Switch configured for three different vlan

Assignment Help Computer Networking
Reference no: EM13917768

1. Which of the following is true regarding VLANs?

a. You must have at least two VLANs defined in every Cisco switched network.
b. All VLANs are configured at the fastest switch and, by default, propagate this information to all other switches.
c. You should not have more than 10 switches in the same VTP domain.
d. VTP is used to send VLAN information to switches in a configured VTP domain.

2. A switch has been configured for three different VLANs: VLAN2, VLAN3, and VLAN4. A router has been added to provide communication between the VLANs. What type of interface is necessary on the router if only one connection is to be made between the router and the switch?

a. 10 Mbps Ethernet
b. 56 Kbps Serial
c. 100 Mbps Ethernet
d. 1 Gbps Ethernet

3. You want to improve network performance by increasing the bandwidth available to hosts and limit the size of the broadcast domains. Which of the following options will achieve this goal?

a. Managed hubs
b. Bridges
c. Switches
d. Switches configured with VLANs

4. Which of the following protocols are used to configure trunking on a switch? Choose two

a. VLAN Trunk Protocol
b. VLAN
c. 802.1Q
d. ISL

5. When a new trunk link is configured on an IOS-based switch, which VLANs are allowed over the link?

a. By default, all VLANs are allowed on the trunk
b. No VLANs are allowed, you must configure each VLAN by hand
c. Only configured VLANs are allowed on the link
d. Only extended VLANs are allowed by default

6. Which switching technology reduces the size of broadcast domain?

a. ISL
b. 802.1Q
c. VLANs
d. STP

7. What VTP mode allows you to change VLAN information on the switch?

a. Client
b. STP
c. Server
d. Transparent

8. Which command will configure a switch port to use the IEEE standard method of inserting VLAN membership information into Ethernet frames?

a. Switch(config)#switchport trunk encapsulation isl
b. Switch(config)#switchport trunk encapsulation ietf
c. Switch(config)#switchport trunk encapsulation dot1q
d. Switch(config-if)#switchport trunk encapsulation isl
e. Switch(config-if)#switchport trunk encapsulation ietf
f. Switch(config-if)#switchport trunk encapsulation dot1q

9. Which of the following is true regarding VTP?

a. All switches are VTP servers by default
b. All switches are VTP transparent by default
c. VTP is on by default with a domain name of Cisco on all Cisco switches
d. All switches are VTP clients by default

10. Which protocol reduces administrative overhead in a switch network by allowing the configuration of new VLAN to be distributed to all the switches in a domain?

a. STP
b. VTP
c. DHCP
d. ISL

11. Which of the following commands sets a trunk port on a 2960 switch?

a. trunk on
b. trunk all
c. switchport trunk on
d. switchport mode trunk

12. Which of the following is an IEEE standard for frame tagging?

a. ISL
b. 802.3Z
c. 802.1Q
d. 802.3U

13. You connect a host to a switch port, but the new host cannot log into the server that is plugged into the same switch. What could the problem be? (choose the most likely answer)

a. The router is not configured for the new host
b. The VTP configuration on the switch is not updated for the new host
c. The host has an invalid MAC address
d. The switch port the host is connected to is not configured to the correct VLAN membership

14. Which of the following provide inter-switch VLAN communication? Choose two

a. ISL
b. VTP
c. 802.1Q
d. 802.3Z

15. To configure the VLAN trunking protocol to communicate VLAN information between two switches, what two requirements must be met? (Choose two)

a. Each end of the trunk link must be set to the IEEE 802.1e encapsulation
b. The VTP management domain name of both switches must be set the same
c. All ports on the both the switches must be set as access ports
d. One of the two switches must be configured as a VTP server
e. A roller cable is required to connect the two switches together
f. A router must be used to forward VTP traffic between VLANs

Reference no: EM13917768

Questions Cloud

Capital structure-what is the value of firm : Two firms, U and L, are identical except for their capital structure. Both own a single perpetual asset that will have annual after tax-free cash flows of $25million in a boom and $5million in a slump. What is the value of firm U in $millions? What i..
Working capital will revert back to normal at end of project : Your firm is contemplating the purchase of a new $657,000 computer-based order entry system. The system will be depreciated straight-line to zero over its six-year life. It will be worth $51,000 at the end of that time. Working capital will revert ba..
A pension fund manager is considering three funds : A pension fund manager is considering three funds. The first is a stock fund, the second is a long-term government and corporate bond fund, and the third is a T-bill money fund that yields a sure rate of 3%. The probability distributions of the risky..
Newly formed electronics services corporation : Newly formed Electronics Services Corporation has 100,000 shares of $10 par common stock authorized. On March 1, 2013, Electronics Services issued 20,000 shares of the stock for $12 per share.
Switch configured for three different vlan : A switch has been configured for three different VLANs: VLAN2, VLAN3, and VLAN4. A router has been added to provide communication between the VLANs. What type of interface is necessary on the router if only one connection is to be made between the..
Companies may have exposure to foreign exchange risk : Due to globalization, companies may have exposure to foreign exchange risk, as unexpected change of exchange rate may affect the settlement of contracts and firm value. Answer the following questions related to foreign currency exposure. List two maj..
Find the regression of cholesterol level on age : Taking age as an independent variable and cholesterol level as a dependent variable compute . Find the regression of cholesterol level on age
Steps of a utilitarian analysis : Although you should go through the steps of a utilitarian analysis before you write the paper, the paper should not list all the steps. Rather, in writing your paper assume you are writing for a general audience (many of whom may disagree with yo..
Characteristics of the two levels of management : Characteristics of the Two Levels of Management Information Systems (MIS)  describe characteristics of the two levels of management information systems.  Also, what is the feedback control model and executive dashboard? Why are they so important?

Reviews

Write a Review

Computer Networking Questions & Answers

  Introduction to modems

Digital communication has proved to be very efficient means of transporting speech, music, videos and data over different kinds of media. These media include satellite, microwave, fiber-optic, coaxial and cellular channels.

  Describe the effects of spyware and adware

Describe the effects of spyware and adware. How has spyware and adware influenced public's confidence in security of the Internet?

  Define social media and networking technologies

Analyze how the university might integrate at least two social media and networking technologies to accomplish their goals. Your analysis must cover the advantages and disadvantages of social networking. The president of the university also needs ..

  Use of virtual private network and a tunneling protocol

Two banks want to establish an electronic link between themselves over which they can transmit money transfers using EDI/XML techniques. Can they use virtual private network and a tunneling protocol or is a better technique available? Defend your ans..

  A sub-network design that needs of acme corporation

Acme Computing Corp. has remote sites in Port Clinton and Napoleon in addition to their main site in Toledo. There are currently 29 devices connected to the network in Toledo.

  How many crossbar switches does a full sun fire have

How many crossbar switches does a full Sun Fire E25K have? Suppose that the wire between switch 2A and switch 3B in the omega network of Fig. 8-31 breaks. Who is cut off from whom?

  Determine number of samples are included in each packet

Assume that sender sends silence suppressed RTP stream of G.711 audio to receiver. During talk spurt 20 msecs chunks of quantized audio samples are encapsulated. Determine number of samples are included in each packet?

  Global finance inc network diagram

Global Finance, Inc. (GFI) network diagram. A hypothetical company, GFI has grown rapidly this past year and implemented a number of network devices as displayed in the diagram

  Evluate the challenges e-business and e-commerce

assess the challenges e-business and e-commerce technologies present to the field of information technology. describe

  Explain the steps take to stop cybersquatter

You are a owner of the register trademark, and you just found that domain name is being held hostage for large sum of money. In around 300 words, Explain the steps which you would take to stop cybersquatter.

  First prepare an abstract of your business recommendations

first create an abstract of your business recommendations for network solutions for large businesses. an abstract is a

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd