You are on page 1of 18

QUIZ 1

In networking term, port density refers to the number of ports available on a


single switch.
True
False
In networking world, "Rack unit" is the term used to express the thickness or
height of a switch.
True
False
Access Layer is the layer of which the hierarchical enterprise LAN design model
would PoE for VoIP phones and access points be considered.
True
False
Rack Unit is the networking term used to express the thickness or height of a
switch.
True
False
Access Layer is a design model layer that provides connectivity for the users.
True
False
Core Layer is a design model layer that forwards traffic from/to different local
networks.
True
False
Distribution Layer is a design model layer that provides a high-speed backbone
link between dispersed networks.
True
False

In network troubleshooting, which command is used to display the bandwidth of


an interface on an EIGRP-enabled router?
a. show ip interface brief
b. show ip route
c. show ip protocols
d. show interfaces
How much traffic for a 12port gigabit switch capable of generating when
operating at full wire speed?
a. 1 Gb/s, because data can only be forwarded from one port at a time
b. 12 Gb/s, by providing full bandwidth to each port
c. 24 Gb/s, because this is the maximum forwarding rate on Cisco switches
d. 26 Gb/s, because of overhead requirements
In network troubleshooting, which command can be issued on a router to verify
that automatic summarization is enabled?
a. show ip protocols
b. show ip eigrp neighbors
c. show ip interface brief
d. show ip eigrp interfaces
In managing Cisco devices, what are two ways to access a Cisco switch for out-
of-band management?
a. A connection that uses the AUX and and Telnet
b. A connection that uses Telnet and SSH
c. A connection that uses HTTP and HTTPs
d. A connection that uses the console and AUX port
Which among the listed below are the 2 functional parts of the network that can
be combined to form a collapsed core design in Cisco Enterprise Architecture?
a. Enterprise edge and access layer
b. Provider edge and access layer
c. Access and distribution layer
d. Distribution and core layer
What is the useof in-band device management and how it is done?
a. It uses a direct connection to a console or AUX port.
b. It is used for initial configuration or when a network connection is
unavailable.
c. It uses a terminal emulation client.
d. It is used to monitor and make configuration changes to a network device
over a network connection.
In this chapter, what is the function of PoE pass-through?
a. Allows a multilayer switch to forward IP packets at a rate close to that of
Layer 2 switching by bypassing the CPU
b. Allows multiple physical switch ports to be aggregated together and act as
a single logical link to increase bandwidth on trunk links
c. Allows a switch to disable redundant Layer 2 paths in the topology to
prevent Layer 2 loops
d. Allows switches, phones, and wireless access points to receive power over
existing Ethernet cables from an upstream switch
How much traffic for a 24port Gbit switch at hand capable of generating when
operating at full wire speed?
a. 12 Gb/s, because of overhead requirements
b. 24 Gb/s, by providing full bandwidth to each port
c. 48 Gb/s, because of overhead requirements
d. 48 Gb/s, because this is the maximum forwarding rate on Cisco switches
What today's network design would contain the scope of disruptions on a
network should a failure occur?
a. The installation of only enterprise class equipment throughout the
network
b. The configuration of all access layer devices to share a single gateway
c. The deployment of distribution layer switches in pairs and the division of
access layer switch connections between them
d. The reduction in the number of redundant devices and connections in the
network core
In today's current switch technology, Which statement describes a characteristic
of Cisco Meraki switches?
a. They are service provider switches that aggregate traffic at the edge of
the network.
b. They are cloud-managed access switches that enable virtual stacking of
switches.
c. They are campus LAN switches that perform the same functions as Cisco
2960 switches.
d. They promote infrastructure scalability, operational continuity, and
transport flexibility.
Which network design solution below in the current technology today will extend
access layer connectivity to user devices?
a. Routing protocol implementation
b. Redundancy implementation
c. Wireless connectivity implementation
d. Implementing etherChannel implementation
Which network design solution among the choices listed below will best extend
access layer connectivity to host devices?
a. Implementing wireless connectivity
b. Implementing redundancy
c. Etherchannel implementation
d. Dynamic routing implementation
If you are a network design engineer, which type of router would an enterprise
use to allow customers to access content anytime and anyplace, regardless of
whether they are at home or work?
a. Network edge routers
b. Modular routers
c. Branch routers
d. Service provider routers
Which among the listed below is a characteristic of in-band device management
as discussed in this chapter?
a. It uses a direct connection to a console or AUX port.
b. It is used to monitor and make configuration changes to a network device
over a network connection.
c. It uses a terminal emulation client.
d. It is used for initial configuration or when a network connection is
unavailable.
Why would a network administrator of RMS Defence Contractor company issue
the show cdp neigbors command on a router especially if a network problem
occurs?
a. To display router ID and other information about OSPF neighbors
b. To display device ID and other information about directly connected Cisco
devices
c. To display routing table and other information about directly connected Cisco
devices
d. To display line status and other information about directly connected Cisco
devices

