You are on page 1of 11

Amity Campus

Uttar Pradesh
India 201303

Subject Name
Roll Number (Reg.No.)
Student Name

: Lan switching & wireless

a) Students are required to submit all three assignment sets.
Assignment A
Assignment B
Assignment C

Five Subjective Questions
Three Subjective Questions + Case Study
40 Objective or one line Questions



Total weightage given to these assignments is 30%. OR 30 Marks
All assignments are to be completed as typed in word/pdf.
All questions are required to be attempted.
All the three assignments are to be completed by due dates and need to
be submitted for evaluation by Amity University.
f) The students have to attached a scan signature in the form.




( √ ) Tick mark in front of the assignments submitted
Assignment ‘B’
Assignment ‘C’

LAN Switching & Wireless Assignment A Q1. the connection is established. What are the benefits of VLAN? Explain different types of VLAN. What are the downsides to password recovery? . Why did the routers establish a connection with PPP and not with HDLC?. Q2. Explain the key features of switches that are used in hierarchical networks? Q3. A point-to-point connection with different vendor routers using HDLC as the Encapsulation type cannot establish a connection. Describe the Hierarchical Network Model? Describe the benefits of the Hierarchical Network Model. When you change the encapsulation type on both routers to PPP. Q4. Q5.

Q3. . answer the following questions about IOS image management. a) The router IOS images should be stored on a TFTP server on the network.Assignment B Q1 (a) Describe the benefits and purpose of VTP (b) Explain the purpose and operation of ACLs? Explain the filtering process? Q2 Describe and compare the Ethernet concepts and techniques used by LAN switches. In your own words. What information is required when using the copy command to upload or download a system image file? b) What happens to a router when the IOS is deleted from flash? Case study Q4 Refer to Figure 1 for all the questions in this command exercise. A network TFTP server can be used to restore lost or corrupted IOS images to network devices.

and name the ACL Internet. Use an extended named ACL to accomplish this task.Figure 1 Network Topology for Questions I Through IV Q.0/27 subnet access to the E-Mail server. Write all the commands Q. and name the ACL No Access. but all other traffic should be permitted. Use the last usable number in the extended list range.16. They are allowed access to the Internet. Use the first usable number in the extended IP range to accomplish this task.0/27 subnet is allowed access to the File Server.1.I Allow only Host A from the 172. and deny everyone else.III No one from the 172.16.II Allow only Host B access to the Internet. Write all the commands Q.1. Write all the commands . Host A should not have access to any of the other servers. but deny them access to the servers on the R2 LAN. Use an extended named ACL to accomplish this task. Write all the commands Q.IV Allow only hosts on the R3 LAN to communicate with hosts on the R1 LAN.

B. Layer 5 . network diameter 3. access layer B. core layer C. network E. Layer 1 B. redundant links C. access C. There is less bandwidth competition between voice and video streams. QoS issues are greatly reduced. Layer 4 D. Which layer of the hierarchical network design model is refered to as the high-speed backbone of the internetwork. distribution D. Which hierarchical design model layer controls the flow of network traffic using policies and delineates broadcast domains by performing routing functions between virtual LANs (VLANs)? A. data-link layer D. Which feature supports higher throughput in switched networks by combining multiple switch ports? A. convergence B. D. where high availability and redundancy are critical? A. distribution layer 2. E. C. What is the likely impact of moving a conventional company architecture to a completely converged network? A. link aggregation D.Assignment C 1. application B. Configuring communication between devices on different VLANs requires the use of which layer of the OSI model? A. Local analog phone service can be completely outsourced to cost-effective providers. 5. A shared infrastructure is created resulting in a single network to manage. core 4. Layer 3 C. The Ethernet VLAN structure is less complex.

network E. inter-VLAN routing 10 Link aggregations should be implemented at which layer of the hierarchical network? A. distribution and core C. access. core only B. Layer 2 C. core layer B. Which layer of the OSI model does an access layer LAN switch use to make a forwarding decision? A. access lists 8. what functionality should be enabled at all three layers of the hierarchical network? A. defined physical characteristics D.6. a slim-line chassis B. distribution. Layer 3 D. flexible characteristics 12. aggregation D. access C. Power over Ethernet B. quality of service C. core . Layer 1 B. and core 11. What statement best describes a modular switch? A. allows interconnection of switches on redundant backplane C. access and distribution D. Which layer of the hierarchical design model provides a means of connecting devices to the network and controlling which devices are allowed to communicate on the network? A. At which hierarchical layer are switches normally not required to process all ports at wire speed? A. Which hierarchical design characteristic would be recommended at both the core and distribution layers to protect the network in the case of a route failure? A. distribution layer C. application B. entry layer 9. switch port security D. redundancy C. Layer 4 7. For organizations that are implementing a voice over IP solution. PoE B. distribution D. access layer D.

such as the hostname and password? A. what will be the result? Switch1(config-line)# line console 0 Switch1(config-line)# password cisco Switch1(config-line)# login A. to gain access to line configuration mode by supplying the required password D. The switch responds with “% Incomplete command”. The switch ends an acknowledgement frame to the source MAC of this incoming frame. determines that the correct host is utilizing the network D. privileged EXEC mode C. indicates which channel the data should flow on C. The SSH client on the switch is enabled. interface configuration mode 16 What happens when the transport input ssh command is entered on the switch vty lines? A. to deny access to the console port by specifying 0 lines are available C. append ? to the last parameter B.13. C. allows the host to choose which channel to use 14 If a network administrator enters these commands on a switch. C. to configure the privilege exec password that will be used for remote access 15 Which command line interface (CLI) mode allows users to configure switch parameters. What can the administrator do to get the parameter information? A. . D. converts clear text data before transmission B. The switch will request that the sending node resend the frame. The administrator cannot remember the missing parameters. what action will be taken by the switch to process the incoming frame? A. A username/password combination is no longer needed to establish a secure remote connection to the switch. use the Tab key to show which options are available 18 When a switch receives a frame and the source MAC address is not found in the switching table. D. B. global configuration mode D. The switch requires remote connections via proprietary client software. Communication between the switch and remote users is encrypted. user EXEC mode B. The switch will map the source MAC address to the port on which it was received. to secure the console port with the password “cisco” B. The switch will issue an ARP request to confirm that the source exists. B. What purpose does authentication serve in a WLAN? A. use Ctrl-P to show a parameter list D. 17 A network administrator uses the CLI to enter a command that requires several parameters. append a space and then ? to the last parameter C.

21. 24 What does a client mode switch in a VTP management domain do when it receives a summary advertisement with a revision number higher than its current revision number? A. how do hosts with data to transmit respond after the backoff period has expired? A. It increments the revision number and forwards it to other switches. NVRAM C.text 22 Which statement is true when VTP is configured on a switched network that incorporates VLANs? A. Enable VTP pruning. The hosts return to a listen-before-transmit mode. VTP dynamically communicates VLAN changes to all switches in the same VTP domain. ROM D. The command is entered in privileged EXEC mode. The command will cause the message End with the character “%” to be displayed after thecommand is entered into the switch. D. D. Change the VTP domain name. Change all the interfaces on the switch to access ports. C. 23 A network administrator is replacing a failed switch with a switch that was previously on the network. D. B. Where is the startup configuration stored? A. It issues an advertisement request for new VLAN information. D. startup-config. D. Change the VTP mode to client. It suspends forwarding until a subset advertisement update arrives. The command will generate the error message Ambiguous command: “banner motd” ”to be displayed. The hosts extend their delay period to allow for rapid transmission. B. It deletes the VLANs not included in the summary advertisement. The hosts creating the collision retransmit the last 16 frames. VTP is only compatible with the 802. C. . The command will cause the message Authorized personnel Only to display before a user logs in. E. C. B. When a collision occurs in a network using CSMA/CD. It issues summary advertisements to advise other switches of status changes. DRAM B. B.1Q standard. C. VTP allows a switch to be configured to belong to more than one VTP domain. 20. C. B. The hosts creating the collision have priority to send data. What precautionary step should the administrator take on the replacement switch to avoid incorrect VLAN information from propagating through the network? A.19 Which statement is true about the command banner login “Authorized personnel Only” issued on a switch? A. VTP adds to the complexity of managing a switched network.

