Flashcards in Network Access Q/A's Deck (30)
What's type of data is carried over a port trunk?
tagged VLAN data traffic
What type of trunking protocol is 802.1Q?
VLAN trunking protocol
What type of data is carried over a Native VLAN?
What type of data is managed over a Native VLAN?
untagged VLAN data traffic
What is the clock rate in a router used to control over it's serial interface?
data transmission speed
When changing the bandwidth on an interface what's two things are impacted?
QOS and software policy management
What is the default speed of serial interface?
What does an EtherChannel combine to create a single interface/channel for data traffic ...?
multiple physical ports
Where are VLAN trunks created from?
the sub-interface of an interface
By ignoring hello messages, BPDU guard is to used to prevent?
Port Fast when enabled immediately puts?
When Port Fast, is enabled what is disabled?
When Port Fast is enabled what should also be enabled immediately and why?
ports into forwarding state
(STP) Spanning Tree Protocol
BPDU Guard to prevent switching loops.
Telnet is what type of two way communication terminal?
Telnet transports data over a network encrypted or in-plain text?
text-orientated virtual terminal
What does SSH stand for?
SSH provides what type of communication and connection over a network?
two way encrypted communication
What does HTTP stands for?
HTTP is responsible for allowing access to what ... over a public network?
Hyper Text Transport Protocol
remote server resources
What does HTTPS stand for?
HTTPS is responsible for allowing access to what ... over a public network?
Hyper Text Transport Secure Protocol
encrypted remote server resources
Console ports on routers and switches are used for?
Dynamic ARP Inspection (DAI) is used to automatically...?
inspect and reject invalid or malicious ARP packets.
What are the three states of port security?
When a port is put in the shutdown state of port security what happens?
port shuts down, goes into an err-disable state
In the protect state of port security what happens?
unauthorized addresses drop with no logging
In the restricted state of port security what happens?
unauthorized addresses drop - logging and violation counts
Sticky MAC address in port security are assigned...?
The default behavior of port security with no additional configuration...?
only one MAC address is allowed at a time
What is port security responsible for?
Securing ports from unauthorized access
What is the recommended ratio and rule of thumb for Ether-channel from the access layer to distribution?
20 PC's to 1
A single uplink of 1 Gbps for ever 20 PC's on 1 Gbps NICs to the distribution layer.
What is the recommended ratio and rule of thumb for Ether-channel from the core layer to distribution? (general)
Recommendation is 4:1
Layer 2 Tunnel Protocol (L2TP) is responsible for supporting service delivery of?
Virtual Private Networks (VPN) by an ISP
Link Layer Discovery Protocol (LLDP) is responsible for advertising device information to?
LLDP is similar to what other protocol?
directly connected neighbors
Cisco Discover Protocol (CDP)
Broadcast address are used to send frames to ...?
all devices over a network
Circuit switching operates at what layer?
Circuit switching provides a physical path between what two things?
Circuit switching is commonly used to establish a?
What is an example of circuit switching?
source and destination
(ex. POTS Plain Old Telephone System)