0% found this document useful (0 votes)
58 views6 pages

Correct Answer: B Explanation:: Home Previous Up Next

1. Layer 3 switching is based on hardware based routing, whereas layer 2 switching is based on hardware based bridging and MAC addresses. 2. By default, the management VLAN resides in VLAN 1. 3. The primary objective of core layer switches is to switch traffic as fast as possible and provide connectivity between different network blocks.

Uploaded by

ABBASSI RABAH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views6 pages

Correct Answer: B Explanation:: Home Previous Up Next

1. Layer 3 switching is based on hardware based routing, whereas layer 2 switching is based on hardware based bridging and MAC addresses. 2. By default, the management VLAN resides in VLAN 1. 3. The primary objective of core layer switches is to switch traffic as fast as possible and provide connectivity between different network blocks.

Uploaded by

ABBASSI RABAH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Q1. Which of the following uses hardware based routing?

A. Layer 2 Switching

B. Layer 3 Switching

C. Layer 5 Switching

D. Layer 1 Switching

Correct Answer: B

Explanation:

Layer 2 switching is based on hardware based bridging, whereas Layer 3 switching is based
on hardware based routing. Layer 2 switching is done based on physical (MAC) addresses,
whereas Layer 3 switching is based on logical address.

Q2. By default, the management VLAN resides in which VLAN number?

A. 0

B. 1

C. 2

D. 10

Correct Answer: B

Home     Previous     Up     Next

Q3. In a Switch network, what is the primary objective of Core Layer switches?

A. To filter traffic based on source address

B. To provide access to end users

C. To switch traffic as fast as possible

D. To provide shared bandwidth, VLAN domains, and LAN segmentation.

Correct Answer: C

Explanation:

The primary function of a Core Layer is to switch traffic as fast as possible and providing
connectivity between switch blocks, WAN blocks and/ or any other blocks that may be
present.
The Distribution Layer is responsible for routing traffic between VLANs, Broadcast domain
definition, Inter-VLAN routing, and security.
The Access Layer is responsible for Layer 2 services, such as VLAN membership, traffic
filtering based on broadcast or MAC addresses.

Home     Previous     Up     Next

Q4. During the exchange of BDPUs, to choose the ports that will be forwarding (and ports
that will be blocked), the Spanning-Tree Algorithm on a switch may use which three
components? [Choose 3]

A. Path cost

B. Subnet mask

C. Bridge ID

D. Port ID

Correct Answer: A,C,D

Explanation:

During the process of Spanning-Tree Algorithm execution, some redundant ports need to be
blocked. This is required to avoid bridging loops. To choose which port to use for forwarding
frames, and which port to block, the following three components are used by the Spanning-
Tree Protocol:
1. Path Cost: The port with lowest path cost is placed in the forwarding mode. Other ports are
placed in blocking mode.
2. Bridge ID: If the path costs are equal, then the bridge ID is used to determine which port
should forward. The port with the lowest Bridge ID is elected to forward, and all other ports
are blocked.
3. Port ID: If the path cost and bridge ID are equal, the Port ID is used to elect the forwarding
port. The lowest port ID is chosen to forward. This type of situation may araise when there are
parallel links, used for redundancy.

Home     Previous     Up     Next

Q5. Which Spanning-Tree port state allows addition of information that a switch port has
learned, to its address table?

A. Listen

B. Learn

C. Forward

D. Disabled

Correct Answer: B
Explanation:

A switch, participating in Spanning-Tree protocol, passes through the following states:


1. Blocked state: This is the initial state. All ports are put in a blocked state to prevent
bridging loops. 
2. Listen state: This is the second state of switch ports. Here all the ports are put in listen
mode. The port can listen to frames but can't send. The period of time that a switch takes to
listen is set by "fwd delay" . 
3. Learn state: Learn state comes after Listen state. The only difference is that the port can add
information that it has learned to its address table. The period of time that a switch takes to
learn is set by "fwd delay". 
4. Forward state: A port can send and receive data in this state. Before placing a port in
forwarding state, Spanning-Tree Protocol ensures that there are no redundant paths or loops.
5. Disabled state: This is the state when the switch port is disabled. A switch port may be
disabled due to administrative reasons or due to switch specific problems.

Home     Previous     Up     Next

Q6. Which one of the following statements is true about SPAN/RSPAN?

A. You cannot configure SPAN sessions on disabled ports

B. A switch does not support a combination of local SPAN and RSPAN in a single session.

C. You cannot run both a local SPAN and an RSPAN source session in the same switch stack.

D. Sources can be ports or VLANs, and you can mix source ports and source VLANs in the
same session.

E. The source port (monitored port) can be a destination port.

Correct Answer: B

Explanation:

Given below are some of the important characteristics of SPAN/RSPAN:

1. You can configure SPAN sessions on disabled ports 


2. The switch does not support a combination of local SPAN and RSPAN in a single session. 
3. You can run both a local SPAN and an RSPAN source session in the same switch stack. 
4. Sources can be ports or VLANs, but you cannot mix source ports and source VLANs in the
same session. 
5. The monitored port cannot be a destination port. In otherwords, a destination port cannot be
monitored.
6. You can monitor multiple source ports in a single session. 
7. Source port can be an access port, trunk port, or voice VLAN port. 
8. If a destination port belongs to a source VLAN, it is excluded from the source list and is not
monitored. 
9. You can monitor only Ethernet VLANs. 
10. The destination port does not participate in any of the Layer 2 protocols (STP, VTP, CDP,
DTP, PagP). 
11. The destination port can participate in only one SPAN session at a time (a destination port
in one SPAN session cannot be a destination port for a second SPAN session).

HSRP router IP address


Home     Previous     Up     Next

Q7. The hosts served by HSRP router, use the IP address of virtual router as the default IP
address.

A. TRUE

B. FALSE

Correct Answer: A

Explanation:

True, the hosts served by HSRP (Hot Standby Routing Protocol) router use the IT address of
virtual router as the default IP address.

Home     Previous     Up     Next

Q8. VTP version 1 and VTP version 2 are interoperable.

A. TRUE

B. FALSE

Correct Answer: B

Explanation:

There are two different VTP versions. VTP version 1 and VTP version 2. These versions are
not interoperable. Version 1 is the default version. All switches in a given management
domain should be configured in either version 1 or version 2. Some of the advantages of VTP
version 2 are as below:
1. Token Ring support: Supports Token Ring LAN switching and VLANs. If Token Ring is
used, this is the version required.
2. Version number auto propagation: In case that all switches are capable of running Version
2, only one switch need to be Version 2 enabled, Version number is automatically propagated
to others.

Access Layer
Home     Previous     Up     Next
Q9. Which one of the following heirarchical layers consists of low cost, high port density
devices?

A. Core Layer

B. Distribution Layer

C. Access Layer

D. Multi Layer

Correct Answer: C

Explanation:

The devices functioning at Access Layer are usually characterized with higher port density
and lower cost. These devices also provide LAN segmentation.
Typically, the following are performed at the Access Layer (AL): 

1.Enable MAC address filtering: Here, the switch is configured to allow/deny access to
network resources depending on the host machine's MAC address (also called the physical
address). 
2.Create separate collision domains: A switch can be configured to use separate collision
domain for each connected node to improve performance. 
3.Support for various devices: The campus access layer supports multiple device types—
including phones, APs, video cameras, and laptops, with each requiring specific services and
policies. 
4.Handle switch bandwidth: You can move data from one network to another to perform load
balancing.

Home     Previous     Up    

Q10. Which of the following release of Catalyst switches is compatible with PVST+
implementation of Spanning-Tree protocol?

A. Catalyst 2.0 release or above

B. Catalyst 3.0 release or above

C. Catalyst 4.0 release or above

D. Catalyst 4.1 release or above

Correct Answer: D

Explanation:

PVST+ is available with Catalyst 4.1 release or above. Switches before release 4.1 are
compatible with PVST implementation of Spanning-Tree. Note that PVST+ is backward
compatible. PVST+ is also compatible with 802.1Q implementation of CST (Common
Spanning Tree) protocol. PVST+ is in fact requires no configuration to make it compatible
with PVST (Plug and play compatible).

You might also like