Domain 2.0 Flashcards

1
Q

Question:
What is the purpose of a VLAN in a network?
Answer Options:
To connect devices across different physical networks.
To logically segment a network into separate broadcast domains.
To assign IP addresses dynamically.
To encrypt data transmitted between switches.

A

Correct Answer + Explanation:
To logically segment a network into separate broadcast domains.
VLANs allow devices on the same physical switch to operate in isolated logical networks, improving organization and reducing unnecessary traffic.
Practical Use:
A company creates separate VLANs for HR, IT, and Finance departments to ensure secure and efficient traffic segmentation.
Why Others Are Incorrect:
Connecting devices across physical networks is a router’s function.
IP assignment is handled by DHCP.
Encryption is managed by specific protocols, not VLANs.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
How do VLANs improve scalability in large networks?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What device is commonly used to connect multiple VLANs?
Answer Options:
Switch.
Router or Layer 3 switch.
Access point.
Firewall.

A

Correct Answer + Explanation:
Router or Layer 3 switch.
Routers or Layer 3 switches enable communication between VLANs by routing traffic across different network segments.
Practical Use:
A Layer 3 switch routes traffic between VLAN 10 (Finance) and VLAN 20 (HR) for shared resources like a printer.
Why Others Are Incorrect:
Switches operate at Layer 2 and cannot route traffic.
Access points handle wireless communication, not VLAN routing.
Firewalls enforce security policies but don’t route VLAN traffic.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
What are the differences between a Layer 3 switch and a router?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question:
What is trunking in VLAN configurations?
Answer Options:
Assigning IP addresses to VLANs.
Combining multiple VLANs over a single physical link.
Encrypting VLAN traffic for secure transmission.
Routing traffic between different VLANs.

A

Correct Answer + Explanation:
Combining multiple VLANs over a single physical link.
Trunking allows multiple VLANs to share the same physical connection between switches using tagging protocols like IEEE 802.1Q.
Practical Use:
A trunk link between two switches carries traffic for VLANs 10, 20, and 30 simultaneously.
Why Others Are Incorrect:
IP assignment is unrelated to trunking.
Encryption and inter-VLAN routing are separate functions.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
What is the purpose of the native VLAN in a trunk link?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question:
What is the role of a wireless controller in enterprise networks?
Answer Options:
To assign static IP addresses to devices.
To centralize the management of multiple access points.
To route traffic between wired and wireless networks.
To encrypt wireless communication.

A

Correct Answer + Explanation:
To centralize the management of multiple access points.
Wireless controllers allow administrators to configure, monitor, and optimize access points from a single interface.
Practical Use:
A university uses a wireless controller to adjust access point settings across campus for optimal coverage.
Why Others Are Incorrect:
IP assignment is handled by DHCP.
Routing and encryption are separate tasks.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
How do wireless controllers improve network scalability in large deployments?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question:
What is the purpose of using PoE (Power over Ethernet) in a network?
Answer Options:
To deliver both power and data over the same Ethernet cable.
To prioritize data packets for critical applications.
To encrypt Ethernet traffic during transmission.
To dynamically assign IP addresses to devices.

A

Correct Answer + Explanation:
To deliver both power and data over the same Ethernet cable.
PoE simplifies installations by powering devices like IP cameras and access points without requiring separate power sources.
Practical Use:
An office uses PoE switches to power security cameras and wireless access points, reducing cabling requirements.
Why Others Are Incorrect:
Packet prioritization and encryption are unrelated to PoE.
IP assignment is a DHCP function.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
What are the differences between PoE and PoE+ standards?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question:
What is the function of a DHCP server in a network?
Answer Options:
Assigning MAC addresses to devices.
Dynamically allocating IP addresses to devices.
Routing traffic between VLANs.
Encrypting data for secure communication.

