Switching Flashcards

1
Q

What is a repeater?

A

Generates a new clean copy of the exact signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Hub?

A

A hub is the same as a repeater with more ports; basically a multi port repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What layer to hubs and repeaters operate at?

A

Physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe what happens when a collision occurs?

A

voltage on the wire changes, thats how the device knows a collision has occurred. The devices will then send a jam signal so other devices know not to transmit data due to a collision. Both devices then invoke a “backoff timer”, each will then start the process over again by listening to the wire and transmitting when clear. The backoff timers are totally random so it is unlikely the hosts will have the same problem again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False - Switches break up broadcast domains

A

False - Routers and VLANS break up broadcast domains, switches add collision domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A switch has 12 ports with 12 devices plugged in, how many collision domains are there?

A

12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Microsegmentation?

A

One host - One collision domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What will a Cisco switch do with an incoming frame?

A

Forward it - Flood it - Filter it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a switch build a MAC address table?

A

By looking at the source MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does a Cisco switch decide what to do with the incoming frame?

A

The switch will check to see if there is an entry in its MAC address table for the source MAC address and then the switch will use its MAC address table to check if there is an entry for the destination MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the command to see the MAC address table

A

show mac-address-table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False - If the switch does not have an entry for the destination MAC address, it will flood every port with the frame.

A

False - The switch will flood every port EXCEPT the port the frame came in on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an unknown Unicast Frame?

A

host to host transmission where the switch doesn’t have the destination MAC address in MAC table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does a switch do when it filters the frame?

A

Drops the frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False - Switches NEVER send a frame back out the same port it came in on.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is flooding?

A

Flooding is performed when the switch has no entry for the frame’s destination MAC address. When the frame is flooded it is sent out every port except the one it came in on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Forwarding?

A

When the switch does have an entry for the frames destination MAC address. The frame will be sent out only one port with Forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Filtering?

A

When the switch has an entry for both the source and destination MAC address and the MAC table indicates that both addresses are found off the same port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What ports are a Broadcast frame sent out on?

A

Every port except the one that received it. Broadcast frames are intended for all hosts, and the MAC broadcast address is
FF-FF-FF-FF-FF-FF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the default time a MAC address is stored?

A

300 Seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Once the switch decides whether to Forward, Filter or Flood the frame…what other decision needs to be made?

A

What processing method will be used to handle this forwarding. The processing options are: Store-and-forward, Cut-through, fragment-free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Store and forward?

A

Store and forward is the default for new switches. It provides more error detection than Cut-hrough or fragment-free, has no error recovery, and is slower than Cut-hrough and fragment-free

23
Q

What is Cut-through?

A

Cutthrough will forward as soon as frame comes in, Cut-through is fastest, and only Mac address is read

24
Q

What is fragment free?

A

Fragment free checks the first 64 bytes for corruption and then forwards if there is none. Fragment free offers middleground between store and forward and Cut-through

25
Q

What is the danger of a Broadcast Storm?

A

Broadcast storms can overwhelm a switch’s memory and CPU capabilities, rendering the switch virtually useless.

26
Q

How do you limit Broadcasts?

A

Increase the amount of broadcast domains by creating smaller groups.

27
Q

What is the purpose of a VLAN?

A

VLANS limit and segment broadcast domains (breaks them into smaller groups)

28
Q

What is the default VLAN on a Cisco switch?

A

VLAN 1

29
Q

True or False - Traffic can be sent from one VLAN to another without the intervention of a layer 3 device

A

False - NO Traffic can be sent from one VLAN to another without the intervention of a layer 3 device

30
Q

What protocol does a ping utilize?

A

ICMP

31
Q

What do we use a ping for?

A

Basic connectivity test

32
Q

What command would you use to see all VLAN’s on a switch?

A

Show VLAN
or
Show VLAN brief

33
Q

The Cisco switching model consists of three layers. The __________, ____________, and _____________. This model defines ____________ for switches

A

Access
Distribution
Core

Roles

34
Q

True or False - VLAN’s are also a security feature.

A

True

35
Q

What does STP stand for?

A

Spanning Tree Protocol

36
Q

What is Spanning Tree used for?

A

To Prevent switching loops - STP will determine a loop free path for frames, and ports that are not on that path will be placed into blocking mode

37
Q

True or False - Spanning Tree is enabled by default

A

True

38
Q

True or False - Unused VLANS can be used as a security feature?

A

True - Cisco switch ports are open by default, close the unused port with the “shutdown” command, and place them in an unused VLAN

39
Q

What are the three options for a port-security violation?

A

Protect - drops the violating frames and transmits a message to the log indicating an issue but does not shut the port

Restrict - simply drops the violating frames

Shutdown - Default mode - drops the violating frames and shuts down the port which will now be listed as err-disabled, also transmits to the log indicating the action taken

40
Q

What is the commmand to verify port security is running?

A

show port-securtity interface f0/2 (example)

41
Q

What is the command for an port security when you don’t know the MAC address?

A

sw2(config-if)#switchport port-security mac-address sticky

42
Q

What does the mac-address sticky command do?

A

The first source MAC address learned on the port will be the secure address, and all others will be onon-secure unless you use the maximum option to change that. - This is commonly used when configuring port security and the MAC address is unknown.

43
Q

What command would you use to find out if a non-secure address has hit a specific port and shut it down? Also, What other indicator will there be that a port has been shut down by port security?

A

sw2#sho int fast 0/3 (example)

The port LED will be dark

44
Q

What command would you use to protect the switch’s console port with a password?

A

line con 0

password cisco (example)

45
Q

Why do you have to configure a password for telnet?

A

Without a password on the VTY lines, no user will be able to telnet to a Cisco router or switch.

46
Q

What is the command do set up a password for telnet?

A

line vty 0 15

password cisco (example)

login

47
Q

What mode are you in when you see this sympbol “ > “

A

User exec mode

48
Q

What mode are you in when you see this symbol “#” ?

A

Privlileged EXEC mode, also referred to as the enable mode

49
Q

True or False - Using an enable mode password is always optional

A

False - for telnet and SSH users to access enable mode the enable password must be configured OR the following command must be configured on the VTY lines - config# username jsmith privilege 15 password cisco (example)

50
Q

What does an amber light on the port LED mean?

A

If it doesn’t go away in a few seconds, it indicates a problem.

51
Q

Typically, What level would you start your troubleshooting at?

A

Physical layer

52
Q

What does configuring the “logging synchronous” command do?

A

By configuring the logging synchronous command on the console port, your telling the router to hold such messages until it detects no input from the keyboard and no other output from the router.

53
Q

what does do ?

A

Takes the cursor all the way to the front of your current command