Switch configured for three different vlan

Assignment Help Computer Networking
Reference no: EM13917768

1. Which of the following is true regarding VLANs?

a. You must have at least two VLANs defined in every Cisco switched network.
b. All VLANs are configured at the fastest switch and, by default, propagate this information to all other switches.
c. You should not have more than 10 switches in the same VTP domain.
d. VTP is used to send VLAN information to switches in a configured VTP domain.

2. A switch has been configured for three different VLANs: VLAN2, VLAN3, and VLAN4. A router has been added to provide communication between the VLANs. What type of interface is necessary on the router if only one connection is to be made between the router and the switch?

a. 10 Mbps Ethernet
b. 56 Kbps Serial
c. 100 Mbps Ethernet
d. 1 Gbps Ethernet

3. You want to improve network performance by increasing the bandwidth available to hosts and limit the size of the broadcast domains. Which of the following options will achieve this goal?

a. Managed hubs
b. Bridges
c. Switches
d. Switches configured with VLANs

4. Which of the following protocols are used to configure trunking on a switch? Choose two

a. VLAN Trunk Protocol
b. VLAN
c. 802.1Q
d. ISL

5. When a new trunk link is configured on an IOS-based switch, which VLANs are allowed over the link?

a. By default, all VLANs are allowed on the trunk
b. No VLANs are allowed, you must configure each VLAN by hand
c. Only configured VLANs are allowed on the link
d. Only extended VLANs are allowed by default

6. Which switching technology reduces the size of broadcast domain?

a. ISL
b. 802.1Q
c. VLANs
d. STP

7. What VTP mode allows you to change VLAN information on the switch?

a. Client
b. STP
c. Server
d. Transparent

8. Which command will configure a switch port to use the IEEE standard method of inserting VLAN membership information into Ethernet frames?

a. Switch(config)#switchport trunk encapsulation isl
b. Switch(config)#switchport trunk encapsulation ietf
c. Switch(config)#switchport trunk encapsulation dot1q
d. Switch(config-if)#switchport trunk encapsulation isl
e. Switch(config-if)#switchport trunk encapsulation ietf
f. Switch(config-if)#switchport trunk encapsulation dot1q

9. Which of the following is true regarding VTP?

a. All switches are VTP servers by default
b. All switches are VTP transparent by default
c. VTP is on by default with a domain name of Cisco on all Cisco switches
d. All switches are VTP clients by default

10. Which protocol reduces administrative overhead in a switch network by allowing the configuration of new VLAN to be distributed to all the switches in a domain?

a. STP
b. VTP
c. DHCP
d. ISL

11. Which of the following commands sets a trunk port on a 2960 switch?

a. trunk on
b. trunk all
c. switchport trunk on
d. switchport mode trunk

12. Which of the following is an IEEE standard for frame tagging?

a. ISL
b. 802.3Z
c. 802.1Q
d. 802.3U

13. You connect a host to a switch port, but the new host cannot log into the server that is plugged into the same switch. What could the problem be? (choose the most likely answer)

a. The router is not configured for the new host
b. The VTP configuration on the switch is not updated for the new host
c. The host has an invalid MAC address
d. The switch port the host is connected to is not configured to the correct VLAN membership

14. Which of the following provide inter-switch VLAN communication? Choose two

a. ISL
b. VTP
c. 802.1Q
d. 802.3Z

15. To configure the VLAN trunking protocol to communicate VLAN information between two switches, what two requirements must be met? (Choose two)

a. Each end of the trunk link must be set to the IEEE 802.1e encapsulation
b. The VTP management domain name of both switches must be set the same
c. All ports on the both the switches must be set as access ports
d. One of the two switches must be configured as a VTP server
e. A roller cable is required to connect the two switches together
f. A router must be used to forward VTP traffic between VLANs

Reference no: EM13917768

Questions Cloud

Capital structure-what is the value of firm : Two firms, U and L, are identical except for their capital structure. Both own a single perpetual asset that will have annual after tax-free cash flows of $25million in a boom and $5million in a slump. What is the value of firm U in $millions? What i..
Working capital will revert back to normal at end of project : Your firm is contemplating the purchase of a new $657,000 computer-based order entry system. The system will be depreciated straight-line to zero over its six-year life. It will be worth $51,000 at the end of that time. Working capital will revert ba..
A pension fund manager is considering three funds : A pension fund manager is considering three funds. The first is a stock fund, the second is a long-term government and corporate bond fund, and the third is a T-bill money fund that yields a sure rate of 3%. The probability distributions of the risky..
Newly formed electronics services corporation : Newly formed Electronics Services Corporation has 100,000 shares of $10 par common stock authorized. On March 1, 2013, Electronics Services issued 20,000 shares of the stock for $12 per share.
Switch configured for three different vlan : A switch has been configured for three different VLANs: VLAN2, VLAN3, and VLAN4. A router has been added to provide communication between the VLANs. What type of interface is necessary on the router if only one connection is to be made between the..
Companies may have exposure to foreign exchange risk : Due to globalization, companies may have exposure to foreign exchange risk, as unexpected change of exchange rate may affect the settlement of contracts and firm value. Answer the following questions related to foreign currency exposure. List two maj..
Find the regression of cholesterol level on age : Taking age as an independent variable and cholesterol level as a dependent variable compute . Find the regression of cholesterol level on age
Steps of a utilitarian analysis : Although you should go through the steps of a utilitarian analysis before you write the paper, the paper should not list all the steps. Rather, in writing your paper assume you are writing for a general audience (many of whom may disagree with yo..
Characteristics of the two levels of management : Characteristics of the Two Levels of Management Information Systems (MIS)  describe characteristics of the two levels of management information systems.  Also, what is the feedback control model and executive dashboard? Why are they so important?

Reviews

Write a Review

 

Computer Networking Questions & Answers

  Question 1i give explanation for network securityii give

question 1i. give explanation for network securityii. give explanation security mechanismiii. what do you comprehend by

  Preparing domain and group structures

The company's IT department has asked you to prioritize recommendations for Windows Server® roles. High-priority roles may be installed immediately

  How might you assess the various network technologies in

question youve been hired to be part of the team building a mission control and reporting system for a new uav system

  What are the range of ipv4 address classes

What are the range of IPv4 address classes - You have to show it in a proper tabular manner.

  Snmp securitybullsnmpv1 is the most commonly used version

snmp securitybullsnmpv1 is the most commonly used version of snmp even though it provides little support for security.

  Describe different common types of server applications

Make a list describing different common types of server applications. Show which of these applications you would combine together on a single server.

  Current ethical and legal concerns

Evaluate the current ethical and legal concerns surrounding your topic. Compose an executive summary highlighting the paper's contents and reasoning for your chosen topic

  Open systems interconnection protocol model

Identify the advantages and disadvantages of circuit switching and packet switching-X.25, Frame Relay, Asynchronous Transfer Mode2, and Transmission Control Protocol/Internet Protocol (TCP/IP)-regarding performance, speed and throughput potential,..

  What problem area would the internet intervention address

What problem area would the internet intervention address

  Design a solution to this problem using private vlans

You have a fifth webserver that is serving a web application and therefore it requires access to the database server. This webserver and the database server should ONLY be able to communicate with each other and the gateway.

  Which access method is used by ethernet

Calculate the minimum length of time it would take to download a 20MByte document from a workstation to a server across each of the following networks.  This means you will have to convert bytes to bits.

  Different routing protocols into a new network design

Design a plan to integrate the different routing protocols into a new network design for Genome4U's lab and identify the information you will redistribute between routing protocols.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd