Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
145 Cards in this Set
- Front
- Back
- 3rd side (hint)
Both switches and hubs are being utilized within the Certkiller network. Which of
the following is true regarding the use of switches and hubs for network connectivity in this network? A. Switches take less time to process frames than hubs take B. Hubs can filter frames C. Switches do not forward broadcasts D. Switches increase the number of collision domains in the network E. Using hubs can increase the amount of bandwidth available to hosts F. None of the above |
Answer: D
Explanation: The biggest benefit of using switches instead of hubs in your internetwork is that each switch port is actually its own collision domain. (Conversely, a hub creates one large collision domain.) But even armed with a switch, you still can't break up broadcast domains. Neither switches nor bridges will do that. They'll typically simply forward all broadcasts instead. Switch creates the collision domain per port, so we can say switch increase the number of collision domains. |
|
|
Which one of the following characteristics is true regarding the use of hubs and
switches? A. Hubs can have their ports be configured with VLANs B. Using hubs is costly with regard to bandwidth availability. C. Switches can not forward broadcasts. D. Switches are more efficient than hubs in processing frames. E. Switches increase the number of collision domains in the network. |
Answer: E
Explanation: Switches increases the number of collisions domains in the network. Switches that are configured with VLANs will reduce the size of the collision domains by increasing the number of collision domains in a network, but making them smaller than that of one big, flat network. |
Incorrect Answers:
A. Switches are capable of VLAN configurations, but hubs are not. B. Hubs are generally the least costly method possible to connect multiple devices together in a network. C. Switches forward broadcasts and multicasts, by default, to all ports within the same VLAN. Only routers block all broadcast traffic by default. D. Switches and hubs can be equally efficient in processing frames, in theory. In practice, switches are generally more efficient as they usually have more CPU and memory allocated to them, and are generally much more expensive than a simple hub. |
|
When comparing and contrasting the similarities and differences between bridges
and switches, which of the following are valid statements? Choose all the valid answer choices) A. Bridges are faster than switches because they have fewer ports. B. A switch is a multiport bridge, C. Bridges and switches learn MAC addresses by examining the source MAC address of each frame received. D. A bridge will forward a broadcast but a switch will not. E. Bridges and switches increase the size of a collision domain. F. None of the above statements are true. |
Answer: B, C
Explanation: Both bridges and switches build the bridge table by listening to incoming frames and examining the source MAC address in the frame. Switches are multiport bridges that allow you to create multiple broadcast domains. Each broadcast domain is like a distinct virtual bridge within a switch. |
Incorrect Answers:
A. Switches are generally faster than bridges. Bridges also do not necessarily have fewer ports than switches. D. Both bridges and switches will forward broadcast and multicast traffic, assuming that the traffic remains in the same VLAN. E. The use of VLANs in a switch can decrease the size of the collision domain, by creating additional, smaller collision domains. |
|
Which of the following correctly describe the various functions and virtues of a
router? (Select all valid answer choices) A. Packet switching B. Collision prevention on a LAN segment. C. Packet filtering D. Broadcast domain enlargement E. Broadcast forwarding F. Internetwork communication G. None of the above |
Answer: A, C, F
Explanation: The main function of a router is to connect different, separated networks together. In doing so, switching packets from one network to another is a primary function, along with providing for communication between networks. As an additional feature, routers are capable of providing filtering on a network address and application port level, so choice C is also correct. |
Incorrect Answers:
B. Routers can indeed be used to segment a network separate a collision domain, since routers do not forward LAN broadcasts and multicasts to other interfaces. However, routers alone can not prevent all collisions from occurring on any given LAN segment. D. Routers actually segment LANs into smaller broadcast domains. E. Routers do not forward broadcast and multicast traffic out the additional interfaces by default. Unless bridging or IP helpers are configured on the router, LAN broadcasts are blocked at the router level. |
|
The LAN needs are expanding at the Certkiller corporate office, which is quickly
growing. You are instructed to enlarge the area covered by a single LAN segment on the Certkiller network. Which of the following are layer 1 devices that you can use? (Choose all that apply.) A. A switch B. A router C. A network adapter card D. A hub E. A repeater |
Answer: D, E
Explanation: A hub simply repeats the electrical signal and makes no attempt to interpret the electrical signal (layer 1) as a LAN frame (Layer 2). So, a hub actually performs OSI layer 1 functions, repeating an electrical signal, whereas a switch performs OSI layer 2 functions, actually interpreting Ethernet header information, particularly addresses, to make forwarding decisions. Hubs can be used to increase the number of stations that can be supported on a LAN. Because the repeater does not interpret what the bits mean, but does examine and generate electrical signals, a repeater is considered to operate at Layer 1. Repeaters can be used to physically extend the LAN to greater distances. |
|
|
Cisco is the leader in the router market space. What basic functions do their routers
perform in a network? (Choose two) A. The microsegmentation of broadcast domains B. Path selection C. Packet switching D. Bridging between LAN segments E. Access layer security F. VLAN membership assignment G. Application optimization |
Answer: B, C
Explanation: The primary functions of a router are: Packet Switching and Path Selection. It is the routers job to determine the best method for delivering the data, and switching that data as quickly as possible. |
|
|
the following statements are true regarding bridges and switches in this network?
(Choose 3) A. Switches are primarily software based while bridges are hardware based. B. Switches usually have a higher number of ports than most bridges. C. Bridges are frequently faster than switches. D. Bridges define broadcast domains while switches define collision domains. E. Both bridges and switches forward Layer 2 broadcasts. F. Both bridges and switches make forwarding decisions based on Layer 2 addresses. |
Answer: B, E, F
|
|
|
As a network administrator, you will need to decide on the appropriate network devices to use. Which of the following correctly describes the roles of devices in a
WAN? (Choose three) A. A CSU/DSU terminates a digital local loop. B. A router is commonly considered a DCE device. C. A modem terminates an analog local loop. D. A router is commonly considered a DTE device. E. A modem terminates a digital local loop. F. A CSU/DSU terminates an analog local loop. G. A modem is used to terminate a T1 |
Answer: A, C, D
Explanation: Layer 2 switching is considered hardware-based bridging because it uses specialized hardware called an application-specific integrated circuit (ASIC). ASICs can run up to gigabit speeds with very low latency rates. Switches usually have higher port number then bridge. Generally bridges have two ports. Both operates on Data link layer. |
|
|
The Certkiller network administrator needs to determine what LAN devices to
install on the Certkiller network. What are two advantages of using Layer 2 Ethernet switches over hubs? (Choose two) A. Allowing simultaneous frame transmissions B. Increasing the size of broadcast domains C. Increasing the maximum length of UTP cabling between devices D. Filtering frames based on MAC addresses E. Decreasing the number of collision domains |
Answer: A, D
Explanation: A: A half duplex connection is where only one device can send or receive at a time. A full duplex connection is where both devices can send and receive at the same time. Thus, if you have a 100Mb half-duplex connection, only sending at 100Mb OR receiving at 100Mb can happen at the same time. If you have a 100Mb full duplex connection, you can effectively get 200Mb out of the link because you could be sending 100Mb and receiving 100Mb at the same time. D: Switches are capable of filtering frames based on any Layer 2 fields. For example, a switch can be programmed to reject (not forward) all frames sourced from a particular network. Because link layer information often includes a reference to an upper-layer protocol, switches usually can filter on this parameter. Furthermore, filters can be helpful in dealing with unnecessary broadcast and multicast packets. |
|
|
CDP is being used throughout the Certkiller network. What are two reasons why the
Certkiller network administrator would use CDP? (Choose two) A. To determine the status of network services on a remote device B. To obtain the IP Address of a connected device in order to telnet to the device C. To verify the type of cable interconnecting two devices D. To verify Layer 2 connectivity between two devices when Layer 3 fails E. To obtain VLAN information from directly connected switches F. To determine the status of the routing protocols between directly connected routers G. To support automatic network failover during outages |
Answer: B, D
Explanation: Cisco Discovery Protocol (CDP) is a proprietary protocol designed by Cisco to help administrators collect information about both locally attached and remote devices. By using CDP, you can gather hardware and protocol information about neighbor devices, which is useful info for troubleshooting and documenting the network. You can use: Show cdp neighbor Show cdp neighbor details Commands to gather the information of connected neighbors. |
|
|
CDP is running between two Certkiller devices. What information is supplied by
CDP? (Select three) A. Device Identifiers B. Capabilities list C. Platform D. Route identifier E. Neighbor traffic data |
Answer: A, B, C
Explanation: CDP is a Cisco proprietary protocol; to support forwarding CDP messages over an interface, that interface must support SNAP headers. Any LAN interface, HDLC, Frame Relay, and ATM all support CDP. The touter or switch can discover Layer 3 addressing details of neighboring routers (without even configuring that Layer 3 protocol) because CDP is not dependent on any particular Layer 3 protocol. CDP discovers several useful details from the neighboring device: 1. Device Identifier - Typically the host name 2. Address list - Network and data link addresses 3. Port Identifier - Text that identifies the port, which is another name for an interface 4. Capabilities list - Information on what the device does - for instance, a router or a switch. 5. Platform - The model and OS level running in the device |
|
|
Two buildings on the London campus of a the Certkiller corporation must be
connected to use Ethernet with a bandwidth of at least 100 Mbps. Certkiller is concerned about possible problems from voltage potential differences between the two buildings. Which media type should be used for the connection? A. Coaxial cable B. Fiber optic cable C. UTP cable D. STP cable E. None of the above |
Answer: B
Explanation: Current Ethernet technology typically comes via either copper UTP or fiber cables. In this scenario the distance between the buildings is only 55 meters so either copper or fiber could be used, as the distance limitation for 100M UTP Ethernet is 100 meters. However, fiber would be a better fit as it is not prone to errors that could occur due to the voltage potential differences. Because fiber is a dielectric material, it's not susceptible to electrical interference. FO-product vendors also claim that fiber systems make secure communications easier. Interference immunity and lack of emissions are givens in FO systems and in the fiber medium itself. |
|
|
You work as a network technician at Certkiller .com. Please study the exhibit
carefully. Based on the information shown above, what is needed to allow host Certkiller 1 to ping host Certkiller 2? A. a crossover cable connecting the switches B. a backbone switch connecting the switches with either fiber optic or straight-through cables C. a straight-through cable connecting the switches D. a CSU/DSU connected to the switches with straight-through cables E. a router connected to the switches with straight-through cables |
Answer: E
Explanation: Routers are Layers 3 devices used for inter-network communication. In this scenario there are two different networks, so both switches need to connect to a router using straight-through cables. A straight-through cable is used to connect two different devices like, switch to router, host to switch. Since we need to insert a router for communication between the two switches, straight through cables will be used between the switches and the router. |
|
|
A new Certkiller office is opening, and a network device needs to be installed in the
place of the icon labeled Network Device to accommodate a leased line T1 to the Internet. Which network device and interface configuration meets the minimum requirements for this installation? A. A switch with two Ethernet interfaces B. A router with two Ethernet interfaces C. A switch with one Ethernet and one serial interface D. A router with one Ethernet and one serial interface E. A router with one Ethernet and one modem interface F. None of the above |
Answer: D
Explanation: Only a router can terminate a leased line T1 access circuit, and only a router can connect two different IP networks. Here, we will need a router with two interfaces, one serial connection for the T1 and one Ethernet interface to connect to the switch on the LAN. |
|
|
which layers of the OSI Model do Wide Area Networks operate in? (Choose two)
A. Physical Layer B. Datalink Layer C. Network Layer D. Session Layer E. Transport Layer F. Presentation Layer G. Application Layer |
Answer: A, B
Explanation: A WAN is a data communications network that covers a relatively broad geographic area and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower two layers of the OSI reference model: the physical layer and the data link layer as shown below. Note: Occasionally WAN's would also be considered to operate at layer 3, but since this question asked for only 2 choices layers 1 and 2 are better choices. |
|
|
While troubleshooting a connectivity problem on the network, you issue the ping
command from your PC command prompt, but the output shows "request times out." At which OSI layer is this problem associated with? A. The data link layer B. The application layer C. The access layer D. The session layer E. The network layer |
Answer: E
Explanation: TCP/IP includes ICMP, a protocol designed to help manage and control the operation of a TCP/IP network. The ICMP protocol provides a wide variety of information about a network's health and operational status. Control message is the most descriptive part of a name. ICMP helps control and manage IP's work and therefore is considered part of TCP/IP's network layer. |
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Cisco Press, ISBN 1-58720-083-X) page 277. |
|
You download a file from an FTP site on the Internet. What is the highest layer in the
OSI model used in this FTP operation? A. Application B. Presentation C. Session D. Transport E. Internet F. Data Link G. Physical |
Answer: A
Explanation: Layer 7 is the application layer, which is the highest layer in the OSI model. This layer describes the use of end user applications, such as opening movie files (avi, mpeg, etc) used Microsoft Office applications, using WWW browsers, using Telnet, and using FTP. |
|
|
A host computer has been correctly configured with a static IP address, but the
default gateway is incorrectly set. Which layer of the OSI model will be first affected by this configuration error? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 6 E. Layer 7 |
Answer: C
Explanation: IP Addressing and IP routing resides on the OSI Network layer, which is layer 3. |
|
|
Which layer of the OSI reference model is responsible for ensuring reliable
end-to-end delivery of data? A. Application B. Presentation C. Session D. Transport E. Network F. Data-Link |
Answer: D
Explanation: A key function of the transport layer is to provide connection services for the protocols and applications that run at the levels above it. These can be categorized as either connection-oriented services or connectionless services. Some protocol suites, such as TCP/IP, provide both a connection-oriented and a connectionless transport layer protocol, to suit the needs of different applications. The transport layer is also the place in the layer stack where functions are normally included to add features to end-to-end data transport. Where network layer protocols are normally concerned with just "best effort" communications, where delivery is not guaranteed. Transport layer protocols are given intelligence in the form of algorithms that ensure that reliable and efficient communication between devices takes place. This encompasses several related jobs, including lost transmission detection and handling, and managing the rate at which data is sent to ensure that the receiving device is not overwhelmed. Transmission quality, meaning ensuring that transmissions are received as sent, is so important that some networking references define the transport layer on the basis of reliability and flow-control functions. However, not all transport layer protocols provide these services. Just as a protocol suite may have a connection-oriented and a connectionless transport layer protocol, it may also have one that provides reliability and data management services, and one that does not. Again, this is the case with TCP/IP: there is one main transport layer protocol; TCP, that includes reliability and flow control features, and a second, UDP, that doesn't. |
|
|
At which OSI layer is a logical path created between two host systems named CK1
and CK2 on the Certkiller LAN? A. Physical B. Session C. Data link D. Transport E. Network F. Application G. Presentation |
Answer: E
Explanation: The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network layer must transport traffic between devices that aren't locally attached. Routers (layer 3 devices) are specified at the Network layer and provide the routing services within an internetwork. |
|
|
Which OSI layer is associated with the following: The acknowledgement of
transmissions, sequencing, and flow control across a network? A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 5 E. Layer 6 F. Layer 7 |
Answer: C
Explanation: The Transport layer (Layer 4) defines several functions, including the choice of protocols. The most important Layer 4 functions are error recovery and flow control. The transport layer may provide for retransmission, i.e., error recovery, and may use flow control to prevent unnecessary congestion by attempting to send data at a rate that the network can accommodate, or it might not, depending on the choice of protocols. Multiplexing of incoming data for different flows to applications on the same host is also performed. Reordering of the incoming data stream when packets arrive out of order is included. Examples include: TCP, UDP, and SPX. |
|
|
Which OSI layer header contains the address of a destination host that is on another
network? A. Application B. Presentation C. Session D. Transport E. Network F. Data link G. Physical |
Answer: E
Explanation: Only network address contains this information. To transmit the packets the sender uses network address and datalink address. But the layer 2 address represents just the address of the next hop device on the way to the sender. It is changed on each hop. Network address remains the same. |
|
|
Which of the following correctly describe steps in the OSI data encapsulation
process? (Choose two) A. The presentation layer translates bits into voltages for transmission across the physical link. B. The transport layer divides a data stream into segments and adds reliability and flow control information. C. Packets are created when the network layer adds Layer 3 addresses and control information to a segment. D. The data link layer adds physical source and destination addresses and an FCS to the segment. E. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information. |
Answer: B, C
Explanation: The Transport Layer: You can think of the transport layer of the OSI model as a boundary between the upper and lower protocols. The transport layer provides a data transport service that shields the upper layers from transport implementation issues such as the reliability of a connection. The transport layer provides mechanisms for: Segmenting upper layer application The establishment, maintenance, and orderly termination of virtual circuits information flow control and reliability via TCP Transport fault detection and recovery The Network Layer: Layer three of the OSI model is the network layer. The network layer creates and sends packets from source network to destination network. it provides consistent end-to-end packet delivery service and control information it creates and uses layer3 addresses for use in path determination and to forward packets. |
Incorrect Answers:
A: This correctly describes the physical layer, not the presentation layer. D: Although the data link layer adds physical (MAC) source and destination addresses, it adds it to a frame, not a segment. E: Packets are encapsulated, not frames. |
|
When files are transferred between a host and an FTP server, the data is divided
into smaller pieces for transmission. As these pieces arrive at the destination host, they must be reassembled to reconstruct the original file. What provides for the reassembly of these pieces into the correct order? A. The sequence number in the TCP header B. The Start Frame Delimiter in the 802.3 Preamble C. The TTL in the IP header D. The acknowledgement number in the segment header E. The frame check sequence in the Ethernet frame trailer |
Answer: A
Explanation: The Transport layer can provide reliable networking via acknowledgments, sequencing, and flow control. Acknowledgments Delivered segments are acknowledged to the sender. If they are not acknowledged, the sender will retransmit. Sequencing Data segments are sequenced into their original order when they arrive at the destination. Flow Control Provides buffer controls that prevent packet flooding to the destination host. Buffers store bursts of data for processing when the transmission is complete. Layer 4 protocols include the following: Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Sequenced Packet Exchange (SPX)A reliable communications protocol created by Novell NetWare |
|
|
Network equipment supporting the use of flow control mechanisms has been recently installed in the Certkiller network. What is the purpose of flow control in a
data network? A. It ensures that data is retransmitted if an acknowledgment is not received. B. It reassembles segments in the correct order on the destination device. C. It provides a mechanism for the receiver to control the transmission speed. D. It regulates the size of each datagram segment. E. All of the above are functions of flow control |
Answer: C
Explanation: Flow control paces the transmission of data between a sending device and a receiving device. Flow control ensures that the receiving device can absorb the data sent to it before the sending device sends more. When the buffers on the receiving device are full, a message is sent to the sending device to suspend transmission until the data in the buffers has been processed. |
Incorrect Answers:
A. Data retransmission mechanisms are not handled by control. They are most often handled by transport layer protocols such as TCP. B. This describes the reassembly portion of the segmentation and reassembly (SAR) function of network equipment. D. The maximum transmission unit (MTU) handles the regulation of maximum frame sizes. |
|
You have just installed a new web server on the Certkiller network. You are required
to ensure that the web server is accessible from the Internet. The network uses private addressing, so an IP-to-registered address mapping is required. To do this, you enter the following command: Certkiller (config)# ip nat inside source static 192.168.2.1 198.18.1.254 You unsuccessfully try to ping the Internet from a PC host on the LAN. During the troubleshooting process, you enter the "show ip nat translations" command but the output is blank. What is the most likely cause of the problem? A. The keyword overload is missing from the command. B. The NAT pool must be defined first. C. An access list must be defined to create static NAT translations. D. The interfaces must be configured for NAT. E. None of the above |
Answer: D
Explanation: In order to successfully configure a static NAT translation, the interfaces must be configured for NAT, in addition to the global NAT command that was entered. The router interface that lies on the inside part of the network must be defined using the "ip nat inside" command. Similarly, the WAN interface that is being used for the Internet connection must be defined using the "ip nat outside" command. |
Incorrect Answers:
A. In order to make an internal server reachable from the Internet, a static one to one NAT entry must be configured for the server. The keyword "overload" is used to configure many to one NAT, or PAT. B, C. This need not be done in order to create a static NAT entry. These steps are typically done in setting up NAT so that inside LAN users can access the Internet via NAT. |
|
Which protocol below uses TCP port 443 at layer 4?
