1.
Which feature is required for multiple VLANs to span multiple switches? (Source:Implementing VLANs and Trunks)
Correct Answer
A. A trunk to connect the switches
Explanation
To span multiple switches with multiple VLANs, a trunk is required. A trunk is a network link that carries traffic for multiple VLANs between switches. It allows for the transmission of VLAN-tagged frames across switches, ensuring that each switch can correctly identify and forward traffic to the appropriate VLAN. Trunks use protocols such as IEEE 802.1Q to tag VLAN information onto Ethernet frames, enabling the switches to differentiate between VLANs and maintain their integrity across the network. Without a trunk, VLANs would be isolated to individual switches, limiting their ability to communicate with each other.
2.
What does a VMPS map to VLAN assignments? (Source: Implementing VLANs and Trunks)
Correct Answer
D. MAC addresses
Explanation
A VMPS (VLAN Membership Policy Server) maps to VLAN assignments based on MAC addresses. This means that the VMPS uses the MAC address of a device to determine which VLAN it should be assigned to. By associating MAC addresses with specific VLANs, the VMPS can effectively manage VLAN membership and ensure that devices are placed in the correct VLAN based on their MAC address.
3.
What are two reasons for using 802.1Q? (Choose two.) (Source: Implementing VLANs and Trunks)
Correct Answer(s)
A. To allow switches to share a trunk link with nontrunking clients
E. To provide trunking between Cisco switches and other vendor switches
Explanation
802.1Q is used to allow switches to share a trunk link with nontrunking clients, which means that multiple VLANs can be transmitted over a single physical link. It also provides trunking between Cisco switches and other vendor switches, allowing for interoperability between different network equipment.
4.
What primary benefit does VTP offer? (Source: Implementing VLANs and Trunks)
Correct Answer
D. D) minimizes misconfigurations and configuration inconsistencies
Explanation
VTP (VLAN Trunking Protocol) minimizes misconfigurations and configuration inconsistencies in a switched network. It does this by allowing for centralized management of VLAN configurations, ensuring that all switches in the network have consistent VLAN information. This helps to prevent errors and inconsistencies that can occur when manually configuring VLANs on individual switches. By minimizing misconfigurations and inconsistencies, VTP improves network reliability and reduces the chances of network issues caused by incorrect VLAN configurations.
5.
How many VTP domains can you configure for a switch? (Source: Implementing VLANs and Trunks)
Correct Answer
A. One
Explanation
The correct answer is one because a switch can only belong to a single VTP (VLAN Trunking Protocol) domain at a time. VTP allows for the synchronization of VLAN information across multiple switches in a network, but each switch can only be part of one domain.
6.
Which command correctly configures a switch for transparent mode in the VTP domain “switchlab”? (Source: Implementing VLANs and Trunks)
Correct Answer
B. Vtp mode transparent
Explanation
The correct answer is "vtp mode transparent" because this command is used to configure a switch in transparent mode in the VTP domain "switchlab". In transparent mode, the switch does not participate in VTP updates and does not advertise its VLAN configuration to other switches. This mode is typically used when you want to manually configure VLANs on a switch without affecting the VTP domain.
7.
Which is the default VTP mode on a Cisco Catalyst switch? (Source: Implementing VLANs and Trunks)
Correct Answer
C. Server
Explanation
The default VTP mode on a Cisco Catalyst switch is "server". In this mode, the switch can create, modify, and delete VLANs and share this information with other switches in the VTP domain. It also synchronizes VLAN information received from other switches and can advertise this information to other switches in the domain. The server mode is typically used in larger networks where multiple switches need to be managed and configured centrally.
8.
Which information does the show vian command display? (Source: Implementing VLANs and Trunks)
Correct Answer
D. Names of the VLANs and the ports assigned to the VLANs
Explanation
The "show vian" command displays the names of the VLANs and the ports assigned to those VLANs. This command provides information about the VLAN configuration on a network device, allowing administrators to see which VLANs are configured and which ports are assigned to each VLAN.
9.
Which command displays the spanning-tree configuration status of the ports on a Cisco Catalyst 2960 Series Switch? (Source: Implementing VLANs and Trunks)
Correct Answer
C. Show spanning-tree
Explanation
The correct answer is "show spanning-tree." This command is used to display the spanning-tree configuration status of the ports on a Cisco Catalyst 2960 Series Switch. It provides information about the spanning-tree protocol, including the root bridge, port roles, and port states. This command is commonly used for troubleshooting and monitoring the spanning-tree topology on the switch.
