2-3: VLANs Flashcards
A network administrator is determining the best placement of VLAN trunk links. Which two types of point-to-point connections utilize VLAN trunking?
between a switch and a server that has an 802.1Q NIC between two switches that utilize multiple VLANs
What happens to a port that is associated with VLAN 10 when the administrator deletes VLAN 10 from the switch?
The port becomes inactive.
Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to another switch. All other ports are unused. Which security best practice did the administrator forget to configure?
All user ports are associated with VLANs distinct from VLAN 1 and distinct from the ‘black-hole’ VLAN.
Which command is used to remove only VLAN 20 from a switch?
no vlan 20
A Cisco Catalyst switch has been added to support the use of multiple VLANs as part of an enterprise network. The network technician finds it necessary to clear all VLAN information from the switch in order to incorporate a new network design. What should the technician do to accomplish this task?
Delete the startup configuration and the vlan.dat file in the flash memory of the switch and reboot the switch.
What is the effect of issuing a switchport access vlan 20 command on the Fa0/18 port of a switch that does not have this VLAN in the VLAN database?
VLAN 20 will be created automatically.
Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface?
show interfaces Fa0/1 switchport
Which DTP mode passively waits for the neighbor to initiate trunking?
dynamic auto
Which DTP mode requires manual configuration of trunking or non-trunking?
nonegotiate
Which DTP mode actively attempts to convert the link to a trunk?
dynamic desirable
Which DTP mode is a permanent trunking mode?
trunk
Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport access vlan 30 is entered on the Fa0/11 interface, what will happen?
Port Fa0/11 will be returned to VLAN 1.
What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3?
Enter the switchport access vlan 3 command in interface configuration mode.
Which two Layer 2 security best practices would help prevent VLAN hopping attacks?
- Disable DTP autonegotiation on end-user ports.
- Change the native VLAN number to one that is distinct from all user VLANs and is not VLAN 1.
In a basic VLAN hopping attack, which switch feature do attackers take advantage of?
the default automatic trunking configuration