Ch 06.00.00 Net+ Quiz Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

B

A switch is running STP is in the learning state. A message destined for a different network arrives at the switch. Which of the following best describes what the switch will do? A. It does not record address or segment information. However, the message is forwarded. B. It uses the source MAC address and network segment information to build its bridge database, but does not forward the message. C. It places the source address and segment in its database and forwards the message. D. It does not record address or segment information. It does not forward the message.

D

A switch receives a frame addressed to the MAC address FF:FF:FF:FF:FF:FF. What will the switch do with the frame? A. Forward it out the port and to the device with that MAC address. B. Process the frame and respond to the sending device. C. Drop the frame, D. Send it out all ports except for the port it was received on.

E

A switch running STP is classified as a backup bridge. What state is it in? A. Listening B. Learning C. Disabled D. Forwarding E. Blocking

A

A switch running STP is in the listening state. A message destined for a different network segment arrives at the switch. Which of the following best describes what the switch will do? A. It does not record or segment information. It does not forward the message. B. It places the source address and segment in its database and forwards the message. C. It places the source address and segment in its database, but does not forward the message. D. It does not record address or segment information. However, the message is forwarded.

A

A user reports that network access from her workstation is very slow. The problem does not seem to be affecting any other users. Which of the following conditions is the most likely cause? A. Duplex Mismatch B. Broadcast Storm C. Switching Loop D. Incorrect VLAN

B

Active mode places the port in a negotiating state. A. Port Aggregation Protocol B. Link Aggregation Control Protocol

A

Affected by network outages. A. In-band Management B. Out-of-band Management

A

Auto mode places the port into a passive negotiating state. A. Port Aggregation Protocol B. Link Aggregation Control Protocol

A

Must be encrypted to protect communications from sniffing. A. In-band Management B. Out-of-band Management

B

Passive mode places the port into a passive negotiating state. A. Port Aggregation Protocol B. Link Aggregation Control Protocol

B

Based on the 802.3ad standard. A. Port Aggregation Protocol B. Link Aggregation Control Protocol

B

Provides port security features. A. Unmanaged Switch B. Managed Switch

A

Provides very few configuration options. A. Unmanaged Switch B. Managed Switch

C

Select the statement that best describes a broadcast storm. A. A broadcast storm occurs when the level of TCP/IP transfers overwhelm a gateway. B. A broadcast storm occurs when the amount of electrical interference on a cable exceeds acceptable levels, broadcasting a storm of noise and preventing accurate data transfer. C. A broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth. D. A broadcast storm occurs when a network server loses its connection to the network, and the disconnected cable sends feedback messages that overwhelm the network cable capacity.

B

Can be configured over a dedicated communication channel. A. Unmanaged Switch B. Managed Switch

B

Can be configured over a network connection. A. Unmanaged Switch B. Managed Switch

A

Commonly sold at retail stores. A. Unmanaged Switch B. Managed Switch

A

Completes with normal network traffic for bandwidth. A. In-band Management B. Out-of-band Management

B

Controls the ability to connect to the device using a direct connection. A. VTY B. Console C. SDM

C

Controls the ability to connect to the device using a web browser using HTTPS. A. VTY B. Console C. SDM

A

Controls the ability to log on through a LAN or WAN interface configured on the device. A. VTY B. Console C. SDM

A

Desirable mode places the port in a negotiating state. A. Port Aggregation Protocol B. Link Aggregation Control Protocol

B

Does not compete with normal network traffic for bandwidth. A. In-band Management B. Out-of-band Management

B

Supports VLANs. A. Unmanaged Switch B. Managed Switch

B

Switches running STP are in the process of exchanging BPDUs and redefining their roles. Which port state are the switches currently in? A. Blocking B. Listening C. Forwarding D. Disabled E. Learning

C,D

The network board in a workstation is currently configured as follows: +Network Speed = Auto +Duplexing = Auto The workstation is experiencing poor network performance, and you suspect that the network board is not correctly detecting the network speed and duplex settings. Upon investigation, you find that it is running at 10 Mbps half-duplex. You know that your network switch is capable of much faster throughput. To fix this issue, you decide to manually configure these settings on the workstation. Before you do so, you need to verify the configuration of the switch port that the workstation is connect to. Given that is is a Cisco switch, which commands can be used on the switch to show a list of all switch ports and their current settings? (Select Two) Ex. A,B A. show interface Ethernet counters B. show interface capabilities C. show running-config interface D. show interface E. show interface switchport

B

Uses a dedicated communication channel. A. In-band Management B. Out-of-band Management

D

When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch? A. Any port not assigned to a VLAN. B. Uplink ports. C. Gigabit and higher Ethernet ports. D. Trunk Ports E. Each port can only be a member of a single VLAN.