1q frames are mapped to VLANs by MAC address. What statement describes the default propagation of VLANs on a trunked link? A. How are VTP messages sent between switches in a domain? A. 29 What is a valid consideration for planning VLAN traffic across multiple switches? A. A port on the switch has been shutdown. 802.1q does NOT require the FCS of the original frame to be recalculated. A five-minute update timer has elapsed. What statement about the 802. Administratively shut down and re-enable the interface to return it to default. 26. The switch is changed to the transparent mode. B. VLANs 1 to 1005 C. Layer 2 unicast D. C. all VLANs E. Layer 3 unicast 27.1q is Cisco proprietary. C. only VLAN 1 D. A new host has been attached to a switch in the management domain. B. Configuring inters witch connections as trunks will cause all hosts on any VLAN to receive broadcasts from the other VLANs. Layer 3 multicast F. D. 30. C. D. C. Disable DTP. B. 802. Restricting trunk connections between switches to a single VLAN will improve efficiency of port usage. only the native VLAN B. D. A trunk connection is affected by broadcast storms on any particular VLAN that is carried by that trunk. 802. 802. but now it will be used to connect a host to the network. Carrying all required VLANs on a single access port will ensure proper traffic separation. Layer 3 broadcast E. D. B. How should the network administrator reconfigure switch port Fa0/1? A. . no VLANs 28 Switch port fa0/1 was manually configured as a trunk.1q will not perform operations on frames that are forwarded out access ports. Layer 2 broadcast B.1q trunking protocol is true? A. Layer 2 multicast C. Enter the switchport mode access command in interface configuration mode.25 What causes a VTP configured switch to issue a summary advertisement? A. Delete any VLANs currently being trunked through port Fa0/1.

D. B. CSMA/CA D. C. 36 Which statement or set of paired statements correctly compares STP with RSTP? A. The ports cannot communicate with other ports. B. The ports remain a part of that VLAN until the switch is rebooted. CSMA/CD B. D. What switch port modes will allow a switch to successfully form a trunking link if the neighboring switch port is in “dynamic desirable” mode? A. STP waits for the network to converge before placing ports into forwarding state. 34. VLAN 1 can not be deleted until another VLAN has been assigned its responsibilities. Why did this command generate an error? A. VLAN 1 can never be deleted. What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3? A. D. B. What happens to the member ports of a VLAN when the VLAN is deleted? A. Enter the no vlan 2 and the vlan 3 commands in global configuration mode. Which access method does a wireless access point use to allow for multiple user connectivity and distributed access? A. . RSTP has only root ports. an error is received. STP specifies backup ports. auto. They then become members of the management VLAN.dat file. The ports automatically become a part of VLAN1. VLAN 1 can not be deleted until all ports have been removed from it. C. and designated ports. C.31. STP and RSTP have the same BPDU format and flag field information. Enter the no shutdown in interface configuration mode to return it to the default configuration and then configure the port for VLAN 3. C. alternate ports. A network administrator is removing several VLANs from a switch. RSTP places designated ports into forwarding state immediately. Enter the switchport access vlan 3 command in interface configuration mode. on. VLAN 1 can only be deleted by deleting the vlan. B. on or dynamic desirable mode C. dynamic desirable. dynamic desirable mode B. D. 33. When the administrator enters the no vlan 1 command. RSTP ties together the port state and port role. The ports default back to the management VLAN. polling 32. auto. or no negotiate mode 35. or dynamic desirable mode D. STP port states are independent of port roles. token passing C. Enter the switchport trunk native vlan 3 commands in interface configuration mode. on.

B. Configure all the interfaces on the switch as the static root ports. Set the switch priority to a smaller value than that of the other switches in the network. learning C. blocking of the non-designated ports C. listening E. bridge priority B. blocking B. determination of the designated port for each segment . forwarding 39 When PVST+ was developed. protocol D. selection of the designated trunk port D. disabling D. VLAN ID 40 What is the first step in the process of convergence in a spanning treetopology? A. the Bridge ID was modified to include which information? A. Change the BPDU to a lower value than that of the other switches in the network. MAC address C. election of the root bridge B. Assign a lower IP address to the switch than that of the other switches in the network. C. D.37 How can a network administrator influence which STP switches become the root bridge? A. 38 In which STP state does a port record MAC addresses but not forward user data? A.