6.4.7 Testout CTI 120
Which of the following connectivity hardware is used to create a VLAN? 1)Hub 2)Switch 3)Router 4)Bridge
2)Switch
When you configure VLANs on a switch, which of the following is used to identify a device's VLAN membership? 1)IP address 2)Switch port 3)MAC address 4)Host name
2)Switch port
Your company is a small start-up that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented? 1)Port security 2)VLAN 3)VPN 4)Spanning tree
2)VLAN
You can create a virtual LAN using which of the following? 1)Switch 2)Hub 3)Gateway 4)Router
1)Switch
you need to keep users in all other departments from accessing the servers used by the finance department , Which of the following technologies should you use to logically isolate the network? 1)VLANs 2)MAC filtering 3)Subnetting 4)NIC teaming
1)VLANs
Which of the following best describes the concept of a VLAN? 1)Devices on different networks that can receive multicast packets 2)Devices connected through the internet that can communicate without using a network address 3)Devices on the same network logically grouped as if they were on separate networks
3)Devices on the same network logically grouped as if they were on separate networks
You want to reduce collisions by creating separate collision domains and virtual LANs. Which of the following devices should you choose? 1)Active hub 2)Router 3)Bridge 4)Switch
4)Switch
You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation? 1)VLAN 2)Port security 3)Spanning tree 4)VPN
1)VLAN
You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ45 ports connected to the switch. You want to allow visitors to plug into these ports to gain access, but they should not have access to any other devices on your private network. Employees connect throughout the rest of your building should have both private and internet access. Which feature should you implement? 1)DMZ 2)VLANs 3)NAT 4)Port authentication
2)VLANs
You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the same switch which is in VLAN 2. What should you configure so that the two devices can communicate? 1)Mirroring 2)PoE 3)Spanning tree 4)Routing 5)Trunking
4)Routing
Which of the following statements describe how VLANs affect broadcast traffic within an network? (select two) ___Broadcast traffic is only transmitted on VLAN1 ___Broadcast traffic is transmitted to all devices on all VLANs ___Devices on separate VLANs share the same subnet address ___Devices on the same VLAN have the same subnet address ___Broadcast traffic is transmitted only within a VLAN
___Devices on the same VLAN have the same subnet address ___Broadcast traffic is transmitted only within a VLAN
Which of the following are reasons to configured VLANs on a switch as opposed to using without VLANs? (select two) ___Increase number of collision domain ___Increase number of broadcast domains ___Increase security ___Redundant paths between two hosts ___Allowing broadcast traffic between subnets
___Increase number of broadcast domains ___Increase security
Which of the following statements is true regarding using multiple VLANs on a single switch? (select two) ___The number of broadcast domains decreases ___The number of collision domains remains the same ___The number of broadcast domains remains the same ___The number of collision domains decrease ___The number of collision domain increases ___The number of broadcast domains increases
___The number of collision domains remains the same ___The number of broadcast domains increases