Chapter 6 - Enterprise LAN Design and Technologies Flashcards

1
Q

In the Cisco hierarchical network model, which layer is responsible for fast transport?

  1. Network layer
  2. Core layer
  3. Distribution layer
  4. Access layer
A

B. The core layer is responsible for fast transport.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the maximum segment distance for Fast Ethernet over UTP?

  1. 100 feet
  2. 500 feet
  3. 100 meters
  4. 285 feet
A

C. The maximum distance for 100BASE-T is 100 meters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the hierarchical network model, at which layer do security filtering, address aggregation, and media translation occur?

  1. Network layer
  2. Core layer
  3. Distribution layer
  4. Access layer
A

C. The distribution layer is responsible for security filtering, address and area aggregation, and media translation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of cable is the best solution in terms of cost for connecting an access switch to the distribution layer requiring 140 meters?

  1. UTP
  2. Copper
  3. Multimode fiber
  4. Single-mode fiber
A

C. Multimode fiber provide a cost-effective solution for that distance. Single-mode fiber is more expensive. UTP’s maximum distance is 100 meters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which mechanism transitions an access port directly to the forwarding state?

  1. UplinkFast
  2. Root Guard
  3. PortFast
  4. AccessPortFast
A

C. PortFast bypasses the listening/learning phase for access ports and goes directly to the port-forwarding state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You have powered devices that require a maximum power of 60 watts per PSE port. Which PoE solution do you recommend?

  1. PoE
  2. PoE+
  3. Cisco UPOE
  4. Cisco UPOE+
A

C. The maximum power per PSE port for Cisco UPOE is 60W; for PoE it is 15.4W, for PoE+ it is 30W, and for Cisco UPOE+ it is 90W. B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which solution remotely powers up a machine?

  1. PoE
  2. WoL
  3. OOB switch
  4. ON switch
A

Wake on LAN (WoL) is a combination of hardware and software technologies to wake up sleeping systems. The WoL feature allows an administrator to remotely power up all sleeping machines so that they can receive updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

High availability, port security, and rate limiting are functions of which hierarchical layer?

  1. Network layer
  2. Core layer
  3. Distribution layer
  4. Access layer
A

D. The access layer functions are high availability, port security, rate limiting, ARP inspection, and trust classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or false: The core layer of the hierarchical model does security filtering and media translation.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or false: The access layer provides high availability and port security.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or false: You can implement a full-mesh network to increase redundancy and reduce a WAN’s costs.

A

False. A full-mesh network increases costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many links are required for a full mesh of six sites?

A

Use n(n − 1)/2, where n = 6. 6(6 − 1)/2 = (6 × 5)/2 = 30/2 = 15.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are four benefits of hierarchical network design?

A

Cost savings, ease of understanding, easy network growth (scalability), and improved fault isolation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or false: Small to medium campus networks must always implement three layers of hierarchical design.

A

False. Small campus networks can have collapsed core and distribution layers and implement a two-layer design. Medium campus networks can have two-tier or three-tier designs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How many full-mesh links do you need for a network with 10 routers?

A

Use the formula n(n − 1)/2, where n = 10. 10(10 − 1)/2 = 90/2 = 45 links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which layer provides routing between VLANs and security filtering?

  1. Access layer
  2. Distribution layer
  3. Enterprise edge
  4. WAN module
A

B. The distribution layer provides routing between VLANs and security filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following describe the access layer? (Choose two.)

  1. Transports data at high speed
  2. Applies network policies
  3. Performs network aggregation
  4. Concentrates user access
  5. Provides PoE Avoids data manipulation
A

D and E. The access layer concentrates user access and provides PoE to IP phones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following describe the distribution layer? (Choose two.)

  1. Transports data at high speed
  2. Applies network policies
  3. Performs network aggregation
  4. Concentrates user access
  5. Provides PoE
  6. Avoids data manipulation
A

B and C. The distribution layer concentrates the network access switches and routers and applies network policies with access lists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following describe the core layer? (Choose two.)

  1. High-speed data transport
  2. Applies network policies
  3. Performs network aggregation
  4. Concentrates user access
  5. Provides PoE
  6. Avoids data manipulation
A

A and F. The core layer provides high-speed data transport without manipulating the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which are two benefits of using a modular approach? (Choose two.)

  1. Simplifies the network design
  2. Reduces the amount of network traffic on the network
  3. Often reduces the cost and complexity of the network
  4. Simplifies the network by using full-mesh topologies
A
  1. A and C.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which topology is best used for connectivity in the building distribution layer?

