2.3 Given a scenario, configure and deploy common Ethernet switching features. Flashcards

1
Q

The same hub has Host A1 and Host B1 connected. Host A1 sends a request to communicate with Host C2. Host B1 is communicating with Host C3. There is a delay in communications between Hosts A1 and C2 until the media is clear. Which Ethernet Protocol is providing this function?

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

Broadcast domain

Carrier Sense Multiple Access/Collision Detection (CSMA/CD)

Virtual Local Area Network (VLAN)

A

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol uses schemes, such as “request to send,” to gain access to the media. Nodes listen to the media before transmitting and transmit when the media is clear. A node wanting to transmit but detecting activity, must wait and try later.

CSMA with Collision Detection (CSMA/CD) protocol defines methods for detecting a collision. When a signal present on the interface transmits and receives lines simultaneously, the node broadcasts a jam signal.

Virtual Local Area Network (VLAN) creates separate layer 2 broadcast domains on the same switch or configures separate broadcast domains across distributed switches.

Nodes that share the same broadcast address are within the same broadcast domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A systems administrator establishes a failover solution while configuring network systems. What technology does the systems administrator use to accomplish this?

Port security

Port aggregation

Port tagging

Port mirroring

A

Port aggregation means combining two or more separate links into a single channel. The Link Aggregation Control Protocol (LACP) can autonegotiate the bonded link between the switch ports and end systems.

By default, sniffing of unicast traffic by hosts attached to the same switch is prevented. Port mirroring copies all packets sent to one or more source ports to a mirror (or destination) port.

A tagged port refers to a virtual LAN (VLAN) configuration and will normally be operating as a trunk. That is, it is capable of transporting traffic addressed to multiple VLANs.

A port security configuration validates the MAC address of end systems that connect to a switch port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly