Chapter 6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You need to disable the FastEthernet0/0 interface on a switch.

Conf t - Enter global configuration mode. int fa0/0 - Enter interface configuration mode shutdown - disable the interface. show ip interface brief - verify the interface is disabled

You need to configure the FastEthernet0/1 interface on a swtich to automatically detect the appropriate link speed and duplex setting by negotiating with the device connected to the other end of the link.

Conf t- Enter global configuration int fa0/1- Enter interface configuration mode. speed auto- Set the speed of the interface duplex auto- Set the duplex setting for the interface.

You have just connected four switches as shown in the exhibit. Assuming the default configuration, which switch will become the root bridge? - A - B - C - D

- B

A switch running STP is classified as a backup bridge. What state is it in? - Disabled - Forwarding - Blocking - Listening - Learning

- Blocking

Which of the following statements describe how VLANs affect broadcast traffic within an internetwork? (Select 2) - Broadcast traffic is only transmitted on VLAN1. - Devices on separate VLANs share the same subnet address. - Devices on the same VLAN have the same subnet address. - Broadcast traffic is transmitted to all devices on the VLANs. - Broadcast traffic is transmitted only within VLAN

- Broadcast traffic is transmitted only within a VLAN. - Devices on the same VLAN have the same subnet address.

You manage a network with a single switch. On each switch port, a hub connects multiple devices to the switch. which condition are you most likely to experience on the network? - Echo - Attenuation - Interference - Crosstalk - Collisions

- Collisions

Computer A and B are on the same VLAN and are separated by two switches, as show in the exhibit. Computer A sends a frame to Computer B. Which of the following best describes the composition of the frame as it travels from A to B? - Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The VLAN ID remains on the frame through the second switch up to Computer B. - Computer A appends a VLAN ID to the frame. It travels from switch to switch and arrives at Computer B where it removes the VLAN ID - Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B. - Computer A sends a normal frame. The first switch forwards the frame to the second switch, where the VLAN ID is appended to the frame and forwarded to computer B.

- Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B.

You have just connected four switches as shown in the exhibit. Assuming the default configuration, how can you force switch C to become the root bridge? - Configure a priority number of 61440 for switch C. - Remove link cables 1 and 6 from the configuration. - remove cable 6 from the configuration - remove link cable 1 from the configuration. - Configure a priority number of 4096 for switch C.

- Configure a priority number of 4096 for switch C.

You have three switches configured as shown in the Exhibit. How can you guarantee that switch C becomes the root bridge? - Configure Fa0/1 and Fa0/2 on switch c with a lower port priority. - Configure switch C with a higher priority value. - Configure switch C with a lower priority value. - Configure Fa0/1 and Fa0/2 on switch c with a higher cost value. - Configure Fa0/1 and Fa0/2 on switch c with a higher port priority. - Configure Fa0/1 and Fa0/2 on switch c with a lower cost value.

- Configure switch C with a lower priority value.

Which of the following best describes the concept of a VLAN? - Devices connected through the internet that can communicate without using a network address. - Devices on the same network logically grouped as they were on separate networks. - Devices connected by a transmission medium other than cable (such as microwave or radio transmissions). - Devices on different networks that can receive multicast packets. - Devices in separate networks (which means they have different network addresses) logically grouped as if they were in the same network.

- Devices on the same network logically grouped as they were on separate networks.

A user reports that network access from her workstation is very slow. The problem does not seem to be affecting any other users. Which of the following conditions is the most likely cause? - Duplex mismatch - Incorrect VLAN - Broadcast storm - Switching loop

- Duplex mismatch

You manage a network with multiple switches. You find that your switches are experiencing heavy broadcast storms. Which of the following will help reduce the effects of a broadcast storm? - Enable spanning tree on the switches - Manually set the speed for each switch port - Disable auto-duplex detextion - Configure each switch with a single trunk port

- Enable spanning tree on the switches

Switches running STP are in the process of exchanging BPDUs and redefining their roles. Which port state are the switches currently in? - Listening - Forwarding - Blocking - Learning - Disabled

- Listening

You need to configure a spanning tree on a cisco switch. You'd like to use a protocol that conforms to the 802.1w standards. Which protocol should you use? - EtherChannel - Rapid PVST+ - PortFast - BPDU guard

- Rapid PVST+

The network board in a workstation is currently configured as follows: Network speed = Auto Duplexing = auto - Show interface capabilities - Show interface - Show interface ethernet counters - Show running-config interface - Show interface switchport

- Show interface - Show running-config interface

Which of the following features dynamically places switch ports in blocking or forwarding states? - Spanning tree - Trunking - Mirroring - PoE

- Spanning tree

Which of the following solutions would you implement to eliminate switching loops? - Inter-VLAN routing - CSMA/CD - Auto-duplex - Spanning tree

- Spanning tree

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature prevents switching loops and ensures there is only a single path between any two switches? - 802.1x - PoE - Trunking - bonding - Spanning tree