  1. Full mesh
  2. Partial mesh
  3. Hub and spoke
  4. Dual ring
  5. EtherChannel
A

B. Partial-mesh connectivity is best suited for the distribution layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which are key features of the distribution layer? (Choose two.)

  1. Aggregates access layer switches
  2. Provides a routing boundary between the access and core layers
  3. Provides connectivity to end devices
  4. Provides fast switching
  5. Provides transport to the enterprise edge
  6. Provides VPN termination
A
  1. A and B.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which Cisco solution allows a pair of switches to act as a single logical switch?

  1. HSRP
  2. VSS
  3. Spanning Tree Protocol
  4. GLB
A

B. VSS allows a Catalyst switch pair to act as a single logical switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the three layers of the hierarchical model? (Choose three.)

  1. WAN layer
  2. LAN layer
  3. Core layer
  4. Aggregation layer
  5. Access layer
  6. Distribution layer
  7. Edge layer
A

C, E, and F. Core, distribution, and access layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which is the recommended design geometry for routed networks?

  1. Linear point-to-point networks
  2. Rectangular networks
  3. Triangular networks
  4. Circular networks
A

C. Build in triangles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which layer performs rate limiting, network access control, and broadcast suppression?

  1. Core layer
  2. Distribution layer
  3. Access layer
  4. Data link layer
A
  1. C.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which layer performs routing between VLANs, filtering, and load balancing?

  1. Core layer
  2. Distribution layer
  3. Access layer
  4. Application layer
A

B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which topology allows for maximum growth?

  1. Triangles
  2. Collapsed core–distribution
  3. Full mesh
  4. Core–distribution–access
A

D.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which layer performs port security and DHCP snooping?

  1. Core layer
  2. Distribution layer
  3. Access layer
  4. Application layer
A

C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which layer handles Active Directory and messaging?

  1. Core layer
  2. Distribution layer
  3. Access layer
  4. Application layer
A

D.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which layers provide redundancy? (Choose two.)

  1. Core layer
  2. Distribution layer
  3. Access layer
  4. Data link layer
A

A and B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which statement is true regarding hierarchical network design?

  1. It makes the network harder since there are many submodules to use.
  2. It provides better performance and network scalability.
  3. It prepares the network for migration from IPv4 to IPv6.
  4. It secures the network with access filters in all layers.
A

B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

You need to connect a building access switch to the distribution switch. The cable distance is 135 meters. What type of cable do you recommend?

  1. UTP
  2. Coaxial cable
  3. Multimode fiber
  4. Single-mode fiber
A

C. Multimode fiber provides the necessary connectivity at the required distance. UTP can reach only 100 meters. Single-mode fiber is more expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following is an access layer best practice?

  1. Reduce switch peering and routing.
  2. Use HSRP and summarize routes.
  3. Disable trunking and use RPVST+.
  4. Offload SSL sessions and use load balancers.
A

C. Disabling trunking on host ports and using RPVST+ are best practices at the access layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following is a distribution layer best practice?

  1. Reduce switch peering and routing.
  2. Use HSRP and summarize routes.
  3. Disable trunking and use RPVST+.
  4. Offload SSL sessions and use load balancers.
A

B. The use of HSRP and summarization of routes are best practices in the distribution layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following is a core layer best practice?

  1. Reduce switch peering and routing.
  2. Use HSRP and summarize routes.
  3. Disable trunking and use RPVST+.
  4. Offload SSL sessions and use load balancers.
A

A. Best practices for the core include the use of triangle connections to reduce switch peering and using routing to prevent network loops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the recommended method to connect the distribution switches to the core?

  1. Redundant triangle links
  2. Redundant cross-connect links
  3. Redundant Layer 3 squares
  4. Redundant Layer 2 links
A

A. The core and the distribution layers should be connected using redundant Layer 3 triangular links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which are best practices for the access layer? (Choose four.)

  1. Disable trunking in host ports.
  2. Limit VLANs to one closet.
  3. Use PVST+ with multilayer switches.
  4. Enable trunking on host ports.
  5. Use VLAN spanning to speed convergence of Spanning Tree Protocol.
  6. Use VTP Server mode in hierarchical networks.
  7. Use VTP Transparent mode in hierarchical networks.
  8. Use RPVST+ as the Spanning Tree Protocol with multilayer switches.
A
  1. A, B, G, and H.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
  1. Which are best practices for the distribution layer? (Choose three.)
  2. Use HSRP or GLBP.
  3. Provide fast transport.
  4. Use Layer 3 routing protocols to the core.
  5. Use Layer 2 routing protocols to the core.
  6. Summarize routes to the core layer.
  7. Summarize routes to the access layer.
A

A, C, and E.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which are best practices for the core layer? (Choose three.)