10.
When you delete a VLAN from a VTP domain, where should you perform the change? (Source: Implementing VLANs and Trunks)
Correct Answer
A. On a switch in VTP server mode
Explanation
When you delete a VLAN from a VTP domain, you should perform the change on a switch in VTP server mode. This is because VTP server mode is responsible for managing and propagating VLAN information to other switches in the domain. By deleting the VLAN on a switch in VTP server mode, the change will be communicated to all other switches in the VTP domain, ensuring that the VLAN is removed from their configurations as well.
11.
Suppose that VTP is not updating the configuration on other switches when the VLAN configuration changes. Which command would you use to determine if the switch is in
VTP transparent mode? (Source: Implementing VLANs and Trunks)
Correct Answer
D. Show vtp status
Explanation
The "show vtp status" command would be used to determine if the switch is in VTP transparent mode. This command displays the VTP configuration information, including the VTP mode. By checking the mode, you can determine if the switch is in transparent mode, which means it does not participate in VTP updates and does not synchronize its VLAN configuration with other switches.
12.
Which three frame types are flooded to all ports except the source port on a switch?(Choose three.) (Source: Improving Performance with Spanning Tree)
Correct Answer(s)
B. Multicast frames
C. Broadcast frames
E. Frames with an unknown destination address
Explanation
Unicast frames are not flooded to all ports except the source port on a switch. Frames with a known destination address are not flooded either, as they can be forwarded directly to the intended recipient. However, multicast frames, broadcast frames, and frames with an unknown destination address are flooded to all ports except the source port to reach all potential recipients.
13.
Which term commonly describes the endless flooding or looping of frames? (Source:
Improving Performance with Spanning Tree)
Correct Answer
C. Broadcast storm
Explanation
A broadcast storm refers to the excessive flooding of broadcast packets in a network, causing a loop and overwhelming the network's resources. This can result in degraded network performance and can even lead to a network outage.
14.
Which term describes multiple copies of a frame arriving on different ports of a switch? (Source: Improving Performance with Spanning Tree)
Explanation
The term that describes multiple copies of a frame arriving on different ports of a switch is "broadcast storm". A broadcast storm occurs when a switch receives a broadcast frame and forwards it out of all its ports, causing each switch in the network to receive and forward the same frame again. This can lead to network congestion and performance issues. Spanning Tree Protocol (STP) helps prevent broadcast storms by blocking redundant paths in a network.
15.
When does STP automatically reconfigure switch or bridge ports? (Source: Improving Performance with Spanning Tree)
Correct Answer
A. When the network topology changes
Explanation
STP automatically reconfigures switch or bridge ports when the network topology changes. This means that when there is a change in the way the devices are interconnected or when a new device is added or removed from the network, STP will dynamically adjust the forwarding paths to prevent loops and ensure a stable network. This automatic reconfiguration is essential for maintaining network stability and preventing broadcast storms or other network issues that can arise from changes in the topology.
16.
Q17) How does STP provide a loop-free network? (Source: Improving Performance with Spanning Tree)
Correct Answer
C. by placing some ports in the blocking state
Explanation
STP provides a loop-free network by placing some ports in the blocking state. This means that certain ports on the switches are temporarily disabled, preventing them from forwarding traffic. By selectively blocking ports, STP ensures that there are no loops in the network, which can cause broadcast storms and degrade network performance. The blocked ports are only activated when there is a failure in the network, ensuring that redundant paths are available if needed, but without creating loops.
17.
Which port is the lowest-cost path from the nonroot bridge to the root bridge? (Source:Improving Performance with Spanning Tree)
Correct Answer
A. root
Explanation
The lowest-cost path from the nonroot bridge to the root bridge is through the root port. The root port is the port on the nonroot bridge that offers the shortest path to reach the root bridge. It is the port that receives the best BPDU (Bridge Protocol Data Unit) information from the root bridge, indicating the lowest cost path. This port is responsible for forwarding traffic towards the root bridge.
18.
How does STP select the designated port on a segment? (Source: Improving Performance with Spanning Tree)
Correct Answer
A. Lowest-cost path to the root bridge
Explanation
STP (Spanning Tree Protocol) selects the designated port on a segment based on the lowest-cost path to the root bridge. The root bridge is the bridge with the lowest bridge ID in the network. By selecting the lowest-cost path to the root bridge, STP ensures that the designated port is on the most efficient path for forwarding traffic. This helps to prevent loops and ensures that the network operates with optimal performance.
19.
Which statement is true of a port in the listening state? (Source: Improving Performance with Spanning Tree)
Correct Answer
B. The port is able to check for BPDUs, but not yet populate its MAC table.
Explanation
In the listening state, a port in Spanning Tree Protocol (STP) is able to receive and process Bridge Protocol Data Units (BPDUs) to determine the network topology. However, it does not yet populate its MAC table, which means it does not learn or store MAC addresses. The listening state is a transitional state before the learning state, where the port starts populating its MAC table. Therefore, the correct answer is that the port is able to check for BPDUs, but not yet populate its MAC table.
20.
Regarding STP, what is the state of a nondesignated port? (Source: Improving Performance with Spanning Tree)
Correct Answer
A. Blocking
Explanation
A nondesignated port in STP is in the blocking state. This means that the port is not part of the active network path and does not forward any frames. It is essentially "blocked" from participating in the network communication to prevent loops and ensure a stable network topology. The blocking state helps in preventing network congestion and ensures that only designated ports are actively forwarding traffic.
21.
Regarding STP, what is the state of a root port? (Source: Improving Performance withSpanning Tree)
Correct Answer
D. Forwarding
Explanation
The state of a root port in STP is forwarding. In Spanning Tree Protocol (STP), the root port is the port on a non-root bridge that offers the shortest path to the root bridge. It is responsible for forwarding data packets towards the root bridge. The forwarding state allows the port to actively send and receive data packets, ensuring efficient communication within the network.
22.
On which SIP bridge are all ports designated ports? (Source: Improving Performance with Spanning Tree)
Correct Answer
A. Root bridge
23.
Which event is required for SIP to detect a topology change? (Source: Improving Performance with Spanning Tree)
Correct Answer
C. The maxage timer has expired without receiving a BPDU.
24.
Which switched network issue does RSTP address? (Source: Improving Performance with Spanning Tree)
Correct Answer
D. Speed of convergence
25.
What is the RSTP equivalent of the SIP listening state? (Source: Improving Performance with Spanning Tree)
Correct Answer
C. Discarding
26.
With RSTP, which two port roles are included in the active topology? (Source:
Improving Performance with Spanning Tree)
Correct Answer
B. Root and designated
27.
Which command correctly assigns a subinterface to VLAN 50 using 802.1Q trunking? (Source: Routing Between VLANs)
Correct Answer
C. Router(config-if) # encapsulation dot1Q 50
Explanation
The command "Router(config-if) # encapsulation dot1Q 50" correctly assigns a subinterface to VLAN 50 using 802.1Q trunking. This command specifies the encapsulation type as dot1Q, which is the standard for VLAN tagging, and assigns the VLAN ID as 50.
28.
Which command restricts port usage to no more than ten devices? (Source: Securing the Expanded Network)
Correct Answer
C. Switchport port-security maximum 10
Explanation
The correct answer is "switchport port-security maximum 10." This command sets the maximum number of MAC addresses allowed on a switchport to 10. This helps to prevent unauthorized devices from connecting to the network by limiting the number of devices that can be connected to a specific port.
29.
What happens to a switch port when you delete the VLAN to which it belongs? (Source: Troubleshooting Switched Networks)
Correct Answer
C. The port remains in the deleted VLAN and becomes inactive.
30.
What happens when you try to create a trunk link between two switches that have their ports set to dynamic auto? (Source: Troubleshooting Switched Networks)
Correct Answer
B. The link will become a non-trunked link.
31.
Switch A is in VIP client mode and has VLANs 1 through 5 in its VLAN database. Switch B is added to the same VIP domain in VIP server mode and has VLANs 6
through 10 in its VLAN database. How do the VLAN databases of Switch A and Switch B appear after Switch B has been added to the network? (Source: Troubleshooting Switched Networks)
Correct Answer
D. It depends upon which switch has the higher revision number.