Chapter 6 - Enterprise LAN Design and Technologies Flashcards
In the Cisco hierarchical network model, which layer is responsible for fast transport?
- Network layer
- Core layer
- Distribution layer
- Access layer
B. The core layer is responsible for fast transport.
What is the maximum segment distance for Fast Ethernet over UTP?
- 100 feet
- 500 feet
- 100 meters
- 285 feet
C. The maximum distance for 100BASE-T is 100 meters.
In the hierarchical network model, at which layer do security filtering, address aggregation, and media translation occur?
- Network layer
- Core layer
- Distribution layer
- Access layer
C. The distribution layer is responsible for security filtering, address and area aggregation, and media translation.
Which type of cable is the best solution in terms of cost for connecting an access switch to the distribution layer requiring 140 meters?
- UTP
- Copper
- Multimode fiber
- Single-mode fiber
C. Multimode fiber provide a cost-effective solution for that distance. Single-mode fiber is more expensive. UTP’s maximum distance is 100 meters.
Which mechanism transitions an access port directly to the forwarding state?
- UplinkFast
- Root Guard
- PortFast
- AccessPortFast
C. PortFast bypasses the listening/learning phase for access ports and goes directly to the port-forwarding state.
You have powered devices that require a maximum power of 60 watts per PSE port. Which PoE solution do you recommend?
- PoE
- PoE+
- Cisco UPOE
- Cisco UPOE+
C. The maximum power per PSE port for Cisco UPOE is 60W; for PoE it is 15.4W, for PoE+ it is 30W, and for Cisco UPOE+ it is 90W. B.
Which solution remotely powers up a machine?
- PoE
- WoL
- OOB switch
- ON switch
Wake on LAN (WoL) is a combination of hardware and software technologies to wake up sleeping systems. The WoL feature allows an administrator to remotely power up all sleeping machines so that they can receive updates.
High availability, port security, and rate limiting are functions of which hierarchical layer?
- Network layer
- Core layer
- Distribution layer
- Access layer
D. The access layer functions are high availability, port security, rate limiting, ARP inspection, and trust classification.
True or false: The core layer of the hierarchical model does security filtering and media translation.
False
True or false: The access layer provides high availability and port security.
True
True or false: You can implement a full-mesh network to increase redundancy and reduce a WAN’s costs.
False. A full-mesh network increases costs.
How many links are required for a full mesh of six sites?
Use n(n − 1)/2, where n = 6. 6(6 − 1)/2 = (6 × 5)/2 = 30/2 = 15.
What are four benefits of hierarchical network design?
Cost savings, ease of understanding, easy network growth (scalability), and improved fault isolation.
True or false: Small to medium campus networks must always implement three layers of hierarchical design.
False. Small campus networks can have collapsed core and distribution layers and implement a two-layer design. Medium campus networks can have two-tier or three-tier designs.
How many full-mesh links do you need for a network with 10 routers?
Use the formula n(n − 1)/2, where n = 10. 10(10 − 1)/2 = 90/2 = 45 links.
Which layer provides routing between VLANs and security filtering?
- Access layer
- Distribution layer
- Enterprise edge
- WAN module
B. The distribution layer provides routing between VLANs and security filtering.
Which of the following describe the access layer? (Choose two.)
- Transports data at high speed
- Applies network policies
- Performs network aggregation
- Concentrates user access
- Provides PoE Avoids data manipulation
D and E. The access layer concentrates user access and provides PoE to IP phones.
Which of the following describe the distribution layer? (Choose two.)
- Transports data at high speed
- Applies network policies
- Performs network aggregation
- Concentrates user access
- Provides PoE
- Avoids data manipulation
B and C. The distribution layer concentrates the network access switches and routers and applies network policies with access lists.
Which of the following describe the core layer? (Choose two.)
- High-speed data transport
- Applies network policies
- Performs network aggregation
- Concentrates user access
- Provides PoE
- Avoids data manipulation
A and F. The core layer provides high-speed data transport without manipulating the data.
Which are two benefits of using a modular approach? (Choose two.)
- Simplifies the network design
- Reduces the amount of network traffic on the network
- Often reduces the cost and complexity of the network
- Simplifies the network by using full-mesh topologies
- A and C.
Which topology is best used for connectivity in the building distribution layer?
- Full mesh
- Partial mesh
- Hub and spoke
- Dual ring
- EtherChannel
B. Partial-mesh connectivity is best suited for the distribution layer.
Which are key features of the distribution layer? (Choose two.)
- Aggregates access layer switches
- Provides a routing boundary between the access and core layers
- Provides connectivity to end devices
- Provides fast switching
- Provides transport to the enterprise edge
- Provides VPN termination
- A and B.
Which Cisco solution allows a pair of switches to act as a single logical switch?
- HSRP
- VSS
- Spanning Tree Protocol
- GLB
B. VSS allows a Catalyst switch pair to act as a single logical switch.
What are the three layers of the hierarchical model? (Choose three.)
- WAN layer
- LAN layer
- Core layer
- Aggregation layer
- Access layer
- Distribution layer
- Edge layer
C, E, and F. Core, distribution, and access layers.
Which is the recommended design geometry for routed networks?
- Linear point-to-point networks
- Rectangular networks
- Triangular networks
- Circular networks
C. Build in triangles.
Which layer performs rate limiting, network access control, and broadcast suppression?
- Core layer
- Distribution layer
- Access layer
- Data link layer
- C.
Which layer performs routing between VLANs, filtering, and load balancing?
- Core layer
- Distribution layer
- Access layer
- Application layer
B.
Which topology allows for maximum growth?
- Triangles
- Collapsed core–distribution
- Full mesh
- Core–distribution–access
D.
Which layer performs port security and DHCP snooping?
- Core layer
- Distribution layer
- Access layer
- Application layer
C.
Which layer handles Active Directory and messaging?
- Core layer
- Distribution layer
- Access layer
- Application layer
D.
Which layers provide redundancy? (Choose two.)
- Core layer
- Distribution layer
- Access layer
- Data link layer
A and B.
Which statement is true regarding hierarchical network design?
- It makes the network harder since there are many submodules to use.
- It provides better performance and network scalability.
- It prepares the network for migration from IPv4 to IPv6.
- It secures the network with access filters in all layers.
B.
You need to connect a building access switch to the distribution switch. The cable distance is 135 meters. What type of cable do you recommend?
- UTP
- Coaxial cable
- Multimode fiber
- Single-mode fiber
C. Multimode fiber provides the necessary connectivity at the required distance. UTP can reach only 100 meters. Single-mode fiber is more expensive.
Which of the following is an access layer best practice?
- Reduce switch peering and routing.
- Use HSRP and summarize routes.
- Disable trunking and use RPVST+.
- Offload SSL sessions and use load balancers.
C. Disabling trunking on host ports and using RPVST+ are best practices at the access layer.
Which of the following is a distribution layer best practice?
- Reduce switch peering and routing.
- Use HSRP and summarize routes.
- Disable trunking and use RPVST+.
- Offload SSL sessions and use load balancers.
B. The use of HSRP and summarization of routes are best practices in the distribution layer.
Which of the following is a core layer best practice?
- Reduce switch peering and routing.
- Use HSRP and summarize routes.
- Disable trunking and use RPVST+.
- Offload SSL sessions and use load balancers.
A. Best practices for the core include the use of triangle connections to reduce switch peering and using routing to prevent network loops.
What is the recommended method to connect the distribution switches to the core?
- Redundant triangle links
- Redundant cross-connect links
- Redundant Layer 3 squares
- Redundant Layer 2 links
A. The core and the distribution layers should be connected using redundant Layer 3 triangular links.
Which are best practices for the access layer? (Choose four.)
- Disable trunking in host ports.
- Limit VLANs to one closet.
- Use PVST+ with multilayer switches.
- Enable trunking on host ports.
- Use VLAN spanning to speed convergence of Spanning Tree Protocol.
- Use VTP Server mode in hierarchical networks.
- Use VTP Transparent mode in hierarchical networks.
- Use RPVST+ as the Spanning Tree Protocol with multilayer switches.
- A, B, G, and H.
- Which are best practices for the distribution layer? (Choose three.)
- Use HSRP or GLBP.
- Provide fast transport.
- Use Layer 3 routing protocols to the core.
- Use Layer 2 routing protocols to the core.
- Summarize routes to the core layer.
- Summarize routes to the access layer.
A, C, and E.
Which are best practices for the core layer? (Choose three.)
- Use routing with no Layer 2 loops.
- Limit VLANs to one closet.
- Use HSRP. Use GLBP.
- Use Layer 3 switches with fast forwarding.
- Use Layer 3 routing to the core.
- Use two equal-cost paths to every destination network.
- Use RPVST+ with multilayer switches.
- A, E, and G.
- What is a major requirement if you use a Layer 3 access layer design?
- The distribution switches are configured as a VSS pair.
- The core switches need to support EIGRP.
- The access layer switch needs to be able to route.
- HSRP is configured on the distribution switches.
- C.
What is an advantage of using the updated Layer 2 access layer design over the traditional model?
- There is an increase in uplink bandwidth.
- The updated model adds routing between the distribution and access layers.
- The access layer switch needs to be able to route.
- Layer 3 load balancing is enabled.
A.
Which Cisco STP Toolkit mechanisms are recommended on user access ports? (Select two.)
- PortFast
- RootGuard
- UplinkFast
- Loop Guard
- BPDU Guard
A and E.
You want to enable physical device virtualization. Which feature provides that?
- VLAN
- VFR
- VSS
- VPN
C.
A network has two distribution switches, A and B, connected via a Layer 2 trunk. Distribution A switch is the HSRP active gateway and Spanning Tree Protocol root. Layer 2 links are used to connect access layer switches to both distribution switches.
Which version of spanning tree is recommended?
- PVST+
- Rapid PVST+
- MST
- VSS
B.
A network has two distribution switches, A and B, connected via a Layer 2 trunk. Distribution A switch is the Spanning Tree Protocol root, and distribution B is the active HSRP gateway. Layer 2 links are used to connect access layer switches to both distribution switches.
Which statement is true?
- Traffic will transit from the access switches through distribution switch A through the Layer 2 trunk to distribution switch B. A
- Spanning Tree Protocol loop will be created.
- The access switches will not be able to communicate.
- Loop Guard will prevent the loop from being created.
A.