CCNA Chapter 3 VLAN Flashcards
A network administrator is determining the best placement of VLAN trunk links. Which two types of point-to-point connections utilize VLAN trunking?
- between a switch and a server that has an 802.1Q NIC
2. between two switches that utilize multiple VLANs
What happens to a port that is associated with VLAN 10 when the administrator deletes VLAN 10 from the switch?
The port becomes inactive.
Which command is used to remove only VLAN 20 from a switch?
no vlan 20
A Cisco Catalyst switch has been added to support the use of multiple VLANs as part of an enterprise network. The network technician finds it necessary to clear all VLAN information from the switch in order to incorporate a new network design. What should the technician do to accomplish this task?
Delete the startup configuration and the vlan.dat file in the flash memory of the switch and reboot the switch.
What is the effect of issuing a switchport access vlan 20 command on the Fa0/18 port of a switch that does not have this VLAN in the VLAN database?
VLAN 20 will be created automatically.
Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface?
show interfaces Fa0/1 switchport
What is the Dynamic Trunking Protocol (DTP) for “Passively waits for the neighbour to initiate trunking”
Dynamic Auto
What is the Dynamic Trunking Protocol (DTP) for “Requires manual configuration of trunking or none trunking”
nonegotiate
What is the Dynamic Trunking Protocol (DTP) for “actively attempts to convert the link to a trunk”
Dynamic desirable
What is the Dynamic Trunking Protocol (DTP) for “permanent trunking mode “
Trunk
Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport access vlan 30 is entered on the Fa0/11 interface, what will happen?
Port Fa0/11 will be returned to VLAN 1.
What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3?
Enter the switchport access vlan 3 command in interface configuration mode.
Which two Layer 2 security best practices would help prevent VLAN hopping attacks? (Choose two.)
- Disable DTP autonegotiation on end-user ports.
2. Change the native VLAN number to one that is distinct from all user VLANs and is not VLAN 1.
In a basic VLAN hopping attack, which switch feature do attackers take advantage of?
The default automatic trunking configuration
A Cisco switch currently allows traffic tagged with VLANs 10 and 20 across trunk port Fa0/5. What is the effect of issuing a switchport trunk allowed vlan 30 command on Fa0/5?
It allows only VLAN 30 on Fa0/5.