  1. Use routing with no Layer 2 loops.
  2. Limit VLANs to one closet.
  3. Use HSRP. Use GLBP.
  4. Use Layer 3 switches with fast forwarding.
  5. Use Layer 3 routing to the core.
  6. Use two equal-cost paths to every destination network.
  7. Use RPVST+ with multilayer switches.
A
  1. A, E, and G.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
  1. What is a major requirement if you use a Layer 3 access layer design?
  2. The distribution switches are configured as a VSS pair.
  3. The core switches need to support EIGRP.
  4. The access layer switch needs to be able to route.
  5. HSRP is configured on the distribution switches.
A
  1. C.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is an advantage of using the updated Layer 2 access layer design over the traditional model?

  1. There is an increase in uplink bandwidth.
  2. The updated model adds routing between the distribution and access layers.
  3. The access layer switch needs to be able to route.
  4. Layer 3 load balancing is enabled.
A

A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which Cisco STP Toolkit mechanisms are recommended on user access ports? (Select two.)

  1. PortFast
  2. RootGuard
  3. UplinkFast
  4. Loop Guard
  5. BPDU Guard
A

A and E.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

You want to enable physical device virtualization. Which feature provides that?

  1. VLAN
  2. VFR
  3. VSS
  4. VPN
A

C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A network has two distribution switches, A and B, connected via a Layer 2 trunk. Distribution A switch is the HSRP active gateway and Spanning Tree Protocol root. Layer 2 links are used to connect access layer switches to both distribution switches.

Which version of spanning tree is recommended?

  1. PVST+
  2. Rapid PVST+
  3. MST
  4. VSS
A

B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A network has two distribution switches, A and B, connected via a Layer 2 trunk. Distribution A switch is the Spanning Tree Protocol root, and distribution B is the active HSRP gateway. Layer 2 links are used to connect access layer switches to both distribution switches.

Which statement is true?

  1. Traffic will transit from the access switches through distribution switch A through the Layer 2 trunk to distribution switch B. A
  2. Spanning Tree Protocol loop will be created.
  3. The access switches will not be able to communicate.
  4. Loop Guard will prevent the loop from being created.
A

A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which is true in regard to using UDLD? (Choose three.)

  1. It is used instead of Loop Guard.
  2. It should be used in aggressive mode.
  3. It should be enabled in global configuration mode.
  4. It prevents blackholing and loops.
  5. It should be used only on UTP links.
  6. It cannot protect against miswiring.
A

B, C, and D.

48
Q

What is true regarding Spanning Tree Protocol design?

  1. Best practice is for the network to determine the root bridge.
  2. All ports should be configured with PortFast to enable root bridge selection.
  3. The root bridge and HSRP primary router should be on the same distribution switch.
  4. It is best practice to disable the toolkit when setting the root bridge.
A

C. The Spanning Tree Protocol root bridge and HSRP active router should match.

49
Q

Match each campus design model with its description.

  1. Routed access layer
  2. Traditional Layer 2 access layer
  3. Layer 2 access with VSS
  4. Hybrid access layer
  5. Legacy design
  6. Access layer using Layer 3 capabilities
  7. Layer 2 design improvement
  8. Not recommended
A

A = ii

B = i

C = iii

D = iv.

50
Q

Which statement is correct regarding Local VLANs? (Select two.)

  1. It is the preferred design.
  2. Users are grouped into VLANs depending on their physical location.
  3. VLAN membership does not change if the user moves to another building within the campus.
  4. VLANs are dispersed throughout the campus.
A

A and B.

51
Q

Which statements are correct regarding end-to-end VLAN design? (Choose two)

  1. It is the preferred design.
  2. Users are grouped into VLANs based on their physical location.
  3. VLAN membership does not change if the user moves to another building within the campus.
  4. VLANs are dispersed throughout the campus.
A

C and D.

52
Q

You need to power a PD that requires 50 watts. Which solution is preferred?

  1. PoE
  2. PoE+
  3. UPOE
  4. UPOE+
A

C. UPOE provides up to 51W to a powered device.

53
Q

An administrator requests a way to do remote maintenance on desktops. What solution would allow the administrator to power up end devices to do maintenance?

  1. PoE
  2. ON switch
  3. WoL
  4. Cisco
  5. UPOE
A

C. Wake on LAN.

54
Q

Which statement regarding campus design is correct?

  1. Connect access switches directly to summarize via the uplinks.
  2. Build using triangles rather than squares.
  3. Configure a security ACL in the core.
  4. Avoid summarization at the distribution layer.
A

B. Build triangles.

55
Q

What is the minimum cable requirement for Cisco UPOE+?

  1. CAT 5
  2. CAT 5e
  3. CAT 6a
  4. CAT 7
A

C. Category 6a.

56
Q

What is correct regarding Spanning Tree Protocol stability mechanisms? (Choose two)

  1. Apply PortFast to all end-user ports.
  2. Apply RootGuard to all ports where a root is never expected.
  3. Apply RootGuard to all end-user ports.
  4. Apply PortFast to all ports where a root is never expected.
  5. Apply PortFast to all end-user ports.
  6. Apply RootGuard to all ports where a root is expected.
  7. Apply Loop Guard to all end-user ports.
  8. Apply RootGuard to all ports.
A

A and B are correct.

  • Apply PortFast to all end-user ports.
  • Apply RootGuard to all ports where a root is never expected.
57
Q

The benefits of using hierarchical models for your network design include the following, except one. Which one does not belong?

  1. Cost savings
  2. Redundancy
  3. Ease of understanding
  4. Modular network growth
  5. Improved fault isolation
A

While important, Redundancy is not a benefit of hierarchical design.

58
Q

What layer of the three layer hierarchical model provides policy-based connectivity?

A

Distribution: The distribution layer provides policy-based connectivity.

59
Q

What layer is the backbone?

A

The core layer is the backbone.

60
Q

What is ‘diameter’ in a network design?

A

When a network uses routers, the number of router hops from edge to edge is called the diameter.

It is considered good practice to design for a consistent diameter within a hierarchical network. The trip from any end station to another end station across the backbone should have the same number of hops. The distance from any end station to a server on the backbone should also be consistent.

This provides predictable performance and ease of troubleshooting.

61
Q

What layer of the three layer hierarchical model applies policies?

A

Distribution.

Policy-based connectivity (for example, ensuring that traffic sent from a particular network is forwarded out one interface while all other traffic is forwarded out another interface)

62
Q

What layer of the three layer model implements load balancing?

A

Distribution.

63
Q

Which of these belong to the distribution layer’s responsibilities? (Choose three.)

  1. Media translations (for example, between Ethernet and Token Ring)
  2. Redistribution between routing domains (for example, between two different routing protocols)
  3. High availability
  4. Demarcation between static and dynamic routing protocols
A

1, 2 and 4

High availability is part of the access layer.

64
Q

Which of the following duties fall to the acces layer? (Choose three.)

  1. Media translations (for example, between Ethernet and Token Ring)
  2. Virtual access control lists (VACLs)
  3. Spanning tree
  4. Trust classification
A

2, 3, and 4.

Media translations (for example, between Ethernet and Token Ring) are part of the distribution layer.

65
Q

Which of the following roles fall in the access layer? (Choose three)

  1. Power over Ethernet (PoE) and auxiliary VLANs for VoIP
  2. Network access control (NAC)
  3. Avoidance of slow packet manipulation caused by filters or other processes
  4. Auxiliary VLANs
A

1, 2, 4

Avoidance of slow packet manipulation caused by filters or other processes is a core layer function.

66
Q

Redistribution between routing domains (for example, between two different routing protocols) happens at what layer?

A

Distribution.

67
Q

Broadcast suppression happens at which layer?

A

Access layer.

68
Q

The __________ layer is the boundary between the Layer 2 domains and the Layer 3 routed network.

Inter-VLAN communications are routed in the _________ layer.

Route summarization is configured under the routing protocol on interfaces toward the core layer.

A

The distribution layer is the boundary between the Layer 2 domains and the Layer 3 routed network.

Inter-VLAN communications are routed in the distribution layer.

Route summarization is configured under the routing protocol on interfaces toward the core layer.

69
Q

See the attached ‘Switched Hierarchical design’.

SPT is great for redundancy. What is a drawback of STP when using multiple links to connect access and distribution switches?

A

The drawback with this design is that Spanning Tree Protocol allows only one of the redundant links between the access switch and the distribution switch to be active. In the event of a failure, the second link becomes active, but at no point does load balancing occur.

70
Q

See the attached ‘Routed Hierarchical design’. What is the benefit of this design?

A

The benefit of this design is that load balancing occurs from the access layer because the links to the distribution switches are routed.

  • In this design, the Layer 3 boundary is pushed toward the access layer. Layer 3 switching occurs in the access, distribution, and core layers.
  • Route filtering is configured on interfaces toward the access layer.
  • Route summarization is configured on interfaces toward the core layer.
71
Q

What is VSS? What problem does it solve with STP?

A

Virtual Switching System (VSS): This provides redundancy between the access and distribution switching layers. VSS solves the Spanning Tree Protocol looping problem by converting the distribution switching pair into a logical single switch.

It removes Spanning Tree Protocol and eliminates the need for Hot Standby Router Protocol (HSRP), Virtual Router Redundancy Protocol (VRRP), or Gateway Load Balancing Protocol (GLBP).

72
Q

One of the main benefits of VSS is MEC. What is this?

A

Multichassis EtherChannel (MEC) creating loop-free technologies and eliminating the need for Spanning Tree Protocol

73
Q

What is a VSL?

A

With VSS, the physical topology changes as each access switch has a single upstream distribution switch rather than two upstream distribution switches.

As shown in Figure 6-4, the two switches are connected via 10 Gigabit Ethernet links called virtual switch links (VSLs), which makes them seem as a single switch. The key benefits of VSS include the following:

  • Layer 3 switching used toward the access layer to enhance nonstop communication
  • Simplified management of a single configuration of the VSS distribution switch
  • Better return on investment (ROI) thanks to increased bandwidth between the access layer and the distribution layer
74
Q

Which of the following topology designs is easier to manage and scales better?

  1. full mesh
  2. ring
  3. hub and spoke
A

The hub-and-spoke network design (see Figure 6-5) provides better convergence times than ring topology. The hub-and-spoke design also scales better and is easier to manage than ring or mesh topologies. For example, implementing security policies in a full-mesh topology would become unmanageable because you would have to configure policies at each point location.

75
Q

What is a two-layer hierarchy used with smaller networks called?

A

One alternative to the three-layer hierarchy is the collapsed core design, which is a two-layer hierarchy used with smaller networks. It is commonly used in sites with a single building with multiple floors.

As shown in Figure 6-6, the core and distribution layers are merged, providing all the services needed for those layers.

Design parameters to decide if you need to migrate to the three-layer hierarchy include not enough capacity and throughput at the distribution layer, network resiliency, and geographic dispersion.

76
Q

When you build in __________, you take advantage of equal-cost redundant paths for best deterministic convergence.

A

When you build in triangles, you take advantage of equal-cost redundant paths for best deterministic convergence.

In the networks shown in Figure 6-7, when the link at location A goes down, the design with triangles does not require routing protocol convergence because each switch has two routes and two associated hardware Cisco Express Forwarding adjacency entries. In the design with squares, routing convergence is required.

77
Q

What is the recovered state of the network if the link fails as shown in the diagram?

A

When designing a hierarchical campus, using redundant links with triangles enables equal-cost path routing. In equal-path cost design, each switch has two routes and two Cisco Express Forwarding adjacency entries.

This allows for the fastest restoration of voice, video, and data traffic flows.

As shown in Figure 6- 8, there are two Cisco Express Forwarding entries in the initial state. When there is a switch failure, the originating switch still has a remaining route and associated Cisco Express Forwarding entry; because of this, it does not trigger or wait for routing protocol convergence and is immediately able to continue forwarding all traffic.

78
Q

What is ‘end-to-end’ VLAN deployment? What are the pros and cons?

A

The term end-to-end VLANs refers to the design that allows VLANs to be widely dispersed throughout the enterprise network.

The advantage of this design is that a user can move from one building to another and remain in the same VLAN.

The problem is that this does not scale well for thousands of users, which makes it difficult to manage. The recommended solution is to implement local VLANs where users are grouped into VLANs based on their physical locations.

79
Q

What is 100BASE-TX Fast Ethernet?

A

100BASE-TX Fast Ethernet

  • The 100BASE-TX specification uses CAT 5 or 6 UTP wiring.
  • Fast Ethernet uses only two pairs of the four-pair UTP wiring.
  • RJ-45 connectors are used (the same as in 10BASE-T).
  • Punchdown blocks in the wiring closet must be CAT 5 certified.
  • 4B5B coding is used.
80
Q

What is 100BASE-T4 Fast Ethernet?

A

100BASE-T4 Fast Ethernet

  • The 100BASE-T4 specification was developed to support UTP wiring at the CAT 3 level.
  • This specification takes advantage of higher-speed Ethernet without recabling to CAT 5 UTP.
  • Transmission occurs over CAT 3, 4, 5, or 6 UTP wiring.
  • Three pairs are used for transmission, and the fourth pair is used for collision detection.
  • No separate transmit and receive pairs are present, so full-duplex operation is not possible.
  • 8B6T coding is used.
81
Q

What is 100BASE-FX Fast Ethernet?

A

100BASE-FX Fast Ethernet

The 100BASE-FX specification for fiber is as follows:

  • It operates over two strands of multimode or single-mode fiber cabling. It can transmit over greater distances than copper media.
  • It uses media interface connector (MIC), stab and twist (ST), or stab and click (SC) fiber connectors defined for FDDI and 10BASE-FX networks.
  • 4B5B coding is used.
82
Q

What is 1000BASE-LX Long-Wavelength Gigabit Ethernet?

A

1000BASE-LX Long-Wavelength Gigabit Ethernet

IEEE 1000BASE-LX uses long-wavelength optics over a pair of fiber strands. The specifications are as follows:

  • It uses long wavelengths (1300 nm [nanometers]).
  • It can be used on multimode or single-mode fiber. Maximum lengths for multimode fiber are as follows:
    • 62.5-micrometer fiber: 440 meters 50-micrometer fiber: 550 meters
    • The max length for single-mode fiber (9 micrometers) is 5 km.
  • It uses 8B10B encoding with simple NRZ.
83
Q

What is 1000BASE-SX Short-Wavelength Gigabit Ethernet?

A

1000BASE-SX Short-Wavelength Gigabit Ethernet

IEEE 1000BASE-SX uses short-wavelength optics over a pair of multimode fiber strands. The specifications are as follows:

  • It uses short wavelengths (850 nm). It can be used on multimode fiber. Maximum lengths are as follows:
    • 62.5-micrometer fiber: 260 m 50-micrometer fiber: 550 m
  • It uses 8B10B encoding with simple NRZ.
84
Q

What is 1000BASE-CX Gigabit Ethernet over Coaxial Cable?

A

1000BASE-CX Gigabit Ethernet over Coaxial Cable

The IEEE 1000BASE-CX standard is for short copper runs between servers. The specifications are as follows:

  • It is used on short-run copper.
  • It runs over a pair of 150-ohm balanced coaxial cables (twinax). The maximum length is 25 meters.
  • It is mainly for server connections.
  • It uses 8B10B encoding with simple NRZ.
85
Q

What is 1000BASE-T Gigabit Ethernet over UTP?

A

1000BASE-T Gigabit Ethernet over UTP

This IEEE standard uses the four pairs in a CAT5 cable. (100BASE-TX and 10BASE-T Ethernet use only two pairs.) The specifications are as follows:

  • It uses CAT 5 four-pair UTP.
  • The maximum length is 100 meters.
  • The encoding defined is a five-level coding scheme. One byte is sent over the four pairs at 1250 MHz.
86
Q

Short-wavelength multimode fiber is ______ nm. Long-wavelength is ______ nm, and extra-long-wavelength is ______ nm.

A

Short-wavelength multimode fiber is 850 nm. Long-wavelength is 1310 nm, and extra-long-wavelength is 1550 nm.

87
Q

The Cisco _____________ implementations provide a method to increase the bandwidth between two systems by bundling Fast Ethernet, Gigabit Ethernet, or 10 Gigabit Ethernet links.

Depending on your hardware, you can form an __________ with up to ______ compatibly configured ports on the switch.

A

The Cisco EtherChannel implementations provide a method to increase the bandwidth between two systems by bundling Fast Ethernet, Gigabit Ethernet, or 10 Gigabit Ethernet links.

Depending on your hardware, you can form an EtherChannel with up to eight compatibly configured ports on the switch.

88
Q

T/F: The participating ports in an EtherChannel trunk must have the same speed and duplex mode and belong to the same VLAN.

A

True.

89
Q

EtherChannel can be established by using three mechanisms. Define these:

  1. LACP:
  2. PAgP:
  3. Static persistence configuration:
A

EtherChannel can be established by using three mechanisms:

LACP: Link Aggregation Control Protocol (LACP) is defined in IEEE 802.3ad. It protects against misconfiguration but adds overhead and delay when setting up a bundle.

PAgP: Port Aggregation Protocol (PAgP) is a Cisco-proprietary negotiation protocol. PAgP aids in the automatic creation of EtherChannel links.

Static persistence configuration: This does not add overhead as LACP does, but it can cause problems if not configured properly.

90
Q

How much power is delivered py PoE and PoE+?

A

PoE provides 15.4W at the power sourcing equipment (PSE) side (LAN switch); due to power dissipation, only 12.95W is assured to the powered device (PD).

PoE+ provides up to 30W on the PSE side, with 25.5.W assured to the PD.

91
Q

What pin pairs is power provided over with PoE and PoE+?

