Chapter 11 Flashcards
Which of the following are reasons to configure VLANs on a switch as opposed to using switches without VLANs? (Select two.)
Increased security
Increased number of broadcast domains
Increased number of collision domains
Allowing broadcast traffic between subnets
Redundant paths between two hosts
Increased security
Increased number of broadcast domains
You have two VLANs connected as shown. How many broadcast domains are in this network?
0
1
2
3
4
5
Which of the following benefits only applies to creating VLANs with switches and not to segmenting the network with regular switches?
You can guarantee bandwidth between two devices.
You can segment the network based on physical location.
You can create multiple collision domains.
You can create multiple broadcast domains.
2
Which of the following statements describe how VLANs affect broadcast traffic within an internetwork? (Select two.)
Devices on the same VLAN have the same subnet address.
Devices on separate VLANs share the same subnet address.
Broadcast traffic is only transmitted within a VLAN.
Broadcast traffic is transmitted to all devices on all VLANs.
Broadcast traffic is only transmitted on VLAN1.
Devices on the same VLAN have the same subnet address.
Broadcast traffic is only transmitted within a VLAN.
Which of the following are true regarding using multiple VLANs on a single switch? (Select two.)
The number of collision domains remains the same.
The number of collision domains increases.
The number of broadcast domains remains the same.
The number of collision domains decreases.
The number of broadcast domains increases.
The number of broadcast domains decreases.
The number of collision domains remains the same.
The number of broadcast domains increases.
Which of the following statements accurately describes a VLAN ID?
- VLAN IDs identify both the source and destination VLAN. They are like network addresses.
- VLAN IDs are defined at the Network layer and help route the frame through the switch fabric.
- Switches append a VLAN ID to the header of each frame to identify the virtual network to which the frame belongs.
- VLAN IDs identify the VLAN where the frame originated so that the receiving host can reply.
-Switches append a VLAN ID to the header of each frame to identify the virtual network to which the frame belongs.
You want to make interface fa0/2 a member of VLAN2 on a Catalyst 2950XL switch. Which commands must you enter? (Select two.)
- int fastethernet 0/2
- switchport access vlan 2
- switchport vlan 2 fa0/2
- membership vlan 2
- create vlan 2
i-nt fastethernet 0/2
-switchport access vlan 2
You want to show a list of VLANs on your system. Which command would you use?
-run vlan id
-show vlan brief
-show vlan id
-run vlan brief
-show vlan brief
Which command would you use to delete a VLAN?
- show vlan id [1-1005]
- vlan [1-1005]
- no vlan [1-1005]
- del vlan [1-1005]
-no vlan [1-1005]
Which of the following commands would you use to set the priority value for voice traffic?
- switchport voice vlan [1-1005]
- switchport priority voice vlan [1-1005]
- switchport priority extend cos [0-7]
- switchport voice priority extend cos [0-7]
-switchport priority extend cos [0-7]
sets the priority value that voice traffic will be tagged with (the default is 5).
Computers A and B are on the same VLAN and are separated by two switches as shown. Computer A sends a frame to Computer B.
Which of the following best describes the composition of the frame as it travels from A to B?
Computer A appends a VLAN ID to the frame. It travels from switch to switch and arrives at Computer B, where it removes the VLAN ID.
Computer A sends a normal frame. The first switch forwards the frame to the second switch, where the VLAN ID is appended to the frame and forwarded to Computer B.
Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B.
Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The VLAN ID remains on the frame through the second switch, up to Computer B.
Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B.
What primary advantages does the 802.1Q Trunking Protocol have over ISL? (Select two.)
- Supports multiple spanning-tree instances per switch.
- Is an IEEE standard.
- Encapsulates the entire data-link frame between the tag header and trailer.
- Can be used with a mix of Cisco and non-Cisco devices.
- Performed by ASIC.
- Is an IEEE standard.
- Can be used with a mix of Cisco and non-Cisco devices.
Which of the following is true concerning the default VLAN and VLAN trunking? (Select two.)
- If the default VLAN on one end of the trunk is different from the default VLAN on the other end, the traffic of the native VLANs on both sides cannot be transmitted correctly on the trunk.
- Supports VLAN numbers 1-1005.
- With 802.1Q trunking, frames from the default VLAN are not tagged.
- The native VLAN is VLAN 0 by default and may not be configured.
- 802.1Q tags all frames before forwarding them to another switch, including the native VLAN.
- If the default VLAN on one end of the trunk is different from the default VLAN on the other end, the traffic of the native VLANs on both sides cannot be transmitted correctly on the trunk.
- With 802.1Q trunking, frames from the default VLAN are not tagged.
You are implementing a static VLAN trunking configuration on a Catalyst 3550 switch. You would like to keep the switch from tagging packets from VLAN 3 as they leave FastEthernet 0/1. Which command(s) would you use?
Switch(config)#int fa 0/1
Switch(config-if)#switchport mode trunk
Switch(config-if)#switchport trunk encapsulation dot1q
Switch(config)#int fa 0/1
Switch(config-if)#switchport mode trunk
Switch(config-if)#switchport trunk native vlan 3
Switch(config)#int fa 0/1
Switch(config-if)#switchport mode access
Switch(config-if)#switchport trunk native vlan 3
Switch(config)#int fa 0/1
Switch(config-if)#switchport mode trunk
Switch(config)#int fa 0/1
Switch(config-if)#switchport mode trunk
Switch(config-if)#switchport trunk native vlan 3
Which command disables the trunking configuration on a switch interface?
- switchport access
- switchport mode trunk
- switchport trunk disable
- switchport mode access
switchport mode access
You have implemented VLAN trunking on your network. You have two switches that are both configured to use dynamic auto mode. You discover that they are not trunking.