B

When you configure VLANs on a switch, which of the following is used to identify a device's VLAN membership? A. MAC address B. Switch Port C. IP address D. Host Name

A,B

Which of the following are reasons to configure VLANs on a switch as opposed to using switches without VLANs? (Select Two) Ex. A,B A. Increased Security B. Increased number of broadcast domains C. Redundant paths between two hosts D. Allowing broadcast traffic between subnets E. Increased number of collision domains

A,D

Which of the following are true regarding using multiple VLANs on a single switch (Select Two) Ex. A,B A. The number of broadcast domains increases. B. The number of collision domains increases. C. The number of collision domains decrease. D. The number of collision domains remains the same. E. The number of broadcast domains remain the same. F. The number of broadcast domains decreases.

B

Which of the following benefits apply only to creating VLANs with switches and not to segmenting the network with regular switches? A. You can provide guaranteed bandwidth between two devices. B. You can create multiple broadcast domains. C. You can segment the network based on physical location. D. You can create multiple collision domains.

D

Which of the following best describes the concept of VLAN? A. Devices on different networks that can receive multicast VLAN? B. Devices connected through the internet that can communicate without using a network address. C. Devices in separate networks (which means they have different network addresses) logically grouped as if they were in the same network. D. Devices on the same network logically grouped as if they were on separate networks. E. Devices connected by a transmission medium other than cable (such as microwave or radio transmissions).

A

Which of the following connectivity hardware is used to create a VLAN? A. Switch B. Hub C. Router D. Bridge

C

Which of the following features dynamically places switch ports in blocking or forwarding states? A. Mirroring B. Trunking C. Spanning Tree D. PoE

D

Which of the following solutions would you implement to eliminate switching loops? A. CSMA/CD B. Inter-VLAN Routing C. Auto-Duplex D. Spanning Tree

B

Which of the following statements accurately describes a VLAN ID? A. VLAN IDs are defined at the Network layer and help route the frame through the switch fabric. B. Switches append a VLAN ID to the header of each frame to identify the virtual network it belongs to. C. VLAN IDs identify both the source and destination VLAN. They are like network addresses, except they exist at the Data Link layer. D. VLAN IDs identify VLAN where the frame originated so the receiving host can reply.

A,B

Which of the following statements describe how VLANs affect broadcast traffic within an internetwork? (Select Two) Ex. A,B A. Devices on the same VLAN have the same subnet address. B. Broadcast traffic is transmitted only with a VLAN. C. Broadcast traffic is transmitted to all devices on all VLANs. D. Devices on separate VLANs share the same subnet address. E. Broadcast traffic is only transmitted on VLAN1.

D

Which problem does the spanning tree protocol prevent? A. Buffer overflows by defining source-quench messages that a receiving device sends to the transmitting device. B. Routing tables from becoming outdated by decreasing the convergence time on a network. C. Packet blocking on backup bridge ports to allow switches to forward frames to all BPDUs. D. Switching loops from developing when redundant paths are implemented between switches.

A,C

Which statements accurately describe the port states of both bridges and switches? (Select Two) Ex. A,B A. In the learning state, the MAC address table can be populated, but frames are not forwarded. B. In the learning state, the MAC address table cannot be populated because the port is blocked. C. Ports in a blocked state still receive BPDUs. D. Ports in a blocked state cannot receive BPDUs. E. In the learning state, all ports are in a forwarding state.

C

While viewing the status of the interfaces on a Cisco switch, you see an abnormally large number of oversized Ethernet frames being received on one interface. This interface is connected to a workstation located on the second floor. What could cause this to happen? A. Two hosts on the network have the same MAC address. B. Collisions between two or more network hosts are occurring. C. The workstation's network board is jabbering. D. A strong EMI emitter is near the able that connects the workstation to the interface. E. An incorrect subnet mask has been configured on the workstation.

D

You can create a virtual LAN using which of the following? A. Hub B. Router C. Gateway D. Switch

B

You manage a local area network with several switches. A new employee has started today, so you connect her workstation to a switch port. After connecting the workstation, you find that the workstation cannot get an IP address from the DHCP server. You check the link and status lights and see the connection is working properly. A ping to the loopback address on the workstation succeeds. No other computers seem to have the problem. Which of the following is the most likely cause of the problem? A. Incorrect default gateway setting B. Incorrect VLAN assignment C. Switching loop D. Half-duplex setting on the switch and workstation.

C

You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ45 ports connected to the switch. You want to allow visitors to plug into these ports to gain internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and internet access. Which feature should you implement? A. PoE B. Spanning Tree C. VLANs D. Port Authentication

C

You manage a network that uses a single switch. All ports withing your building connect through the single switch. In the lobby of your building are three RJ45 ports connected to the switch. You want to allow visitors to plug into these ports to gain internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and internet access. Which feature should you implement? A. NAT B. DMZ C. VLANs D. Port Authentication

E

You manage a network that uses multiple switches. You want to provide multiple paths between switches so that if one link goes down, an alternate path is available. Which feature should your switch support? A. Trunking B. Mirroring C. OSPF D. PoE E. Spanning Tree

A

You manage a network with multiple switches. You find that your switches are experiencing heavy broadcast storms. Which of the following will help reduce the effects of a broadcast storm? A. Enable spanning tree on the switches B. Disable auto-duplex C. Configure each switch with a single trunk port D. Manually set the speed for each switch port.

A

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the same switch which is in VLAN 2. What should you configure so that the two devices can communicate? A. Routing B. Mirroring C. Trunking D. Spanning Tree E. PoE

C

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch in LAN 1. What should you configure to allow communication between these two devices through the switches? A. Spanning Tree B. Layer 3 Switching C. Trunking D. Bonding

A

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature allows the switches to pass VLAN traffic between the switches? A. Trunking B. 802.1x C. PoE D. Spanning Tree E. Bonding

E

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature prevents switching loops and ensures there is only a single active path between any two switches? A. Trunking B. Bonding C. 802.1x D. PoE E. Spanning Tree

D

You need to configure spanning tree on a Cisco switch. You'd like to use a protocol that conforms to the 802.1w standards. Which protocol should you use? A. BPDU guard B. PortFast C. EtherChannel D. Rapid PSVT+

B

You need to keep users in all other departments from accessing the servers used by the finance department. Which of the following technologies should you use to logically isolate the network? A. Subnetting B. VLANs C. NIC Teaming D. MAC Filtering

D

You run a small network for your business that has a single router connected to the internet and single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able communicate with this computer through the switch, but you still need to access the network through the computer. Which of the following should you use in this situation? A. VPN B. Port Security C. Spanning Tree D. VLAN

C

You run a small network for your business that has single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation? A. Spanning Tree B. VPN C. VLAN D. Port Security

C

You want to reduce collisions by creating separate collision domains and VLANs. Which of the following devices should you choose? A. Router B. Active Hub C. Switch D. Bridge

A

Your company is a small start-up that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented? A. VLANs B. Spanning Tree C. Port Security D. VPN


Ensembles d'études connexes

BUS/475: Integrated Business Topics - Week 4

View Set

Jordan midterm history flashcards 120

View Set

Greece: Archaic & Classical Period, Greece: Late Classical Period & Hellenistic Period, Survey of Art I - Day 9 - Classic Greece, Survey of Art I - Day 14 - Exam 2 Study Guide (Days 8-13), Survey of Art I - Day 10 - Late Classical, Hellenistic Period...

View Set

Common Probability Distributions

View Set

Gravitas | The moonlighting debate: Is it legal to work 2 jobs in India?

View Set

Herbivores, Carnivores & Omnivores

View Set