A. HTML B. HTTPS C. TFTP D. Telnet E. SMTP F. None of the above |
Answer: B
Explanation: HTTPS is the secured version of the HTTP application, which normally uses 128 bit SSL encryption to secure the information sent and received on a web page. An example is a banking web site, or a trustworthy shopping web site that takes credit card information. It is an application layer protocol which uses TCP port 443. |
Incorrect Answers:
A. HTML is not a protocol. C. TFTP uses UDP port 69. D. Telnet uses TCP port 23. E. SMTP uses TCP port 25. |
|
As a CCNA candidate, you will be expected to know the OSI model very well.
Which of the following are associated with the application layer (layer 7) of the OSI model? (Choose two) A. TCP B. Telnet C. FTP D. Ping E. IP F. UDP |
Answer: B, C
Explanation: The application layer is the top layer of the OSI model and is used to describe the end user applications that can be used over a network. Layer Name Examples Application (layer 7) Telnet, HTTP, FTP, WWW browsers, NFS, SMTP gateways, SNMP |
Incorrect Answers:
A. TCP resides at layer 4. D. ARP is a function of the data link layer, which is layer 2. E. IP is used at layer 3 (network layer). Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Cisco Press, ISBN 1-58720-094-5) Page 34. |
|
As the Certkiller network administrator, you are required to have a firm
understanding of the OSI model. Why does the data communication industry use the layered OSI reference model? (Choose two) A. It enables equipment from different vendors to use the same electronic components, thus saving research and development funds B. It encourages industry standardization by defining what functions occur at each layer of the model C. It divides the network communication process into smaller and simpler components; thus aiding component development, design and troubleshooting D. It provides a means by which changes in functionality in one layer require changes in other layers E. It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers |
Answer: B, C
Explanation: The OSI (Open System Interconnection) reference model was created as a reference point for communications devices. A layered approach is used to segment the entire telecommunications process into a series of smaller steps. A is correct because it encourages a level of standardization by encouraging that functions be compared to known layers. D is also correct because it allows engineers to focus on the development, refining, and perfection of simpler components. |
|
|
You need to describe the various types of flow control to your co-workers. Which of
the following are types of flow control that can be used in a network? (Choose three) A. Congestion avoidance B. Windowing C. Cut-through D. Buffering E. Load Balancing F. Fast Forward |
Answer: A, B, D
|
|
|
Which of the protocols below use TCP at the transport layer? (Select four)
A. TFTP B. SMTP C. SNMP D. FTP E. HTTP F. HTTPS |
Answer: B, D, E, F
Explanation: SMTP (Simple Mail Transfer Profile for email), FTP (File Transfer Protocol), and HTTP/HTTPS (Hyper Text Transfer Protocol for internet) all use TCP because of the reliable delivery mechanism. SMTP uses TCP port 25, FTP uses TCP ports 20 and 21, HTTP uses TCP port 80, and HTTPS uses TCP port 443. |
Incorrect Answers:
A, C: SNMP and TFTP use UDP as the transport mechanism. Generally speaking, protocols that use the keywords "trivial" or "simple" uses UDP, since connectionless, best effort delivery mechanism usually suffice. Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Cisco Press, ISBN 1-58720-094-5) Page 163. |
|
Which fields are included in the TCP header? (Choose three).
A. Source Port B. Acknowledgement Number C. Request Number D. Destination Address E. Window F. Data |
Answer: A, B, E
Explanation: TCP header: Source Port: 16 bits. Destination Port: 16 bits. Sequence Number: 32 bits. The sequence number of the first data byte in this segment. If the SYN bit is set, the sequence number is the initial sequence number and the first data byte is initial sequence number + 1. Acknowledgment Number: 32 bits. If the ACK bit is set, this field contains the value of the next sequence number the sender of the segment is expecting to receive. Once a connection is established this is always sent. Data Offset: 4 bits. The number of 32-bit words in the TCP header. This indicates where the data begins. The length of the TCP header is always a multiple of 32 bits. Reserved: 3 bits. Must be cleared to zero. ECN, Explicit Congestion Notification: 3 bits. Added in RFC 3168. Control Bits: 6 bits. Window: 16 bits, unsigned. The number of data bytes beginning with the one indicated in the acknowledgment field which the sender of this segment is willing to accept. Checksum: 16 bits. This is computed as the 16-bit one's complement of the one's complement sum of a pseudo header of information from the IP header, the TCP header, and the data, padded as needed with zero bytes at the end to make a multiple of two bytes. Urgent Pointer: 16 bits, unsigned. If the URG bit is set, this field points to the sequence number of the last byte in a sequence of urgent data. Options: 0 to 44 bytes. Options occupy space at the end of the TCP header. All options are included in the checksum. An option may begin on any byte boundary. The TCP header must be padded with zeros to make the header length a multiple of 32 bits. Data: Variable length. |
|
|
Acknowledgements, sequencing, and flow control are functions that are handled by
which layer of the OSI model? A. Layer 5 B. Layer 4 C. Layer 7 D. Layer 6 E. Layer 3 F. Layer 2 G. Layer 1 |
Answer: B
|
|
|
A receiving host has failed to receive all of the segments that it should acknowledge.
What can the host do to improve the reliability of this communication session? A. Start a new session using UDP B. Obtain a new IP address from the DHCP server C. Use a different source port for the session D. Decrease the sequence number E. Decrease the window size |
Answer: E
Explanation: A TCP window the amount of outstanding (unacknowledged by the recipient) data a sender can send on a particular connection before it gets an acknowledgment back from the receiver that it has gotten some of it. For example if a pair of hosts are talking over a TCP connection that has a TCP window size of 64 KB (kilobytes), the sender can only send 64 KB of data and then it must stop and wait for an acknowledgment from the receiver that some or all of the data has been received. If the receiver acknowledges that all the data has been received then the sender is free to send another 64 KB. One way to improve the reliability of the TCP connection is to reduce the window size that the receiver needs to receive before sending an acknowledgement. However, this will reduce throughput as more segments and acknowledgements will need to be sent in order to transfer the same amount of data. |
|
|
You have set up an Internet based FTP server, where people can upload and
download files. In terms of the OSI model, what is the highest layer used during the FTP sessions. A. Application B. Presentation C. Session D. Transport E. Internet F. Data Link G. Physical |
Answer: A
Explanation: The application layer is the highest layer (layer 7) of the OSI model, and is reserved for end user applications. Since FTP is itself an application, layer 7 is the highest layer used. |
Incorrect Answers:
B, C, D, E, F, G. In any given FTP session, all of these layers will be used at some point but they are incorrect because the question asked for the highest layer used by FTP. |
|
ICMP is often used in troubleshooting and verifying network. What statements are
true regarding ICMP packets? (Choose two) A. They acknowledge receipt of TCP segments. B. They guarantee datagram delivery. C. They can provide hosts with information about network problems. D. They are encapsulated within IP datagrams. E. They are encapsulated within UDP datagrams. F. They are encapsulated within TCP datagrams. |
Answer: C, D
Explanation: ping may be used to find out whether the local machines are connected to the network or whether a remote site is reachable. This tool is a common network tool for determining the network connectivity which uses ICMP protocol instead of TCP/IP and UDP/IP. This protocol is usually associated with the network management tools which provide network information to network administrators, such as ping and traceroute (the later also uses the UDP/IP protocol). ICMP is quite different from the TCP/IP and UDP/IP protocols. No source and destination ports are included in its packets. Therefore, usual packet-filtering rules for TCP/IP and UDP/IP are not applicable. Fortunately, a special "signature" known as the packet's Message type is included for denoting the purposes of the ICMP packet. Most commonly used message types are namely, 0, 3, 4, 5, 8, 11, and 12 which represent echo reply, destination unreachable, source quench, redirect, echo request, time exceeded, and parameter problem respectively. In the ping service, after receiving the ICMP "echo request" packet from the source location, the destination |
Incorrect Answers
ICMP is an IP protocol so A and E are incorrect. ICMP doesn't guarantee datagram delivery so B is wrong as well. |
|
Which of the following services use TCP? (Choose three)
A. DHCP B. SMTP C. SNMP D. FTP E. HTTP F. TFTP |
Answer: B, D, E
Explanation: TCP (Transmission Control Protocol) is a reliable mechanism for data delivery. SMTP, FTP and HTTP services use TCP via ports 25, 20/21, and 80, respectively. |
|
|
Which of the following are types of flow control? (Choose three)
A. Buffering B. Cut-through C. Windowing D. Congestion avoidance E. Load balancing |
Explanation:
Data transmission flow control occurs at layer 4 with the help of buffering, windowing and congestion avoidance. |
Reference: CCNA Cisco Certified Network Associate Study Guide, 5th Edition, Todd
Lammle, chapter 1, page 17. |
|
Which Layer 4 protocol is used for a Telnet connection between two Certkiller
routers? A. IP B. ICMP C. DNS D. TCP E. UDP F. RTP |
Answer: D
Explanation: TCP is a reliable connection-oriented protocol. TCP uses acknowledgments, sequencing, and flow control to ensure reliability. Telnet uses TCP port 23. |
|
|
FTP, Telnet, DNS, and SMTP are all protocols being used in the Certkiller network.
Of these, which uses both TCP and UDP ports? A. Telnet B. FTP C. DNS D. SMTP E. None of the above |
Answer: C
Explanation: The following port numbers for the protocols listed above are as follows: FTP: TCP Port 20 and 21 SMTP: TCP Port 25 Telnet: TCP Port 23 DNS: both TCP and UDP Port 53 |
|
|
Although TCP segments are similar to UDP segments, TCP packets contains some
additional fields. Which of the following are found in a TCP header, but not in a UDP header? (Choose three) A. Checksum B. Sequence number C. Destination port D. Window size E. Acknowledgment number F. Source port |
Answer: B, D, E
Explanation: The Figure below illustrates the fields and overall format of a TCP packet. Twelve fields comprise a TCP packet. TCP Packet Field Descriptions The following descriptions summarize the TCP packet fields illustrated in Figure 30-10: 1. Source Port and Destination Port-Identifies points at which upper-layer source and destination processes receive TCP services. 2. Sequence Number-Usually specifies the number assigned to the first byte of data in the current message. In the connection-establishment phase, this field also can be used to identify an initial sequence number to be used in an upcoming transmission. 3. Acknowledgment Number-Contains the sequence number of the next byte of data the sender of the packet expects to receive. 4. Data Offset-Indicates the number of 32-bit words in the TCP header. 5. Reserved-Remains reserved for future use. 6. Flags-Carries a variety of control information, including the SYN and ACK bits used for connection establishment, and the FIN bit used for connection termination. 7. Window-Specifies the size of the sender's receive window (that is, the buffer space available for incoming data). 8. Checksum-Indicates whether the header was damaged in transit. 9. Urgent Pointer-Points to the first urgent data byte in the packet. 10. Options-Specifies various TCP options. 11. Data-Contains upper-layer information. User Datagram Protocol (UDP) The User Datagram Protocol (UDP) is a connectionless transport-layer protocol (Layer 4) that belongs to the Internet protocol family. UDP is basically an interface between IP and upper-layer processes. UDP protocol ports distinguish multiple applications running on a single device from one another. Unlike the TCP, UDP adds no reliability, flow-control, or error-recovery functions to IP. Because of UDP's simplicity, UDP headers contain fewer bytes and consume less network overhead than TCP. UDP is useful in situations where the reliability mechanisms of TCP are not necessary, such as in cases where a higher-layer protocol might provide error and flow control. UDP is the transport protocol for several well-known application-layer protocols, including Network File System (NFS), Simple Network Management Protocol (SNMP), Domain Name System (DNS), and Trivial File Transfer Protocol (TFTP). The UDP packet format contains four fields, as shown in the figure below. These include source and destination ports, length, and checksum fields. A UDP packet consists of four fields. Source and destination ports contain the 16-bit UDP protocol port numbers used to demultiplex datagrams for receiving application-layer processes. A length field specifies the length of the UDP header and data. Checksum provides an (optional) integrity check on the UDP header and data. |
Reference: http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/ip.htm#xtocid21
|
|
Certkiller is installing IP phones in a new office. The phones and office computers
connect to the same device. To ensure maximum throughout for the phone data sessions, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers and what technology should be implemented on this device? (Choose two) A. VLAN B. Subinterface C. STP D. Hub E. Switch F. Router G. Wireless Access Point H. VTP |
Answer: A, E
|
|
|
The corporate head office of Certkiller has a teleconferencing system that uses VOIP
640-802 Actualtests.com - The Power of Knowing (voice over IP) technology. This system uses UDP as the transport for the data transmissions. If these UDP datagrams arrive at their destination out of sequence, what will happen? A. UDP will send an ICMP Information Request to the source host. B. UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive. C. UDP will drop the datagrams. D. UDP will use the sequence numbers in the datagram headers to reassemble the data in the correct order. E. UDP will not acknowledge the datagrams and wait for a retransmission of the datagrams. |
Answer: B
Explanation: VOIP systems utilize UDP because it is faster and uses less overhead. In addition, the reliable transport mechanism used in TCP is useless to VOIP because if a packet gets dropped and needs to be resent, it will be already too late. UDP provides a service for applications to exchange messages. Unlike TCP, UDP is connectionless and provides no reliability, no windowing, and no reordering of the received data. However, UDP provides some functions of TCP , such as data transfer, segmentation, and multiplexing using port numbers, and it does so with fewer bytes of overhead and with less processing required. UDP data transfer differs from TCP data transfer in that no reordering or recovery is accomplished. Applications that use UDP are tolerant of lost data, or they have some application mechanism to recover data loss. |
Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Cisco Press,
ISBN 1-58720-094-5) Page 161. |
|
Which IOS user EXEC command will allow a network technician to determine
which router in the path to an unreachable network host should be examined more closely for the cause of the network failure? A. Certkiller B> telnet B. Certkiller B > ping C. Certkiller B > trace D. Certkiller B > show ip route E. Certkiller B > show interface F. Certkiller B > show cdp neighbors |
Answer: C
Explanation: This can perform the trace command. It sends the ping packets to each of the routers on the way to the receiver. The router which doesn't respond will be a potential failure place in this network. |
|
|
You are logged into a router and wish to view the layer 3 information about your
neighboring Cisco routers. What IOS command gives layer 3 information for of the directly connected router interfaces? A. show ip links B. show cdp neighbor C. show cdp neighbor detail D. show ip clients E. show ip route F. None of the above |
Answer: C
Explanation: To display detailed information about neighboring devices discovered using Cisco Discovery Protocol (CDP), use the show cdp neighbors privileged EXEC command. Detail - (Optional) Displays detailed information about a neighbor (or neighbors) including network address, enabled protocols, hold time, and software version. |
Incorrect Answers:
A, D. These are invalid commands. B. The "show cdp neighbor" command, without the "detail" keyword will not display the additional layer 3 protocol information. E. This will show all routes from all other routers within the domain. We wish to see information from just the direct interface neighbors. |
|
A Certkiller technician is troubleshooting connectivity problems between two
routers that are directly connected through the serial line. The technician notices that the serial line is up but cannot see any neighbors displayed in the output of the show cdp neighbors command. In which OSI layer is the problem most likely occurring? A. Physical B. Data link C. Network layer D. Transport layer E. Application layer |
Answer: B
Explanation: As the question states that serial line is up, it means the problem is not on the Network layer. The administrator cannot see any output by issuing the show cdp neighbors command. It means that CDP is disabled and CDP is a protocol that runs over Layer2 (the data link layer) on all Cisco routers, bridges, access servers, and switches. |
|
|
While troubleshooting a network connectivity problem, a Certkiller technician
observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message "Request timed out." is displayed. At which layer of the 7-layer OSI model does the problem most likely exist? A. The data link layer B. The application layer C. The protocol layer D. The access layer E. The session layer F. The network layer G. None of the above |
Answer: F
Explanation: Network Layer: The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network layer must transport traffic between devices that aren't locally attached. Routers (layer 3 devices) are specified at the Network layer and provide the routing services within an internetwork. Request Time out, Destination Unreachable etc error comes from Network Layer problem. |
|
|
Which line from the output of the show ip interface command indicates that there is
a Layer 1 problem? A. Serial0/1 is up, line protocol is down B. Serial0/1 is down, line protocol is down C. Serial0/1 is up, line protocol is up D. Serial0/1 is administratively down, line protocol is down E. None of the above |
Answer: B
Explanation: When the physical interface itself is down, then the problem is related to layer 1. When it is up, but the line protocol is down, then the problem is related to layer 2. |
Reference: http://www.cisco.com/univercd/cc/td/doc/cisintwk/itg_v1/tr1915.htm
|
|
At which layer of the OSI model does the protocol that provides the information
displayed by the "show cdp neighbors" command operate? A. Transport B. Physical C. Application D. Data link E. Network |
Answer: D
Explanation: CDP is a device discovery protocol that runs over Layer 2 (the data link layer) on all Cisco-manufactured devices (routers, bridges, access servers, and switches) and allows network management applications to discover Cisco devices that are neighbors of already known devices. With CDP, network management applications can learn the device type and the Simple Network Management Protocol (SNMP) agent address of neighboring devices running lower-layer, transparent protocols. |
|
|
Which three of the protocols below belong to the application layer? (Select three
answer choices) A. ARP B. HTTPS C. SMTP D. CDP E. TFTP F. ICMP |
Answer: B, C, E
Explanation: The application layer is the highest OSI layer, and protocols at this layer are end-user oriented. HTTPS so people can get information on the internet, SMTP so people can manage networks, and TFTP so people can download files. Incorrect Answers: A, D, F. ARP, CDP, ICMP are protocols that equipment like routers and switches use to communicate with themselves, and belong to lower levels on the model. |
|
|
You want to upgrade the Certkiller LAN so that all ports operate in full duplex
mode. Which statement is true about full-duplex Ethernet when comparing to half-duplex Ethernet? A. Full-duplex Ethernet consists of a shared cable segment. Half-duplex provides a point-to-point link B. Full-duplex Ethernet uses two wires to send and receive. Half-duplex Ethernet uses one wire to send and receive C. Full-duplex Ethernet can provide higher throughput than can half-duplex Ethernet of the same bandwidth D. Full-duplex Ethernet uses a loopback circuit to detect collisions. Half-duplex Ethernet uses a jam signal E. None of the above |
Answer: C
Explanation: Full-duplex Ethernet uses two pairs of wires instead of one wire pair like half duplex. And full duplex uses a point-to-point connection between the transmitter of the transmitting device and the receiver of the receiving device. This means that with full-duplex data transfer, you get a faster data transfer compared to half duplex. |
|
|
What are two characteristics of "store and forward" switching? (Select two answer
choices) A. Latency fluctuates regardless of frame size. B. The switch receives the complete frame before beginning to forward it. C. Latency through the switch varies with frame length. D. The switch checks the destination address upon receipt of headers. |
Answer: B, C
Explanation: With store-and-forward, the entire frame is received by the switch before the first bit of the frame is forwarded. As soon as the incoming switch port receives enough of the frame to see the destination MAC address, the forwarding decision is made and the frame is transmitted out the appropriate outgoing port to the destination device. So, each frame might experience slightly less latency. Store and forward switching may add latency when compared to other switching methods such as cut through, but it can reduce the amount of errors that become forwarded through a network. |
Reference:
CCNA Self-Study CCNA INTRO exam certification Guide (Cisco Press, ISBN 1-58720-094-5) Page 243 Incorrect Answers: A. The amount of latency that is introduced with this method of switching is dependent on the size of the frame, as the switch must wait to receive the entire frame before sending it. D. The switch must wait for the entire frame before forwarding it on, and not just the headers. |
|
Split horizon has been enabled within the Certkiller routed network. Which one of
the following statements best explains the split horizon rule? A. Only routers can split boundaries (horizons) between networks in separate AS numbers. B. Each AS must keep routing tables converged to prevent dead routes from being advertised across boundaries. C. Once a route is received on an interface, advertise that route as unreachable back out the same interface. D. Information about a route should never be sent back in the direction from which the original update came. E. None of the above |
Answer: D
Explanation: The split horizon rule states: * Never advertise a route out of the interface through which you learned it. For instance, in Figure 4a below, if Router One is connected to Routers Two and Three through a single multipoint interface (such as Frame Relay), and Router One learned about Network A from Router Two, it will not advertise the route to Network A back out the same interface to Router Three. Router one assumes that Router Three would learn about Network A directly from Router Two. Incorrect Answers: A: There is no such requirement B: Distance vector protocols updates routing table at regular intervals instead of Topology changes C: This is the definition of the poison reverse rule, not the split horizon rule. |
Reference: Wendell Odom. CISCO CCNA Certification Guide (2000 Press) Page 369.
|
|
Which of the following commands would be applied to a WAN interface, but not on
LAN Interface? (Choose all that apply) A. IP address B. encapsulation PPP C. no shutdown D. authentication CHAP E. Speed F. None of the above |
Answer: B, D
Explanation: PPP encapsulation can be used in ISDN interfaces, Asynchronous serial interfaces, and point to point serial WAN connections. PPP is not an option for LAN interfaces. CHAP authentication is a PPP 3 way authentication method. CHAP authentication can only be used on PPP encapsulated interfaces and is not a LAN interface configuration option. |
Incorrect Answers:
A, C. This command can be applied to both LAN and WAN interface types. E. The speed command is used on LAN interfaces, and is not used on WAN interface types. |
|
What kind of cable should be used to establish a trunked line between two Catalyst
switches? A. A straight-through cable B. An EIA/TIA-232 serial cable C. An auxiliary cable D. A modem cable E. A cross-over cable |
Answer: E
Explanation: A crossover cable is used to connect two of the same device types, or devices from the same OSI layer. |
|
|
Assuming you build networks to exact specifications, what is the recommended
maximum length a 10BaseT cable can be before it has to be segmented or repeated? A. 100 meters B. 100 feet C. 100 yards D. 200 meters E. None of the above |
Answer: A
Explanation: The distance standards are in meters and 10BaseT has a distance restriction of 100 meters. If you go further then that, you compromise data integrity. 10BastT is the predominant cable type used in Ethernet networks. |
|
|
statement is true about full-duplex Ethernet in comparison to half-duplex Ethernet?
A. Full-duplex Ethernet uses two wires to send and receive. Half-duplex Ethernet uses one wire to send and receive B. Full-duplex Ethernet consists of a shared cable segment. Half-duplex Ethernet provides a point-to-point link C. Full-duplex Ethernet can provide higher throughout than can half-duplex Ethernet of the same bandwidth D. Full-duplex Ethernet uses a loopback circuit to detect collisions. Half-duplex ethernet uses a jam signal E. None of the above |
Answer: C
|
|
|
A network administrator wants to control which user hosts can access the network
based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch? A. BPDU B. Port security C. RSTP D. STP E. VTP F. Blocking mode |
Answer: B
Explanation: UnderstandingHow PortSecurity Works: You can use port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different from any of the MAC addresses specified for that port. Alternatively, you can use port security to filter traffic destined to or received from a specific host based on the host MAC address. When a secure port receives a packet, the source MAC address of the packet is compared to the list of secure source addresses that were manually configured or autoconfigured (learned) on the port. If a MAC address of a device attached to the port differs from the list of secure addresses, the port either shuts down permanently (default mode), shuts down for the time you have specified, or drops incoming packets from the insecure host. The port's behavior depends on how you configure it to respond to a security violation. If a security violation occurs, the Link LED for that port turns orange, and a link-down trap is sent to the Simple Network Management Protocol (SNMP) manager. An SNMP trap is not sent if you configure the port for restrictive violation mode. A trap is sent only if you configure the port to shut down during a security violation. |
Reference:
http://www.cisco.com/en/US/products/hw/switches/ps700/products_configuration_guide_chapter09186a008007 f |
|
What is the IEEE standard associated with Gigabit Ethernet? (Select two answer
choices) A. 802.11 B. 802.5 C. 802.3ab D. 802.3ae E. 802.3z F. 802.3u |
Answer: C, E
Explanation: The IEEE 802.3z standard describes 1000BASE-SX. The 1000BaseT standard was released in June 1999, defined by IEEE 802.3ab. Incorrect Answers: A. This describes the standard used for wireless networks. B. This is the standard for token ring networks. D. On June 17, 2002 the IEEE 802.3ae specification for 10 Gigabit Ethernet was approved as an IEEE standard by the IEEE Standards Association (IEEE-SA) Standards Board. F. IEEE 802.3u describes the standard for 100BASE-TX. |
|
|
Which of the following can lead to the contribution of LAN traffic congestion?
(Select all that apply) A. Too many hosts in a broadcast domain B. Full duplex operation C. Broadcast storms D. Multicasting E. Segmentation F. Low bandwidth |
Answer: A, C, F
Explanation: Choice A is correct because the more hosts on a broadcast domain, the more traffic that is created. Choice Ccontributes to congestion because broadcast storms can become very problematic, and lead to complete network saturation. Multicasts are similar to broadcasts in their use on a LAN. Finally, if there is not enough bandwidth, traffic sessions can time out. This leads to new transmissions and the re-sending of data, which can lead to more congestion. Incorrect Answers: B, E. These are incorrect because full duplex operation and segmented networks actually result in less congestion. D. Multicasting can actually alleviate congestion issues, as single streams of information can reach multiple hosts at the same time, instead of using a series of point to point connections. |
|
|
On a half-duplex Ethernet LAN, two hosts attempt to send data simultaneously,
resulting in a collision. Following this collision, what will the hosts do? (Select all valid answers) A. The destination host sends a request to the source for retransmission. B. The jam signal indicates that the collision has been cleared. C. The hosts will attempt to resume transmission after a time delay has expired. D. An electrical pulse indicates that the collision has cleared. E. The router on the segment will signal that the collision has cleared. F. The hosts will do nothing, as the higher layers are responsible for data error correction and re-transmission. |
Answer: C
Explanation: When a host on an Ethernet LAN has information to send, the following steps are taken: 1. A device with a frame to send listens until Ethernet is not busy. 2. When the Ethernet is not busy, the sender begins sending the frame. 3. The sender listens to make sure that no collision occurred. 4. Once the senders hear the collision, they each send a jamming signal, to ensure that all stations recognize the collision. 5. After the jamming is complete, each sender randomizes a timer and waits that long. 6. When each timer expires, the process starts over with step 1. |
|
|
Which of the following statements correctly describe the differences between
half-duplex and full-duplex Ethernet? (Select two answer choices.) A. Full-duplex Ethernet uses CSMA/CD to prevent collisions. B. Half-duplex Ethernet uses a loopback circuit to detect collisions. C. A full-duplex Ethernet card allows 20Mbps for data transmission. D. Full-duplex Ethernet makes use of two pairs of wires for data. E. An Ethernet hub can operate both half and full duplex simultaneously. |
Answer: B, D
Explanation: Half-duplex Ethernet send and receives on the same line, so a loopback needs to be set to detect collisions. Alternatively, full-duple Ethernet doesn't have to because it uses two pairs of wire, one to send and the other to receive. Collisions are not possible on full duplex Ethernet networks. |
Incorrect Answers:
A. Full duplex uses both pairs of wires, so transmissions are sent on the first pair, and data that is received come in on the other pair. This prevents collisions. C. Full duplex allows for data to be sent and received at the same time. It will not double the amount of bandwidth at any given time. The speed of the Ethernet link will remain at 10/100. E. Hubs are shared devices and can only support one mode, unlike switches. |
|
Why is full-duplex Ethernet superior to its single-duplex counterpart? (Select two
answer choices.) A. It uses inexpensive hubs B. It operates without collisions C. It operates on switches D. It provides faster data transfer E. It utilizes fewer wiring pairs |
Answer: B, D
Explanation: Full duplex Ethernet allows concurrent sending and receiving, which allows the full bandwidth to be used for both sending and receiving. The result is a collision free network with increased throughput. |
Incorrect Answers:
A, C. These are incorrect because full duplex doesn't require hubs or switches. Full duplex operation can be used on switch and router ports, as well as PC hosts. E. This is incorrect because full duplex actually uses more wiring pairs. In full duplex, both wire pairs are used. Half duplex uses only a single pair. |
|
When you compare the differences between half-duplex and full-duplex Ethernet,
which of the following characteristics are exclusive to half-duplex? (Select two answer choices) A. Half-duplex Ethernet operates in a shared collision domain. B. Half-duplex Ethernet operates in an exclusive broadcast domain. C. Half-duplex Ethernet has efficient throughput. D. Half-duplex Ethernet has lower effective throughput. E. Half-duplex Ethernet operates in an exclusive collision domain. |
Answer: A, D
Explanation: A single device could not be sending a frame and receiving a frame at the same time because it would mean that a collision was occurring. So, devices simply chose not to send a frame while receiving a frame. That logic is called half-duplex logic. Ethernet switches allow multiple frames to be sent over different ports at the same time. Additionally, if only one device is connected to a switch port, there is never a possibility that a collision could occur. So, LAN switches with only one device cabled to each port of the switch allow the use of full-duplex operation. Full duplex means that an Ethernet card can send and receive concurrently. |
Incorrect Answers:
B. Full duplex effectively doubles the throughput of half-duplex operation, because data can be both sent and received at the full 10/100 speed. C, E. In half duplex operation, the network is shared between all devices in the collision domain. Reference: CCNA Self-Study CCNA INTRO exam certification Guide (Cisco Press, ISBN 1-58720-094-5) Page 62-63. |
|
Two stations on the Certkiller LAN transmit at the same time, resulting in a
collision. What happens when a collision occurs on the network? (Choose all that apply) A. Each device on the Ethernet segment stops transmitting for a short time. B. A jam signal informs all devices that a collision occurred. C. When data transmission resumes, the devices that were involved in the collision have priority to transmit. D. The devices that are involved in the collision stops transmitting for a short time. E. The collision invokes a random back-off algorithm. |
Answer: B, D, E
Explanation: When a host on an Ethernet LAN has information to send, the following steps are taken: 1. A device with a frame to send listens until Ethernet is not busy. 2. When the Ethernet is not busy, the sender begins sending the frame. 3. The sender listens to make sure that no collision occurred. 4. Once the senders hear the collision, they each send a jamming signal, to ensure that all stations recognize the collision. 5. After the jamming is complete, each sender randomizes a timer and waits that long. 6. When each timer expires, the process starts over with step 1. |
Incorrect Answers:
A. Only the stations involved in the collision stop transmitting for a short time, not all stations on the LAN. C. No priority is given to any stations once a collision has occurred. |
|
Which of the following are true of Ethernet technology?
A. Hosts use a logical ring topology. B. Hosts use a logical bus topology C. Hosts must wait for an electronic signal to transfer data. D. Hosts are directly connected to a wiring concentrator called a MSAU. E. None of the above |
Answer: B
Explanation: LAN topologies define the manner in which network devices are organized. Four common LAN topologies exist: bus, ring, star, and tree. These topologies are logical architectures, but the actual devices need not be physically organized in these configurations. Logical bus and ring topologies, for example, are commonly organized physically as a star. A bus topology is a linear LAN architecture in which transmissions from network stations propagate the length of the medium and are received by all other stations. Of the three most widely used LAN implementations, Ethernet/IEEE 802.3 networks, including 100BaseT, implement a bus topology, which is illustrated in Figure 2-3. Figure2-3: Some networks implement a local bus topology. |
Reference: http://www.pulsewan.com/lanintro.htm
|
|
With regard to Ethernet media access methods, which of the following are true?
(Choose all that apply.) A. A device waits for an electronic signal before transmitting. B. A device listens and waits until the media is not busy before transmitting. C. All devices on an Ethernet segment see data that passes on the network medium. D. Only the sender and the receiver devices see data that passes on the network medium. E. Ethernet networks allow you to configured devises with higher transmission priority. |
Answer: B, C
Explanation: Ethernet uses the CSMA/CD access method. CSMA/CD logic helps prevent collisions and also defines how to act when a collision does occur. The CSMA/CD algorithm words like this: 1. A device with a frame to send listens until the Ethernet is not busy. 2. When the Ethernet is not busy, the sender begins sending the frame. 3. The sender listens to make sure that no collision occurred. 4. Once the senders hear the collision, they each send a jamming signal, to ensure that all stations recognize the collision. 5. After the jamming is complete, each sender randomizes a timer and waits that long. 6 When each timer expires, the process starts over with Step 1. So, all devices on the Ethernet need to use CSMA/CD to avoid collisions and to recover when inadvertent collisions occur. |
Reference: Cisco CCNA intro 640-821 p.55
|
|
Which two statements describe the operation of the CSMA/CD access method,
which is in use on the Certkiller network? (Choose two) A. After a collision, the station that detected the collision has first priority to resend the lost data. B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting. C. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously. D. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the CSMA/CD access method. E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data. F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data. |
Answer: B, E
Explanation: Ethernet networking uses Carrier Sense Multiple Access with Collision Detect (CSMA/CD), a protocol that helps devices share the bandwidth evenly without having two devices transmit at the same time on the network medium. CSMA/CD was created to overcome the problem of those collisions that occur when packets are transmitted simultaneously from different nodes. And trust me, good collision management is crucial, because when a node transmits in a CSMA/CD network, all the other nodes on the network receive and examine that transmission. Only bridges and routers can effectively prevent a transmission from propagating throughout the entire network! So, how does the CSMA/CD protocol work? Like this: when a host wants to transmit over the network, it first checks for the presence of a digital signal on the wire. If all is clear (no other host is transmitting), the host will then proceed with its transmission. But it doesn't stop there. The transmitting host constantly monitors the wire to make sure no other hosts begin transmitting. If the host detects another signal on the wire, it sends out an extended jam signal that causes all nodes on the segment to stop sending data (think, busy signal). The nodes respond to that jam signal by waiting a while before attempting to transmit again. Backoff algorithms determine when the colliding stations can retransmit. If collisions keep occurring after 15 tries, the nodes attempting to transmit will then time out. |
|
|
Which three statements are true about the operation of a full-duplex Ethernet
network, which is being used in the Certkiller LAN? (Choose three) A. Ethernet hub ports are preconfigured for full-duplex mode. B. The host network card and the switch port must be capable of operating in full-duplex mode. C. There are no collisions in full-duplex mode. D. In a full-duplex environment, the host network card must check for the availability of the network media before transmitting. E. A dedicated switch port is required for each full-duplex node. |
Answer: B, C, E
Explanation: Half-duplex Ethernet is defined in the original 802.3 Ethernet and Cisco says you only use one wire pair with a digital signal running in both directions on the wire. It also uses the CSMA/CD protocol to help prevent collisions and to permit retransmitting if a collision does occur. If a hub is attached to a switch, it must operate in half-duplex mode because the end stations must be able to detect collisions. Half-duplex Ethernet-typically 10BaseT-is only about 30 to 40 percent efficient as Cisco sees it, because a large 10BaseT network will usually only give you 3- to 4Mbps-at most. Full-duplex Ethernet uses two pairs of wires, instead of one wire pair like half duplex. Also, full duplex uses a point-to-point connection between the transmitter of the transmitting device and the receiver of the receiving device, which means that with full-duplex data transfer, you get a faster data transfer compared to half duplex. And because the transmitted data is sent on a different set of wires than the received data, no collisions occur. The reason you don't need to worry about collisions is because now Full-duplex Ethernet is like a freeway with multiple lanes instead of the single-lane road provided by half duplex. Full-duplex Ethernet is supposed to offer 100 percent efficiency in both directions; this means you can get 20Mbps with a 10Mbps Ethernet running full duplex, or 200Mbps for FastEthernet. |
|
|
The Certkiller network administrator wants to use a router named CK1 to segment
the local network. What are some of the advantages of using CK1 to segment the network? (Choose two) A. Routers generally cost less than switches B. Filtering can occur based on Layer 3 information C. Broadcasts are not forwarded across the router D. Broadcasts are eliminated E. Adding a router to the network decreases latency F. Routers can generally support more LAN ports than switches |
Answer: B, C
Explanation: When the router's interface receives the broadcast, it discard the broadcast without forwarding it on to other networks. Even though routers are known for breaking up broadcast domains by default, it's important to remember that they break up collision domains as well. There are two advantages of using routers in your network: * They don't forward broadcasts by default. * They can filter the network based on layer 3 (Network layer) information (e.g., IP address) by using IOS based firewall ie. ACL Four router functions in your network can be listed as follows: * Packet switching * Packet filtering * Internetwork communication * Path selection |
|
|
Which of the following devices can the Certkiller network administrator use to
segment the LAN? (Choose all that apply) A. Hubs B. Repeaters C. Switches D. Bridges E. Routers F. Media Converters G. All of the above |
Answer: C, D, E
Explanation: Switches and bridges forward broadcast but routers do not forward broadcasts by default (they can via the "ip helper-address" command). Switches, bridges and routers can segment an Ethernet collision domain via the use of VLAN's |
Incorrect Answers:
A. Hubs is incorrect because a hub doesn't segment a network, it only allows more hosts on one. Hubs operate at layer one, and is used primarily to physically add more stations to the LAN. B. This also incorrect because the job of a repeater is to repeat a signal so it can exceed distance limitations. It also operates at layer one and provides no means for logical LAN segmentation. F. This is incorrect because media converters work by converting data from a different media type to work with the media of a LAN. It also operates at layer one and provides no means for logical LAN segmentation. |
|
The Certkiller corporate LAN consists of one large flat network. You decide to
segment this LAN into two separate networks with a router. What will be the affect of this change? A. The number of broadcast domains will be decreased. B. It will make the broadcasting of traffic between domains more efficient between segments. C. It will increase the number of collisions. D. It will prevent segment 1's broadcasts from getting to segment 2. E. It will connect segment 1's broadcasts to segment 2. |
Answer: D
Explanation A router does not forward broadcast traffic. It therefore breaks up a broadcast domain, reducing unnecessary network traffic. Broadcasts from one segment will not be seen on the other segment. |
Incorrect Answers:
A. This will actually increase the number of broadcast domains from one to two. B. All link level traffic from segment one to segment two will now need to be routed between the two interfaces of the router. Although this will reduce the traffic on the LAN links, it does also provide a less efficient transport between the segments. C. Since the network size is effectively cut into half, the number of collisions should decrease dramatically. E. Broadcasts from one segment will be completely hidden from the other segment. |
|
You want to influence the root bridge selection within the Certkiller LAN. Which
two values are used by spanning tree protocol to elect a root bridge? (Choose two.) A. Amount of RAM B. Speed of the links C. IOS Version D. MAC Address E. Bridge Priority F. IP Address G. Router ID |
Answer: D, E
Explanation: Switch having lowest bridge ID will become the root bridge. The bridge ID is how STP keeps track of all the switches in the network. It is determined by a combination of the bridge priority (32,768 by default on all Cisco switches) and the base MAC address. The bridge with the lowest bridge ID becomes the root bridge in the network. |
|
|
A Certkiller Ethernet switch receives a unicast frame with a destination MAC that
IS listed in the switch table. What will this switch do with the frame? A. The switch will forward the frame to a specific port B. The switch will forward the frame to all ports except the port on which it was received C. The switch will return a copy of the frame out the source port D. The switch will not forward unicast frames E. The switch will remove the destination MAC from the switch table F. None of the above. |
Answer: A
Explanation: How Does the Switch Find Host MACs? Let's use the diagram below to help us understand how address learning process takes place. Let's assume that we have just powered on the switch. It has nothing in its MAC table. We connect the cables from the hosts on the switch interfaces as shown in the diagram. Host A initiates a connection towards Host D, and the following takes place: 1. Host A (interface fe0/0) sends a frame to Host D (MAC address:0000.43c5.334c). 2. The switch inspects the Source Address in the frame and notes in its table the MAC address of Host A along with the Interface number from which the frame originated. 3. The switch inspects the Destination Address in the frame. Since it does not have Hosts D MAC address in its table, it constructs a broadcast frame and forwards out all interfaces except the interface from where the original frame arrived. 4. Host D identifies itself as the expected recipient and responds back to Host A. The switch receives the respond frame on interface fe0/11 and places the SA in its table along with the interface number where the frame came from. 5. From now on, further communication between the two hosts will be switched to the appropriate interfaces based on the MAC tables entries. This process takes place every time a new host is attached on the switch and initiates traffic. The switch tries to keep its MAC table up-to-date, therefore if some hosts do not initiate traffic for a certain amount of time, the switch removes them from its table and reinserts them when they begin sending traffic. |
Reference:
http://www.trainsignaltraining.com/studying-for-your-ccent-learn-all-about-switching-and-stp/2007-11-01/ |
|
In which circumstance are multiple copies of the same unicast frame likely to be
transmitted in the Certkiller Switched LAN? A. During high traffic periods B. In an improperly implemented redundant topology C. After broken links are re-established D. When upper-layer protocols require high reliability E. When a dual ring topology is in use F. None of the above |
Answer: B
Explanation: A redundant topology eliminates single points of failure, but it also causes broadcast storms, multiple frame copies, and MAC address table instability problems. Multiple Frame Copies--when a new switch is added, the other switches may not have learned its correct MAC address. The host may send a unicast frame to the new switch. The frame is sent through several paths at the same time. The new switch will receive several copies of the frame. This causes MAC database instability. MAC database instability results when multiple copies of a frame arrive on different ports of a switch. Layer 2 has no mechanism to stop the loop. This is the main reason for the Spanning Tree Protocol(STP) IEEE 802.1d which was developed to prevent routing loops. If multiple connections between switches are created for redundancy purposes, network loops can occur in an improperly designed topology. Spanning Tree Protocol (STP) is used to stop network loops while still permitting redundancy. |
|
|
The Certkiller network administrator needs to a switch named CK1 to become the
root bridge for a redundant path switched network. What can be done to ensure that CK1 will always assume the role as the root bridge? A. Assign the switch a higher MAC address than the other switches in the network have B. Establish a direct link from the switch to all other switches in the network C. Configure the switch full-duplex operation and configure the other switches for half-duplex operation D. Configure the switch so that it has lower priority than other switches in the network E. None of the above |
Answer: D
Explanation: Switch having lowest bridge ID will become the root bridge. The bridge ID is how STP keeps track of all the switches in the network. It is determined by a combination of the bridge priority (32,768 by default on all Cisco switches) and the base MAC address. The bridge with the lowest bridge ID becomes the root bridge in the network. To elect the desired switch as a root bridge, set the bridge priority lowest than other switch. |
|
|
CK1 is a switch in the Certkiller network. Why will CK1 never learn the broadcast
address? A. Broadcast frames are never sent to switches B. A broadcast frame is never forwarded by a switch C. Broadcasts only use network layer addressing D. A broadcast address will never be the source address of a frame E. Broadcast addresses use an incorrect format for the switching table F. None of the above |
Answer: D
Explanation: There are three different address types: * Unicast : One source to One destination * Broadcast: One source to multiple destination * Multicast: One source to multiple destination joined to group On unicast or broadcast or multicast communication, the source address is always the unicast address but the destination address can be unicast, broadcast or multicast. |
|
|
The system LED is amber on a new Certkiller Catalyst 2950 series switch. What does
this indicate? A. The system is powered up and operational. B. The system is sensing excessive collisions. C. The system is forwarding traffic. D. The system is not powered up. E. The system is malfunctioning. F. None of the above |
Answer: E
Explanation: While the switch powers on, it begins POST, a series of tests. POST runs automatically to verify that the switch functions properly. When the switch begins POST, the system LED is off. If POST completes successfully, the LED turns green. If POST fails, the LED turns amber. Note: POST failures are usually fatal. Call Cisco Systems if your switch does not pass POST. |
|
|
Some of the older Certkiller switches store the entire frame before forwarding it to
the destination. What are two effects on network performance of configuring a switch to do this? (Choose two) A. Filtering of collision fragments only B. Decreased latency C. Increased latency D. Filtering of all frame errors E. Increase in switch operating speed F. Propagation of corrupted or damaged frames |
Answer: C, D
Explanation: Switches that store the entire frame before forwarding to the destination are using the store and forward process. This mode copies the entire frame into memory, computes the Cyclic Redundancy Check (CRC) for errors, and then looks up the destination MAC address and forwards the frame. This is slow but offers the best solution for error correction without affecting the entire backbone in retransmission. This gives us the best method for filtering errors from traversing the network, but at a cost of higher latency. |
|
|
As a Certkiller trainee you are required to set the default gateway on a Cisco switch
to the IP address of 192.168.1.115. Which IOS command should you use? A. CertK Switch(config)# ip route-default 192.168.1.115 B. CertK Switch(config)# ip default-gateway 192.168.1.115 C. CertK Switch(config)# ip route 192.168.1.115 0.0.0.0 D. CertK Switch(config)# ip default-network 192.168.1.115 E. None of the above |
Answer: B
Explanation: Use the "ip default-gateway" command to enter the IP address of the next-hop router interface that is directly connected to the switch where a default gateway is being configured. The default gateway receives IP packets with unresolved destination IP addresses from the switch. Once the default gateway is configured, the switch has connectivity to the remote networks with which a host needs to communicate. |
|
|
You need to perform some initial configuration tasks on a new Certkiller switch.