- Spanning tree

Which of the following connectivity hardware is used to create a VLAN? - Router - Switch - Hub - Bridge

- Switch

You can create a virtual LAN using which of the following? - Switch - Gateway - Router - Hub

- Switch

You want to reduce collisions by creating separate collision domains and virtual LANs. Which of the following devices should you choose? - Active hub - Switch - bridge - Router

- Switch

When you configure VLANs on a switch, which of the following is used to identify a device's VLAN membership? - Host name - Switch port - IP address - MAC address

- Switch port

Which of the following statements accurately describes a VLAN ID? - VLAN IDs are defined at the Network layer and help route the frame through the switch fabric. - VLAN IDs identify both the source and destination VLAN. They are like network addresses, except they exist at the Data Link Layer. - VLAN IDs identify the VLAN where the frame originated so the receiving host can reply. - Switches append a VLAN ID to the header of each frame to identify the virtual network to which it belongs.

- Switches append a VLAN ID to the header of each frame to identify the virtual network to which it belongs.

Which problem does the spanning tree protocol prevent? - Switching loops from developing when redundant paths are implemented between switches. - Packet blocking on backup bridge ports to allow switches to forward frames to all BPDUs. - Routing tables from becoming outdated by decreasing the convergence time on a network. - Buffer overflows by defining source-quench messages that receiving devices send to the transmitting device.

- Switching loops from developing when redundant paths are implemented between switches.

Which of the following are true regarding using multiple VLANs on a single switch? - The number of collision domains decreases. - The number of broadcast domains increase. - The number of collision domains increases. - The number of collision domains remains the same. - The number of broadcast domains decreases. - The number of broadcast domains remains the same.

- The number of collision domains remains the same. - The number of broadcast domains increases.

When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch? - Each port can only be a member of a single VLAN. - Trunk ports - Gigabit and higher Ethernet ports. - Any port not assigned to a VLAN. - Uplink ports.

- Trunk ports

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch also in VLAN 1. What should you configure to allow communication between these two devices through the switches? - Trunking - Bonding - Layer 3 switching - Spanning tree

- Trunking

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature allows the switches to pass VLAN traffic between the switches? - 802.1x - PoE - Bonding - Spanning tree - Trunking

- Trunking

Which of the following benefits apply to only the created VLANs with switches and not to segmenting the network with regular switches? - You can create multiple broadcast domains. - You can create multiple collision domains. - You can segment the network based on physical location. - you can provide guaranteed bandwidth between two devices.

- You can create multiple broadcast domains.

A switch receives a frame addressed to the MAC address FF:FF:FF:FF:FF:FF. What will the switch do with the frame?

Send it out all ports except for the port it was received on.

You have two switches connected together as shown in the following diagram. How many broadcast domains are in the network shown? - 0 - 1 - 2 - 4 - 5

- 2

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in Vlan 1 needs to communicate with a device on the same switch which is in VLAN2. What should you configure so that the two devices can communicate? - Routing - PoE - Spanning tree - Trunking - Mirroring

- Routing

A switch is running STP is in the learning state. A message destined for a different network segment arrives at the switch. Which of the following best describes what the switch will do? - It uses the source MAC address and network segment information to build its bridge database, but does not forward the message. - It does not record address or segment information. However, the message is forwarded. - It places the source address and segment in its database and forwards the message. - It does not record address or segment information. It does not forward the message.

- It uses the source MAC address and network segment information to build its bridge database, but does not forward the message.

Which statements accurately describe the port states of both bridges and switches? (Select two.) - Ports in a blocked state still receive BPDUs. - In the learning state, all ports are in a forwarding state. - Ports in a blocked state cannot receive BPDUs. - In the learning state, the MAC address table cannot be populated because the port is blocked. - In the learning state, the MAC address table can be populated, but frames are not forwarded.

- Ports in a blocked state still receive BPDUs. - In the learning state, the MAC address table can be populated, but frames are not forwarded.

You manage a network that uses multiple switches. You want to provide multiple paths between switches so that if one link goes down, an alternate path is available. Which feature should your switch support? - Spanning tree - Trunking - OSPF - Mirroring - PoE

- Spanning tree

While viewing the status of the interfaces on a Cisco switch, you see abnormally large of oversized ethernet frames being received on one interface. This interface is connected to a workstation located on the 2nd floor. What could be causing this to happen? - Two hosts on the network have the same MAC address. - Collisions between two or more network hosts are occurring. - A strong EMI emitter is near the cable that connects the workstation on the interface. - The workstation's network board is jabbering - An incorrect subnet mask has been configured on the workstation.

