLAN routing requires that each VLAN be assigned to a different physical router interface. - So, if there are 5 VLANs to be configured, it is necessary to have 5 physical router interfaces, one for each VLAN.
If an organization is changing to include Cisco IP phones in its network, what design feature must be considered to ensure voice quality?
A separate VLAN is needed for voice traffic. - A PC commonly connects to an IP phone and the IP phone, in turn, connects to a switch. - The phone does not require a separate port. Because voice traffic cannot tolerate much packet delay, it needs to be in a separate VLAN.
Which statement is true about broadcast and collision domains?
Adding a switch to a network will increase the size of the broadcast domain. - A switch that receives a broadcast frame will forward the frame out all other interfaces, including interfaces that connect to other switches. - These switches will also perform the same forwarding action. By adding more switches to the network, the of the size broadcast domain increases.
Which step should be performed first when deleting a VLAN that has member switch ports?
Reassign all VLAN member ports to a different VLAN. - Before deleting an active VLAN, it is recommended that all ports currently assigned as a member of that VLAN be reassigned. - Any port that is a member of a VLAN that is deleted will become unusable.
Which service is provided by an automated attendant feature on a converged network?
Routing calls -The automated attendant feature increases the speed of voice services by routing calls directly to individuals or departments. Point-to-point video and video conferencing describe video services on a converged network.
The initialism ________ refers to a protocol that provides an encrypted connection. The protocol replaces the clear text Telnet protocol for Cisco device management.
SSH - SSH is the initialism for Secure Shell, a secure protocol for remote access.
Which configuration must be in place for the auto-MDIX feature to function on a switch interface?
The speed and duplex of the interface must be configured for auto detect. - The auto-MIDX feature only functions on Cisco devices when the speed and duplex of the connected interfaces are set to auto detect.
What is the result of issuing the no switchport port-security mac-address sticky command on an interface with port security configured?
The sticky secure MAC addresses remain part of the address table but are removed from the running configuration. - Sticky learning is disabled by using the no switchport port-security mac-address sticky command. - Any sticky secure MAC addresses remain as part of the mac-address table but are removed from the running configuration.
What would be the most common reason that a network technician would see the following Cisco switch prompt after the switch boots? switch:
The switch operating system cannot be found. - The prompt of "switch:" is seen when the switch cannot find an operating system and is in the boot loader environment where only a few basic commands can be used to repair the switch to an operational state.
Which impact does adding a Layer 2 switch have on a network?
an increase in the size of the broadcast domain - Adding a Layer 2 switch to a network increases the number of collision domains and increases the size of the broadcast domain.
A college offers classes at a nearby naval base where a remote switch is located. In order for network administrators at the college main office to manage a remote switch for SSH traffic, which destination port number should be opened and tracked on the college firewall?
port 22
What is the meaning of the number 10 in the encapsulation dot1Q 10 native router subinterface command?
the VLAN ID - The administrator can use the encapsulation command to specify the encapsulation type (IEEE 802.1Q or ISL), the VLAN ID, and optionally the native VLAN.
What is the purpose of the switch command switchport access vlan 99?
to assign the port to a particular VLAN
For what reason would a network administrator use the show interfaces trunk command on a switch?
to view the native VLAN -The show interfaces trunk command displays the ports that are trunk ports, the trunking mode, the encapsulation type, the trunk status, the native VLAN, and the allowed VLANs on the link.