What is the purpose of assigning an IP address to a switch? A. To provide local hosts with a default gateway address B. To allow remote management of the switch. C. To allow the switch to respond to ARP requests between two hosts D. To ensure that hosts on the same LAN can communicate with each other. E. None of the above |
Answer: B
Explanation: Switch is a layer 2 device and doesn't use network layer for packet forwarding. The IP address may be used only for administrative purposes such as Telnet access or for network management purposes. |
|
|
You need to perform some initial configuration tasks on a new Certkiller switch.
What are the possible trunking modes for this switch port? (Choose three) A. Transparent B. Auto C. On D. Desirable E. Client F. Forwarding G. Learning |
Answer: B, C, D
Explanation: Here, the trunk link is identified by its physical location as the switch module number and port number. The trunking mode can be set to any of the following: on- This setting places the port in permanent trunking mode. The corresponding switch port at the other end of the trunk should be similarly configured because negotiation is not allowed. The encapsulation or identification mode should also be manually configured. off-This setting places the port in permanent non-trunking mod. the port will attempt to convert the link to non-trunking mode. desirable-Selection this port will actively attempt to convert the link into trunking mode. If the far end switch port is configured to on, desirable, or auto mode, trunking will be successfully negotiated. auto-The port will be willing to convert the link into trunking mode. If the far end switch port is configured to on or desirable, trunking will be negotiated. By default, all Fast Ethernet and Gigabit Ethernet links that are capable of negotiating using DTP are configured to this mode. Because of the passive negotiation behavior, the link will never become a trunk, if both ends of the link are left to the auto default. nonegotiate-The port is placed in permanent trunking mode, but no DTP frames are generated for negotiation. The far end switch port must be manually configured for trunking mode. |
|
|
An administrator would like to configure a switch over a virtual terminal
connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? (Choose two) A. The switch must be reachable through a port connected to its management VLAN. B. The switch console port must be connected to the Ethernet LAN. C. The switch must be fully configured as an SNMP agent. D. The switch must be configured with an IP address, subnet mask, and default gateway. E. The switch management VLAN must be created and have a membership of at least one switch port. F. The switch must be connected to a router over a VLAN trunk. |
Answer: A, D
Explanation: In order the telnet to any Cisco device, the device must be reachable from the remote location. For a Cisco switch to be reachable from remote locations, it must have an IP address, subnet mask, and default gateway assigned. Communication with the switch management interfaces is through the switch IP address. The IP address is associated with the management VLAN, which by default is VLAN 1 |
|
|
While troubleshooting a connectivity problem, the Certkiller network administrator
notices that a port status LED on a Cisco Catalyst Series switch is alternating between green and amber. Which condition could this indicate? A. The port is experiencing errors B. The port has ac active link with normal traffic activity C. The port blocked by spanning tree D. The port is administratively disabled E. None of the above |
Answer: A
|
|
|
You are the administrator of the Certkiller LAN and you have been reviewing error
logs of networking devices and notice a large number of errors associated with several MAC addresses. You suspect that some of the errors are being generated by the routers. Which router commands will allow you to find the ip address associated with each MAC address? (Choose two) A. show arp B. show version C. show address D. show hosts E. show interface F. show protocols |
Answer: A, E
Explanation: The "show arp" command Displays the entries in the ARP table, including their layer 2 MAC address and layer 3 IP address. Example: The following is the output for the show arp command on Router 1: CK1 # show arp Protocol Address Age (min) Hardware Addr Type Interface Internet 10.0.0.3 0 0004.dd0c.ffcb ARPA Ethernet01 Internet 10.0.0.1 - 0004.dd0c.ff86 ARPA Ethernet0 To see the MAC (hardware) address of the router interfaces as well as their IP addresses, use the "show interfaces" command as shown in the example below: CK1 # show interfaces Ethernet 0 is up, line protocol is up Hardware is MCI Ethernet, address is 0000.0c00.750c (bia 0000.0c00.750c) Internet address is 10.108.28.8, subnet mask is 255.255.255.0 MTU 1500 bytes, BW 10000 Kbit, DLY 100000 usec, rely 255/255, load 1/255 |
|
|
The Certkiller network administrator issues the ping 192.168.2.5 command and
successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? (Choose two) A. ARP B. CDP C. DHCP D. DNS E. ICMP |
Answer: A, E
Explanation: ARP finds the hardware address of a host from a known IP address. Here's how it works: when IP has a datagram to send, it must inform a Network Access protocol, such as Ethernet or Token Ring, of the destination's hardware address on the local network. (It has already been informed by upper-layer protocols of the destination's IP address.) If IP doesn't find the destination host's hardware address in the ARP cache, it uses ARP to find this information. ICMP works at the Network layer and is used by IP for many different services. ICMP is a management protocol and messaging service provider for IP. Its messages are carried as IP datagrams. RFC 1256 is an annex to ICMP, which affords hosts' extended capability in discovering routes to gateways. Periodically, router advertisements are announced over the network, reporting IP addresses for the router's network interfaces. Hosts listen for these network infomercials to acquire route information. A router solicitation is a request for immediate advertisements and may be sent by a host when it starts up. |
|
|
While troubleshooting an issue in the Certkiller LAN you notice that a network
interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port? A. This is an Ethernet port operating at half duplex B. This is an Ethernet port operating at full duplex C. This is a port on a network interface card in a PC D. This is 10 MB/s switch port E. This is a 100 MB/s switch port F. None of the above |
Answer: A
Explanation: Half-duplex Ethernet is defined in the original 802.3 Ethernet; Cisco says it uses only one wire pair with a digital signal running in both directions on the wire. It also uses the CSMA/CD protocol to help prevent collisions and to permit retransmitting if a collision does occur. If a hub is attached to a switch, it must operate in half-duplex mode because the end stations must be able to detect collisions. Half-duplex Ethernet-typically 10BaseT-is only about 30 to 40 percent efficient as Cisco sees it because a large 10BaseT network will usually only give you 3 to 4Mbps, at most |
|
|
When a switch port is used as a VLAN trunk, which of the following trunk modes
are valid? (Select all that apply.) A. Blocking B. Auto C. Desirable D. On E. Transparent F. Learning |
Answer: B, C, D
Explanation: A trunk port can be configured as one of the following 5 different modes: on, off, desirable, auto, or nonegotiate. |
|
|
Which of following VLAN frame encapsulation types are configurable on a Cisco
switch? (Select two answer choices.) A. VTP B. 802.1Q C. LLC D. ISL E. CDP F. PAP |
Answer: B, D
Explanation: ISL and 802.1Q are the two trunking encapsulations that can be configured on a Cisco switch. ISL is Cisco proprietary and 802.1Q is the IEEE standard method. |
Incorrect Answers:
A. VTP is the VLAN Trunking Protocol, which is used to carry VLAN information across the trunks. The question is asking for the encapsulation options for the trunk, which will be used by VTP. C. LLC is the Logical Link Control, which is a sub-layer of the data link layer. E. CDP is the Cisco Discovery Protocol, which is used by Cisco devices to discover information on neighboring Cisco devices. F. PAP is the Password Authentication Protocol, which is used as an authentication mechanism on PPP links. |
|
Certkiller users have noticed extremely slow network performance, intermittent
connectivity, and connection losses. After entering the "show interfaces" command, you notice that the Ethernet interface is configured as 100 Mbps full-duplex and that there is evidence of late collisions. What could be the cause of this problem? A. Duplex mismatch B. A routing loop C. Trunking mode mismatch D. Improperly configured root bridge E. Improperly configured static VLAN F. None of the above |
Answer: A
Explanation: A duplex mismatch may result in performance issues, intermittent connectivity, and loss of communication. When troubleshooting NIC issues, verify that the NIC and switch are using a valid configuration. Some third-party NIC cards may fall back to half-duplex operation mode, even though both the switchport and NIC configuration have been manually configured for 100 Mbps, full-duplex. This behavior is due to the fact that NIC autonegotiation link detection is still operating when the NIC has been manually configured. This causes duplex inconsistency between the switchport and the NIC. Symptoms include poor port performance and frame check sequence (FCS) errors that increment on the switchport. To troubleshoot this issue, try manually configuring the switchport to 100 Mbps, half-duplex. If this action resolves the connectivity problems,you may be running into this NIC issue. Try updating to the latest drivers for your NIC, or contact your NIC card vendor for additional support. |
Reference:
http://www.cisco.com/en/US/products/hw/switches/ps700/products_tech_note09186a00800a7af0.shtml |
|
You are experiencing intermittent issues relating to congestion within the Certkiller
network. What are the possible causes of congestion on this LAN? (Choose all that apply) A. A broadcast domain with too many hosts. B. Full duplex operation. C. Broadcast storms. D. Multicasting. E. Network Segmentation. F. Low bandwidth. |
Answer: A, C, F
Explanation: A LAN segment with too many hosts can mean that there are a large number of stations contending for bandwidth. It can also mean an increase in the number of collisions on the segment, which can cause further congestion issues. Broadcast storms are the result of a large number of broadcasts sent over the LAN. Because each station listens to these broadcast messages, congestion can occur quickly. Finally, low bandwidth can simply mean that the LAN can not process all of the LAN traffic that is being sent. This can mean that TCP sessions are retransmitted, which can lead to additional congestion. |
Incorrect Answers:
B. This can alleviate congestion, as data can be sent and received at the same time. In addition, collisions are not possible in a full duplex LAN. D. Multicasting can actually alleviate congestion issues, as single streams of information can reach multiple hosts at the same time, instead of using a series of point to point connections. E. Segmentation breaks up a large LAN into multiple, smaller LANS. This will mean fewer hosts per broadcast domain. |
|
You need to configure two Certkiller switches to exchange VLAN information.
Which protocol provides a method of sharing VLAN configuration information between these two switches? A. STP B. 802.1Q C. VLSM D. ISL E. VTP F. HSRP G. None of the above |
Answer: E
Explanation: VLAN Trunking Protocol (VTP) is a Cisco proprietary Layer 2 messaging protocol that manages the addition, deletion, and renaming of VLANs on a network-wide basis. Virtual Local Area Network (VLAN) Trunk Protocol (VTP) reduces administration in a switched network. When you configure a new VLAN on one VTP server, the VLAN is distributed through all switches in the domain. This reduces the need to configure the same VLAN everywhere. To do this VTP carries VLAN information to all the switches in a VTP domain. VTP advertisements can be sent over ISL, 802.1q, IEEE 802.10 and LANE trunks. VTP traffic is sent over the management VLAN (VLAN1), so all VLAN trunks must be configured to pass VLAN1. VTP is available on most of the Cisco Catalyst Family products. |
|
|
Certkiller has implemented the use of the Virtual Trunking Protocol (VTP). Which
statement below accurately describes a benefit of doing this? A. VTP will allow physically redundant links while preventing switching loops B. VTP will allow switches to share VLAN configuration information C. VTP will allow a single port to carry information to more than one VLAN D. VTP will allow for routing between VLANs E. None of the above |
Answer: B
Explanation: Trunking Protocol (VTP) are to manage all configured VLANs across a switched internetwork and to maintain consistency throughout that network VTP allows you to add, delete, and rename VLANs-information that is then propagated to all other switches in the VTP domain. Here's a list of some features of VTP: * Consistent VLAN configuration across all switches in the network * VLAN trunking over mixed networks, such as Ethernet to ATM LANE or even FDDI * Accurate tracking and monitoring of VLANs * Dynamic reporting of added VLANs to all switches in the VTP domain * Plug and Play VLAN adding |
|
|
A Certkiller switch is configured with all ports assigned to VLAN 2. In addition, all
ports are configured as full-duplex FastEthernet. What is the effect of adding switch ports to a new VLAN on this switch? A. The additions will create more collisions domains. B. IP address utilization will be more efficient. C. More bandwidth will be required than was needed previously. D. An additional broadcast domain will be created. E. The possibility that switching loops will occur will increase dramatically. |
Answer: D
Explanation: A VLAN is a group of hosts with a common set of requirements that communicate as if they were attached to the same wire, regardless of their physical location. A VLAN has the same attributes as a physical LAN, but it allows for end stations to be grouped together even if they are not located on the same LAN segment. Networks that use the campus-wide or end-to-end VLANs logically segment a switched network based on the functions of an organization, project teams, or applications rather than on a physical or geographical basis. For example, all workstations and servers used by a particular workgroup can be connected to the same VLAN, regardless of their physical network connections or interaction with other workgroups. Network reconfiguration can be done through software instead of physically relocating devices. Cisco recommends the use of local or geographic VLANs that segment the network based on IP subnets. Each wiring closet switch is on its own VLAN or subnet and traffic between each switch is routed by the router. The reasons for the Distribution Layer 3 switch and examples of a larger network using both the campus-wide and local VLAN models will be discussed later. A VLAN can be thought of as a broadcast domain that exists within a defined set of switches. Ports on a switch can be grouped into VLANs in order to limit unicast, multicast, and broadcast traffic flooding. Flooded traffic originating from a particular VLAN is only flooded out ports belonging to that VLAN, including trunk ports, so a switch that connects to another switch will normally introduce an additional broadcast domain. |
|
|
A new switch is installed in the Certkiller network. This switch is to be configured so
that VLAN information will be automatically distributed to all the other Cisco Catalyst switches in the network. Which of the conditions below have to be met in order for this to occur? (Choose all that apply). A. The switch that will share the VLAN information must be in the VTP Server mode. B. The switches must be in the same VTP domain. C. The switch that will share the VLAN information must be configured as the root bridge. D. The switches must be configured to use the same VTP version. E. The switches must be configured to use the same STP version. F. The switches must be configured to use the same type of ID tagging. G. The switches must be connected over VLAN trunks. |
Answer: A, B, F, G
Explanation: For the VLAN information to pass automatically throughout the network, VTP must be set up correctly. In order for VTP to work, a VTP server is needed, the VLAN's must be in the same VTP domain, and the encapsulation on each end of the trunk must both set to either 802.1Q or ISL. |
Incorrect Answers:
C. Root bridges and other functions of the Spanning Tree Protocol (STP) have no impact of the VTP configuration. D, E. There is only one version of VTP and STP. |
|
A network administrator needs to force a high-performance switch that is located in
the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role of the Root Bridge? A. Configure the switch so that it has a lower priority than other switches in the network. B. Assign the switch a higher MAC address than the other switches in the network have. C. Configure the switch for full-duplex operation and configure the other switches for half-duplex operation. D. Connect the switch directly to the MDF router, which will force the switch to assume the role of root bridge. E. Establish a direct link from the switch to all other switches in the network. F. None of the above |
Answer: A
Explanation: For all switches in a network to agree on a loop-free topology, a common frame of reference must exist. This reference point is called the Root Bridge. The Root Bridge is chosen by an election process among all connected switches. Each switch has a unique Bridge ID (also known as the bridge priority) that it uses to identify itself to other switches. The Bridge ID is an 8-byte value. 2 bytes of the Bridge ID is used for a Bridge Priority field, which is the priority or weight of a switch in relation to all other switches. The other 6 bytes of the Bridge ID is used for the MAC Address field, which can come from the Supervisor module, the backplane, or a pool of 1024 addresses that are assigned to every Supervisor or backplane depending on the switch model. This address is hard coded, unique, and cannot be changed. The election process begins with every switch sending out BPDUs with a Root Bridge ID equal to its own Bridge ID as well as a Sender Bridge ID. The latter is used to identify the source of the BPDU message. Received BPDU messages are analyzed for a lower Root Bridge ID value. If the BPDU message has a Root Bridge ID (priority) of the lower value than the switch's own Root Bridge ID, it replaces its own Root Bridge ID with the Root Bridge ID announced in the BPDU. If two Bridge Priority values are equal, then the lower MAC address takes preference. |
|
|
Which of the protocols below, operates at Layer 2 of the OSI model, and is used to
maintain a loop-free network? A. RIP B. STP C. IGRP D. CDP E. VTP F. None of the above |
Answer: B
Explanation: STP (spanning tree protocol) operates on layer 2 to prevent loops in switches and bridges. |
Incorrect Answers:
A, C. RIP and IGRP are routing protocols, which are used at layer 3 to maintain a loop free routed environment. D. CDP does indeed operate at layer 2, but it doest not provide for a loop free topology. CDP is used by Cisco devices to discover information about their neighbors. E. VTP is the VLAN Trunking Protocol, used to pass VLAN information through switches. It relies on the STP mechanism to provide a loop free network. |
|
By default, which of the following factors determines the spanning-tree path cost?
A. It is the individual link cost based on latency B. It is the sum of the costs based on bandwidth C. It is the total hop count D. It is dynamically determined based on load E. None of the above |
Answer: B
Explanation: "The STP cost is an accumulated total path cost based on the available bandwidth of each of the links." Reference: Sybex CCNA Study Guide 4th Edition (Page 323) Note: A path cost value is given to each port. The cost is typically based on a guideline established as part of 802.1d. According to the original specification, cost is 1,000 Mbps (1 gigabit per second) divided by the bandwidth of the segment connected to the port. Therefore, a 10 Mbps connection would have a cost of (1,000/10) 100. To compensate for the speed of networks increasing beyond the gigabit range, the standard cost has been slightly modified. The new cost values are: Bandwidth - STP Cost Value 4 Mbps - 250 10 Mbps - 100 16 Mbps - 62 45 Mbps - 39 100 Mbps - 19 155 Mbps - 14 622 Mbps - 6 1 Gbps - 4 10 Gbps - 2 You should also note that the path cost can be an arbitrary value assigned by the network administrator, instead of one of the standard cost values. Incorrect Answers: A, D: The STP process does not take into account the latency or load of a link. STP does not recalculate the link costs dynamically. C. Hop counts are used by RIP routers to calculate the cost of a route to a destination. The STP process resides at layer 2 of the OSI model, where hop counts are not considered. |
|
|
What is the purpose of the spanning-tree algorithm in a switched LAN?
A. To provide a monitoring mechanism for networks in switched environments. B. To manage VLANs across multiple switches. C. To prevent switching loops in networks with redundant switched paths. D. To segment a network into multiple collision domains. E. To prevent routing loops in networks. |
Answer: C
Explanation: STP is used in LANs with redundant paths or routes to prevent loops in a layer 2 switched or bridged LAN. |
Incorrect Answers:
A, B: The primary purpose of STP is to prevent loops, not for monitoring or management of switches or VLANs. D. VLANs are used to segment a LAN into multiple collision domains, but the STP process alone does not do this. E. Routers are used to prevent routing loops at layer 3 of the OSI model. STP operates at layer 2. |
|
Which two of the following values does STP take into consideration when it elects
the root bridge? (Select two answer choices) A. The BPDU version number B. The access layer bridge setting C. The Bridge ID D. The spanning-tree update number E. The bridge priority F. The VLAN number |
Answer: C, E
Explanation: The bridges elect a root bridge based on the bridge IDs in the BPDUs. The root bridge is the bridge with the lowest numeric value for the bridge ID. Because the two part bridge ID starts with the priority value, essentially the bridge with the lowest priority becomes the root. For instance, if one bridge has priority 100, and another bridge has priority 200, the bridge with priority 100 wins, regardless of what MAC address was used to create the bridge ID or each bridge/switch. |
Reference: CCNA Self-Study CCNA ICND Exam Certification Guide (Cisco Press,
ISBN 1-58720-083-X) Page 39 |
|
Which of the following are spanning tree port states? (Select three answer choices)
A. Learning B. Spanning C. Listening D. Forwarding E. Initializing F. Filtering G. Permitting |
Answer: A, C, D
Explanation: There are 4 STP states that a bridge port can be in: Blocking, Listening, Learning, and Forwarding |
|
|
What are the switch and bridge port characteristics of a layer two spanning-tree
network that is fully converged? A. All switch and bridge ports are in the forwarding state. B. All switch and bridge ports are in the stand-by state. C. All switch and bridge ports are assigned as either root or designated ports. D. All switch and bridge ports are in either the forwarding or blocking state. E. All switch and bridge are either blocking or looping. |
Answer: D
Explanation: When a switch first comes up, it will be in the listening and learning states. This is needed so that the switch learns the MAC addresses of the devices on the LAN, and to learn where any loops in the network may exist. After this initial period of listening and learning, the ports will be forwarding to the hosts, or blocking certain ports that create a loop in the network. An example of this is shown below: In the above figure, after the network has converged, spanning tree protocol puts each port either in designated (Forwarding) or Non-designated (Blocking) state. So, Choice D is correct. If you get a converged spanning-tree network, you have only two port states. Forwarding and Blocking. Forwarding: all traffic will be forwarded Blocking: all traffic to devices that will create a loop in a spanning-tree network will be blocked. It is possible to get redundant paths in large switched and routed networks. |
|
|
In a switched LAN network, what is the Spanning-Tree algorithm used for?
A. It is used to provide a mechanism for routing updates in switched environments. B. It is used to prevent routing loops in networks with redundant routes. C. It is used to prevent switching loops in networks with redundant switched routes. D. It is used to manage, the addition, deletion, and naming of VLANs across multiple switches. E. It is used to segment a network into multiple collision domains. F. None of the above. G. All of the above are functions of STP. |
Answer: C
Explanation: To avoid loops, all bridging devices, including switches, use STP. STP causes each interface on a bridging device to settle into a blocking state or a forwarding state. Blocking means that the interface cannot forward or receive data frames. Forwarding means that the interface can send and receive data frames. By having a correct subset of the interfaces blocked, a single currently active logical path will exist between each pair of LANs. STP resides at the data link layer, so it is used to prevent loops within a switched network. It is not used to prevent routing loops; that is the function of the mechanisms within a routing protocol. |
Reference:
CCNA Self-Study CCNA INTRO exam certification Guide (Cisco Press, ISBN 1-58720-094-5) page 248. |
|
In which Spanning-Tree states does a switch port learn MAC addresses? (Select
two) A. Blocking B. Listening C. Forwarding D. Learning E. Relaying |
Answer: C, D
Explanation: STP uses a couple of port states besides forwarding and blocking. 1. Listening - Listens to incoming Hello messages to ensure that there are no loops, but does not forward traffic. This is an interim state between blocking and forwarding. 2. Learning - Still listens to BPDUs, plus learns MAC addresses from incoming frames. It does not forward traffic. This is an interim state between blocking and forwarding. 3. Disabled - Administratively down. |
Reference: Cisco CCNA intro 640-821
|
|
When is a switched network that is running the Spanning Tree Protocol considered
to be fully converged? A. when all switches have the same BID as the root switch B. when all switches have received the MAC address of each neighboring switch C. when every enabled switch port has been assigned a unique identifier D. when every operating switch port is in either the blocking or forwarding state E. when all switches are in either client, server, or transparent mode |
Answer: D
Explanation: States of the Spanning Tree Protocol: Blocking A blocked port won't forward frames; it just listens to BPDUs. All ports are in blocking state by default when the switch is powered up. The purpose of the blocking state is to prevent the use of looped paths. Listening The port listens to BPDUs to make sure no loops occur on the network before passing data frames. A port in listening state prepares to forward data frames without populating the MAC address table. Learning The switch port listens to BPDUs and learns all the paths in the switched network. A port in learning state populates the MAC address table but doesn't forward data frames. Forwarding The port sends and receives all data frames on the bridged port. Disabled A port in the disabled state does not participate in the frame forwarding or STP. A port in the disabled state is virtually non-operational. In Blocking States, all ports are in blocking state. The purpose of the blocking state is to prevent the use of looped paths. The forward state sends and receives the all data frames in a loop free network. So these two states are considered to be fully converged. |
|
|
What is the purpose of the Spanning Tree Protocol (STP)?
A. To prevent routing loops B. To create a default route C. To provide multiple gateways for hosts D. To maintain a loop-free Layer 2 network topology E. To enhance the functions of SNMP |
Answer: D
Explanation: STP's main task is to stop network loops from occurring on your Layer 2 network (bridges or switches). It vigilantly monitors the network to find all links, making sure that no loops occur by shutting down any redundant ones. STP uses the spanning-tree algorithm (STA) to first create a topology database, then search out and destroy redundant links. With STP running, frames will only be forwarded on the premium, STP-picked links. |
|
|
Which of the following components must be elected before the Spanning Tree
Protocol can converge in a switched LAN? A. Designated ports. B. Duplex operating mode. C. Fast mode ports. D. Root bridge. E. Root ports. F. BDPU priority. |
Answer: A, D, E
Explanation: Designated port: Either a root port or a port that has been determined as having the best (lower) cost-a designated port will be marked as a forwarding port. Root bridge: The root bridge is the bridge with the best bridge ID. With STP, the key is for all the switches in the network to elect a root bridge that becomes the focal point in the network. All other decisions in the network-like which port is to be blocked and which port is to be put in forwarding mode-are made from the perspective of this root bridge. Root port: Always the link directly connected to the root bridge, or the shortest path to the root bridge. If more than one link connects to the root bridge, then a port cost is determined by checking the bandwidth of each link. The lowest cost port becomes the root port. So these three components must be elected before the spanning tree protocol can converge in a switched LAN |
|
|
Why would the Certkiller administrator change the value of the spanning-tree
priority of a switch? A. in order to optimize the path that frames take from source to destination B. to increase the priority so a designated port will become a root port C. to increase the BID, so the switch is more likely to become root bridge D. in order to allow VLANs to be sent from one switch to another across a single link E. to force a given switch to become an STP server F. None of the above |
Answer: A
Explanation: The Bridge Priority is used to measure the preference of a bridge in the spanning-tree Algorithm. The possible values range between 0 and 65,535. The default setting is 32,768. By adjusting the priority, the root bridge can be manually assigned to meet the needs of the network administrator. |
|
|
What value is primarily used to determine which port becomes the root port on
each nonroot switch in a spanning-tree topology? A. path cost B. lowest port MAC address C. VTP revision number D. highest port priority number E. port priority number and MAC address F. None of the above |
Answer: A
Explanation: At the conclusion of the root bridge election process, the switches move on to selecting Root Ports. The Root Port of a bridge is the port that is closest to the Root Bridge in terms of Path Cost. Every non-Root Bridge must select one Root Port. Again, bridges use the concept of cost to measure closeness. As with some routing metrics, the measure of closeness using STP is not necessarily reflected by hop count. Specifically, bridges track what is referred to as Root Path Cost, which is the cumulative cost of all links to the Root Bridge. |
|
|
In the Certkiller switched LAN environment, what does the IEEE 802.1Q standard
describe? A. VLAN pruning B. A method of VLAN trunking C. An approach to wireless LAN communication D. The operation of VTP E. The process for root bridge selection F. None of the above |
Answer: B
Explanation: A broadcast domain must sometimes exist on more than one switch in the network. To accomplish this, one switch must send frames to another switch and indicate which VLAN a particular frame belongs to. On Cisco switches, a trunk link is created to accomplish this VLAN identification. ISL and IEEE 802.1Q are different methods of putting a VLAN identifier in a Layer 2 frame. The IEEE 802.1Q protocol interconnects VLANs between multiple switches, routers, and servers. With 802.1Q, a network administrator can define a VLAN topology to span multiple physical devices. Cisco switches support IEEE 802.1Q for FastEthernet and Gigabit Ethernet interfaces. An 802.1Q trunk link provides VLAN identification by adding a 4-byte tag to an Ethernet Frame as it leaves a trunk port. |
|
|
You are an administrator of the Certkiller switched network and your goal is to
reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in the Certkiller network. However, you need to share the VLAN information across numerous switches. Which of the following would allow you accomplish this? A. STP B. GVRP C. SNMP D. VTP E. DHCP F. None of the above |
Answer: D
Explanation: The VTP (VLAN Trunking Protocol) is a Cisco Layer 2 messaging protocol that manages the addition, deletion, and renaming of VLANs on a network-wide basis. It allows for VLAN information to span multiple switches within the switch domain. |
Incorrect Answers:
A. STP is a switching protocol but it is used for preventing network loops. B. GVARP is an actual protocol used in switch administration, but it beyond the scope of what a CCNA is expected to know. C. SNMP is a protocol used for managing and monitoring networks E. DHCP is the Dynamic Host Configuration Protocol, which allows for PC's to obtain their IP address dynamically upon booting up, along with their DNS and default gateway information. |
|
Which of the following a true statements regarding the use of VLANs to segment a
network? (Select three) A. They increase the size of collision domains B. They allow logical grouping of users by function. C. They can enhance network security. D. They increase the size of the broadcast domain while decreasing the number of collision domains. E. They increase the number of broadcast domains while decreasing the size of the broadcast domains. F. They simplify switch administration. |
Answer: B, C, E
Explanation: VLANs are used to segment a LAN into multiple, smaller LANs. This can be used to enhance security as local traffic from one VLAN will not be passed to users in other VLANS. |
Incorrect Answers:
A. VLANs are used to decrease the size of a collision domain, not increase it. D. The opposite is true. F. The default operation of a switch is to allow all traffic and to enable all ports in VLAN 1. The use of VLANs will increase the complexity of the switch environment, making for more difficult administration. |
|
You wish to segment your LAN into multiple broadcast domains. Which technology
method should you implement in order to do this? A. Transparent bridging B. Cut-through switching C. Fragment-free switches D. Virtual LANs E. Store-and-forward switching F. None of the above |
Answer: D
Explanation: The creation of VLANs in a switch will provide separate Broadcast domains. By default, all ports in a Catalyst switch belong to VLAN 1. By creating additional VLANs, the LAN will be logically segmented into separate broadcast domains. |
Incorrect Answers
A. Transparent bridging is called Transparent because the endpoints devices do not need to know that the bridges exists. It will not play any role for creating separate broadcast domain B, E. Both of these are switching methods. C. This has nothing to do with the creation of multiple broadcast domains. |
|
Certkiller has implemented the use of VLANs in their network. Which of the
following are considered to be a benefit of VLANs? (Choose three) A. They increase the size of collision domains. B. They allow logical grouping of users by function. C. They can enhance network security, D. The increase the size of broadcast domains while decreasing the number of the broadcast domains. E. The increase the number of broadcast domains while decreasing the size of the broadcast domains. F. They simplify switch administration. |
Answer: B, C, E
Explanation: There are many motivations for using VLANs, including these: 1. To group users by department, or by groups that work together, instead of by physical location. (B) 2. To reduce overhead by limiting the size of each broadcast domain (E) 3. To enforce better security by keeping sensitive devices on a separate VLAN (C) 4. To separate specialized traffic from mainstream traffic - for example, putting IP telephones on a separate VLAN form user PCs. |
|
|
What are some of the characteristics of a typical VLAN arrangement, found
throughout the Certkiller switched LAN? (Select all that apply) A. VLANs logically divide a switch into multiple, independent switches at Layer 2. B. Trunk links can carry traffic for multiple VLANs. C. VLAN implementation significantly increases traffic due to added trunking information. D. A VLAN can span multiple switches. E. VLANs typically increase the number of switches needed F. VLANs typically decrease the number of switches needed |
Answer: A, B, D
Explanation: VLANs give you the power of making virtual LAN networks to subdivide collision domains into smaller units of functionality, without being limited by physical location. A is correct because that is the exact function of a VLAN. B is correct because trunk links are used to carry traffic for multiple VLANs. D is correct because a VLAN can and often does span across multiple switches. VTP makes this possible. |
Incorrect Answers:
C. Although trunking information does indeed add some level of overhead, the overall traffic overhead is greatly reduced though the use of VLANs. E, F. The number of total switches needed in a network is the result of the number of devices on the entire LAN that need to be connected. Whether VLANs are used or not will have little, if any, impact on the total number of switches needed in a LAN. |
|
How could the Certkiller corporation benefit from using VLANs on their network?
(Select three answer choices.) A. VLANs allow access to network services based on department, not physical location. B. VLANs utilize packet filtering to enhance network security. C. VLANs provide a low-latency, high bandwidth internetworking alternative. D. VLANs provide a method of communication between IP addresses in large networks. E. VLANs establish segmented broadcast domains in switched networks. F. VLANs can greatly simplify adding, moving, or changing hosts on the network. |
Answer: A, E, F
Explanation: VLANs establish broadcast domains in switched networks, so by virtue of having the option to create many efficient broadcast domains, congestion is reduced and network throughput is greatly enhanced. VLANs allow networks to be divided by department or resource needs, rather then by physical location. When people move departments, leave a department, or join a department, administration is easy and convenient with a few keystrokes. |
Incorrect Answers:
B, D. These would be router functions at layer 3. Switches and VLANs operate at layer 2 of the OSI model. C. The use of VLANs may actually increase the latency in some cases, as traffic from one VLAN to the other will need to be routed. |
|
You are working as a network technician at Certkiller University, when you get a
call from the Engineering Faculty. They're complaining that they're receiving obsolete information from the Business Faculty's network traffic broadcasts. What can you do to contain the Business Faculty's broadcast while still keeping it connected to the internet and the enterprise services of the University? (Select all valid answer choices) A. Use half and full-duplex Ethernet on the Engineering Department LAN B. Establish a VTP domain to minimize the obsolete traffic C. Change the switch IP address of the switch D. Create separate VLANs and subnets for the two departments and route between the two E. Provide greater bandwidth to the Engineering Department LAN F. Place the business department on a separate subnet and route between networks |
Answer: D, F
Explanation: In order to prevent the broadcast and link level multicast traffic separated between the departments, they need to be isolated at layer two. This can be accomplished in two ways. The first is to create separate VLANs and place each department into a different one. The second method would be to separate the two departments into two completely different networks, and route between them. |
Incorrect Answers:
A. Mixing the use of half and full duplex will make no difference to the number of broadcasts sent. B. Trunking is only useful in networks that already contain VLANs. C. This will make no difference, as all users will still be contained within the same IP subnet. E. The amount of bandwidth involved will not have any impact on the amount of broadcasts that are sent and received. |
|
Which of the following steps are necessary in order to add a new VLAN to the
Certkiller switched network? (Select all that apply) A. Create the VLAN. B. Name the VLAN. C. Configure an IP address for the VLAN. D. Add the desired ports to the new VLAN. E. Add the VLAN to the VTP domain. |
Answer: A, B, D
Explanation: The following are the basic requirements for creating VLANs: * Creating the VLAN numbers and names * Configuring each port's assigned VLAN |
Incorrect Answers:
C. This is an optional feature, but not a necessary step for creating a VLAN. E. Adding any VLAN to a Virtual Trunking Protocol (VTP) domain may be desired in a complex multi-switch and multi-VLAN network. However, it is not a necessary step for creating stand-alone VLANs on a single switch. |
|
You need to create a new VLAN on your Catalyst switch. This VLAN is to be named
Certkiller . Which of the following need to be completed for the creation of this new VLAN? (Select all that apply) A. The Certkiller VLAN must be created. B. The desired ports must be added to the new Certkiller VLAN. C. The Certkiller VLAN must be added to all of the domains. D. The Certkiller VLAN must be named. E. An IP address must be configured for the Certkiller VLAN. F. None of the above. VLAN creations are automatic. |
Answer: A, B, D
Explanation: Creating a VLAN is done in 3 steps: 1. Create the VLAN 2. Name the VLAN 3. Assign ports to the VLAN From there, other features and functionality can be configured, but these are the only steps that are required for the addition of a VLAN. |
Incorrect Answers:
C. The VLAN needs only to be added to a single switch, where it can act as a stand-alone VLAN, or it can be transferred to other switches in the network through the use of the VTP protocol. E. VLANs operate at layer 2, and although many are configured with a layer 3 IP address, it is not absolutely necessary to do this. |
|
What must the Certkiller network administrator do in order to successfully
configure VTP so that VLAN information can be propagated across the trunk between two switches named CK1 and CK2 ? (Select two answer choices) A. Set each end of the trunk link to IEEE 802.1Q encapsulation. B. Set the same VTP management domain name on both switches. C. Set all ports on the two switched as access ports. D. Configure one of the two switches as a VTP server. E. Connect the two switches using a rollover cable. F. Use a router to forward VTP traffic between the VLANs. |
Answer: B, D
Explanation: All switches that need to share VLAN information via a trunk must use the same VTP domain name, and a switch can only be in one domain at a time. This means that a switch can only share VTP domain information with other switches if they're configured into the same VTP domain. You can use a VTP domain if you have more than one switch connected in a network, but if you've got all your switches in only one VLAN, you don't need to use VTP. VTP information is sent between switches via a trunk port. Switches advertise VTP management domain information, as well as a configuration revision number and all known VLANs with any specific parameters. There's also something called VTP transparent mode, in it, you can configure switches to forward VTP information through trunk ports, but not to accept information updates or update their VTP databases. At least one of the switches will need to be configured as the VTP server in order to pass the VLAN info. |
Incorrect Answers:
A. Although this is a valid option, it is not a requirement since using ISL as the encapsulation type is also a valid option. E. A rollover cable is not used between switches for any of the port types. F. Routers will be required for sending traffic from one VLAN to the other, but not to forward the actual VTP traffic. |
|
After connecting a PC to an available port on a switch, you find that the PC can not
access any of the resources on the LAN. No other PC's connected to the switch appear to be having any issues. What is the most likely cause for this problem? A. The router lacks a routing table entry for the new host B. The host switch port is assigned to the incorrect VLAN C. The host MAC address is incorrectly configured D. A STP instance for the new host has not been initialized E. The switch does not have the MAC address hard coded in the CAM table. |
Answer: B
Explanation: Virtual LANs break up broadcast domains in a layer-two switched internetwork. If a host is in a different VLAN then the network services it needs to use, the packets must go through a router. If routing does not take place, the PC will be unable to communicate with any other devices not in the same VLAN. Answer B is the best answer for this question. |
Incorrect Answers:
A. The PC is unable to communicate with other LAN users. No router needs to even be installed for this to work. C, E. The MAC address of the PC does not need to be entered manually into the switch. The switch will dynamically learn of the MAC address of the PC. D. The STP algorithm does not need to have any end host information added in order for it to work. |
|
The Certkiller network administrator needs to verify that switch interface 0/5 has
been assigned to the Marketing VLA.N. Which command will accomplish this task? A. Show vlan B. Show mac-address-table C. Show vtp status D. show spanning-tree root E. show ip interface brief F. None of the above |
Answer: A
Explanation: The "show vlan" command displays the configured vlan name and ID as well as the ports that belong to each VLAN, etc. By default all ports belongs to VLAN 1 Note: You can also use: show vlan brief, show vlan ID where ID is the VLAN ID. |
|
|
A new trunk has been configured on a switch in the Certkiller LAN. By default,
which VLANs are allowed over this trunk link? A. No VLANs B. Only the VLANs that are specified when creating the trunk C. Only VLANs 1-64 D. All VLANs E. All VLAN's except VLAN 1 F. None of the above |
Answer: D
Explanation: Trunk ports send and receive information from all VLANs by default, and if a frame is untagged, it's sent to the management VLAN. This applies to the extended range VLANs as well. But we can remove VLANs from the allowed list to prevent traffic from certain VLANs from traversing a trunked link. Here is example: RouterA(config)#int f0/1 RouterA(config-if)# switchport mode trunk RouterA(config-if)#switchport trunk allowed vlan VLANID RouterA(config-if)#switchport trunk allowed vlan remove VLANID |
|
|
The Certkiller network administrator has just issued the "switchport trunk native
vlan 998" command on switch CK2 . What is the function of this command? A. It designates VLAN 998 as the default for all unknown tagged traffic B. It designates VLAN 998 for untagged traffic C. It blocks VLAN 998 traffic from passing on the trunk D. It creates a VLAN 998 interface E. None of the above |
Answer: B
Explanation: Native VLAN is the VLAN that you configure on the Catalyst interface before you configure the trunking on that interface. By default, all interfaces are in VLAN 1. Therefore, VLAN 1 is the native VLAN that you can change. On an 802.1Q trunk, all VLAN packets except the native VLAN are tagged. You must configure the native VLAN in the same way on each side of the trunk. Then, the router or switch can recognize to which VLAN a frame belongs when the router or switch receives a frame with no tag. To configure the native VLAN use the following command. Cat2950(config-if)# switchport trunk native vlan 10 |
|
|
You are bringing up a new Certkiller switch, and wish to connect it via a trunk to
another switch from a different vendor, which uses the IEEE standard for the trunking method. When setting the encapsulation type on the trunk, what should you configure on the Cisco switch? A. Switch(config)# switchport trunk encapsulation isl B. Switch(config)# switchport trunk encapsulation ietf C. Switch(config-if)# switchport trunk encapsulation isl D. Switch(config-if)# switchport trunk encapsulation ietf E. Switch(config-if)# switchport trunk encapsulation dot1q |
Answer: E
Explanation: The only real choices for setting up switching trunks are ISL and 802.1Q. ISL is Cisco proprietary, while 802.1Q uses the IEEE defined standard for trunking between switches. To configure the 802.1Q standard, the keyword "dot1q" is used in Cisco switches. |
Incorrect Answers:
A, B, D. These are not valid options in a Cisco switch. C. ISL is a Cisco proprietary method for setting up trunks, and will only work between Cisco switches. |
|
A new switch is being installed in the Certkiller network and you have been assigned
the task of connecting it to an existing switch. In doing this, you want to set up the VLAN Trunking Protocol so that VLAN information can be passed between the switches. Which of the following must you do to accomplish this? (Choose all that apply). A. You must set each end of the trunk line to IEEE 802.1e encapsulation. B. You must set the same VTP management domain name on both switches. C. You must set all ports on the two switches as access ports. D. You must configure one of the switches as a VTP server. E. You must use a rollover cable to connect the two switches. |
Answer: B, D
Explanation: The following describes what is needed in order to correctly set up VTP: VTP operates in one of three modes: * Server mode * Client mode * Transparent mode For VTP to exchange information, some switches act as servers, and some act as clients. VTP servers can create, modify, and delete VLANs and other configuration parameters for the entire VTP domain; this information, in turn, is propagated to the VTP clients and servers in that same domain. VTP servers save VLAN configurations in the Catalyst NVRAM, whereas in clients, the VLAN configuration is not stored at all. A VTP client cannot create, change, or delete VLANs, nor can it save VLAN configurations in nonvolatile memory. |
Incorrect Answers:
A. The encapsulation can be either ISL or 802.1Q, and need to match at each end of the trunk. C. Ports must only be assigned to VLANS. Once that is done and the trunk is up and running, the VLAN information will be passed between the switches. E. A regular CAT5 cable is used to connect the switches, assuming 10/100 Ethernet is used. |
|
A new Certkiller switch is installed into an existing LAN and a new VTP trunk is set
up with an existing switch. Which VLANs will be allowed on this new trunk? A. All defined VLANs are allowed on the trunk by default. B. Each VLAN, or VLAN range, that is specified with the switchport mode command. C. Each VLAN, or VLAN range, that is specified with the vtp domain command. D. Each VLAN, or VLAN range, that is specified with the vlan database command. E. None of the above |
Answer: A
Explanation: The question does not state that there are multiple VTP Domains meaning that all defined VLANs are allowed on the trunk until a vtp domain command is issued. |
|
|
You need to decide on which trunking method to implement in the Certkiller
network. What is a characteristic of ISL and 802.1q frame tagging in a switched LAN environment? A. They are used to find the best path through a network. B. They allow the exchange of filtering tables. C. They specify different implementations of the Spanning-Tree Protocol. D. They allow the exchange of routing tables E. They provide inter-switch VLAN communication. |
Answer: E
Explanation: A trunk link is the other type of Layer 2 port supported on Cisco switches. When a trunk port is configured, it begins marking frames as they exit the port to indicate which VLAN each frame is associated with. The trunk port can also read the markings, called tags, as they enter the trunk port. This enables the switch to send a frame only to the ports for the given VLAN associated with the incoming frame. The main purpose of trunking is to carry traffic between switches and maintain the VLAN information. Unlike an access link, the trunk link does not belong to a single VLAN but instead can carry traffic from several VLANs over a point-to-point link between two devices that understand the protocol. Two forms of trunking are used for Cisco switches on Ethernet networks: An IEEE industry standard called IEEE 802.1Q. This is a frame-tagging mechanism that adds a VLAN identifier to the frame by inserting a tag at Layer 2. Another form of trunking on Cisco switches is called Inter-Switch Link (ISL), which is a Cisco proprietary trunking mechanism. ISL uses a frame encapsulation method that adds a header to identify the VLAN. |
Incorrect Answers:
A, D. These are the functions of routers, not switches. B. Filtering tables can be used on certain Catalyst switches via the use of VLAN access control lists, but this information is never shared between switches. C. A separate STP instance is created for each VLAN, but the STP implementation remains the same. |
|
Which one of the following protocols allows the information about the configuration
of a new VLAN to be distributed across entire switched network? A. STP B. VTP C. EIGRP D. SNMP E. CDP F. None of the above |
Answer: B
Explanation: Sybex CCNA Study Guide 4th Edition states on page 359: "The basic goals of VLAN Trunking Protocol (VTP) are to manage all configured VLANs across a switched internetwork and to maintain consistency throughout that network. VTP allows an administrator to add, delete, and rename VLANs-information that is then propagated to all other switches in the VTP domain." |
Incorrect Answers:
A. STP is the Spanning Tree Protocol, used to prevent bridging loops in a LAN. C. EIGRP is a routing protocol used to exchange routing information, not VLAN information. D. SNMP is the Simple Network Management Protocol, used to provide information to remote network management stations. E. CDP is the Cisco Discovery Protocol, which is used to exchange information between Cisco devices. It can only be used between Cisco routers and switches. |
|
Which encapsulation types are configurable on a Cisco switch for a trunk? (Select
two answer choices) A. VTP B. ISL C. CDP D. 802.1Q E. 802.1p F. LLC G. IETF |
Answer: B, D
Explanation: Trunks are used to carry traffic belonging to multiple VLANs between devices over the same link. A device can determine which VLAN the traffic belongs to by its VLAN identifier. The VLAN identifier is a tag that is encapsulated with the data. ISL and 802.1q are two types of encapsulations used to carry data from multiple VLANs over trunk links. ISL is a Cisco proprietary protocol for interconnecting multiple switches and maintaining VLAN information as traffic goes between switches. ISL provides VLAN trunking capabilities while maintaining full wire speed performance on Ethernet links in full-duplex or half-duplex mode. ISL operates in a point-to-point environment and will support up to 1000 VLANs. In ISL, the original frame is encapsulated and an additional header is added before the frame is carried over a trunk link. At the receiving end, the header is removed and the frame is forwarded to the assigned VLAN. .ISL uses Per VLAN Spanning Tree (PVST) which runs one instance of Spanning Tree Protocol (STP) per VLAN. PVST allows for optimal root switch placement for each VLAN and supports load balancing of VLANs over multiple trunk links. 802.1Q is the IEEE standard for tagging frames on a trunk and supports up to 4096 VLANs. In 802.1Q, the trunking device inserts a four-byte tag into the original frame and re-computes the Frame Check Sequence (FCS) before sending the frame over the trunk link. At the receiving end, the tag is removed and the frame is forwarded to the assigned VLAN. 802.1Q does not tag frames on the native VLAN. It tags all other frames transmitted and received on the trunk. While configuring a 802.1 trunk, you must make sure that the same native VLAN is configured on both sides of the trunk. IEEE 802.1Q defines a single instance of spanning tree running on the native VLAN for all the VLANs in the network which is called Mono Spanning Tree (MST). This lacks the flexibility and load balancing capability of PVST available with ISL. However, PVST+ offers the capability to retain multiple Spanning Tree topologies with 802.1Q trunking. |
|
|
You need to configure an 802.1Q link on a Certkiller switch. Which commands,
when used together, would do this? (Select two answer choices) A. Switch(vlan)# mode trunk B. Switch(config)# switchport access mode trunk C. Switch(config-if)# switchport mode trunk D. Switch(config-if)# switchport trunk encapsulation dot1q E. Switch(config)# switchport access mode 1 F. Switch(vlan)# trunk encapsulation dot1q |
Answer: C, D
Explanation: Creating this trunk link is a two step process. First you have to set the switchport mode to trunk, and then you configure the encapsulation. The giveaway on this question is the fact that to create a trunk on an interface, you have to be in interface configuration mode. So switchport mode trunk sets the trunk, and switchport trunk encapsulation dot1q sets the encapsulation. |
|
|
Which of the following are VLAN frame encapsulation types that may be
configured on a Catalyst switch? (Choose two.) A. VTP B. ISL C. CDP D. 802.1Q E. 802.1p F. LLC |
Answer: B, D
Explanation: The two VLAN trunking encapsulation types are: Inter-Switch Link (ISL): This is proprietary to Cisco switches, and it's used for Fast Ethernet and Gigabit Ethernet links only. ISL routing can be used on a switch port, router interfaces, and server interface cards to trunk a server. ISL lets you explicitly tag VLAN information onto an Ethernet frame. This tagging information allows VLANs to be multiplexed over a trunk link through an external encapsulation method, which allows the switch to identify the VLAN membership of a frame over the trunked link. IEEE 802.1Q: Created by the IEEE as a standard method of frame tagging, this actually inserts a field into the frame to identify the VLAN. If you're trunking between a Cisco switched link and a different brand of switch, you have to use 802.1Q for the trunk to work. |
|
|
There are 2 switches in the Certkiller LAN, with no routers. Ports 1, 2 & 3 are
assigned to VLAN 1 in switch 1 and 2 and ports 4, 5 & 6 are assigned to VLAN 2 in both switches. These two switches are connected together via a trunked link. Which of the conditions below would verify trunk and VLAN operation? (Select all valid answers) A. Host 1 on VLAN 1 can ping Host 2 on VLAN 1 B. Host 1 on VLAN 1 can ping Host 4 on VLAN 2 C. Host 1 on VLAN 1 can not ping Host 2 on VLAN 1 D. Host 4 on VLAN 2 can not ping Host 1 on VLAN 1 E. Host 4 on VLAN 2 can ping Host 2 on VLAN 2 |
Answer: A, D, E
Explanation: If there is no router present, only hosts in the same VLAN will be able to ping each other. In order for any host on one VLAN to communicate with a host on another VLAN, the traffic must pass through a router. Host within the same VLAN will be able to ping each other, even though they reside on different switches, as long as the switches have a trunk connection configured between them. |
|
|
The Certkiller network administrator has issued the "VTP password Certkiller "
command on a Cisco device. What is the purpose of this command? A. It allows two VTP servers to exists in the same domain, each configured with different passwords B. It is the password required when promoting a switch from VTP client mode to VTP server mode C. It is used to access the VTP server to make changes to the VTP configuration D. It is used to validate the sources of VTP advertisements sent between switches E. None of the above |
Answer: D
Explanation: When you create the VTP domain, you have a bunch of options, including setting the domain name, password, operating mode, and pruning capabilities of the switch. Use the vtp global configuration mode command to set all this information. The purpose of setting password on VTP is to validate the sources of VTP advertisements sent between switches belonging to same VTP domain. |
|
|
Which VTP mode should a Cisco switch be set to if this switch is to add or delete
VLANs to a management domain? A. Transparent B. Server C. Auto D. Client E. User |
Answer: B
Explanation: VTP Modes: If you intend to make a switch part of a VTP management domain, each switch must be configured in one of three possible VTP modes. The VTP mode assigned to a switch will determine how the switch interacts with other VTP switches in the management domain. The three VTP modes that can be assigned to a Cisco switch include server mode, client mode, and transparent mode. Each of these roles is outlined below: Server Mode Once VTP is configured on a Cisco switch, the default mode used is Server Mode. In any given VTP management domain, at least one switch must be in Server Mode. When in Server Mode, a switch can be used to add, delete, and modify VLANs, and this information will be passed to all other switches in the VTP management domain. Client Mode When a switch is configured to use VTP Client Mode, it is simply the recipient of any VLANs added, deleted, or modified by a switch in Server Mode within the same management domain. A switch in VTP client mode cannot make any changes to VLAN information. Transparent Mode A switch in VTP Transparent Mode will pass VTP updates received by switches in Server Mode to other switches in the VTP management domain, but will not actually process the contents of these messages. When individual VLANs are added, deleted, or modified on a switch running in transparent mode, the changes are local to that particular switch only, and are not passed to other switches in the VTP management domain. Based on the roles of each VTP mode, the use of each should be more or less obvious. For example, if you had 15 Cisco switches on your network, you could configure each of them to be in the same VTP management domain. Although each could theoretically be left in the default Server Mode, it would probably be easier to leave only one switch in this configuration, and then configure all remaining switches for VTP Client Mode. Then, when you need to add, delete, or modify a VLAN, that change can be carried out on the VTP Server Mode switch and passed to all Client Mode switches automatically. In cases where you need a switch to act in a relatively standalone manner, or do not want it to propagate information about its configured VLANs, use Transparent Mode. |
Incorrect Answers:
A. A switch in VTP Transparent Mode will pass VTP updates received by switches in Server Mode to other switches in the VTP management domain, but will not actually process the contents of these messages. C, E. These are not valid VTP modes. D. Client mode merely accepts changes made by the switch that is connected and in SERVER mode. |
|
What are two results of entering the CKSwitch(config)# vtp mode client command
on a Catalyst switch in the Certkiller LAN? (Choose two.) A. The switch will ignore VTP summary advertisements B. The switch will forward VTP summary advertisements C. The switch will process VTP summary advertisements D. The switch will originate VTP summary advertisements E. The switch will create, modify and delete VLANs for the entire VTP domain |
Answer: B, C
Explanation : Server mode-VTP servers have full control over VLAN creation and modification for their domains. All VTP information is advertised to other switches in the domain, while all received VTP information is synchronized with the other switches. By default, a switch is in VTP server mode. Note that each VTP domain must have at least one server so that VLANs can be created, modified, or deleted, and VLAN information can be propagated. Client mode-VTP clients do not allow the administrator to create, change, or delete any VLANs. Instead, they listen to VTP advertisements from other switches and modify their VLAN configurations accordingly. In effect, this is a passive listening mode. Received VTP information is forwarded out trunk links to neighboring switches in the domain, so the switch also acts as a VTP relay. Transparent mode-VTP transparent switches do not participate in VTP. While in transparent mode, a switch does not advertise its own VLAN configuration, and a switch does not synchronize its VLAN database with received advertisements. In VTP version 1, a transparent-mode switch does not even relay VTP information it receives to other switches, unless its VTP domain names and VTP version numbers match those of the other switches. In VTP version 2, transparent switches do forward received VTP advertisements out of their trunk ports, acting as VTP relays. This occurs regardless of the VTP domain name setting. |
|
|
Study the Exhibit below carefully:
London#show vtp VTP Version: 2 Configuration Revision: 0 Maximum VLANs supported locally: 64 Number of existing VLANs: 5 VTP Operating Mode: Client VTP Domain Name: London VTP Pruning Mode: Disabled VTP V2 Mode: Disabled VTP Traps Generation: Disabled Based on the information given above, what is the VTP function of this particular switch? A. Learn and save VTP configuration in the running configuration. B. Create and change VLANs. C. Forwards information about VTP configuration. D. VTP is disabled on this device. E. VTP is not saved to NVRAM. |
Answer: C
Explanation: From the output this switch is operating merely as VTP client, so it basically does as the VTP server says, and passes on information about VTP configuration to the next switch in line. |
Incorrect Answers:
A. This is incorrect because the function is redundant. B. This incorrect because the switch must be in server or transparent mode to create and change VLANs. D. This is incorrect because if VTP would be disabled, it wouldn't appear on the command output. E. If this were true, the VTP configuration information would not be displayed after being powered on. |
|
Certkiller is experiencing network delays. The network administrator discovers that
a worker in a location far from the MDF has connected an old 10BASE-T switch with redundant links to the existing network. How could this action be responsible for the impaired network performance? A. Connecting a host to the old switch has created a broadcast storm. B. The 10BASE-T switch forced the entire network to be reduced to 10 Mbps operation. C. The old switch does not support VLANs, which has disabled the VLAN configuration of the entire the network. D. The old switch does not support full-duplex operation, effectively forcing half-duplex operation throughout the network. E. Spanning Tree Protocol has elected the old switch as the root bridge, creating inefficient data paths through the switched network. F. None of the above |
Answer: E
Explanation: Without the Spanning Tree Protocol (STP), frames would loop for an indefinite period of time in networks with physically redundant links. To prevent looping frames, STP blocks some ports from forwarding frames so that only one active path exists between any pair of LAN segments (collision domains). The result of STP is good: Frames do not loop infinitely, which makes the LAN usable. However, the network uses some redundant links in case of a failure, but not for balancing traffic. To avoid loops, all bridging devices, including switches, use STP. STP causes each interface on a bridging device to settle into a blocking state or a forwarding state. Blocking means that the interface cannot forward or receive data frames. Forwarding means that the interface can send and receive data frames. By having a correct subset of the interfaces blocked, a single currently active logical path will exist between each pair of LANs. STP behaves identically for a transparent bridge and a switch. So, the terms bridge, switch, and bridging device all are used interchangeably when discussing STP. Root bridge The root bridge is the bridge with the best bridge ID. With STP, the key is for all the switches in the network to elect a root bridge that becomes the focal point in the network. All other decisions in the network-like which port is to be blocked and which port is to be put in forwarding mode-are made from the |
|
|
The Certkiller network administrator wants to ensure that only a single web server
can connect to pot Fa0/1 on a catalyst switch. The server is plugged into the switch's Fast Eth. 0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of this server is allowed by switch port Fa0/1? (Choose two) A. Configure port Fa0/1 to accept connections only from the static IP address of the server B. Configure the MAC address of the server as a static entry associated with port Fa0/1 C. Employ a proprietary connector type on Fa0/1 that is incomputable with other host connectors D. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server E. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address |
Answer: B, D
Explanation: You can use port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different from any of the MAC addresses specified for that port. When a secure port receives a packet, the source MAC address of the packet is compared to the list of secure source addresses that were manually configured or autoconfigured (learned) on the port. If a MAC address of a device attached to the port differs from the list of secure addresses, the port either shuts down permanently (default mode), shuts down for the time you have specified, or drops incoming packets from the insecure host. The port's behavior depends on how you configure it to respond to a security violation. When a security violation occurs, the Link LED for that port turns orange, and a link-down trap is sent to the Simple Network Management Protocol (SNMP) manager. An SNMP trap is not sent if you configure the port for restrictive violation mode. A trap is sent only if you configure the port to shut down during a security violation. |
|
|
The network administrator has configured port security on a Certkiller switch. Why
would a network administrator configure port security on this Certkiller device? A. To prevent unauthorized hosts from getting access to the LAN B. To limit the number of Layer 2 broadcasts on a particular switch port C. To prevent unauthorized Telnet or SSH access to a switch port D. To prevent the IP and MAC address of the switch and associated ports E. None of the above |
Answer: A
Explanation: You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port. If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged. |
Reference:
http://www.cisco.com/en/US/products/hw/switches/ps628/products_configuration_guide_chapter09186a00800d 6 |
|
The network security policy for Certkiller requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface
should be automatically disabled. Which two commands must the Certkiller network administrator configure on the 2950 Catalyst switch to meet this policy? (Choose two) A. SW Certkiller 1(config-if)# switchport port-security maximum 1 B. SW Certkiller 1(config)# mac-address-table secure C. SW Certkiller 1(config)# access-list 10 permit ip host D. SW Certkiller 1(config-if)# switchport port-security violation shutdown E. SW Certkiller 1(config-if)# ip access-group 10 |
Explanation
Catalyst switches offer the port security feature to control port access based on MAC addresses. To configure port security on an access layer switch port, begin by enabling it with the following interface configuration command: Switch(config-if)# switchport port-security Next, you must identify a set of allowed MAC addresses so that the port can grant them access. You can explicitly configure addresses or they can be dynamically learned from port traffic. On each interface that uses port security, specify the maximum number of MAC addresses that will be allowed access using the following interface configuration command: Switch(config-if)# switchport port-security maximum max-addr Finally, you must define how each interface using port security should react if a MAC address is in violation by using the following interface configuration command: Switch(config-if)# switchport port-security violation {shutdown | restrict | protect} A violation occurs if more than the maximum number of MAC addresses are learned, or if an unknown (not statically defined) MAC address attempts to transmit on the port. The switch port takes one of the following configured actions when a violation is detected: shutdown-The port is immediately put into the errdisable state, which effectively shuts it down. It must be re-enabled manually or through errdisable recovery to be used again. restrict-The port is allowed to stay up, but all packets from violating MAC addresses are dropped. The switch keeps a running count of the number of violating packets and can send an SNMP trap and a syslog message as an alert of the violation. protect-The port is allowed to stay up, as in the restrict mode. Although packets from violating addresses are dropped, no record of the violation is kept. |
|
|
You have configured a Certkiller switch as shown below:
Certkiller 3(config-if)# switchport port-security Certkiller 3(config-if)# switchport port-security mac-address sticky Select the action below that results from executing these commands. A. A dynamically learned MAC address is saved in the VLAN database. B. A dynamically learned MAC address is saved in the startup-configuration file. C. Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received. D. A dynamically learned MAC address is saved in the running-configuration file. E. Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received. F. None of the above |
Answer: D
Explanation: With port security, the switch supports these types of secure MAC addresses: Static secure MAC addresses-These are manually configured by using the switchport port-security mac-address mac-address interface configuration command, stored in the address table, and added to the switch running configuration. Dynamic secure MAC addresses-These are dynamically configured, stored only in the address table, and removed when the switch restarts. Sticky secure MAC addresses-These are dynamically configured, stored in the address table, and added to the running configuration. If these addresses are saved in the configuration file, when the switch restarts, the interface does not need to dynamically reconfigure them. You can configure an interface to convert the dynamic MAC addresses to sticky secure MAC addresses and to add them to the running configuration by enabling sticky learning. To enable sticky learning, enter the switchport port-security mac-address sticky interface configuration command. When you enter this command, the interface converts all the dynamic secure MAC addresses, including those that were dynamically learned before sticky learning was enabled, to sticky secure MAC addresses. The interface adds all the sticky secure MAC addresses to the running configuration. The sticky secure MAC addresses do not automatically become part of the configuration file, which is the startup configuration used each time the switch restarts. If you save the sticky secure MAC addresses in the configuration file, when the switch restarts, the interface does not need to relearn these addresses. If you do not save the sticky secure addresses, they are lost. |
Reference:
http://www.cisco.com/en/US/docs/switches/lan/catalyst2950/software/release/12.1_11_ea1/configuration/guide/ s |
|
Why would the Certkiller network administrator configure port security on a new
Certkiller switch? A. To prevent unauthorized Telnet access to a switch port. B. To limit the number of Layer 2 broadcasts on a particular switch port. C. To prevent unauthorized hosts from accessing the LAN. D. To protect the IP and MAC address of the switch and associated ports. E. To block unauthorized access to the switch management interfaces over common TCP ports. F. None of the above |
Answer: C
Explanation: You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port. If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged. |
Reference:
http://www.cisco.com/en/US/products/hw/switches/ps628/products_configuration_guide_chapter09186a00800d 6 |
|
Certkiller is using private IP addressing in their network. Which of the following IP
addresses is a private IP address? (Select all that apply) A. 12.0.0.1 B. 168.172.19.39 C. 172.20.14.36 D. 172.33.194.30 E. 192.168.42.34 F. 11.11.11.1 |
Answer: C, E
Explanation: Range of IP Addresses Class of Networks Number of Network 10.0.0.0 to 10.255.255.255.255 A 1 172.16.0.0 to 172.31.255.255 B 16 192.168.0.0 to 192.168.255.255 C 256 |
|
|
Certkiller is migrating to a private IP addressing scheme. Which of the following
describe the use of private IP addresses? (Choose two) A. Addresses chosen by Certkiller .com to communicate with the Internet. B. Addresses that cannot be routed through the public Internet. C. Addresses that can be routed through the public Internet. D. A scheme to conserve public addresses. E. Addresses licensed to enterprise or ISPs by an Internet registry organization. |
Answer: B, D
Explanation: Private IP address space has been allocated via RFC 1918. This means the addresses are available for any use by anyone and therefore the same private IP addresses can be reused. However they are defined as not routable on the public Internet. They are used extensively in private networks due to the shortage of publicly registered IP address space and therefore network address translation is required to connect those networks to the Internet. |
|