- The workstation's network board is jabbering

You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation? - Spanning tree - VLAN - Port security - VPN

- VLAN

You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. Which of the following should you use in this situation? - Port security - Spanning tree - VPN - VLAN

- VLAN

Your company is a small start-up that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented? - VPN - Spanning tree - Port security - VLAN

- VLAN

You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ45 ports connected to the switch. You want to allow visitors to plug into these ports to gain internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and internet access. Which feature should you implement? - NAT - Port authentication - DMZ - VLANs

- VLANs

You manage a network that uses a single switch. All ports within your buildings connect through he single switch . In the lobby of your building are three RJ45 ports connected to the switch. You want to allow visitors to plug into these ports to gain internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and internet access. Which feature should you implement? - VLANs - Port authentication - Spanning tree - PoE

- VLANs

select the statement that best describes a broadcast storm. - A broadcast storm occurs when the amount of electrical interference on a cable exceeds acceptable levels, broadcasting a storm of noise and preventing accurate data transfer. - A broadcast storm occurs when the level of TCP/IP transfers overwhelm a gateway. - A broadcast storm occurs when a network server loses its connection to the network, and the disconnected cable sends feedback messages that overwhelm the network cable capacity. - A Broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth.

- A Broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth.

Match each switch management method on left with its corresponding characteristics on the right. Each method may be used once, more than once, or not at all.

- Competes with normal network traffic for bandwidth. In-band Management - Uses a dedicated communication channel. Out-of-band Management - Must be encrypted to protect communications from sniffing. In-band Management - Does not compete with normal network traffic for bandwidth. Out-of-band Management - Affected by network outages. In-band Management

You manage a local area network with several switches. A new employee has started today so you connect her workstation to a switch port. After connecting the workstation, you find that the workstation cannot get an IP address from the DHCP server. You check the link and status lights and the connection is working properly. A ping to the local loopback address on the workstation succeeds. No other computers seem to have a problem. Which of the following is the most likely cause of the problem? - Incorrect default gateway setting - Half-duple setting on the switch and workstation - Switching loop - Incorrect VLAN assignment

- Incorrect VLAN assignment

Which of the following are reasons to configure VLANS on a switch as opposed to using switches without VLANs? - Increased security - redundant paths between two hosts - Increased number of collision domains - increased number of broadcast domains - allowing broadcast traffic between subnets

- Increased security - Increased number of broadcast domains

A switch running STP is in the listening state. A Message destined for a different network segment arrives at the switch. Which of the following best describes what the switch will do? - It places the source address and segment in its database, but does not forward the message. - It does not record address or segment information. It does not forward the message. - It does not record address or segment information. However, the message is forwarded. - It places the source address and segment in its database and forwards the message.

- It does not record address or segment information. It does not forward the message.

What does the ip address dhcp command allow you to do?

Configures the switch to obtain an IP address from a DHCP server.

Match the Cisco device password type on the left with its functions on the right.

Controls the ability to log on through a LAN or WAN interface configured on the device. - YTV Controls the ability to connect to the device using a web browser using HTTPS. - SDM Controls the ability to connect to the device using a direct connection. - Console

Match the EtherChannel protocol on the left with its characteristics on the right. Each protocol may be used once, more than once, or not at all. Desirable mode places the port in a negotiating state. Passive mode places the port into a passive negotiating state. Active mode placed the port in a negotiation state. Based on the 802.3ad standard. Auto mode places the port into a passive negotiation state.

Desirable mode places the port in a negotiating state. - Port aggregation protocol Based on the 802.3ad standard. - Link aggregation control protocol Passive mode places the port into a passive negotiating state. - Link aggregation control protocol Auto mode places the port into a passive negotiation state. - Port aggregation protocol Active mode placed the port in a negotiation state. - Link aggregation control protocol

Match each type of switch on the left with its corresponding characteristics on the right. Each switch type may be used once, more than once, or not at all.

Managed Switch -Provide port security features. -Support VLANs. -Can be configured over a network connection. -Can be configured over a dedicated communication channel. Unmanaged switch -Commonly sold at retail stores. -Provide very few configuration options.

You are configuring a switch so that you can manage it via PuTTY from the same network segment as the switch. On the switch, you enter the following commands: switch#config terminal switch(config)#interface vlan1 switch(config)#ip address 192.168.1.10 255.255.255.0

No, the NO SHUTDOWN command needs to be entered.

You need to keep users in all other departments from accessing the servers used by the finance department. Which of the following technologies should you use to logically isolate the network?

VLANs

The Fast Ethernet 0/0 interface on a switch is currently disabled. You need to enable it so a workstation can be connected to it.

conf t - Enter global configuration mode. int fa0/0 - Enter interface configuration mode. no shut - Enable the interface. Show interface status - verify the interface is disabled.

Which command would you use on a switch to enable management from a remote network?

ip default-gateway 192.168.10.185


Set pelajaran terkait

Chapter 08: Concepts of Care for Patients at End of Life

View Set

Penny Review : Multiple gestations

View Set

Chemistry Semester 1 Exam Review (Tests for Ch. 1-5)

View Set

Entrepreneurship Final Chapter 11

View Set

Milady's Chapter 5- Anatomy Q & A

View Set

Lymphatic capillaries (Figure 31.1)

View Set

human molecular genetics - MODULE 1 ( single gene disorders - mapping and identification of causative mutations)

View Set

Western Civilization: Chapters 4 & 5

View Set