LAN Switching Fundamentals Flashcards
What commands are used to troubleshoot err-disabled for port state recovery? (Choose all that apply.)
A. show interfaces status err-disabled
B. show etherchannel summary
C. show detect errdisable
D. show errdisable recovery
A. show interfaces status err-disabled
B. show etherchannel summary
D. show errdisable recovery
The following commands are used to troubleshoot err-disabled for port state recovery:
1) show etherchannel summary
2) show errdisable recovery
3) show interfaces status err-disabled
The “show interfaces status err-disabled” command displays the local ports involved in the errdisabled state. The “show etherchannel summary” command displays the current status of the etherchannel. The “show errdisable recovery” command shows the period after which the interfaces are enabled for errdisable conditions.
An administrator wants a switch to advertise information about itself to other devices on the network. What commands need to be configured on the switch to accomplish the task?
A. configure terminal
lldp run
end
B. configure terminal
interface fa0-24
lldp
end
C. configure terminal
lldp enable
end
D. configure terminal
lldp transmit
end
A. configure terminal
lldp run
end
For a switch to advertise information about itself to other devices on a network, an administrator needs to configure the following commands on the switch.
configure terminal
lldp run
end
Link Layer Discovery Protocol (LLDP) is a neighbor discovery protocol that network devices use to provide information about themselves to other devices on the network. LLDP must be enabled on a device before being enabled or disabled on any interface. LLDP is a non-proprietary discovery protocol that supports multi-vendor networks.
A new Cisco IOS switch needs to be configured at a San Jose site. Which command is configured on the switch interface to disable auto-negotiation? (Choose all that apply)
A. duplex full
B. speed 100
C. no auto-negotiation
D. auto-negotiation disable
A. duplex full
C. no auto-negotiation
To disable auto-negotiation on the switch interface, an administrator needs to configure the following commands under the interface subcommand:
speed 100
duplex full
The default setting for the switch interface is set to duplex, auto, and speed auto. An administrator can’t set a duplex value until the speed is set to a non-default value.
If a packet is received with the destination MAC address as 1235.ad89.cdb3 on the switch port fa0/20, what action will the switch take? (Choose all that apply.) The output of the MAC address table is shown as follows:
switch#show mac address-table
VLAN Mac-address Ports
1 12dc.45ad.bc78.acd4 fa0.15
1 15ed.cba3.da46.1567 fa0.20
1 00AC.1247.f567.3AC4 fa0.19
1 00aa.1234.cdb5.eacd fa0.21
A. It will forward the packet port fa0.15.
B. It will drop the packet.
C. It will forward the packet to port fa0.19 and fa0.21.
D. It will forward the packet to all the destination listed in the MAC address table.
A. It will forward the packet port fa0.15.
C. It will forward the packet to port fa0.19 and fa0.21.
The switch will forward the received packet to the devices connected to switch ports fa0.15, fa0.19, and fa0.21.
The MAC address table does not contain the destination MAC address 1235.ad89.cdb3 to which the packet needs to be transferred. Hence, the switch will forward the packet to all the devices listed in the MAC address table, expect the port on which it has received the packet.
What fields define a typical Ethernet frame format? (Choose all that apply.)
A. Frame Check Sequence
B. Type
C. Preamble
D. Physical Layer Compatibility
A. Frame Check Sequence
B. Type
C. Preamble
Preamble, Frame Check Sequence, and Type define a typical Ethernet frame format.
Preamble consists of seven bytes. It uses an alternating pattern of ones and zeros, which notifies the receiving stations that a frame is coming. The frame check sequence consists of four bytes. The sequence contains a 32-bit cyclic redundancy check (CRC) value. The frame check sequence is generated across the destination address, source address, length/type, and data fields. Length/Type consists of two bytes. The field indicates the number of MAC client data bytes contained in the data field of the frame.
An administrator needs to configure a Cisco IOS switch that supports IEEE 802.1q frame tagging. What command needs to be configured on the trunk interface for a trunk to use 802.1q?
A. switchport trunk encapsulation dot1q
B. switchport trunk encapsulation negotiate
C. switchport trunk encapsulation 802.1q
D. switchport trunk encapsulation isl
A. switchport trunk encapsulation dot1q
The switchport trunk encapsulation dot1q command needs to be configured on the trunk interface for a trunk to use 802.1q frame tagging.
The trunk port is used to carry traffic for all VLANs accessed by a switch. 802.1Q and ISL are the types of encapsulations configured on a switch trunk port. Dot1q defines the interface to use only 802.1Q trunking encapsulation, whereas ISL defines the interface to use only ISL trunking encapsulation.
The manager of a sales team wants to restrict the LAN connection to each computer on the floor. What configuration commands need to be executed on the switch port to prohibit computers and laptops from being connected to other ports?
A. switch(config-if)#switchport security mac-address
B. switchport(config-if)#switchport port-security VLAN Sales
C. switchport(config-if)#switchport port-security mac-address AAAA.BBBB.CCCC
D. switchport(config-if)#switchport port-security fa0/0
C. switchport(config-if)#switchport port-security mac-address AAAA.BBBB.CCCC
The switch(config-if)#switchport port-security mac-address AAAA.BBBB.CCCC command needs to be executed on each port for every MAC address. The port security feature is used to restrict a computer from entering an interface by limiting and identifying the MAC addresses of the workstations that are allowed to access the port. The administrator can limit the number of secure MAC addresses to ‘one’ by assigning a single secure MAC address. The workstation attached to that port is assured the full bandwidth of the port.
The MAC address table of a newly installed Cisco IOS switch at a remote site is empty. Five computers are connected to the switch. Which statements are true with regard to updating the MAC-address table? (Choose all that apply)
A. Determine whether to forward or drop the frame based on the destination MAC address.
B. Create an entry in a table if the source MAC address and the interface on which the frame has received the On switch don’t exist.
C. The destination MAC address is always ignored during the MAC learning process.
D. Listen to the incoming frame and examine the source MAC-address in the frame.
B. Create an entry in a table if the source MAC address and the interface on which the frame has received the On switch don’t exist.
C. The destination MAC address is always ignored during the MAC learning process.
D. Listen to the incoming frame and examine the source MAC-address in the frame.
The following statements are true with regard to updating the MAC-address table.
1) Listen to the incoming frame and examine the source MAC-address in the frame.
2) Create an entry in a table, if the source MAC-address and the interface on which the frame has received the on switch don’t exist.
3) The destination MAC addresses is always ignored during the MAC learning process.
The two main functions of a switch are determining whether to forward or drop the frame based on the destination Mac-address and learning the MAC addresses and interfaces to update its MAC-address table.
An administrator needs to configure the port security feature on an IOS switch. Which steps should the administrator follow to configure the static MAC address for port security?
A. 1) Ensure the switch port used is an access port.
2) Configure the switchport port-security command at the interface level.
3) Define the port security parameters.
4) Use switchport port-security mac-address [mac-address_id] command to define
MAC-address.
B. 1) Define the port as dynamic desirable.
2) Configure the port-security command on the switch port level. 3) Enable port security on define port. 4) Use the switchport mac-address command to define the MAC-address.
C. 1) Configure the port as an STP port.
2) Define the port security parameters.
3) List the MAC-address statically using the command mac-address switch-port secure.
4) Configure the switchport port-security command under the global configuration
mode.
D. 1) Use the switch port mode access command to configure the switch port.
2) Define the port security parameters.
3) Configure the port-security enable command under the global configuration mode.
4) List the MAC-address statically using the command switch-port secure mac-
address_id.
A. 1) Ensure the switch port used is an access port.
2) Configure the switchport port-security command at the interface level.
3) Define the port security parameters.
4) Use switchport port-security mac-address [mac-address_id] command to define
MAC-address.
The following steps help configure the port security feature on a Cisco IOS switch:
1) Ensure the switch port used is an access port.
2) Configure the switchport port-security command at the interface level.
3) Define the port security parameters.
4) Use the switchport port-security mac-address [mac-address] command to define the MAC-address.
Port security helps limit the number of Mac addresses accessing a switch port. By default, port security is disabled on switch ports.
An administrator needs to remotely manage the switch on a different network subnet, 192.16.170.0/28. What commands must be present on the switch for it to be managed remotely? (Choose all that apply.)
A. int range f0/6
switchport mode access
switchport port-security violation restrict
B. int vlan1
ip address 192.16.170.5 255.255.255.240
C. line con 0
password console
login
D. ip default-gateway 192.16.170.1
B. int vlan1
ip address 192.16.170.5 255.255.255.240
D. ip default-gateway 192.16.170.1
The following commands must be present on the switch for it to be managed remotely:
1) int vlan1
ip address 192.16.170.5 255.255.255.240
2) ip default-gateway 192.16.170.1
The IP address, mask, and default gateway need to be defined for the administrator to remotely manage the switch.
Which VLAN ID carries untagged traffic on trunk ports?
A. Data VLAN
B. Native VLAN
C. Voice VLAN
D. Access VLAN
B. Native VLAN
The native VLAN ID carries untagged traffic on trunk ports. Native VLAN ID numbers must match at both ends of the trunk. A trunk port can carry untagged packets with the 802.1Q tagged packets. If an administrator assigns a default port VLAN ID to the trunk port, the entire untagged traffic travels on the default port VLAN ID and the entire untagged traffic is assumed to belong to this VLAN.
The HQ site users are unable to reach the devices at a remote site. The remote site IT engineer connects a laptop to the console port of a router to investigate further and finds that the serial interface line protocol is down. The router log details are as follows.
Router log:
Remote-site #show interface serial 0/0/0
Serial 0/0/0 is up, line protocol is down
What can be the cause of this issue? (Choose all that apply)
A. issue with clocking
B. Cable or interface problem
C. Encapsulation mismatch
D. Line protocol mismatch
A. issue with clocking
D. Line protocol mismatch
The line protocol can be down if there is an issue with clocking or there is a mismatch in encapsulation.
The serial interface is up, and the line protocol is down. This indicates there is an issue with the Data Link Layer. The output of the interface and line protocol status is the most important statistic of the show interface command. If the output displays serial 0/0/0 and line protocol as up, the interface is assumed to be up and running.
How many bits define the Organizationally Unique Identifier (OUI) in the structure of Unicast Ethernet addresses?
A. 6 bits
B. 24 bits
C. 32 bits
D. 12 bits
B. 24 bits
The number of bits that define the Organizationally Unique Identifier in the structure of Unicast Ethernet addresses is 24.
All Ethernet devices are assigned a unique MAC address during the manufacturing process. IEEE assigns the manufacturer a unique 3-byte (24 bits) code called the Organizationally Unique Identifier. The manufacturer then provides the code to all devices. The manufacturer also uses a unique value for the last 3 bytes (24 bits), a number that the manufacturer has never used with the OUI, which results in unique MAC addresses for all devices.
The Virtual Trunk Port has been configured on a Cisco IOS switch, but the Switch-floor2 is unable to receive the VLAN information from Switch-floor1. What is the possible cause as per the output of the show VTP status? (Choose all that apply)
Switch-Floor1#sh vtp status
VTP Version : 2
Configuration Revision : 5
Maximum VLANs supported locally : 8
Number of existing VLANs : 6
VTP Operating Mode : Server
VTP Domain Name : Finance
VTP Pruning Mode : Disable
VTP V2 Mode : Disable
VTP Traps Generation : Disable
Switch-Floor2#sh vtp status
VTP Version : 2
Configuration Revision : 8
Maximum VLANs supported locally : 25
Number of existing VLANs : 6
VTP Operating Mode : Server
VTP Domain Name : Sales
VTP Pruning Mode : Disable
VTP V2 Mode : Disable
VTP Traps Generation : Disable
A. On both the switches, VTP Operating Mode is configured as the VTP server
B. Switch-floor1 has a lower revision number than Switch-floor2.
C. VTP domain configured on both the switches are different.
D. The VTP V2 Mode is disabled on both the switches.
B. Switch-floor1 has a lower revision number than Switch-floor2.
C. VTP domain configured on both the switches are different.
Here are the possible causes for Switch-floor2 being unable to receive the VLAN information from Switch-floor1:
1) VTP domains configured on both the switches are different.
2) Switch-floor1 has a lower revision number than Switch-floor2.
The switches will share VTP information only if VTP domain names are same on both the switches. The switches in the VTP server mode will share the VLAN information using VTP. To advertise VTP VLAN information, the server should have the highest revision number.
What is the function of the “switchport port-security mac-address sticky” command?
A. Block secured ports for a specific MAC address or subnet
B. Update the static MAC address in the MAC address table
C. Save the dynamically learned MAC address in running configuration
D. Update CAM table to MAC address of sticky devices
C. Save the dynamically learned MAC address in running configuration
The “switchport port-security mac-address sticky” command is used to save the dynamically learned MAC address in running configuration. It provides static MAC address security without the need to type any MAC address on the network as it saves the dynamically learned MAC address in the running configuration.
Which section of the Ethernet II frame is responsible for error detection?
A. Type
B. SFD
C. Preamble
D. FCS
D. FCS
The FCS section of the Ethernet II frame is responsible for error detection. Frame Check Sequence (FCS) is a field at the end of the frame, which is used to store the cyclic redundancy check (CRC) answer. When received by a host, a frame runs the CRC and checks the answer. If it is different, it will discard the frame, assuming that an error has occurred.
What will be the duplex setting if the Ethernet interface uses a speed greater than 1 Gbps?
A. Full Duplex
B. Auto
C. 100 Full
D. Half Duplex
A. Full Duplex
If the Ethernet interface uses a speed greater than 1 Gbps, the duplex setting will be Full Duplex.
If one device is set to auto-negotiation whereas others have auto-negotiation disabled, the device using auto negotiation will choose the default duplex setting based on the current speed. Half duplex is used by default if the speed setting is set to 10 or 100 Mbps, whereas full duplex is used if the speed is set to 1000 Mbps or above.