A

Correct Answer + Explanation:
Dynamically allocating IP addresses to devices.
A DHCP server automatically assigns IP addresses, subnet masks, and other configurations, simplifying device setup.
Practical Use:
A DHCP server assigns IP addresses to all devices in a network, ensuring no manual configuration is required.
Why Others Are Incorrect:
MAC addresses are fixed hardware identifiers.
VLAN routing and encryption are unrelated to DHCP.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
How does a DHCP lease work, and what happens when it expires?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question:
What is the purpose of a static route in a network?
Answer Options:
To dynamically update routing tables based on network changes.
To manually define a specific path for traffic to a destination network.
To encrypt data packets during transmission.
To assign IP addresses to connected devices.

A

Correct Answer + Explanation:
To manually define a specific path for traffic to a destination network.
Static routes are manually configured to direct traffic to a specific destination, useful for small networks or backup paths.
Practical Use:
A small business sets up a static route to send traffic to a secondary ISP for redundancy.
Why Others Are Incorrect:
Dynamic updates are managed by routing protocols like OSPF or RIP.
Encryption and IP assignment are unrelated to static routes.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
What are the advantages and disadvantages of static routing compared to dynamic routing?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question:
What type of cable is typically used to connect devices within a LAN?
Answer Options:
Fiber optic cable.
Twisted pair Ethernet cable (e.g., Cat5e or Cat6).
Coaxial cable.
Serial cable.

A

Correct Answer + Explanation:
Twisted pair Ethernet cable (e.g., Cat5e or Cat6).
Twisted pair cables are widely used for LAN connections due to their balance of cost, performance, and ease of use.
Practical Use:
An office connects computers and printers to a network switch using Cat6 Ethernet cables for fast, reliable communication.
Why Others Are Incorrect:
Fiber optic cables are typically used for high-speed, long-distance connections.
Coaxial and serial cables are not standard for modern LANs.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
What is the difference between Cat5e and Cat6 cables in terms of performance?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question:
What is a star topology in networking?
Answer Options:
A network where devices are connected to a central hub or switch.
A network where devices are connected in a closed loop.
A network where devices are directly connected to one another.
A network where devices are connected in multiple paths for redundancy.

A

Correct Answer + Explanation:
A network where devices are connected to a central hub or switch.
In a star topology, each device connects individually to a central point, making it easy to manage and troubleshoot.
Practical Use:
A small office network uses a star topology with a central switch to connect workstations and printers.
Why Others Are Incorrect:
A closed loop is a ring topology.
Direct connections describe a mesh topology.
Multiple paths also describe a mesh topology.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
What are the advantages of a star topology compared to a bus topology?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question:
What is the purpose of using a crossover Ethernet cable?
Answer Options:
To connect devices with different speeds.
To connect two devices directly without a switch or hub.
To encrypt Ethernet traffic for secure transmission.
To assign IP addresses to connected devices.

A

Correct Answer + Explanation:
To connect two devices directly without a switch or hub.
Crossover cables allow direct communication between devices like PCs or routers by reversing the transmit and receive pins.
Practical Use:
Two laptops are connected directly using a crossover cable for file transfer without requiring a switch.
Why Others Are Incorrect:
Device speeds are managed by autonegotiation, not the cable type.
Encryption and IP assignment are unrelated to crossover cables.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
Why are crossover cables less commonly used in modern networks?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Question:
Which routing protocol is best suited for routing between autonomous systems on the internet?
Answer Options:
OSPF
RIP
BGP
EIGRP

A

Correct Answer + Explanation:
BGP
Border Gateway Protocol (BGP) is the standard routing protocol used to exchange routing information between autonomous systems on the internet.
Practical Use:
ISPs use BGP to share routing information and ensure data travels efficiently across multiple networks.
Why Others Are Incorrect:
OSPF: Designed for internal routing within an autonomous system.
RIP: Lacks scalability for large networks.
EIGRP: Proprietary to Cisco and primarily used in enterprise networks.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
What factors influence the path selection process in BGP?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Question:
What is the primary advantage of using 802.1Q VLAN tagging?
Answer Options:
Encrypting data between VLANs.
Increasing available IP addresses.
Allowing multiple VLANs on a single trunk link.
Providing automatic failover for redundant links.

