Theory Mock Questions Flashcards
(44 cards)
With reference to the figure, identify the Device?
- Firewall
- Hub
- Switch
- Router
Hub
A resilient network is essential. Which topology should be implemented to facilitate redundancy in the switch design?
Linear Bus
Star
Partial Mesh
Full Mesh
Partial Mesh
You have been tasked with renaming the switches within your organisation. Which one of the following would not change the Switch name as it is unacceptable?
R1(config)#host GlasgowEast
R1(config)#hostname Glasgow East
R1(config)#hostname GlasgowEast
R1(config)#host Glasgow_East
R1(config)#hostname Glasgow East
Which one of the following commands can be used to view if the switch is a server or a client ?
show VTP status
show VLAN brief
show VTP brief
show VLAN database
show VTP status
Which one of the following commands can be used to view the configuration of a port on a switch?
show interface fa 0/1
show interface ge 1/0
show interface fa 0/0
show interface ge 0/0
show interface fa 0/1
What is symmetric switching?
Switch ports are configured with the same speed
Switching between ports with multiple different speeds of like speed
Switch ports are configured with different speeds
Routing between ports of different speeds
Switch ports are configured with the same speed
Which switch frame forwards mode has the greatest latency?
Store and forward
Cut through
fragment free
Cut through store and forward
Store and forward
Which switch frame forwarding mode begins to sending the data as soon as the destination address is identified?
fragment free
store and forward
Cut through
Cut through store forward
Cut through
Identify the protocols used for remote access
SSH & Telnet
FTP & Telnet
HTTP & SSH
Telnet & HTTP
SSH & Telnet
A switch has yet to populate its MAC address table. What will happen when the switch receives a packet?
Populate the MAC table with the frame source address and forward the frame out all ports except the port on which the frame was received
Discard the frame
Discard the source address and forward frame out all ports
Populate the MAC table with the frame destination address and forward the frame out all ports except the port on which the frame was received
Populate the MAC table with the frame source address and forward the frame out all ports except the port on which the frame was received
What is the function of CRC?
switches packet to correct destination
prevents loops in switching
encapsulates data
error-detecting code commonly to detect accidental changes to raw data
error-detecting code commonly to detect accidental changes to raw data
What of the following would be the last host address of the 172.29.64.64/27?
172.29.64.0/27
172.29.64.126/27
172.29.64.94/27
172.29.64.65/27
172.29.64.94/27
Port security is a function of which layer of the Cisco 3 Tier Model?
Backbone layer
Access Layer
Distribution Layer
Core Layer
Access Layer
Which of the following is the most common and effective switch topology utilised in modern LANs?
Star
Full Mesh
Hierarchical Tree
Linear Bus
Hierarchical Tree
Store and Forward is a method of forwarding data via a switch. Which one of the following best describes Store and Forward?
The switch will analyse the entire frame for the destination MAC address and then forward the frame
The switch will analyse the entire frame for the destination MAC address and then forward the packet
The switch will analyse the entire frame for the destination MAC address and then forward the frame
Which one of the following commands can be used to view which VLAN a port is associated with?
show ver
show int f0/1
show VTP status
show vlan brief
show vlan brief
What is the command to add a VLAN to your switch?
(config)#create VLAN 10
(config-if)# VLAN 10
(config)#int VLAN 10
(config-router)#int VLAN 10
(config-if)# VLAN 10
What protocol is use when configuring router-on-a-stick?
802.1p
SSH
802.1q
encapsulation
802.1q
What is the function of VTP Pruning?
Prevents switching loops
Minimises the area a LAN covers
Stops VLAN communications
Restricts the flood of broadcasts to only areas requiring these broadcasts
Restricts the flood of broadcasts to only areas requiring these broadcasts
Which trunking protocol operating mode will not learn VLAN information from a VTP Server?
Server
Cisco
Client
Transparent
Transparent
Which one of the following list of commands would you require set a switch as a VTP client? The password required is switch.
Switch(Config)# Show run
Switch(Config)# vtp mode client
Switch(Config)# vtp password switch
Switch(Config)# vtp client
Switch(Config)# vtp domain cisco
Switch(Config)# vtp password switch
Switch(Config)# Int f0/1
Switch(Config)# vtp domain cisco
Switch(Config)# vtp password switch
Switch(Config)# vtp mode client
Switch(Config)# vtp domain Cisco
Switch(Config)# vtp password switch
Switch(Config)# vtp mode client
Switch(Config)# vtp domain Cisco
Switch(Config)# vtp password switch
Switches will compare the priority and MAC address for the lowest value to identify which of the following?
Root Switch
VTP Client
Root Bridge
VTP Server
Root Bridge
Which of the following is the correct term that refers to the process of when a switch creates a dedicated path for sending and receiving transmissions with each connected host. Each host then has a separate collision domain and a dedicated bandwidth?
Tunneling
Micro Segmentation
Encapsulation
Packet Switching
Micro Segmentation
Which of the following is a function of a bridge protocol data unit?
Used by STP to prune routes to control broadcast
Used by VTP to communicate with other switches to control broadcasts
Used by STP to communicate with other switches to prevent switching loops
Used by VTP to identify VTP server
Used by STP to communicate with other switches to prevent switching loops