2-2: Basic Switching Concepts and Configuration Flashcards

1
Q

The fifth step of the boot sequence is?

A

Load the IOS software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Port Fa0/2 has already been configured appropriately. The IP phone and PC work properly. Which switch configuration would be most appropriate for port Fa0/2 if the network administrator has the following goals?

  • No one is allowed to disconnect the IP phone or the PC and connect some other wired device.
  • If a different device is connected, port Fa0/2 is shut down.
  • The switch should automatically detect the MAC address of the IP phone and the PC and add those addresses to the running configuration.
A
SWA(config-if)# switchport port-security SWA(config-if)# switchport port-security maximum 2 SWA(config-if)# switchport port-security mac-address sticky
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The network administrator enters the following commands on a Cisco switch:

Switch(config)# interface vlan1 Switch(config-if)# ip address 192.168.1.2 255.255.255.0 Switch(config-if)# no shutdown

What is the effect of entering these commands?

A

Users on the 192.168.1.0/24 subnet are able to ping the switch at IP address 192.168.1.2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which three statements are true about using full-duplex Fast Ethernet?

A
  1. Performance is improved because the collision detect function is disabled on the device.
  2. Performance is improved with bidirectional data flow.
  3. Full-duplex Fast Ethernet offers 100 percent efficiency in both directions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The network administrator wants to configure Switch1 to allow SSH connections and prohibit Telnet connections. How should the network administrator change the displayed configuration to satisfy the requirement?

A

Modify the transport input command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The fourth step of the boot sequence is?

A

Flash Filesystem Initilizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which two statements are true regarding switch port security?

A
  1. Dynamically learned secure MAC addresses are lost when the switch reboots.
  2. If fewer than the maximum number of MAC addresses for a port are configured statically, dynamically learned addresses are added to CAM until the maximum number is reached.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which action will bring an error-disabled switch port back to an operational state?

A

Issue the shutdown and then no shutdown interface commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In which type of attack does a malicious node request all available IP addresses in the address pool of a DHCP server in order to prevent legitimate hosts from obtaining network access?​

A

DHCP starvation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which command displays information about the auto-MDIX setting for a specific interface?​

A

Show controllers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which protocol or service sends broadcasts containing the Cisco IOS software version of the sending device, and the packets of which can be captured by malicious hosts on the network?

A

CDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The first step of the boot sequence is?

A

POST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which interface is the default location that would contain the IP address used to manage a 24-port Ethernet switch?

A

VLAN 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of cable does a network administrator need to connect a PC to a switch to recover it after the Cisco IOS software fails to load?

A

A console cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What impact does the use of the mdix auto configuration command have on an Ethernet interface on a switch?

A

Automatically detects copper cable type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The sixth step of the boot sequence is?

A

Transfer control of the switch over to IOS

14
Q

The second step of the boot sequence is?

A

Load the bootloader from ROM

15
Q

Which event will take place if there is a port security violation on switch S1 interface Fa0/1?

A

Packets with unknown source addresses will be dropped.

17
Q

The third step of the boot sequence is?

A

CPU register initializations

18
Q

What can be determined about port security from the information that is shown?

A

The port violation mode is the default for any port that has port security enabled.

20
Q

While troubleshooting a connectivity problem, a network administrator notices that a switch port status LED is alternating between green and amber. What could this LED indicate?

A

The port has no link.

22
Q

When port security is enabled, a switch port uses the default violation mode of ________ until specifically configured to use a different violation mode.

A

Shutdown

23
Q

A production switch is reloaded and finishes with a Switch> prompt. What two facts can be determined?

A
  1. A full version of the Cisco IOS was located and loaded.
  2. POST occurred normally.
24
Q

Which two basic functions are performed by network security tools?

A
  1. Simulating attacks against the production network to determine any existing vulnerabilities
  2. Revealing the type of information an attacker is able to gather from monitoring network traffic
25
Q

Which method would mitigate a MAC address flooding attack?

A

Configuring port security

26
Q

What media issue might exist on the link connected to Fa0/1 based on the show interface command?

A

There could be too much electrical interference and noise on the link.

27
Q

Which S1 switch port interface or interfaces should be configured with the ip dhcp snooping trust command if best practices are implemented?

A

Only the G0/1 and G0/24 ports

28
Q

___________ communication allows both ends of a connection to transmit and receive data simultaneously.

A

Full-Duplex