A

Correct Answer + Explanation:
Allowing multiple VLANs on a single trunk link.
802.1Q tagging inserts a VLAN ID into Ethernet frames, enabling multiple VLANs to share a single trunk connection.
Practical Use:
A trunk link between switches can carry traffic for VLANs such as accounting, HR, and IT.
Why Others Are Incorrect:
802.1Q does not provide encryption.
IP addressing is unrelated to VLAN tagging.
Failover is managed by protocols like STP, not 802.1Q.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
How does the Native VLAN work in 802.1Q tagging, and what are its security implications?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Question:
Which wireless frequency band provides greater range but lower data rates?
Answer Options:
2.4 GHz
5 GHz
6 GHz
900 MHz

A

Correct Answer + Explanation:
2.4 GHz
The 2.4 GHz band penetrates obstacles better and has a longer range but supports lower data rates compared to higher frequency bands.
Practical Use:
Deploying 2.4 GHz is ideal for covering large areas like warehouses or outdoor environments.
Why Others Are Incorrect:
5 GHz: Higher data rates but shorter range.
6 GHz: Higher capacity but limited range and penetration.
900 MHz: Rarely used in modern Wi-Fi networks.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
What are the trade-offs between 2.4 GHz and 5 GHz for indoor Wi-Fi deployments?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question:
What is the function of First Hop Redundancy Protocol (FHRP) in a network?
Answer Options:
Resolving IP addresses to MAC addresses.
Providing a backup gateway in case of a primary gateway failure.
Encrypting communication between devices.
Managing multicast group memberships.

A

Correct Answer + Explanation:
Providing a backup gateway in case of a primary gateway failure.
FHRP ensures high availability by providing redundancy for default gateways using protocols like HSRP or VRRP.
Practical Use:
If the primary gateway in a network fails, FHRP enables a secondary gateway to take over seamlessly.
Why Others Are Incorrect:
Address resolution is performed by ARP.
Encryption is unrelated to FHRP.
Multicast management is handled by IGMP.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
What are the differences between HSRP and VRRP in FHRP configurations?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Question:
What is a key benefit of implementing SD-WAN in an enterprise network?
Answer Options:
Simplified cable management.
Centralized management of WAN connections.
Increased availability of IPv4 addresses.
Automatic VLAN assignment.

A

Correct Answer + Explanation:
Centralized management of WAN connections.
SD-WAN (Software-Defined WAN) allows centralized control over WAN links, optimizing performance and reducing costs.
Practical Use:
A retail chain can use SD-WAN to manage connectivity across multiple store locations from a single interface.
Why Others Are Incorrect:
Cable management is unrelated to SD-WAN.
IPv4 availability is managed through subnetting or NAT.
VLAN assignment is a Layer 2 function, not SD-WAN’s role.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
How does SD-WAN improve performance and reliability compared to traditional WAN setups?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Question:
What is the function of Link Aggregation Control Protocol (LACP) in a network?
Answer Options:
Increasing redundancy for Layer 3 routing.
Combining multiple physical links into a single logical link.
Encrypting data transmissions across a WAN.
Managing IP address assignment within a VLAN.

A

Correct Answer + Explanation:
Combining multiple physical links into a single logical link.
LACP aggregates multiple physical connections into one logical interface, increasing bandwidth and redundancy.
Practical Use:
Two 1 Gbps links between switches can be combined using LACP to provide 2 Gbps throughput.
Why Others Are Incorrect:
Redundancy for routing is managed by routing protocols.
Encryption is unrelated to LACP.
IP assignment is a function of DHCP or manual configuration.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
What are the potential risks of improper LACP configuration, and how can they be mitigated?

17
Q

Question:
Which type of transceiver is commonly used for long-distance fiber optic connections?
Answer Options:
SFP
QSFP
Copper transceiver
Twinax

A

Correct Answer + Explanation:
SFP
Small Form-Factor Pluggable (SFP) transceivers are ideal for long-distance fiber optic connections, supporting both single-mode and multimode fiber.
Practical Use:
Connecting data centers across campuses with single-mode fiber requires SFP transceivers.
Why Others Are Incorrect:
QSFP: Supports higher data rates but is less common for long distances.
Copper transceiver: Limited to short distances.
Twinax: Used for short-distance connections in data centers.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
What are the differences between SFP and SFP+ transceivers in terms of data rates and applications?

18
Q

Question:
What is the benefit of implementing a Switch Virtual Interface (SVI)?
Answer Options:
Enabling VLAN tagging on trunk ports.
Allowing a switch to perform Layer 3 routing.
Reducing the number of MAC addresses in a VLAN.
Increasing the physical port count on a switch.

A

Correct Answer + Explanation:
Allowing a switch to perform Layer 3 routing.
An SVI enables Layer 3 functionality on a switch, allowing it to route traffic between VLANs.
Practical Use:
An SVI allows inter-VLAN routing on a Layer 3 switch without the need for a dedicated router.
Why Others Are Incorrect:
VLAN tagging is unrelated to SVI.
MAC address reduction is not achieved with SVIs.
Physical port count cannot be increased.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
What configurations are required to enable inter-VLAN routing using an SVI?

19
Q

Question:
What is the primary function of 802.11r in wireless networking?
Answer Options:
Enhancing encryption for wireless connections.
Providing fast roaming between access points.
Increasing the range of Wi-Fi networks.
Reducing interference on 5 GHz bands.

A

Correct Answer + Explanation:
Providing fast roaming between access points.
802.11r optimizes handoff between access points, reducing delays for mobile devices in Wi-Fi networks.
Practical Use:
In a hospital, 802.11r ensures smooth roaming for medical devices moving between rooms.
Why Others Are Incorrect:
Encryption is handled by protocols like WPA2/WPA3.
Wi-Fi range depends on frequency and antenna placement.
Interference reduction is unrelated to 802.11r.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
What role does 802.11k play alongside 802.11r in improving wireless performance?

20
Q

Question:
What is the purpose of using a wireless controller in an enterprise network?
Answer Options:
Increasing the range of wireless access points.
Centralizing management of multiple access points.
Encrypting wireless data across the network.
Ensuring backward compatibility with older devices.

A

Correct Answer + Explanation:
Centralizing management of multiple access points.
Wireless controllers streamline configuration, monitoring, and management of access points in large networks.
Practical Use:
An office with dozens of access points can use a wireless controller to configure them centrally instead of individually.
Why Others Are Incorrect:
Range is determined by access points, not controllers.
Encryption is managed by security protocols like WPA3.
Backward compatibility depends on the access points themselves.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
How does a wireless controller improve network security in large deployments?

21
Q

Question:
How does SD-WAN improve application performance compared to traditional WAN technologies?
Answer Options:
By encrypting all traffic between branch offices.
By dynamically selecting the optimal path based on real-time conditions.
By eliminating the need for routing protocols.
By prioritizing unicast traffic over multicast traffic.

A

Correct Answer + Explanation:
By dynamically selecting the optimal path based on real-time conditions.
SD-WAN uses dynamic path selection, considering metrics like latency, jitter, and packet loss, to ensure application performance and reliability.
Practical Use:
A retail chain uses SD-WAN to prioritize VoIP traffic over less critical data transfers, ensuring clear communication between branches.
Why Others Are Incorrect:
Encryption is a feature but not the main benefit for application performance.
Routing protocols are still used alongside SD-WAN.
Traffic prioritization depends on QoS policies, not traffic type.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
How does SD-WAN integrate with cloud services to enhance application delivery?

22
Q

Question:
What is the purpose of configuring private VLANs (PVLANs) in a switched network?
Answer Options:
To enable communication between isolated devices.
To enhance security by restricting inter-host communication within the same VLAN.
To dynamically assign IP addresses to VLAN members.
To route VLAN traffic between Layer 3 switches.

A

Correct Answer + Explanation:
To enhance security by restricting inter-host communication within the same VLAN.
PVLANs divide a VLAN into isolated segments, preventing devices from communicating directly while maintaining access to shared resources like routers.
Practical Use:
In a data center, PVLANs isolate servers within the same VLAN to minimize lateral movement during a security breach.
Why Others Are Incorrect:
PVLANs restrict communication, not enable it.
IP address assignment is unrelated to PVLANs.
Routing occurs at Layer 3, independent of PVLAN configurations.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
What are the differences between isolated, community, and promiscuous ports in a PVLAN?

23
Q

Question:
How does 802.11ax (Wi-Fi 6) improve wireless network performance in high-density environments?
Answer Options:
By increasing channel bandwidth to 160 MHz.
By implementing orthogonal frequency-division multiple access (OFDMA).
By prioritizing broadcast traffic over unicast traffic.
By limiting the number of connected devices.

A

Correct Answer + Explanation:
By implementing orthogonal frequency-division multiple access (OFDMA).
OFDMA divides channels into subcarriers, allowing multiple devices to communicate simultaneously, improving efficiency in crowded networks.
Practical Use:
A university deploys Wi-Fi 6 in lecture halls to provide seamless connectivity for hundreds of students.
Why Others Are Incorrect:
Channel bandwidth is increased, but OFDMA is the key enhancement.
Broadcast traffic prioritization is unrelated to Wi-Fi 6 improvements.
Wi-Fi 6 increases, not limits, device support.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up: How does MU-MIMO complement OFDMA in enhancing Wi-Fi 6 performance?

24
Q

Question:
What is the benefit of implementing VRFs (Virtual Routing and Forwarding) in a Layer 3 switch?
Answer Options:
Creating multiple virtual switches within the same physical device.
Isolating routing tables to support multiple tenants or networks.
Encrypting data within a single VLAN.
Improving VLAN tagging efficiency.

A

Correct Answer + Explanation:
Isolating routing tables to support multiple tenants or networks.
VRFs allow multiple routing tables to exist independently on the same device, enabling network segmentation for tenants or departments.
Practical Use:
An ISP uses VRFs to isolate routing for different business customers while using a single physical router.
Why Others Are Incorrect:
VRFs isolate routing tables, not Layer 2 switches.
Encryption is unrelated to VRF functionality.
VLAN tagging is independent of VRFs.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
How do VRFs compare to MPLS in achieving network segmentation?

25
Q

Question:
What is the primary advantage of using LACP (Link Aggregation Control Protocol) in a high-availability network?
Answer Options:
Encrypting data transmitted across multiple links.
Combining multiple physical links into a single logical link with redundancy.
Automating IP address configuration for connected devices.
Reducing VLAN configuration complexity.

A

Correct Answer + Explanation:
Combining multiple physical links into a single logical link with redundancy.
LACP bundles links into one logical connection, providing increased bandwidth and failover capability.
Practical Use:
A data center uses LACP to combine two 10 Gbps links between switches, providing 20 Gbps bandwidth and failover support.
Why Others Are Incorrect:
Encryption is not a feature of LACP.
IP configuration is unrelated to link aggregation.
VLAN configuration is independent of LACP.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
What are potential pitfalls of misconfiguring LACP in a redundant network setup?

26
Q

Question:
How does implementing MST (Multiple Spanning Tree) improve Layer 2 scalability in a network with numerous VLANs?
Answer Options:
By automatically assigning VLANs to different switches.
By grouping VLANs into instances to reduce the number of Spanning Tree Protocol instances.
By encrypting VLAN traffic to prevent loops.
By increasing the redundancy of switch uplinks.

A

Correct Answer + Explanation:
By grouping VLANs into instances to reduce the number of Spanning Tree Protocol instances.
MST assigns multiple VLANs to a single spanning tree instance, reducing resource usage and improving scalability.
Practical Use:
An enterprise with 200 VLANs configures MST to map VLANs into 10 instances, minimizing CPU and memory usage on switches.
Why Others Are Incorrect:
VLAN assignment is unrelated to MST functionality.
MST does not encrypt traffic; it prevents loops.
Redundancy is achieved through design, not MST.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
What are the key differences between MST and RSTP in terms of scalability and deployment?