Which of the following trunking configuration options can be used to make these two switches trunk successfully? (Select two.)
- Configure at least one of the switches to use dynamic desirable mode.
- Configure at least one of the switches to use dynamic link mode.
- Configure both switches to autonegotiate speed and duplex mode.
- Configure at least one of the switches to use dynamic access mode.
- Manually configure trunking on at least one of the switches.
iConfigure at least one of the switches to use dynamic desirable mode.
-Manually configure trunking on at least one of the switches.
Review the image to answer the following question.
You would like to manually configure the trunk status on each port for switch A so that the appropriate type is selected and so that a trunking protocol is not used. Match the command on the left with the correct port on switch A. (Commands on the left can be used once, more than once, or not at all.)
Interface Fa0/1
Interface Fa0/2
Interface Fa0/3
Interface Fa0/4
switchport mode dynamic desirable
switchport mode trunk
switchport mode access
Interface Fa0/1=switchport mode access
Interface Fa0/2=switchport mode access
Interface Fa0/3=switchport mode trunk
Interface Fa0/4=switchport mode access
You have entered the following command to enable dynamic trunking configuration:
Switch(config-if)#switchport mode dynamic desirable
If the switch interface is connected to another switch, what will it attempt to do?
- Negotiate a link only with a switch that is using dynamic auto mode.
- Negotiate a link only with a switch that is using dynamic desirable mode.
- Negotiate a link only with a switch that is using trunk mode.
- Negotiate a link using the desired trunking protocol.
Negotiate a link using the desired trunking protocol.
You have two Cisco 2960 switches with 12 FastEthernet ports and 2 GigabitEthernet ports on each switch.
You connect Fa0/1 on SwitchA to Fa0/1 on SwitchB with a crossover cable. A partial configuration for both switches is shown below.
You notice that VLAN traffic for VLAN 2 is not being carried from SwitchA to SwitchB. What should you do?
- Connect the switches using the Gi0/1 port.
- For Fa0/1 on SwitchA, set the switchport mode to dynamic desirable.
- For Fa0/1 on both switches, set the switchport mode to access.
- Configure the encapsulation type on both switches to ISL.
- Connect the switches using a straight-through cable.
-For Fa0/1 on SwitchA, set the switchport mode to dynamic desirable.
You want to verify that trunking is enabled between the Catalyst 2950XL switch and the Cisco 2600 router. Which command must you enter?
- show interface fa0/1 trunk
- show trunk
- show vtp status
- switchport mode trunk
Which of the following are advantages of using the Spanning Tree Protocol (STP) in network segmented bridges? (Select two.)
- STP minimizes the convergence time required for bridges to share network information.
- STP identifies the most efficient path through a bridged network.
- STP allows all bridges to forward packets.
- STP prevents message loops from forming.
- STP calculates all the possible paths through the network and performs load balancing.
- STP prevents message loops from forming.
- STP identifies the most efficient path through a bridged network.
Which problem does the Spanning Tree Protocol prevent?
- It prevents message loops from developing when a switch or bridge is connected to the same location more than once.
- It doesn’t prevent any problem. Instead, it creates an overall routing table (a span tree) for the entire network.
- It prevents buffer overflows by defining source-quench messages that a receiving device sends to the transmitting device.
- It prevents route tables from becoming outdated by decreasing the convergence time on a network.
-It prevents message loops from developing when a switch or bridge is connected to the same location more than once.
You have three switches configured as shown.
How could you guarantee that switch C becomes the root bridge?
- Configure switch C with a lower priority value.
- Configure Fa0/1 and Fa0/2 on switch C with a lower port priority.
- Configure Fa0/1 and Fa0/2 on switch C with a higher cost value.
- Configure switch C with a higher priority value.
- Configure Fa0/1 and Fa0/2 on switch C with a higher port priority.
- Configure Fa0/1 and Fa0/2 on switch C with a lower cost value.
-Configure switch C with a lower priority value.
You have four switches configured as shown.
Which switch becomes the root bridge?
A
B
C
D
D
A switch running STP is a backup bridge. What state is it in?
- Disabled
- Learning
- Listening
- Forwarding
- Blocking
Blocking
EXPLANATION
A backup bridge is in the blocking state. It receives packets addressed specifically to it and packets addressed to all bridges. It builds its database, but does not forward packets.
You have three switches configured as shown.
For each port, identify the port role and status after spanning tree convergence by matching the port states on the left with the ports on the graphic. (Port states on the left can be used once, more than once, or not at all.)
A Gi0/1
A Gi0/2
B Gi0/1
B Gi0/2
C Gi0/1
C Gi0/2
Backup and Blocked
Designated and Forwarding
Root and Forwarding
C=Designated and Forwarding
A Gi0/1=Root and Forwarding
A Gi0/2=Designated and Forwarding
B Gi0/1=Root and Forwarding
B Gi0/2=Backup and Blocked
STP uses two timers to monitor connections, the hello timer and the max age timer. Which of the following describes the hello timer?
- Is affected by network congestion and small hardware issues.
- Initiates a new root bridge election process if convergence occurs and a new root switch is selected.
- Measures the amount of time between the hello packets sent from the root bridge.
- Specifies how long a particular switch should wait after not receiving a hello packet before initiating changes to the STP topology.
-Measures the amount of time between the hello packets sent from the root bridge.
Which advanced Spanning Tree Protocol (STP) feature prevents certain switch ports from connecting to other switches to prevent switching loops and unauthorized connections?
- Rapid STP
- PortFast
- BPDU Guard
- EtherChannel
-BPDU Guard