LAN switching fundamentals Flashcards

1
Q

What are the two primary switch forwarding methods

A

Store and forward
Cut through
Maybe fragment free?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is store and forward switching

A

error checking is performed against the frame, and any frame with errors is discarded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is cut through switching

A

no error checking is performed against the frame, which makes forwarding the frame through the switch faster than store-and-forward switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a collision domain

A

Network segments that share the same bandwidth between devices.
Each switch port represents a new segment
Each segment is a collision domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the flash

A

Storage location the keeps the IOS image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the NVRAM

A

Non volatile RAM, where the startup config is save

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the RAM

A

Volatile. Holds the running config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the ROM

A

This is where the POST is stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the switch boot sequence

A

Power on self test (POST)

Switch loads boot loader

BL performs low level CPU initialisation and initialises CPU registers

BL initialises flash file system

BL locates and loads default IOS in to memory and hands control over to IOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Automatic Medium-Dependant Interface Crossover (auto-MDIX)

A

When enabled, automatically detects the required cable connection type and configures the connection appropriately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the steps to configuring SSH on a switch

A

Verify SSH is supported on device (sh ip ssh)

Configure IP domain (ip domain-name)

Generate RSA key pairs (crypto key generate rsa)

Configure user authentication (username __ secret ___)

Configure VTY lines (login local)

Enable SSH version 2 (ip ssh ver 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is port security

A

Specifies a single MAC address or a group of valid MAC address allowed on a port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is static port security

A

Manually configured on a port using the switchport port-security mac-address mac-address interface config command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is dynamic port security

A

Dynamically learned and stored only in the address table

Removed when switch restarts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is sticky port security

A

Address that can be dynamically learned or manually configured then stored in the address table and added to the running config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is a security violation triggered

A

Either when a MAC address that is not in the address table attempts to access the interface when it is full, or if an address is being used on two secure interface in the same vlan

17
Q

What are the 3 violation modes

A

Protect
Restrict
Shutdown

18
Q

What is protect mode

A

When reaching the limit of secure mac address, packets with unknown source address are dropped until sufficient number of mac addresses are removed or number of allowed addresses increases

There is no notification that violation has occurred

19
Q

What is restrict mode

A

When reaching the limit of secure mac address, packets with unknown source address are dropped until sufficient number of mac addresses are removed or number of allowed addresses increases

There is a notification to say violation has occured

20
Q

What is shutdown mode

A

Interface becomes error disabled and turns off port LED

21
Q

What are some benefits of VLANs

A

Improved security
Segregation
Better performance
Smaller broadcast domains

22
Q

What is a data VLAN

A

Configured to carry user generated traffic

23
Q

What is a default VLAN

A

VLAN 1, all switchports become part of the default VLAN after initial boot up loading default config.
Can not be deleted or renamed

24
Q

What us a native VLAN

A

Untagged VLAN on an 802.1q trunked switchport

25
Q

What us a mgmt VLAN

A

VLAN configured to access the management capabilities of a switch

26
Q

What is a voice VLAN

A

A separate VLAN that is need to support VOIP

27
Q

What is Dynamic Trunking Protocol (DTP)

A

Manages trunk negotiation if neighbour switch is configured in a trunk mode that supports DTP.

28
Q

What are the DTP interface modes

A

Switchport mode dynamic auto
Switchport mode dynamic desirable
Switchport nonegotiate

29
Q

What is Vlan Trunking Protocol (VTP)

A

Not a trunking protocol

Allows the copy of vlans from one switch to another

30
Q

What are the 3 VTP modes

A

Client
Server
Transparent

31
Q

What is the default security violation mode

A

Shutdown

32
Q

What are the 3 main rules that define a native vlan

A

It must match on both ends of a trunk link
It is VLAN 1 by default
It is only available with 802.1q encapsulation

33
Q

What is Link Layer Discovery Protocol (LLDP)

A

Like CDP, but non Cisco proprietary.

34
Q

How does 802.1q identify what VLAN the frame belongs to.

A

VLAN Identifier field - 12 bits