27
Q

Question:
What is the primary purpose of a dynamic VLAN assignment using RADIUS in enterprise networks?
Answer Options:
Reducing the manual configuration of VLANs on switches.
Encrypting data for devices within VLANs.
Enabling automatic VLAN routing across subnets.
Prioritizing multicast traffic over unicast traffic.

A

Correct Answer + Explanation:
Reducing the manual configuration of VLANs on switches.
Dynamic VLAN assignment allows RADIUS servers to assign devices to specific VLANs based on authentication credentials, streamlining network management.
Practical Use:
A university uses dynamic VLAN assignment to place faculty, students, and guests into separate VLANs automatically after authentication.
Why Others Are Incorrect:
VLAN routing is a Layer 3 task, not a function of dynamic assignment.
Encryption is unrelated to VLAN assignment.
Traffic prioritization depends on QoS, not VLAN assignment.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
What security concerns arise when relying on dynamic VLAN assignment, and how can they be mitigated?

28
Q

Question:
How does the implementation of channel bonding enhance throughput in wireless networks?
Answer Options:
By splitting a single channel into smaller subchannels.
By combining adjacent channels to increase bandwidth.
By reducing interference from nearby wireless devices.
By prioritizing broadcast traffic over unicast traffic.

A

Correct Answer + Explanation:
By combining adjacent channels to increase bandwidth.
Channel bonding merges two or more channels, effectively doubling or tripling the available bandwidth, improving throughput.
Practical Use:
An organization uses 40 MHz channel bonding on a 5 GHz network to achieve higher speeds for video conferencing and file transfers.
Why Others Are Incorrect:
Splitting channels reduces bandwidth, not enhances it.
Interference reduction depends on channel selection, not bonding.
Traffic prioritization is managed by QoS policies, not channel bonding.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
What trade-offs should be considered when enabling channel bonding in high-density environments?

29
Q

Question:
What is the role of CAPWAP in wireless network management?
Answer Options:
Encrypting data between access points and clients.
Managing communication between wireless controllers and access points.
Assigning IP addresses to wireless devices.
Prioritizing traffic based on QoS policies.

A

Correct Answer + Explanation:
Managing communication between wireless controllers and access points.
CAPWAP (Control and Provisioning of Wireless Access Points) standardizes the control plane, enabling centralized management of access points by a controller.
Practical Use:
An enterprise uses CAPWAP to deploy configuration updates to all access points simultaneously from the wireless controller.
Why Others Are Incorrect:
CAPWAP does not handle encryption for client traffic.
IP assignment is performed by DHCP, not CAPWAP.
QoS policies are managed at the controller or application layer, not CAPWAP.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
How does CAPWAP differ from proprietary protocols like Cisco’s LWAPP in managing wireless networks?

30
Q

Question:
What is the primary benefit of using VTP (VLAN Trunking Protocol) in a large network?
Answer Options:
Automatically encrypting VLAN traffic.
Dynamically propagating VLAN information across switches.
Prioritizing VLAN traffic over non-VLAN traffic.
Reducing the need for spanning tree configurations.

A

Correct Answer + Explanation:
Dynamically propagating VLAN information across switches.
VTP simplifies VLAN management by automatically sharing VLAN configurations among connected switches in the same domain.
Practical Use:
A corporate network uses VTP to add a new VLAN across multiple switches without manual configuration on each device.
Why Others Are Incorrect:
Encryption is unrelated to VTP.
Traffic prioritization is managed by QoS, not VTP.
Spanning tree is still necessary to prevent loops in VLAN configurations.
Exam Objective Reference:
N10-009 Domain 2.0: Network Implementation
Follow-Up:
What risks are associated with improper VTP configuration, and how can these be mitigated?