Which among the listed below as discussed in Cisco Enterprise Architecture


which two functional parts of the network are combined to form a collapsed core
design?
a. Provider edge and access layer
b. Core and distribution layer
c. Access and distribution layer
d. Enterprise edge and access layer

A network administrator of Genesis Airlines issue a command of show cdp


neigbors on a router, what do you think is the reason?
a. To display device ID and other information about directly connected Cisco
devices
b. To display routing table and other information about directly connected
Cisco devices
c. To display line status and other information about directly connected Cisco
devices
d. To display router ID and other information about OSPF neighbors
In managing Cisco devices, what is a characteristic of out-of-band device
management?
a. It requires Telnet, SSH, or HTTP to access a Cisco device.
b. It requires a terminal emulation client.
c. Out-of-band device management requires a direct connection to a network
interface.
d. It requires at least one network interface on the device to be connected
and operational.

QUIZ 2

A protocol that allows multiple vlans to run in a single spanning-tree instance is


called Rapid PVST.
True
False
In FHRP operation, two or more routers are represented as a single virtual router.
True
False
The spanning-tree mode rapid-pvst global configuration command is used to
enable Rapid PVST+.
True
False
The legacy standard for STP that runs all VLANs in a single spanning-tree
instance is called MSTP.
True
False
A Cisco enhancement of RSTP to provide a spanning tree instance for each vlan
is called STP.
True
False

Among the choices below, which protocol specified by RFC 2281 provides
network redundancy for IP networks, ensuring that user traffic immediately and
transparently recovers from first-hop failures in network edge devices or access
circuits?
a. HSRP
b. ICMP
c. STP
d. IRDP
Which of the following statement is true?
a. A switch creates separate collision domains but one broadcast domain. A
router provides a separate broadcast domain.
b. A switch creates separate collision domains and separate broadcast
domains. A router provides separate collision domains.
c. A switch creates a single collision domain and a single broadcast domain.
A router creates a single collision domain.
d. A switch creates a single collision domain and separate broadcast
domains. A router provides a separate broadcast domain as well.
You want to run the new 802.1w on your switches. Which of the following would
enable this protocol?
a. Switch# spanning-tree mode 802.1w
b. Switch(config)# spanning-tree mode rapid-pvst
c. Switch# spanning-tree mode rapid-pvst
d. Switch(config)# spanning-tree mode 802.1w
A network administrator is overseeing the implementation of first hop
redundancy protocols. Which two protocols will not be able to function with
multivendor devices?
a. HSRP & PVST
b. IRDP & HSRP
c. GLBP & HSRP
d. VRRP & GLBP
As discussed in LAN Redundancy chapter, What is the purpose of HSRP?
a. It prevents malicious hosts from connecting to trunk ports.
b. It enables an access port to immediately transition to the forwarding
state.
c. It provides a continuous network connection when a router fails.
d. It prevents a rogue switch from becoming the STP root.

