2.2 Given a scenario, configure switching technologies and features. Flashcards

1
Q

Why do most switches now support the concept of a voice or auxiliary VLAN?
- To distinguish PC and VoIP traffic without configuring a trunk
- To support more devices on the network
- To allow for easier configuration of trunk ports
- To enable faster data transfer rates

A

To distinguish PC and VoIP traffic without configuring a trunk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary difference between a subinterface and a Switched Virtual Interface (SVI)?

  • Subinterfaces are used for routing between VLANs, while SVIs are not
  • A subinterface requires a physical interface, while an SVI does not
  • An SVI can only be used on routers, while subinterfaces are for switches
  • SVIs are used for encrypting VLAN traffic, while subinterfaces are not
A

subinterface requires a physical interface, while an SVI does not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network engineer configures network connectivity. Identify how switches will work if the engineer configures the spanning tree protocol (STP). (Select two.)

  • Hosts can configure IPv6 addresses automatically
  • Each switch determines the shortest path to the root.
  • Switches are organized into a hierarchy.
  • Hosts are allowed to discover other nodes.
A
  • Each switch determines the shortest path to the root.
  • Switches are organized into a hierarchy.

Each switch determines the shortest path to the root bridge by exchanging information with other switches. This STP information gets packaged as bridge protocol data unit (BPDU) multicast frames.

Switches organize into a hierarchy, with the switch at the top of the hierarchy being the root. The switch with the lowest ID, comprising a priority value and the MAC address, will be selected as the root.

The neighbor discovery protocol features address autoconfiguration that enables a host to configure IPv6 addresses for its interfaces automatically and detect whether an address is already in use on the local network.

The neighbor discovery protocol features local address resolution, which allows a host to discover other nodes and routers on the local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A sysadmin has set a network switch to autonegotiate.

What does this setting impact?

  • Mirroring
  • Speed
  • Aggregation
  • Connectivity
A
  • Speed
    Switches support a range of Ethernet standards so older and newer network adapters can all connect to the same network. In most cases, a sysadmin sets a port on the switch to autonegotiate speed (10/100/1000 Mbps.)

When a switch needs to connect to another switch, communications would fail if both interfaces used MDI-X. Nowadays, most switch interfaces configure to use auto-MDI/MDIX by default.

Port aggregation combines two or more separate cabled links into a single logical channel. From the host end, this is known as NIC teaming. This will not improve speed in this situation.

Port mirroring copies all packets sent to one or more source ports to a mirror (or destination) port. This does not set the switch’s speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A systems administrator increases the speed of network connections by using a technique that auto negotiates a bonded connection between switch ports and end systems.

What technology is the systems administrator using to accomplish this?
-Port aggregation
- Port mirroring
- Port security
- Port tagging

A
  • Port aggregation
    Port aggregation means combining two or more separate links into a single channel. The Link Aggregation Control Protocol (LACP) can auto negotiate the bonded link between the switch ports and end systems.

By default, sniffing of unicast traffic by hosts attached to the same switch is prevented. Port mirroring copies all packets sent to one or more source ports to a mirror (or destination) port.

A tagged port refers to a virtual LAN (VLAN) configuration and will normally be operating as a trunk. That is, it is capable of transporting traffic addressed to multiple VLANs.

A port security configuration validates the MAC address of end systems that connect to a switch port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

While deploying a VoIP network for a small business, a telecom company configures which options? (Select two.)

  • Untagged Frames
  • Auxiliary VLAN
  • Circuit-based transmission
  • Multiple Broadcast domains
A
  • Auxiliary VLAN
  • Multiple Broadcast domains
    Most switches now support the concept of a voice or auxiliary VLAN (Virtual LAN) to distinguish a PC/data and VoIP traffic without having to configure a trunk.

A VLAN (Virtual LAN) creates its own broadcast domain. Therefore, the engineer uses multiple broadcast domains when integrating a data and voice network with VLANs.

Voice over IP (VoIP) transmits voice traffic as data packets rather than over circuit-based transmission lines found in traditional analog phone systems.

To differentiate traffic, a switch that handles VoIP traffic will only accept tagged frames that match the configured voice VLAN ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens when an 802.1Q tagged frame is received on an untagged port?
- The frame is forwarded with the tag intact
- The frame is dropped
- The tag is stripped, and the frame is forwarded to the host
- The port is automatically converted to a tagged port

A
  • The tag is stripped, and the frame is forwarded to the host
    When an untagged port receives an 802.1Q tagged frame, it strips the tag before forwarding the frame to the host. This is because the host connected to an untagged port is not expected to understand VLAN tags.

The frame is not forwarded with the tag intact; the tag is removed.

The frame is not dropped; it is processed by removing the tag.

The port does not automatically convert to a tagged port upon receiving a tagged frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When implementing jumbo frames, what is crucial to ensure among all hosts and appliances along the communications path?

  • That they all support the same MTU
  • That they eliminate the need for EtherType fields
  • That they support a standard Ethernet frame size of 1518 bytes
  • That they use a fixed error checking field size
A
  • That they all support the same MTU
    When implementing jumbo frames, it is critical that all hosts and appliances (switches and routers) along the communications path support the same MTU to ensure compatibility and proper functioning. The other options are incorrect as they do not directly relate to the implementation requirements of jumbo frames.

The focus when implementing jumbo frames is on supporting larger MTUs than the standard, not just the standard frame size.

Using a fixed error checking field size is not a requirement specific to jumbo frames; error checking field size is standard across Ethernet frames.

That they eliminate the need for EtherType fields is incorrect because the EtherType field is necessary for indicating the protocol type within the frame and is unrelated to the implementation of jumbo frames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following describes a technique that constitutes a form of link aggregation?
- Redundant circuits
- Clustering
- Load balancing
- NIC teaming

A
  • NIC teaming
    Link aggregation means combining two or more separate cabled links into a single logical channel. When done from the host end, this is called NIC teaming.

A load balancer can switch client traffic to alternative processing nodes, reducing bottlenecks and allowing for failover services in the event of a host or network route going down.

A cluster is a group of servers, each of which is referred to as a node, that provides redundancy and fault tolerance for critical applications.

A redundant circuit is two separate power supply lines from electricity suppliers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network technician needs to set up the ability to auto-negotiate a bonded link between the switch ports and the end system.

Which of the following should they set up?

A
  • Link Aggregation Control Protocol
    Link Aggregation Control Protocol (LACP), which can be used to auto-negotiate the bonded link between the switch ports and the end system, detects configuration errors and recovers from the failure of one of the physical links.

Port mirroring copies all packets sent to one or more source ports to a mirror (or destination) port.

The Spanning Tree Protocol (STP) is a means for the bridges or switches to organize themselves into a hierarchy. The switch at the top of the hierarchy is the root.

When Ethernet is wired with a hub, there must be a means of distinguishing the interface on an end system versus an intermediate system. The interface on the hub is called an MDI crossover (MDI-X).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the model typically used in spine and leaf topologies to connect distribution switches to server nodes and provide higher bandwidth than the typical workgroup switch?
- Fibre Channel
- Top-of-rack switching
- Software-defined network
- Core

A
  • Top of rack switching
    Top-of-rack switching refers to the practice of using switches specifically made to provide high-bandwidth links between distribution switches and server nodes.

A software-defined network does not serve the purpose of connecting server nodes to distribution switches. The software-defined network makes all parts of the network infrastructure accessible to automation and orchestration technologies.

Fibre Channel (FC) connects storage area networks via fiber technologies, not server nodes and distribution switches. Fibre Channel involves three components: the initiator, the target, and the FC switch.

The core is a layer of the hierarchical network model that provides a highly available network backbone. This layer comprises connections between wide area network (WAN) routers/firewalls and layer 3 switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly