CCNP_Switch_PART I

52 terms by twsted1too 

Create a new folder

Advertisement Upgrade to remove ads

CCNP_Switch_PART I

Which method of Layer 3 switching uses a forwarding information base? (FIB)*
A. Topology-based switching
B. Demand-based switching
C. Route Caching
D. Flow-Based Switching
E. None of the other alternatives apply

A. Topology-based switching

If you needed to transport traffic coming from multiple VLANs (connected between switches), and your CTO was insistent on using an open standard, which protocol would you use?*

A. 802.11B
B. spanning-tree
C. 802.1Q
D. ISL
E. VTP
F. Q.921

C. 802.1Q

Under what circumstances should an administrator prefer local VLANs over end-to-end VLANs?

A. Eighty percent of traffic on the network is destined for Internet sites.
B. There are common sets of traffic filtering requirements for workgroups located in multiple buildings.
C. Eighty percent of a workgroup's traffic is to the workgroup's own local server.
D. Users are grouped into VLANs independent of physical location.
E. None of the other alternatives apply

A. Eighty percent of traffic on the network is destined for Internet sites.

What are some virtues of implementing end-to-end VLANs? *

A. End-to-end VLANs are easy to manage.
B. Users are grouped into VLANs independent of a physical location.
C. Each VLAN has a common set of security and resource requirements for all members.
D. Resources are restricted to a single location.

B. Users are grouped into VLANs independent of a physical location.

C. Each VLAN has a common set of security and resource requirements for all members.

Which of the following statements is true about the 80/20 rule (Select all that apply)?*

A. 20 percent of the traffic on a network segment should be local
B. no more than 20 percent of the network traffic should be able to move across a backbone.
C. no more than 80 percent of the network traffic should be able to move across a backbone.
D. 80 percent of the traffic on a network segment should be local

B. no more than 20 percent of the network traffic should be able to move across a backbone.

D. 80 percent of the traffic on a network segment should be local

The Company LAN is becoming saturated with broadcasts and multicast traffic. What could you do to help a network with many multicasts and broadcasts?*

A. Creating smaller broadcast domains by implementing VLANs.
B. Separate nodes into different hubs.
C. Creating larger broadcast domains by implementing VLANs.
D. Separate nodes into different switches.
E. All of the above.

A. Creating smaller broadcast domains by implementing VLANs.

The Company LAN switches are being configured to support the use of Dynamic VLANs. Which of the following are true of dynamic VLAN membership (Select all that apply)*

A. VLAN membership of a user always remains the same even when he/she is moved to another location.
B. VLAN membership of a user always changes when he/she is moved to another location.
C. Membership can be static or dynamic.
D. Membership can be static only.
E. None of the other alternatives apply.

A. VLAN membership of a user always remains the same even when he/she is moved to another location.
C. Membership can be static or dynamic.

The Company LAN switches are being configured to support the use of Dynamic VLANs. What should be considered when implementing a dynamic VLAN solution? *

A. Each switch port is assigned to a specific VLAN.
B. Dynamic VLANs require a VLAN Membership Policy Server.
C. Devices are in the same VLAN regardless of which port they attach to.
D. Dynamic VLAN assignments are made through the command line interface.

B. Dynamic VLANs require a VLAN Membership Policy Server.
C. Devices are in the same VLAN regardless of which port they attach to.

In the three-layer hierarchical network design model; what's associated with the access layer? (Select two)*

A. optimized transport structure
B. high port density
C. boundary definition
D. data encryption
E. local VLANs
F. route summaries

B. high port density
E. local VLANs

You are assigning VLANs to the ports of switch R1. What VLAN number value is an assigned to the default VLAN?*

A. VLAN 1003
B. VLAN 1
C. VLAN ON
D. VLAN A
E. VLAN 0

B. VLAN 1

The VLANs in switch R1 are being modified. Which of the following are updated in R1 every time a VLAN is modified? (Select all that apply)*

A. Configuration revision number
B. Configuration revision flag field
C. Configuration revision reset switch
D. Configuration revision database
E. None of the other alternatives apply.

A. Configuration revision number
D. Configuration revision database

What is a characteristic of a static VLAN membership assignment?*
A. VMPS server lookup is required
B. Easy to configure
C. Easy of adds, moves, and changes
D. Based on MAC address of the connected device

B. Easy to configure

Static VLANs are being used on the Company network. What is true about static VLANs?*

A. Devices use DHCP to request their VLAN.
B. Attached devices are unaware of any VLANs.
C. Devices are assigned to VLANs based on their MAC addresses.
D. Devices are in the same VLAN regardless of which port they attach to.

B. Attached devices are unaware of any VLANs.

Two Company switches are connected via a trunk using VTP. Which VTP information does a Catalyst switch advertise on its trunk ports when using VTP? (Select two)

A. STP root status
B. VTP mode
C. Negotiation status
D. Management domain
E. Configuration revision number

D. Management domain
E. Configuration revision number

The lack of which two prevents VTP information from propagating between switches?*

A. A root VTP server
B. A trunk port
C. VTP priority
D. VLAN 1
E. None of the other alternatives apply

B. A trunk port
D. VLAN 1

What is the default VTP advertisement for subset advertisements in Catalyst switches that are in server or client mode?*

A. 30 seconds
B. 5 minutes
C. 1 minute
D. 10 seconds
E. 5 seconds
F. None of the other alternatives apply

B. 5 minute

What must be configured on a Cisco switch in order to advertise VLAN information?*

A. VTP mode
B. VTP password
C. VTP revision number
D. VTP pruning
E. VTP domain name
F. None of the other alternatives apply

E. VTP domain name

The Company switches have all been upgraded to use VTP version 2. What are two benefits provided in VTP Version 2 that are not available in VTP Version 1? *

A. VTP version 2 supports Token Ring VLANs
B. VTP version 2 allows VLAN consistency checks
C. VTP version 2 allows active redundant links when used with spanning tree
D. VTP version 2 reduces the amount of configuration necessary
E. VTP version 2 saves VLAN configuration memory

A. VTP version 2 supports Token Ring VLANs
B. VTP version 2 allows VLAN consistency checks

What action should a network administrator take to enable VTP pruning on an entire management domain?*

A. Enable VTP pruning on any switch in the management domain
B. Enable VTP pruning on any client switch in the domain
C. Enable VTP pruning on a VTP server in the management domain
D. Enable VTP pruning on every switch in the domain
E. None of the other alternatives apply

C. Enable VTP pruning on a VTP server in the management domain

What are two benefits provided in VTP Version 2 but NOT in VTP Version 1? *

A. Supports Token Ring VLANs.
B. Allows VLAN consistency checks.
C. Saves VLAN configuration memory.
D. Reduces the amount of configuration necessary.
E. Allows active redundant links when used with spanning tree.

A. Supports Token Ring VLANs.
B. Allows VLAN consistency checks.

The Company switches are configured to use VTP. What's true about the VLAN trunking protocol (VTP)? (Select two)*

A. VTP messages will not be forwarded over nontrunk links.
B. VTP domain names need to be identical. However, case doesn't matter.
C. A VTP enabled device which receives multiple advertisements will ignore advertisements with higher configuration revision numbers.
D. A device in "transparent" VTP v.1 mode will not forward VTP messages.
E. VTP pruning allows switches to prune VLANs that do not have any active ports associated with them.

A. VTP messages will not be forwarded over nontrunk links.
D. A device in "transparent" VTP v.1 mode will not forward VTP messages.

Switch R1 and R2 both belong to the Company VTP domain. What's true about the switch operation in VTP domains? (Select all that apply)*

A. A switch can only reside in one management domain
B. A switch is listening to VTP advertisements from their own domain only
C. A switch is listening to VTP advertisements from multi domains
D. A switch can reside in one or more domains
E. VTP is no longer supported on Catalyst switches

A. A switch can only reside in one management domain
B. A switch is listening to VTP advertisements from their own domain only

VTP devices in a network track the VTP revision number. What is a VTP configuration revision number?*

A. A number for identifying changes to the network switch.
B. A number for identifying changes to the network router.
C. A number for identifying changes to the network topology.
D. None of the other alternatives apply.

C. A number for identifying changes to the network topology.

Switch R1 is configured to use the VLAN Trunking Protocol (VTP). What does R1 advertise in its VTP domain?*

A. The VLAN ID of all known VLANs, the management domain name, and the total number of trunk links on the switch.
B. The VLAN ID of all known VLANs, a 1-bit canonical format (CF1 Indicator), and the switch configuration revision number.
C. The management domain name, the switch configuration revision number, the known VLANs, and their specific parameters.
D. A 2-byte TPID with a fixed value of 0x8100 for the management domain number, the switch configuration revision number, the known VLANs, and their specific parameters.
E. None of the other alternatives apply.

C. The management domain name, the switch configuration revision number, the known VLANs, and their specific parameters.

VTP switches use advertisements to exchange information with each other. Which of the following advertisement types are associated with VTP? (Select all that apply)*

A. Domain advertisements
B. Advertisement requests from clients
C. Subset advertisements
D. Summary advertisements

B. Advertisement requests from clients
C. Subset advertisements
D. Summary advertisements

Switch R1 is part of the Company VTP domain. What's true of VTP Pruning within this domain? (Select all that apply)*

A. It does not prune traffic from VLANs that are pruning-ineligible
B. VLAN 1 is always pruning-eligible
C. it will prune traffic from VLANs that are pruning-ineligible
D. VLAN 2 is always pruning-ineligible
E. None of the other alternatives apply.

A. It does not prune traffic from VLANs that are pruning-ineligible

What action should a network administrator take to enable VTP pruning on an entire management domain?*

A. Enable VTP pruning on any client switch in the management domain.
B. Enable VTP pruning on any switch in the management domain.
C. Enable VTP pruning on every switch in the management domain.
D. Enable VTP pruning on a VTP server in the management domain.
E. Disable VTP pruning on a VTP server in the management domain

D. Enable VTP pruning on a VTP server in the management domain.

Switch R1 is configured with VTP. Which two VTP modes will make R1 capable of creating and deleting VLANs on itself? (Select two)*

A. Client
B. Server
C. Transparent
D. Pass-through
E. No-negotiate

B. Server
C. Transparent

When the Catalyst switch R1 is enabled to use VTP, which information does it advertise on its trunk ports (Select two)*

A. VTP mode
B. STP root status
C. Negotiation status
D. Management domain
E. Configuration revision number

D. Management domain
E. Configuration revision number

Two Company switches are connected via a trunk link. In this network, the original frame is encapsulated and an additional header is added before the frame is carried over a trunk link. At the receiving end, the header is removed and the frame is forwarded to the assigned VLAN. This describes which technology? *

A. DISL
B. ISL
C. DTP
D. IEEE 802.1Q
E. MPLS
F. None of the other alternatives apply

B. ISL

The Company core switches use 802.1Q trunks to connect to each other. How does 802.1Q trunking keep track of multiple VLANs? *

A. It tags the data frame with VLAN information and recalculates the CRC value
B. It encapsulates the data frame with a new header and frame check sequence
C. It modifies the port index of a data frame to indicate the VLAN
D. It adds a new header containing the VLAN ID to the data frame
E. None of the other alternatives apply

E. None of the other alternatives applyA. It tags the data frame with VLAN information and recalculates the CRC value

Which three statements are correct with regard to the IEEE 802.1Q standard? *

A. The IEEE 802.1Q frame format adds a 4 byte field to a Ethernet frame
B. The packet is encapsulated with a 26 byte header and a 4 byte FCS
C. The protocol uses point-to-multipoint connectivity
D. The protocol uses point-to-point connectivity
E. The IEEE 802.1Q frame uses multicast destination of 0x01-00-0c-00-00
F. The IEEE 802.1Q frame retains the original MAC destination address

A. The IEEE 802.1Q frame format adds a 4 byte field to a Ethernet frame
D. The protocol uses point-to-point connectivity
F. The IEEE 802.1Q frame retains the original MAC destination address

Switch R1 has been configured with DTP using the desirable option. Which statement describes Dynamic Trunking Protocol (DTP) desirable mode?*

A. The interface actively attempts to convert the link to a trunk link.
B. The interface is put into permanent trunking mode but prevented from generating DTP frames.
C. The interface is put into permanent trunking mode and negotiates to convert the link into a trunk link.
D. The interface is put into a passive mode, waiting to convert the link to a trunk link.
E. None of the other alternatives apply

A. The interface actively attempts to convert the link to a trunk link.

Which switch command enables a trunking protocol that appends a four byte CRC to the packet?*

A. CompanySwitch(config-if)#switchport trunk encapsulation dot1q
B. CompanySwitch(config-if)#switchport trunk encapsulation itef
C. CompanySwitch(config-if)#switchport trunk encapsulation fddi
D. CompanySwitch(config-if)#switchport trunk encapsulation isl
E. None of the other alternatives apply

D. CompanySwitch(config-if)#switchport trunk encapsulation isl

While using a packet analyzer, you notice four additional bytes being added to the packets in the Company network. Which protocol inserts a four byte tag into the Ethernet frame and recalculates CRC value?*

A. DTP
B. VTP
C. 802.1Q
D. ISL
E. None of the other alternatives apply

C. 802.1Q

You need to configure a new Company switch to support DTP. Which DTP switchport mode parameter sets the switch port to actively send and respond to DTP negotiation frames?*

A. Access
B. No negotiate
C. Trunk
D. Dynamic desirable
E. Dynamic auto
F. None of the other alternatives apply

D. Dynamic desirable

A new Company switch was just configured using the "switchport trunk native vlan 7" command. What does this interface command accomplish?*

A. Causes the interface to apply ISL framing for traffic on VLAN 7
B. Configures the trunking interface to forward traffic from VLAN 7
C. Configures the interface to be a trunking port and causes traffic on VLAN 7 to be 802.1q tagged
D. Configures the trunking interface to send traffic from VLAN 7 untagged
E. None of the other alternatives apply

D. Configures the trunking interface to send traffic from VLAN 7 untagged

Which statement is true regarding the configuration of ISL trunks?*

A. A Catalyst switch cannot have ISL and IEEE 802.1q trunks enabled.
B. All Catalyst switches support ISL trunking.
C. A Catalyst switch will report giants if one side is configured for ISL while the other side is not.
D. ISL trunking requires that native VLANs match.
E. None of the other alternatives apply

C. A Catalyst switch will report giants if one side is configured for ISL while the other side is not.

Which of the following technologies would an Internet Service Provider use to support overlapping customer VLAN ID's over transparent LAN services?*

A. 802.1q tunneling
B. ATM
C. SDH
D. IP Over Optical Networking
E. ISL

A. 802.1q tunneling

If you were to configure an ISL Ethernet trunk between two Cisco switches, named R1 and R2, what would you have to include at the end of the link for the trunk to operate correctly? (Select two)*

A. An identical VTP mode.
B. An identical speed/duplex.
C. An identical trunk negotiation parameter.
D. An identical trunk encapsulation parameter.

B. An identical speed/duplex.
D. An identical trunk encapsulation parameter.

You are the network administrator at Company and switch R1 is configured as shown below:*

Interface gigethernet 0/1
Switchport mode trunk
Switchport trunk
encapsulation dot1q
Switchport trunk native vlan 5

If untagged frames are arriving on interface G0/1 of R1, which of the following statements are correct?

A. Untagged frames are automatically assumed to be in VLAN 5.
B. Untagged frames are defaulted to VLAN 1 traffic.
C. Untagged frames are dropped because all packets are tagged when dot1q trunked.
D. Untagged frames are determined on the other switch
E. Untagged frames are not supported on 802.1Q trunks.

A. Untagged frames are automatically assumed to be in VLAN 5.

If you were to set up a VLAN trunk over a Fast Ethernet link on switch R1, which trunk mode would you set the local port to on R1 if you wanted it to respond to requests from its link partner (R2) and become a trunk?*

A. Auto
B. Negotiate
C. Designate
D. No negotiate

A. Auto

Which of the following trunking modes are unable to request their ports to convert their links into trunk links? (Select all that apply)*

A. Negotiate
B. Designate
C. No negotiate
D. Auto
E. Manual
F. Off

C. No negotiate
D. Auto

ISL is being configured on a Company switch. Which of the following choices are true regarding the ISL protocol? (Select two)*

A. It can be used between Cisco and non-Cisco switch devices.
B. It calculates a new CRC field on top of the existing CRC field.
C. It adds 4 bytes of protocol-specific information to the original Ethernet frame.
D. It adds 30 bytes of protocol-specific information to the original Ethernet frame.

B. It calculates a new CRC field on top of the existing CRC field.
D. It adds 30 bytes of protocol-specific information to the original Ethernet frame.

You are the network administrator tasked with designing a switching solution for the Company network. Which of the following statements describing trunk links are INCORRECT? (Select all that apply)*

A. The trunk link belongs to a specific VLAN.
B. Multiple trunk links are used to connect multiple end user devices.
C. A trunk link only supports native VLAN.
D. Trunk links use 802.10 to identify a VLAN.
E. The native VLAN of the trunk link is the VLAN that the trunk uses for untagged packets.

A. The trunk link belongs to a specific VLAN.
B. Multiple trunk links are used to connect multiple end user devices.
C. A trunk link only supports native VLAN.
D. Trunk links use 802.10 to identify a VLAN.

Switch R1 has been configured with the root guard feature. What statement is true if the spanning tree enhancement Root Guard is enabled?*

A. If BPDUs are not received on a non-designated port, the port is moved into the STP loopinconsistent blocked state
B. If BPDUs are received on a PortFast enabled port, the port is disabled.
C. If superior BPDUs are received on a designated port, the interface is placed into the rootinconsistent blocked state.
D. If inferior BPDUs are received on a root port, all blocked ports become alternate paths to the root bride.

C. If superior BPDUs are received on a designated port, the interface is placed into the rootinconsistent blocked state.

What does the global command udld enable\ accomplish?*

A. Enables all fiber-optic LAN ports for
Unidirectional LINK Detection (UDLD)
B. Enables all copper media LAN ports Unidirectional Link Detection (UDLD)
C. Overrides the default UDLS setting for all ports
D. Globally enables all ports on the device for Unidirectional Link Detection (UDLS)
E. None of the other alternatives apply

A. Enables all fiber-optic LAN ports for
Unidirectional LINK Detection (UDLD)

Which three statements about the Multiple Spanning Tree (MST) protocol (IEEE 802.1s) are true?*

A. To verify the MST configuration, the show pending command can be used in MST configuration mode.
B. When RSTP and MSTP are configured; UplinkFast and BackboneFast must also be enabled.
C. All switches in the same MST region must have the same VLAN-to-instance mapping, but different configuration revision numbers.
D. All switches in an MST region, except distribution layer switches, should have their priority lowered from the default value 32768.
E. An MST region is a group of MST switches that appear as a single virtual bridge to adjacent CST and MST regions.
F. Enabling MST with the "spanning-tree mode mst" global configuration command also enables RSTP.

A. To verify the MST configuration, the show pending command can be used in MST configuration mode.

E. An MST region is a group of MST switches that appear as a single virtual bridge to adjacent CST and MST regions.

F. Enabling MST with the "spanning-tree mode mst" global configuration command also enables RSTP.

Company uses MSTP within their switched LAN. What is the main purpose of Multiple Instance Spanning Tree Protocol (MSTP)?*

A. To enhance Spanning Tree troubleshooting on multilayer switches
B. To reduce the total number of spanning tree instances necessary for a particular topology
C. To provide faster convergence when topology changes occur in a switched network
D. To provide protection for STP when a link is unidirectional and BPDUs are being sent but not received
E. None of the other alternatives apply

B. To reduce the total number of spanning tree instances necessary for a particular topology

Which of the following specifications is a companion to the IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) algorithm, and warrants the use multiple spanning-trees?*

A. IEEE 802.1s (MST)
B. IEEE 802.1Q (CST)
C. Cisco PVST+
D. IEEE 802.1d (STP)\
E. None of the other alternatives apply

A. IEEE 802.1s (MST)

Which three items are configured in MST configuration submode? *

A. Region name
B. Configuration revision number
C. VLAN instance map
D. IST STP BPDU hello timer
E. CST instance map
F. PVST+ instance map

A. Region name
B. Configuration revision number
C. VLAN instance map

By default, all VLANs will belong to which MST
instance when using Multiple STP?*

A. MST00
B. MST01
C. the last MST instance configured
D. none

A. MST00

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set