Which two network design features require Spanning Tree Protocol (STP) to
ensure correct network operation?
a. static default routes & implementing VLANs to contain broadcasts
b. link-state dynamic routing that provides redundant routes & static default
routes
c. redundant links between Layer 2 switches & removing single point of
failure with multiple Layer 2 switches
d. implementing VLANs to contain broadcasts & redundant links between
Layer 2 switches
As per our discussion in this module LAN Redundancy, what is the outcome of a
Layer 2 broadcast storm?
a. Routers will take over the forwarding of frames as switches become
congested.
b. CSMA/CD will cause each host to continue transmitting frames.
c. ARP broadcast requests are returned to the transmitting host.
d. New traffic is discarded by the switch because it is unable to be
processed.
Which of the following is a layer 2 protocol used to maintain a loop-free
network?
a. STP
b. VTP
c. PORTFAST
d. CDP
Which RSTP ports are connected to end devices?
a. Designated ports
b. Root ports
c. Edge ports
d. Trunk ports
A network problem occurs suddenly, what is the initial approach that should be
used to troubleshoot a broadcast storm in a switched network?
a. Replace all instances of STP with RSTP.
b. Insert redundant links to replace the failed STP links.
c. Manually remove redundant links in the switched network.
d. Replace the cables on failed STP links.
Among the choices listed below, which port state will switch ports immediately
transition to when configured for PortFast?
a. Blocking
b. Listening
c. Learning
d. Forwarding
What is the purpose of Spanning Tree Protocol in a switched LAN as discussed in
this chapter?
a. To prevent switching loops in networks with redundant switched paths
b. To prevent routing loops in networks with redundant paths
c. To manage the VLAN database across multiple switches
d. To provide a mechanism for network monitoring in switched environments

An administrator is troubleshooting a switch and wants to verify if it is a root


bridge. What command can be used to do this?
a. show running-config
b. show cdp neigh
c. show spanning-tree
d. show startup-config
In this chapter, which two types of spanning tree protocols can cause sub-
optimal traffic flows because they assume only one spanning-tree instance for
the entire bridged network?
a. STP & MSTP
b. Rapid PVST+ & RSTP
c. STP & RSTP
d. PVST+ & VRRP
As discussed in this chapter, what is an advantage of PVST+?
a. PVST+ optimizes performance on the network through autoselection of
the root bridge.
b. PVST+ reduces bandwidth consumption compared to traditional
implementations of STP that use CST.
c. PVST+ optimizes performance on the network through load sharing.
d. PVST+ requires fewer CPU cycles for all the switches in the network.

As per our current module discussion, which non-proprietary protocol provides


router redundancy for a group of routers which support IPv4 LANs?
a. VRRPv2
b. HSRP
c. GLBP
d. SLB
In this chapter, which is a characteristic of a Layer 2 loop?
a. A switch is continually forwarding the same unicast frame.
b. Routers continually forward packets to other routers.
c. The Time-to-Live attribute of a frame is set to infinity.
d. Broadcast frames are forwarded back to the sending switch.
In reference to our current topic which is LAN Redundancy, which 3 components
are combined to form a bridge ID?
a. IP address, extended system ID, cost
b. MAC address, port ID, ip address
c. extended system ID, MAC address, bridge priority
d. port ID, ip address, MAC address
A network engineer connected 2 switches together with two crossover cables for
redundancy, and STP is disabled. Which of the following will happen between the
switches?
a. Broadcast storms will occur on the switched network.
b. The switches will automatically load-balance between the two links.
c. The MAC forward/filter table will not update on the switch.
d. The routing tables on the switches will not update.
If you want to disable STP on a port connected to a server, which command
would you use?
a. spanning-tree portfast
b. spanning-tree security
c. spanning-tree off
d. disable spanning-tree

PRELIM EXAM

If the network administrator of Genesis Mobile Telecommunications wanted to


disable STP on a port connected to a server, which command would you use?
a. spanning-tree portfast
b. spanning-tree security
c. spanning-tree off
d. disable spanning-tree
The number of interfaces supported on a switch.
a. Bandwidth Capacity
b. Port Density
c. Etherchannel ports
d. Rack Unit (RU)
In reference to module 2 of this course, which is true of the difference between
STP and RSTP?
a. STP uses a proposal and agreement process to allow switches to negotiate
on port roles, but RSTP assigns the roles centrally.
b. RSTP is the default version on all Cisco switches now, but STP was the
default until IOS version 11.4
c. RSTP is able to support VLANs by using Cisco proprietary enhancements
but STP is not.
d. STP stops sending user data while the whole network converges, but RSTP
closes down and converges each link separately.
As discussed which is true of the PVST+ protocol?
a. It supports the use of VLANs and requires that ISL frame tagging should
be used on VLAN trunk links.
b. It was the first version of STP to include the PortFast feature that allows
access ports to transition directly to the forwarding state.
c. It is Cisco's implementation of Rapid STP.
d. It allows different VLANs to have different root bridges and allows ports to
be blocked for some VLANs but not others.
In which situation would a network expert install a Cisco Nexus Series or Cisco
Catalyst 6500 Series switch to promote infrastructure scalability?
a. on a campus LAN network as access layer switches
b. to enable virtual stacking of switches to provide cloud-managed access
c. on a data center network to provide expansion and transport flexibility
d. on a service provider network to promote integrated security, and
simplified management
As discussed in chapter 2, what states does a port go through from the time
when a switch first start up to the time when the port is fully operational?
a. Listening, learning, blocking, forwarding
b. Blocking, learning, listening, forwarding

c. Disabled, listening, learning, forwarding


d. Blocking, listening, learning, forwarding

In FHRP operation, two or more routers are represented as a single ______ router.
a. Perimeter
b. Switch
c. Virtual
d. Core
An administrator is troubleshooting a switch and wants to verify if it is a root
bridge. What command can be used to do this?
a. show cdp neigh
b. show startup-config
c. show running-config
d. show spanning-tree
Which is the default STP operation mode on Cisco Catalyst switches?
a. MST
b. RSTP
c. MSTP
d. PVST+
As discussed in Chapter 2, what do you called a design methodology for building
networks in three layers including access, distribution, and core.
a. STP
b. hierarchical network
c. Etherchannel technology
d. Collapsed Core
In terms of network reliability, the ability of a network to be up most of the time.
Sometimes referred to as 99.999, or "five nines".
a. Flexibility
b. Reliability
c. Scalability
d. Integrity
A network link connected to a switch went down. How long can it take for a
network using spanning tree topology to converge again after a topology
change?
a. up to 15 seconds
b. up to 20 seconds
c. up to 10 seconds
d. up to 50 seconds
Which technology is required when switched networks are designed to include
redundant links?
a. link aggregation
b. virtual LANs
c. Spanning Tree Protocol
d. virtual private networks
A connection to a switch went down suddenly, how long can it take for a network
using RSTP to converge again after a topology change?
a. 6sec
b. 15sec
c. 50sec
d. 10sec
Among the listed below, what are the distinct functions of layer 2 switching that
increase available bandwidth on the network?
1. Address learning
2. Routing
3. Forwarding and filtering
4. Creating network loops
5. Loop avoidance
6. IP addressing
a. 2 and 6
b. 3 and 5
c. 1, 3 and 5
d. 2, 4 and 6
As discussed in chapter 1, the duplication of devices, services, or connections so
that, in the event of a failure, the redundant devices, services , or connections
can perform the work of those that failed.
a. Bundle
b. Backup
c. Duplication
d. Redundancy
Why do a network administrator change a switch priority to a higher value than
that of other switches in the network?
a. To make sure that the switch is not chosen as the root bridge.
b. To make sure that no ports on the switch are blocked.
c. To make sure that no ports on the switch are blocked.
d. To make sure that the switch is chosen as the root bridge.
What protocol defined by IEEE standard 802.1D. Allows switches and bridges to
create a redundant LAN, with the protocol dynamically causing some ports to
block traffic so that the bridge/ switch forwarding logic will not cause frames to
loop indefinitely around the LAN. SSID See service set identifier?
a. Etherchannel
b. PAgP
c. STP
d. LACP
Divides the network into functional components while still maintaining the core,
distribution, and access layers of the three-layer model as discussed in chapter
2 LAN Redundancy?
a. Enterprise edge
b. Cisco Enterprise Architecture
c. Collapsed Core
d. Hierarchical network

As shown in the exhibit below, which protocol information is being displayed in


the output?
a. GLBP
b. VRRP
c. HSRP
d. FHRP
Which STP port role is adopted by a switch port if there is no other port with a
lower cost to the root bridge?
a. designated port
b. root port
c. alternate
d. disabled port
In the Cisco Enterprise Architecture, which two functional parts of the network
are combined to form a collapsed core design. This is usually implemented in a
small to medium network setup?
a. provider edge & access layer
b. distribution layer & enterprise edge
c. access layer & enterprise edge
d. core layer and distribution layer
As discussed in chapter 2 , what will exist when the spanning tree protocol has
worked and the network has converged?
a. One root bridge per segment, one root port per non root bridge, one
designated port per segment, non-designated ports.
b. One root bridge per network, one root port on each bridge, one
designated port on each bridge, all non-designated ports are blocked.
c. One root bridge per network, one root port per non root bridge, one
designated port per segment, non-designated ports.
d. One root bridge per network, one root port on each switch, one non-
designated port on each segment, other ports are blocked.
If no bridge priority is configured in PVST, which criteria is considered when
electing the root bridge?
a. lowest IP address
b. lowest MAC address
c. highest MAC address
d. highest IP address
In MRT Construction head office, a network administrator is preparing the
implementation of Rapid PVST+ on a production network. How are the Rapid
PVST+ link types determined on the switch interfaces?
a. Link types must be configured with specific port configuration commands.
b. Link types can only be determined if PortFast has been configured.
c. Link types can only be configured on access ports configured with a single
VLAN
d. Link types are determined automatically.
Which statement below describes HSRP?
a. It prevents malicious hosts from connecting to trunk ports.
b. It prevents a rogue switch from becoming the STP root.
c. It enables an access port to immediately transition to the forwarding
state.
d. It provides a continuous network connection when a router fails.
As discussed in this chapter, which of the following listed below is a layer 2
protocol used to maintain a loop-free network and this refers to the IEEE 802.1D
standard?
a. STP
b. VTP
c. CDP
d. RIP
A certified network expert is configuring a LAN with a redundant first hop to
make better use of the available network resources. Which protocol should the
engineer implement?
a. GLBP
b. HSRP
c. VRRP
d. FHRP
Which three port states are used by Rapid PVST+?
a. Discarding, learning & forwarding
b. trunking , blocking & forwarding
c. Blocking, learning & forwarding
d. listening , blocking & trunking
Which STP priority configuration would ensure that a switch would always be the
root switch?
a. spanning-tree vlan 10 priority 4096
b. spanning-tree vlan 10 root primary
c. spanning-tree vlan 10 priority 61440
d. spanning-tree vlan 10 priority 0
Which switch among the listed below would STP choose to become the root
bridge in the selection process?
a. 32769: 22-33-44-55-66-78
b. 32768: 11-22-33-44-55-66
c. 32768: 11-22-33-44-55-65
d. 32768: 22-33-44-55-66-77
You want to run the new 802.1w on your switches. Which of the following
command syntax would enable this protocol?
a. Switch(config)Switch(config)# spanning-tree mode 802.1w
b. Switch# spanning-tree mode rapid-pvst
c. Switch(config)# spanning-tree mode rapid-pvst
d. Switch(config)# mode span rapid-pvst
During the implementation of Spanning Tree Protocol, all switches are rebooted
by the network administrator. What is the first step of the spanning-tree election
process?
a. Each switch determines the best path to forward traffic.
b. Each switch with a lower root ID than its neighbor will not send BPDUs.
c. All the switches send out BPDUs advertising themselves as the root
bridge.
d. Each switch determines what port to block to prevent a loop from
occurring.
As discussed in initial stages of Scaling Networks, which two features of
enterprise class equipment assists an enterprise network in maintaining 99.999
percent up-time?
a. redundant power supplies & failover capabilities
b. failure domains & failover capabilities
c. redundant power supplies & collapsed core
d. services module & failover capabilities
Observe the given output below. A certified network engineer is troubleshooting
host connectivity on a LAN that uses a first hop redundancy protocol. Which IPv4
gateway address should be configured on the host?
a. 192.168.2.2
b. 192.168.2.0
c. 192.168.2.100
d. 192.168.2.1
In the above network diagram of DFA Headquarters core switches , which switch
will be chosen as root bridge and why?
a. Sw-C, because it has the lowest priority
b. Sw-B, because it has the highest MAC address
c. Sw-A, because it has the lowest MAC address
d. Sw-D, because it has the highest priority
During connectivity issues, why would a network admin issue the show cdp
neigbors command on a router?
a. to display device ID and other information about directly connected Cisco
devices
b. to display line status and other information about directly connected Cisco
devices
c. to display router ID and other information about OSPF neighbors
d. to display routing table and other information about directly connected
Cisco devices
When first hop redundancy protocols are used, which two items will be shared
by a set of routers that are presenting the illusion of being a single router?
a. IP address & BID
b. MAC address & IP address
c. BID & static route
d. hostname & MAC address
In managing cisco devices, which two requirements must always be met to use
in-band management to configure a network device?
a. a direct connection to the auxiliary port & Telnet, SSH, or HTTP access to
the device
b. at least one network interface that is connected and operational & Telnet,
SSH, or HTTP access to the device
c. a terminal emulation client & a direct connection to the console port
d. a direct connection to the console port & at least one network interface
that is connected and operational
What is the most likely effect on the topology if Spanning Tree Protocol has been
disabled?
a. All hosts will reply to the ARP request
b. The router will reply to the ARP request
c. Excessive collisions
d. Broadcast storm
Among the listed below, how can an enterprise network be designed to optimize
bandwidth?
a. by deploying a collapsed core model
b. by installing devices with failover capabilities
c. by organizing the network to control traffic patterns
d. by limiting the size of failure domains
A switch port was configured to Portfast, What will be the port state after this
configuration?
a. learning
b. blocking
c. forwarding
d. listening
During the discussion in this chapter, what is a characteristic of in-band device
management?
a. It uses a direct connection to a console or AUX port.
b. It is used for initial configuration or when a network connection is
unavailable.
c. It is used to monitor and make configuration changes to a network device
over a network connection.
d. It uses a terminal emulation client.
What are two benefits of extending access layer connectivity to users through a
wireless medium?
a. increased network management options & reduced costs
b. reduced costs & increased flexibility
c. increased bandwidth availability & increased flexibility
d. reduced costs & decreased number of critical points of failure
In ABC Construction Co., a network administrator is planning redundant devices
and cabling in a switched network to support high availability. Which benefit will
implementing the Spanning Tree Protocol provide to this design?
a. Redundant paths can be available without causing logical Layer 2 loops.
b. Multiple physical interfaces can be combined into a single EtherChannel
interface.
c. Network access can be expanded to support both wired and wireless
devices.
d. Faster convergence is available for advanced routing protocols.
A newly hired certified network engineer of RMS Industries is troubleshooting a
switch and wants to verify if it is a root bridge. Which of the following listed
below is the right command to display the correct information?
a. show spanning-tree
b. show startup-config
c. show running-config
d. show vlan
In Genesis Research Lab, a network administrator is reviewing a network design
that uses a fixed configuration enterprise router that supports both LAN and
WAN connections. However, the engineer realizes that the router does not have
enough interfaces to support growth and network expansion. Which type of
device should be used as a replacement?
a. a PoE device
b. another fixed configuration router
c. a Layer 3 switch
d. a modular router
How many switches in a network must be running STP or RSTP in order to avoid
broadcast storms?
a. At least the switch that is chosen as the root bridge.
b. At least one in each loop.
c. All of them.
d. At least one.
Which feature ensures that configured switch edge ports do not cause Layer 2
loops if a port is mistakenly connected to another switch?
a. extended system ID
b. PortFast
c. PVST+
d. BPDU guard
Which non-proprietary protocol among the listed below provides router
redundancy for a group of routers which support IPv4 LANs?
a. HSRP
b. VRRPv2
c. SLB
d. GLBP
Immediately after a router completes its boot sequence, the network
administrator of Gilas Telecoms wants to check the routers configuration. From
privileged EXEC mode, which of the following commands can the administrator
use for this purpose?
a. show startup-config & show running-config
b. show NVRAM &show running-config
c. show flash &show startup-config
d. show version &show running-config

You might also like