Block 7 Flashcards

0
Q

_______ ________ consists of the data link later specifications that often define how devices are to be physically and logically connected.

A

Network topology

Ex. Bus & Ring topologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

________ __________ defines how devices are addressed at the data link layer.

A

Physical Addressing.

Also known as: physical, hardware, machine, or MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ _________ uses Cyclic Redundancy Check (CRC) or Frame Check Sequences (FCS) to detect errors in transmissions.

A

Error detection and notifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What reorders frames that are received out of sequence?

A

Sequencing of data frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ ______ moderates the transmission of data so that the receiving device is not overwhelmed with more traffic that it can handle at one time.

A

Flow control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the PRIMARY METHOD of flow control for switches?

A

Buffering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

________ is a forwarding technique used in packet-switched networks.

A

Bridging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

________ devices depend on flooding and examination of source addresses in received packed headers to locate unknown devices.

A

Bridging Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True/False?

Bridges are considered software based.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True/False?

Switches are hardware based devices that use Application Specific Integrated circuits(ASIC) for faster operation.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True/False?

Bridges have advance Spanning-Tree control.

A

False

Bridges have limited Spanning-Tree control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True/False?

Switches have limited Spanning-Tree control.

A

False.

Switches have ADVANCE Spanning-Tree control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bridges can have up to __ ports.

A

Up to 16 ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Switches can have _________ of ports

A

Hundreds.

Only limited by the amount of ports available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Q.1 _________ domain is a physical or logical network segment in which data lackeys can collide with each other.

Q.2 What reduces this from happening?

A
  1. Collision domain

2. CSMA/CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_________ domain is a logical network segment defined by it’s router port connection.

All network devices can communicate with each other by using broadcasts.

A

Broadcast Domain

255.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Switches use ____ to build and maintain MAC address tables.

A

Application-Specific Integrated Circuits (ASIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Layer 2 switches are built to provide what 4 things?

A

Hardware-based bridging
Wire speed
Low latency (low delay)
Low cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are considered the MOST COMMON type of switches?

They provide network segmentation by breaking up collision domains

A

Ethernet Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the MAJOR switch functions?

A

(A)ddress Learning
(L)oop Avoidance
(F)orward/Filter Decision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which major switch function does this fall under?

The switch has no choice but to flood the network with this frame because it just try and learn the location of the destination device.

A

(A)ddress Learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Under the major switch functions what happens if a workstation does not talk for a period of time on a network?

A

Chances are that it’s MAC address heads aged out (removed) from the table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

If the destination hardware address is known and listed in the database, then the frame is _________ out only on the correct exit interface.

A

Forwarded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

This helps preserve bandwidth on the other network segments

A

Frame filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the 3 switching methods?

A

Store & Forward
Cut-Through (Real Time)
Fragment Free (Modified Cut-Through)

(SaCF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

With this frame switching method, the switch copies the entire frame into it’s buffers and computes the CRC (Cyclic Redundancy Check). If no errors are present the MAC address is used to determine the appropriate interface to use.

A

Store & Forward

This method is BEST for sending error free frames but consumes the greatest amount of processing time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

This frame switching method provides reduced latency. Provides no error checking but results in the fastest processing time.

A

Cut-Through (Real Time).

LAN switch copies only the destination (first 6 bytes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

In this frame switching method the switch waits for the COLLISION WINDOW (64 bytes) to pass before forwarding.

A

Fragment Free ( Modified Cut-Through)

Better error checking than the cut-through mode, with practically no increase in latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Switches or Bridges in a network environment can create what is referred to as a “____ ____ __ _____”

A

Single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A ____ is simply having more than one path to a destination that causes instability in the MAC address table.

A

Loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The instability of of loops causes why 3 things?

A

Broadcast Storms
Multiple Frame Copies
Multiple Lopps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

When referring to loop avoidance if the switches flood broadcasts endlessly throughout the internetwork it’s called….?

A

Broadcast Storms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

When referring to loop avoidance problems; _______ _______ ______ Is when a device can receive multiple copies of the same frame because the frame can arrive from different segments at the same time.

A

Multiple Frame Copies

MAC address filter table will be confused. Constantly updating the MAC filter table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

In reference to loop avoidance this is one if the BIGGEST PROBLEMS.

A

Multiple Loops

Loops can occur within other loops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

This protocol is used by layer 2 devices to STOP NETWORK LOOPS in networks that have more than one physical link to the same network.

A

Spanning Tree Protocol

Designed to detect loops and close or open the necessary ports to avoid such loops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What 2 categories can Ethernet switch components divided into?

A

External & Internal components

36
Q

Which category of Ethernet switch components are the physical connections to the switch?

A

External components.

37
Q

Most Ethernet switches include a _______ ____ and _______ _________

A

Console port and network interfaces

38
Q

Which external component allows locally direct access to the switch during configuration?

A

Console Port

This is where you must connect when you initially configure a “blank” switch

39
Q

This external component is where you will connect your end devices such as your computers or printers.

A

Network interfaces

A switch may also have uplink ports used for high speed connectivity to another switch or router.

40
Q

True/False?

A switch MUST have an IP address.

A

False.

A switch only requires an IP address if telnetting is required.

41
Q

What are the internal components of an Ethernet switch?

Hint - they are similar to those you find in any standard computer system.

A

ROM
Flash memory
NVRAM
RAM

42
Q

Explain the internal components of an Ethernet switch.

ROM, RAM, Flash memory and NVRAM

A

ROM- where diagnostic and bootup routines are stored. Can’t be changed (burned-in)
Flash memory- holds the IOS
RAM- called volatile memory. Config file and the IOS are executed during operation
NVRAM- non-volatile memory. Stores the startup config file (Start)

43
Q

What is a LOGICAL grouping of network computers and resources connected to an administratively defined ports on a layer 2 switch?

A

Virtual Local Area Network (VLAN)

44
Q

True/False?

VLAN’s can be used to break up broadcast domains in layer 2 switched networks

A

True

45
Q

____ _______ is also called a broadcast domain and all connected devices see all broadcast packets that are transmitted.

A

Flat Network

46
Q

True False?

As the number of VLAN’s increase so do the number of Broadcast Domains.

A

False

As the number of VLAN’s increase the number of Broadcast Domains decrease (inversely proportional)

47
Q

True/ False?

VLAN, Broadcast Domain and Subnet are interchangeable terms?

A

True

48
Q

Increased security, no geographical barriers, flexibility and scalability, and broadcast control are all benefits of ____

A

VLAN’s (Virtual Local Area Networks)

49
Q

Which VLAN benefit does this fall under?

Any unauthorized device connected to a switch port will not function or provide access to network resources?

A

Increased security

B/c the admin controls each switch port as whatever resources it is allowed to use.

50
Q

Which VLAN benefit does this fall under?

You are no longer confined to creating workgroups based on physical locations.

A

No geographical barriers

51
Q

Which VLAN benefit does this fall under?
Adds flexibility to your network by limiting or adding only the device you want in the broadcast domain regardless of it’s physical location

A

Flexibility and Scalability

52
Q

Which VLAN benefit does this fall under?
Able to create smaller broadcast domains within a switch by assigning different ports in the switch to different sub-networks.

A

Broadcast domains

53
Q

VLAN port membership assignments are split into two types. What are they?

A

Dynamic and Static

54
Q

What must be used to assign a dynamic VLAN membership?

A

VMPS (VLAN Membership Policy Server)

55
Q

In regards to VLAN Memberships: This service will tell the switch port which VLAN it belongs to based on the MAC address of the device that connects to the port.

A

VMPS (VLAN Membership Policy Server)

56
Q

In regards to VLAN Memberships which type has the administrator create VLANs and assigns the respected ports to it.

Typical method and MOST secure

A

Static VLANs

57
Q

What are the two types of LINKS modes?

A

Access Link and Trunk Link

58
Q

In regards to LINK modes which is a link that is assigned to one VLAN?

A

Access Link

Example is a connection between any host device and a switch

59
Q

In regards to LINK modes which is thought of as neutral? They will carry traffic for all VLANs unless you specifics otherwise

A

Trunk Link

60
Q

Which protocol automatically negotiates with other Cisco devices when they connect?

