7.3.16 Switching Ports

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following must each device's MTU be set to for jumbo frames to transverse the network without risk of fragmentation?

9,000 The MTU of each device in the network must be set to 9,000 for jumbo frames to transverse the network without fragmentation. If a device's MTU is set to 1,500, 3,000, or 6,000, a jumbo frame could be fragmented.

Which of the following BEST describes Ethernet flow control?

A configuration that sends a pause frame to the transmitting device when the receiving device cannot keep up with the volume of data being sent. Ethernet flow control is a configuration that sends a pause frame to the transmitting device when the receiving device cannot keep up with the volume of data being sent.

Computers A and B are on the same VLAN and are separated by two switches as shown in the exhibit. Computer A sends a frame to Computer B. Which of the following BEST describes the frame's composition as it travels from A to B?

Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B.

Which statements accurately describe the port states of both bridges and switches? (Select two.)

Ports in a blocked state still receive BPDUs. In the learning state, the MAC address table can be populated, but frames are not forwarded.

Which of the following BEST describes port aggregation?

Multiple ports linked together and used as a single logical port. Multiple ports linked together and used as a single logical port is called link aggregation

You have a large Power over Ethernet flat screen that you are installing in a conference room that requires 70 watts of power. Which of the following IEEE standards does your PoE switch need to provide power for the flat screen?

PoE++ Type 4 You would need PoE++ Type 4, which provides up to 71. 3 watts of power.

Your organization's management wants to monitor all the customer services calls. The calls are taken on VoIP phones. Which of the following configurations would BEST help you set up a way to monitor the calls?

Port mirroring Port mirroring provides copies of packets from a selected port for monitoring and analysis.

Which of the following switch features allows you to configure how the switch's MAC address table is filled?

Port security Port security allows you to choose from dynamic locking, static locking, or a combination of both to fill the MAC address table. This is done to protect the switch from MAC flooding and other vulnerabilities.

You manage a single subnet with three switches. The switches are connected to provide redundant paths between themselves. Which feature prevents switching loops and ensures that there is only a single active path between any two switches?

Spanning Tree Spanning Tree is a protocol on a switch that allows it to maintain multiple paths between other switches within a subnet. Spanning Tree runs on each switch and is used to select a single path between any two switches. Without this protocol, switches that are connected with multiple links would form a switching loop, where frames are passed back and forth continuously.

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch in VLAN 1. What should you configure to allow communication between these two devices through the switches?

Trunking A trunk port connects two switches together. Typically, Gigabit Ethernet ports are used for trunk ports, although any port can be a trunking port. A trunk port is a member of all VLANs and carries traffic between the switches. With trunking, frames that are sent over a trunk port are tagged by the first switch with the VLAN ID so that the receiving switch knows which VLAN the frame belongs to. The trunking protocol describes the format that switches use for tagging frames with the VLAN ID. Because end devices do not understand VLAN tags, the tag is removed from the frame by the switch before the frame is forwarded to the destination device. VLAN tagging is only used for frames that travel between switches on the trunk ports.


संबंधित स्टडी सेट्स

Chapter 30: Management of Patients with Hematologic Neoplasms

View Set

Chapter 36: Management of Patients With Immune Deficiency Disorders

View Set

Capstone Pharm Pre-Assessment Quiz

View Set

Estructura 1.2 - 1 - Los números

View Set

Chapter 11: Health Care of the Older Adult

View Set

3. Physics Practice Questions - Chapter 7- Momentum

View Set