A

PoE and PoE+ provide power using two pairs: pins 1 and 2 and pins 3 and 6.

92
Q

What are UPOE and UPOE+? How much power can they deliver?

A

Cisco has developed Universal Power over Ethernet (UPOE) to provide power to higher-level devices, such as telepresence systems, digital signage, and IP turrets.

Cisco UPOE uses four twisted pairs (instead of two pairs for PoE) to provide additional power.

UPOE provides 30W + 30W = 60W of PSE power over Category 5e UTP, assuring 51W to the PD. Cisco

UPOE+ provides 45W + 45 W = 90W of PSE power over Category 6a UTP cabling, assuring 71.3W of power to the PD.

93
Q

What is a magic packet?

A

Wake on LAN (WoL)

When a PC shuts down, the NIC still receives power and is able to listen to thenetwork. WoL allows an administrator to remotely power up sleeping machines in order to perform maintenance updates.

WoL sends specially coded network packets, called magic packets, to systems equipped and enabled to respond to these packets. If you send WoL packets from remote networks, the routers must be configured to allow directed broadcasts.

94
Q

Spanning Tree Protocol is defined by IEEE ______.

RSTP is defined by IEEE ______.

MST is defined by IEEE _______.

A

Spanning Tree Protocol is defined by IEEE 802.1D

RSTP is defined by IEEE 802.1W.

MST is defined by IEEE 802.1S.

95
Q

Spanning Tree Protocol is implemented by switches exchanging ______ messages with other switches to detect loops, which are removed by shutting down selected bridge interfaces.

A

Spanning Tree Protocol is implemented by switches exchanging BPDU messages with other switches to detect loops, which are removed by shutting down selected bridge interfaces.

This algorithm guarantees that there is one and only one active path between two network devices.

96
Q

A __________ port would cause a switching loop if it were active.

A

A blocking port would cause a switching loop if it were active.

No user data is sent or received over a blocking port, but it may go into forwarding mode if the other links in use fail and the spanning tree algorithm determines that the port may transition to the forwarding state.

BPDU data is still received in the blocking state. It prevents the use of looped paths.

97
Q

What STP state does this describe?

The switch processes BPDUs and awaits possible new information that would cause it to return to the blocking state. It does not populate the MAC address table and does not forward frames.

A

Listening: The switch processes BPDUs and awaits possible new information that would cause it to return to the blocking state. It does not populate the MAC address table and does not forward frames.

98
Q

What STP state does this describe?

While the port does not yet forward frames, it does learn source addresses from frames received and adds them to the filtering database (switching database). It populates the MAC address table but does not forward frames.

A

Learning: While the port does not yet forward frames, it does learn source addresses from frames received and adds them to the filtering database (switching database). It populates the MAC address table but does not forward frames.

99
Q

A __________ port receives and sends data in normal operation. Spanning Tree Protocol still monitors incoming BPDUs that would indicate it should return to the blocking state to prevent a loop.

A

A forwarding port receives and sends data in normal operation. Spanning Tree Protocol still monitors incoming BPDUs that would indicate it should return to the blocking state to prevent a loop.

100
Q

T/F: A network administrator can manually disable a port, although this is not strictly part of Spanning Tree Protocol.

A

True.

101
Q

What are the STP metrics, the updated 32 bit values, for the following:

  1. 1M
  2. 10M
  3. 100M
  4. 1G
  5. 10G
  6. 100G
  7. 1T
  8. 10T
A
  1. 20,000,000 - 1M
  2. 2,000,000 - 10M
  3. 200,000 - 100M
  4. 20,000 - 1G
  5. 2000 - 10G
  6. 200 - 100G
  7. 20 - 1T
  8. 2 - 10T
102
Q

PVST+ is a Cisco proprietary protocol.

A

True.

Per VLAN Spanning Tree Plus (PVST+) provides the same functionality as PVST using 802.1Q trunking technology rather than ISL. PVST+ is an enhancement to the 802.1Q specification and is not supported on non-Cisco devices.

PVST+ is based on the IEEE 802.1D and adds Cisco-proprietary features such as BackboneFast, UplinkFast, and PortFast.

103
Q

T/F: With RPVST+ all the switches generate BPDUs and send out on all the ports every 2 seconds, whereas with 802.1D Spanning Tree Protocol, only the root bridge sends the configuration BPDUs.

A

True.

All the switches generate BPDUs and send out on all the ports every 2 seconds, whereas with 802.1D Spanning Tree Protocol, only the root bridge sends the configuration BPDUs.

104
Q

T/F: RPVST+ is backward compatible with STP.

A

True.

Rapid PVST+ uses RSTP to provide faster convergence. When any RSTP port receives a legacy 802.1D BPDU, it falls back to legacy Spanning Tree Protocol, and the inherent fast convergence benefits of 802.1W are lost when it interacts with legacy bridges.

Cisco recommends that Rapid PVST+ be configured for best convergence.

105
Q

What must you remember when configuring STP with a FHRP?

A

Remember to align the STP root with the Active/Primary FHRP router!

You should manually assign the root bridge of a Spanning Tree Protocol network to match the Layer 3 First-Hop Resiliency Protocol (FHRP) active/primary/master router..

The root bridge is assigned by manually lowering its root bridge priority from the default.

106
Q

What is PortFast? Where is it used?

A

PortFast causes a Layer 2 LAN access port to enter the forwarding state immediately, bypassing the listening and learning states. When configured for PortFast, a port is still running Spanning Tree Protocol and can immediately transition to the blocking state, if necessary.

PortFast should be used only when connecting a single end station to the port. It can be enabled on trunk ports.

107
Q

What is UplinkFast? Where is it deployed?

A

UplinkFast provides fast convergence after a direct link failure.

UplinkFast cannot be configured on individual VLANs; it is configured on all VLANs of a LAN switch.

It is most useful when configured on the uplink ports of closet switches connecting to distribution switches. This mechanism is enabled when RSTP is enabled on a switch.

108
Q

What is BackboneFast? Where is it configured?

A

BackboneFast provides fast failover when an indirect link failure occurs. It is initiated when a root port or blocked port on a network device receives inferior BPDUs from its designated bridge.

It is configured on distribution and core switches.

As with UplinkFast, this mechanism does not need to be enabled when RSTP is configured.

109
Q

What is LoopGuard? Where is it deployed?

A

Loop Guard helps prevent bridging loops that could occur because of a unidirectional link failure on a point-to-point link.

It detects root ports and blocked ports and ensures that they keep receiving BPDUs from the designated port on the segment.

When Loop Guard is enabled, if a root or blocked port stops receiving BPDUs from its designated port, it transitions to the loop-inconsistent blocking state.

110
Q

T/F: LoopGuard must be configured on point- to-point links only.

A

True.

Loop Guard can be enabled on a per-port basis. It must be configured on point- to-point links only. When Loop Guard is enabled, it is automatically applied to all active instances or VLANs to which that port belongs. When enabled on an EtherChannel (link bundle) and the first link becomes unidirectional, it blocks the entire channel until the affected port is removed from the channel. Loop Guard cannot be enabled on PortFast ports, dynamic VLAN ports, or Root Guard–-enabled switches. It does not affect UplinkFast or BackboneFast operation.

111
Q

What is Root Guard? Where is it deployed?

A

Root Guard prevents a port from becoming a root port or blocked port.

When a Root Guard port receives a superior BPDU, the port immediately goes to the root-inconsistent (blocked) state.

Root Guard is configured on access switches so that they do not become a root of the spanning tree.

112
Q

What is BPDU Guard? Where is it used?

A

BPDU Guard shuts down a port that receives a BPDU, regardless of PortFast configuration.

This is used on access ports.

113
Q

What is BPDU Filter? Where is it used?

A

BPDU Filter prevents a port from sending or receiving BPDUs.

It can be configured on a per-port basis. When configured globally, it applies to alloperational PortFast ports.

This should only be used on ports connected to hosts.

114
Q

Match the following recommended practices for Spanning Tree Protocol stability mechanisms:

  1. PortFast:
  2. Root Guard:
  3. Loop Guard:
  4. Apply to all ports where a root is never expected.
  5. Apply to all end-user ports. To secure PortFast-enabled ports, always combine PortFast with BPDU Guard.
  6. Apply to all ports that are or can become non-designated ports.
A

PortFast: Apply PortFast to all end-user ports. To secure PortFast-enabled ports, always combine PortFast with BPDU Guard.

Root Guard: Apply Root Guard to all ports where a root is never expected.

Loop Guard: Apply Loop Guard to all ports that are or can become non-designated ports.

115
Q

What is UDLD? How is it useful.

A

UDLD detects unidirectional links on optical fiber links before a forwarding loop is created. Loop Guard and UDLD functionality overlap, partly in the sense that both protect against Spanning Tree Protocol failures caused by unidirectional links.

A Spanning Tree Protocol loop can occur on fiber networks if an SFP module fails. Unidirectional Link Detection (UDLD) can be configured on a per-port basis on all redundant links. Because Loop Guard does not work on shared links, UDLD should also be configured to prevent loops.