2.2 Given a scenario, configure switching technologies and features. Flashcards

(19 cards)

1
Q

Why do most switches now support the concept of a voice or auxiliary VLAN?
- To distinguish PC and VoIP traffic without configuring a trunk
- To support more devices on the network
- To allow for easier configuration of trunk ports
- To enable faster data transfer rates

A

To distinguish PC and VoIP traffic without configuring a trunk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary difference between a subinterface and a Switched Virtual Interface (SVI)?

  • Subinterfaces are used for routing between VLANs, while SVIs are not
  • A subinterface requires a physical interface, while an SVI does not
  • An SVI can only be used on routers, while subinterfaces are for switches
  • SVIs are used for encrypting VLAN traffic, while subinterfaces are not
A

subinterface requires a physical interface, while an SVI does not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network engineer configures network connectivity. Identify how switches will work if the engineer configures the spanning tree protocol (STP). (Select two.)

  • Hosts can configure IPv6 addresses automatically
  • Each switch determines the shortest path to the root.
  • Switches are organized into a hierarchy.
  • Hosts are allowed to discover other nodes.
A
  • Each switch determines the shortest path to the root.
  • Switches are organized into a hierarchy.

Each switch determines the shortest path to the root bridge by exchanging information with other switches. This STP information gets packaged as bridge protocol data unit (BPDU) multicast frames.

Switches organize into a hierarchy, with the switch at the top of the hierarchy being the root. The switch with the lowest ID, comprising a priority value and the MAC address, will be selected as the root.

The neighbor discovery protocol features address autoconfiguration that enables a host to configure IPv6 addresses for its interfaces automatically and detect whether an address is already in use on the local network.

The neighbor discovery protocol features local address resolution, which allows a host to discover other nodes and routers on the local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A sysadmin has set a network switch to autonegotiate.

What does this setting impact?

  • Mirroring
  • Speed
  • Aggregation
  • Connectivity
A
  • Speed
    Switches support a range of Ethernet standards so older and newer network adapters can all connect to the same network. In most cases, a sysadmin sets a port on the switch to autonegotiate speed (10/100/1000 Mbps.)

When a switch needs to connect to another switch, communications would fail if both interfaces used MDI-X. Nowadays, most switch interfaces configure to use auto-MDI/MDIX by default.

Port aggregation combines two or more separate cabled links into a single logical channel. From the host end, this is known as NIC teaming. This will not improve speed in this situation.

Port mirroring copies all packets sent to one or more source ports to a mirror (or destination) port. This does not set the switch’s speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A systems administrator increases the speed of network connections by using a technique that auto negotiates a bonded connection between switch ports and end systems.

What technology is the systems administrator using to accomplish this?
-Port aggregation
- Port mirroring
- Port security
- Port tagging

A
  • Port aggregation
    Port aggregation means combining two or more separate links into a single channel. The Link Aggregation Control Protocol (LACP) can auto negotiate the bonded link between the switch ports and end systems.

By default, sniffing of unicast traffic by hosts attached to the same switch is prevented. Port mirroring copies all packets sent to one or more source ports to a mirror (or destination) port.

A tagged port refers to a virtual LAN (VLAN) configuration and will normally be operating as a trunk. That is, it is capable of transporting traffic addressed to multiple VLANs.

A port security configuration validates the MAC address of end systems that connect to a switch port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

While deploying a VoIP network for a small business, a telecom company configures which options? (Select two.)

  • Untagged Frames
  • Auxiliary VLAN
  • Circuit-based transmission
  • Multiple Broadcast domains
A
  • Auxiliary VLAN
  • Multiple Broadcast domains
    Most switches now support the concept of a voice or auxiliary VLAN (Virtual LAN) to distinguish a PC/data and VoIP traffic without having to configure a trunk.

A VLAN (Virtual LAN) creates its own broadcast domain. Therefore, the engineer uses multiple broadcast domains when integrating a data and voice network with VLANs.

Voice over IP (VoIP) transmits voice traffic as data packets rather than over circuit-based transmission lines found in traditional analog phone systems.

To differentiate traffic, a switch that handles VoIP traffic will only accept tagged frames that match the configured voice VLAN ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens when an 802.1Q tagged frame is received on an untagged port?
- The frame is forwarded with the tag intact
- The frame is dropped
- The tag is stripped, and the frame is forwarded to the host
- The port is automatically converted to a tagged port

A
  • The tag is stripped, and the frame is forwarded to the host
    When an untagged port receives an 802.1Q tagged frame, it strips the tag before forwarding the frame to the host. This is because the host connected to an untagged port is not expected to understand VLAN tags.

The frame is not forwarded with the tag intact; the tag is removed.

The frame is not dropped; it is processed by removing the tag.

The port does not automatically convert to a tagged port upon receiving a tagged frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When implementing jumbo frames, what is crucial to ensure among all hosts and appliances along the communications path?

  • That they all support the same MTU
  • That they eliminate the need for EtherType fields
  • That they support a standard Ethernet frame size of 1518 bytes
  • That they use a fixed error checking field size
A
  • That they all support the same MTU
    When implementing jumbo frames, it is critical that all hosts and appliances (switches and routers) along the communications path support the same MTU to ensure compatibility and proper functioning. The other options are incorrect as they do not directly relate to the implementation requirements of jumbo frames.

The focus when implementing jumbo frames is on supporting larger MTUs than the standard, not just the standard frame size.

Using a fixed error checking field size is not a requirement specific to jumbo frames; error checking field size is standard across Ethernet frames.

That they eliminate the need for EtherType fields is incorrect because the EtherType field is necessary for indicating the protocol type within the frame and is unrelated to the implementation of jumbo frames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following describes a technique that constitutes a form of link aggregation?
- Redundant circuits
- Clustering
- Load balancing
- NIC teaming

A
  • NIC teaming
    Link aggregation means combining two or more separate cabled links into a single logical channel. When done from the host end, this is called NIC teaming.

A load balancer can switch client traffic to alternative processing nodes, reducing bottlenecks and allowing for failover services in the event of a host or network route going down.

A cluster is a group of servers, each of which is referred to as a node, that provides redundancy and fault tolerance for critical applications.

A redundant circuit is two separate power supply lines from electricity suppliers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network technician needs to set up the ability to auto-negotiate a bonded link between the switch ports and the end system.

Which of the following should they set up?

A
  • Link Aggregation Control Protocol
    Link Aggregation Control Protocol (LACP), which can be used to auto-negotiate the bonded link between the switch ports and the end system, detects configuration errors and recovers from the failure of one of the physical links.

Port mirroring copies all packets sent to one or more source ports to a mirror (or destination) port.

The Spanning Tree Protocol (STP) is a means for the bridges or switches to organize themselves into a hierarchy. The switch at the top of the hierarchy is the root.

When Ethernet is wired with a hub, there must be a means of distinguishing the interface on an end system versus an intermediate system. The interface on the hub is called an MDI crossover (MDI-X).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the model typically used in spine and leaf topologies to connect distribution switches to server nodes and provide higher bandwidth than the typical workgroup switch?
- Fibre Channel
- Top-of-rack switching
- Software-defined network
- Core

A
  • Top of rack switching
    Top-of-rack switching refers to the practice of using switches specifically made to provide high-bandwidth links between distribution switches and server nodes.

A software-defined network does not serve the purpose of connecting server nodes to distribution switches. The software-defined network makes all parts of the network infrastructure accessible to automation and orchestration technologies.

Fibre Channel (FC) connects storage area networks via fiber technologies, not server nodes and distribution switches. Fibre Channel involves three components: the initiator, the target, and the FC switch.

The core is a layer of the hierarchical network model that provides a highly available network backbone. This layer comprises connections between wide area network (WAN) routers/firewalls and layer 3 switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following are examples of link aggregation/NIC teaming? (select TWO)

  • Bonding two uplink transceivers to create a 20 Gbps channel to a router
  • Combining two 1 Gbps ports to create a 2 Gbps link to a workgroup switch
  • Connecting a computer to a wireless network and a wired network simultaneously for internet access
  • Using a single 10 Gbps port to connect to a high-speed server
A

Bonding two uplink transceivers to create a 20 Gbps channel to a router
Combining two 1 Gbps ports to create a 2 Gbps link to a workgroup switch

The following are examples of link aggregation/NIC teaming:

Combining two 1 Gbps ports to create a 2 Gbps link to a workgroup switch. This is a classic example of link aggregation, where multiple network interfaces (in this case, two 1 Gbps ports) are combined to increase the total bandwidth available for network traffic, resulting in a 2 Gbps link.
Bonding two uplink transceivers to create a 20 Gbps channel to a router. This example involves combining multiple network connections (two uplink transceivers) to significantly increase the bandwidth (to 20 Gbps) between a workgroup switch and a router, which is another application of link aggregation.
Using a single network interface for connectivity, which does not involve combining multiple connections into one, and therefore, is not an example of link aggregation or NIC teaming.

While connecting a computer to a wireless network and a wired network simultaneously for internet access uses multiple network interfaces, it does not combine them into a single logical connection for increased bandwidth or redundancy, which is the essence of link aggregation/NIC teaming. Instead, it’s a form of network redundancy or failover.

Configuring a firewall to block all incoming connections is related to network security and has nothing to do with combining multiple network connections into a single logical channel, which is the primary function of link aggregation/NIC teaming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An engineer has currently set a data payload or maximum transmission unit (MTU) to 1,500 bytes. The network the frames traverse uses a 10GB switching fabric. The MTU limit is causing network congestion due to the high number of frames.

What can the engineer implement to resolve this issue?

Link aggregation protocol
Flow control
Port Aggregation
Jumbo Frames

A
  • Jumbo Frames
    A jumbo frame supports a data payload of up to around 9,000 bytes (rather than 1500). This reduces the number of frames that need transmitting, which reduces the number of processing that switches and routers do.

IEEE 802.3x flow control allows a server to instruct the switch to pause traffic temporarily to avoid overwhelming its buffer and causing it to drop frames.

Port aggregation combines two or more separate cabled links into a single logical channel. From the host end, this is also known as NIC teaming. This will not improve bandwidth in this situation.

The Link Aggregation Control Protocol (LACP) can auto negotiate the bonded link between the switch ports and the end system to recover from a physical failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

As a network administrator, you have been tasked with organizing your network in a way that will help secure the development team’s network traffic by keeping it separate from other departments.

Which of the following would be the BEST way to do this?

  • Implement OSPF
  • Implement CSMA/CD
  • Create a VLAN that includes only the development team’s devices
  • Implement routing internet protocol
A
  • Create a VLAN that includes only the development team’s devices
    The best option would be to create a VLAN for only the department team’s devices. This will isolate their network traffic from all other traffic in the network. This will also add a layer of security.

OSPF, or Open Shortest Path First, is a routing protocol for Internet Protocol networks. This is not the best choice for securing the development team’s traffic.

Routing Internet Protocol, or RIP, is a routing protocol used to decide the most efficient route on a network, not to protect devices.

CSMA/CD is an algorithm used with half-duplex devices that senses if a data channel is already in use and proscribes steps for trying to resend the transmission. This is not helpful in securing the development team’s network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A sysadmin has set a network switch to autonegotiate.

What does this setting impact?

  • Speed
  • Aggregation
  • Mirroring
  • Connectivity
A
  • Speed
    Switches support a range of Ethernet standards so older and newer network adapters can all connect to the same network. In most cases, a sysadmin sets a port on the switch to autonegotiate speed (10/100/1000 Mbps.)

When a switch needs to connect to another switch, communications would fail if both interfaces used MDI-X. Nowadays, most switch interfaces configure to use auto-MDI/MDIX by default.

Port aggregation combines two or more separate cabled links into a single logical channel. From the host end, this is known as NIC teaming. This will not improve speed in this situation.

Port mirroring copies all packets sent to one or more source ports to a mirror (or destination) port. This does not set the switch’s speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The most efficient communication method ensures Ethernet communicates in which way?

  • Half-duplex
  • Full-duplex
  • Non-Shared
  • Collision Free
A
  • Full duplex
    Full-duplex communication is not possible with collision detection. Full-duplex would mean that send and receive can happen at the same time from a node.

The collision detection mechanism means that only half-duplex transmission is possible. This means that a node can transmit or receive, but it cannot do both at the same time.

Each network node connected to the same media is in the same collision domain. The collisions become more frequent with the addition of more nodes, and consequently, it reduces the effective data rate. Ethernet is not collision free.

Ethernet is a multiple access area network, which means that the available communications capacity, shared between the nodes, connect to the same media.

17
Q

An engineer notices a large number of frames traversing a network. While frames are not getting dropped, the traffic from the frames is taxing switches in a network closet.

What will the engineer MOST likely implement to resolve this issue?

  • Port aggregation
  • Flow control
  • Link Aggregation protocol
  • Jumbo Frames
A
  • Jumbo Frames
    A jumbo frame supports a data payload of up to around 9,000 bytes (rather than 1500). This reduces the number of frames that need transmitting, which reduces the number of processing that switches and routers do.

IEEE 802.3x flow control allows a server to instruct the switch to pause traffic temporarily to avoid overwhelming its buffer and causing it to drop frames.

Port aggregation combines two or more separate cabled links into a single logical channel. From the host end, this is also known as NIC teaming. This will not improve bandwidth in this situation.

The Link Aggregation Control Protocol (LACP) can auto negotiate the bonded link between the switch ports and the end system to recover from a physical failure

18
Q

An engineer configures a voice over IP (VoIP) implementation on an existing data network.

What approach does the engineer use while avoiding the use of trunk ports? (Select two.)

  • Untagged frames
  • Auxiliary VLAN
  • Multiple broadcast domains
  • Circuit-based transmission
A
  • Auxiliary VLAN
  • Multiple broadcast domains
    Most switches now support the concept of a voice or auxiliary VLAN (Virtual LAN) to distinguish a PC/data and VoIP traffic without having to configure a trunk.

A VLAN (Virtual LAN) creates its own broadcast domain. Therefore, the engineer uses multiple broadcast domains when integrating a data and voice network with VLANs.

Voice over IP (VoIP) transmits voice traffic as data packets rather than over circuit-based transmission lines found in traditional analog phone systems.

To differentiate traffic, a switch that handles VoIP traffic will only accept tagged frames that match the configured voice VLAN ID.