A

Dynamic Trunking Protocol

61
Q

In regards to LINKS modes which one is used as a point-to-point connection for switch to other switches, routers, or servers?

Large traffic flow

A

Trunk Link

62
Q

In regards to VLAN Identification Methods: what uniquely assigns a user-defined ID to each frame?

A

Frame Tagging

63
Q

What are the two identification methods that Cisco switches support?

A

ISL (Inter-Switch Link) and IEEE 802.1q

64
Q

In regards to VLAN Identification Methods: which is a Cisco proprietary protocol. It is a way of encapsulating a VLAN frame with an added header and trailer

A

Inter-Switch Link Protocol (ISL)

65
Q

In regards to VLAN Identification Methods: which is an open source standard method that uses an internal tagging process by modifying the existing internal Ethernet frame

A

IEEE 802.1q Standard

66
Q

Which Cisco proprietary protocol allows for the creation, addition, deletion, modification and synchronizing of VLANs from a central point of control within an administrative domain

A

VTP (VLAN Trunking Protocol)

67
Q

What are the 3 VTP modes of operation?

A

Server
Client
Transparent

68
Q

In regards to VTP modes which one os the central point (management) for VLAN creation within a domain?

A

Server

69
Q

In regards to VTP modes which one will receive info from the VTP server via the trunk link using multicast messaging?

Syncs to the highest revision number

A

Client

70
Q

In regards to VTP modes which one doesn’t participate on the VTP domain, but they still receive and forward VTP advertisements through trunk links?

A

Transparent

Will maintain it’s own database

71
Q

What 4 things will a VTP advertisement include?

A

Management Domain Name
Configuration revision number
VLANs
Parameters for each VLAN

72
Q

What are the 3 types of messages used with VTP advertisements?

A

Client request
Summary advertisements
Subset advertisements

73
Q

In regards to VTP advertisement message types which one can send requests for VLAN information to the server?

A

Client requests

The servers in turn will respond with both summary and subset advertisements.

74
Q

In regards to VTP advertisement message types which one is sent out every 300 seconds on VLAN-1 of whenever a change occurs.

A

Summary advertisements

75
Q

What 3 things do the summary advertisements contain?

A

Management domain name
Configuration revision number
Updater identity

76
Q

True/False?

If a switch was part of another internetwork it is best to clear everything from it’s memory and then power-cycle it.

A

True

Part of Threat of High Revision Numbers

77
Q

___ is a standardized protocol that provides a stable, fault tolerant, loop free network environment while selecting the fastest network path when redundant links exist within an internetwork

A

STP (Spanning Tree Protocol)

78
Q

In regards to STP the ______-____ _________ chooses one path on which to forward frames and places the other redundant links in blocking state to stop any network loops from occurring.

A

Spanning-tree algorithm

79
Q

______-____ ________ is the selected BEST PATH through the network that does not from a loop.

A

Spanning-Tree Instance

80
Q

What is a layer 2 device that is in control of the Spanning-Tree?

A

Root Bridge

Device with the lowest bridge ID

81
Q

True/False?

All ports on the root bridge are called designated ports and are set to “Forwarding”

A

True

Forwarding means they will pass data

82
Q

After the root bridge has been selected, all other remaining switches will become ___-____ ______

A

Non-Root Bridge

They will synchronize with the root bridge

83
Q

What is used to exchange information between layer 2 devices with STP capability?

A

BPDUs (bridge protocol data units)

84
Q

What is the default priority on all devices running the IEEE version of STP?

A

32768

It can be changed by the network administrator to a lower number

85
Q

A __________ port is one that is active and forwarding traffic

Connects one switch to the root port on another switch, but it doesn’t have to.

A

Designated Port (Forwarding)

86
Q

____ ports are in forwarding mode and provide a constant connection to the root bridge from the non-root bridge so advertisements and updates are received

A

Root Port (Listening)

87
Q

___-__________ ports are used to prevent loops.

A

Non-Designated (Blocked)