You are on page 1of 16

CCNA Exploration 3, Chapter 2.

Basic Switch Concepts and Configuration Worksheet


PLP CISCO Networking Academy Name: JMB, Instructor

1. The set of rules that Ethernet uses is based on the IEEE ________________________________________________________________ technology: 2. _____________________ is only used with half-duplex communication typically found in hubs. Full-duplex switches do not use __________________________. 3. Communications in a switched LAN network occur in three ways. List, explain, and give an example of each:

. 4. The Ethernet frame structure adds _________________________ around the Layer 3 PDU to __________________________ the message being sent. 5. List and briefly describe each of the seven sections of an Ethernet 802.3 Frame:

CCNA Exploration 3, Chapter 2. Basic Switch Concepts and Configuration Worksheet


PLP CISCO Networking Academy JMB, Instructor

6. An Ethernet MAC address is a two-part _______-bit binary value expressed as _________________hexadecimal digits. 7. The ____________ is the first part of a MAC address. It is _____ bits long and identifies ______________________________________________________. 8. The vendor-assigned part of the MAC address is __________ bits long and ____________________________________ the Ethernet hardware. 9. Summarize each of the two types of duplex settings used for communications on an Ethernet network:

10. Standard, shared hub-based Ethernet configuration efficiency is typically rated at _________________________ percent of the 10-Mb/s bandwidth. Full-duplex Fast Ethernet, compared to 10-Mb/s bandwidth, offers ______________ percent efficiency in both directions (_______-Mb/s transmit and _______-Mb/s receive). 11. List and explain each of the duplex settings on Cisco Catalyst switches:

CCNA Exploration 3, Chapter 2. Basic Switch Concepts and Configuration Worksheet


PLP CISCO Networking Academy JMB, Instructor

12. What is a possible problem with autonegotation and what can you do to avoid this situation?

13. Explain the auto-MDIX feature and what command you use to enable it:

14. How does a switch builds its MAC address table?

15. What does a switch do when an incoming data frame is received and the destination MAC address is not in the table?

16. What is a collision domain and what effect do hubs and switches have on collision domains?

CCNA Exploration 3, Chapter 2. Basic Switch Concepts and Configuration Worksheet


PLP CISCO Networking Academy JMB, Instructor

17. What is a microsegment (microsegmentation)?

18. A collection of interconnected switches forms a single _______________domain. Only a Layer 3 entity, such as a ____________, or a _____________________, can stop a Layer 2 broadcast domain. 19. When two switches are connected, the ________________domain is increased. 20. List and describe three sources of latency:

21. Explain why switches add less latency to a network than routers:

22. The predominant cause of network latency in a switched LAN is more a function of the ____________________________________, routing protocols used, and _____________________________________________ running on the network. 23. List the most common causes of network congestion:

CCNA Exploration 3, Chapter 2. Basic Switch Concepts and Configuration Worksheet


PLP CISCO Networking Academy JMB, Instructor

24. Describe the distinctions between a bridge and a switch:

25. What is a bottleneck? Describe some ways of removing network bottlenecks:

26. List and describe two switch forwarding methods:

27. List and describe two variants of cut-through switching:

28. Describe the differences between symmetric and asymmetric switching

CCNA Exploration 3, Chapter 2. Basic Switch Concepts and Configuration Worksheet


PLP CISCO Networking Academy JMB, Instructor

29. Describe how Ethernet switches use memory buffering:

30. List and describe two methods of memory buffering used by switches:

31. How does a Layer 3 Switch differ from a Layer 2 LAN Switch?

32. With the advent of Layer 3 Switching technology, why do we still need routers?

33. What are the similarities between navigating through the Command Line Interface Modes on a Cisco switch and a Cisco Router?

34. List some GUI-based Alternatives to the CLI:

CCNA Exploration 3, Chapter 2. Basic Switch Concepts and Configuration Worksheet


PLP CISCO Networking Academy JMB, Instructor

35. The Cisco IOS CLI offers two types of help. Briefly describe them:

36. List the tasks you can complete with the command history feature:

37. By default, command history is _______________, and the system records the last ______ command lines in its history buffer. You can use the _____________ command to view recently entered EXEC commands. 38. The command history can be disabled for the ____________________________ only by using the ______________________________ in user or ________________________ mode. 39. Describe the Boot Sequence of a Cisco switch:

40. How can the Boot Loader help in recovering from a system crash?

CCNA Exploration 3, Chapter 2. Basic Switch Concepts and Configuration Worksheet


PLP CISCO Networking Academy JMB, Instructor

41. When the switch is powered on, the POST begins. During POST, the LEDs blink while a series of tests determine that the switch is functioning properly. When the POST has completed, the SYST LED rapidly blinks ____________. If the switch fails POST, the SYST LED turns _____________. When a switch fails the POST test, it is necessary to ____________________________________. 42. Explain why you would assign an IP address to a switch even though it is a Layer 2 device:

43. To configure an IP address and subnet mask on the management VLAN of the switch, you must be in _________________________________________ mode. 44. To configure a default gateway for the switch, use the _____________________ command in _________________________ mode. 45. Describe the purpose of the ip http authentication enable command:

46. Dynamic addresses are ______________ MAC addresses that the switch learns and then ages when they are not in use. You can change the aging time setting for MAC addresses. The default time is _________ seconds. 47. What are the implications of setting the aging time too short or too long?

CCNA Exploration 3, Chapter 2. Basic Switch Concepts and Configuration Worksheet


PLP CISCO Networking Academy JMB, Instructor

48. Why would a network administrator specifically assign static MAC addresses to certain ports on a switch?

49. What command would be used to assign these static mappings?

50. List some of the show commands that can be used to verify the configuration of a Cisco switch:

51. Why would you not regularly use the copy startup-config running-config command to restore a switchs configuration?

52. List the steps to upload a configuration file from a switch to a TFTP server for storage:

53. List the steps to restore a configuration file to a switch from a TFTP server:

CCNA Exploration 3, Chapter 2. Basic Switch Concepts and Configuration Worksheet


PLP CISCO Networking Academy JMB, Instructor

54. To clear the contents of your startup configuration, use the ________________ or the ____________________________________ privileged EXEC command. 55. To delete a file from Flash memory, use the ____________________________ privileged EXEC command. Be sure to do the PT Activity 2.3.8 on Basic Switch Management! 56. To ensure that a user on the console port is required to enter the password, use the __________________ command. Even when a password is defined, it is not required to be entered until the _________________ command has been issued. 57. What will happen if you input the login command in line configuration mode but do not define a password?

58. How many vty ports are available on a Cisco 2960 switch?

59. The enable password global configuration command allows you to specify a password to restrict access to privileged EXEC mode. What is the problem with this and what mechanism does Cisco provide to protect switch security from this problem?

60. What command will ensure that all system passwords are stored in an encrypted form?

10

CCNA Exploration 3, Chapter 2. Basic Switch Concepts and Configuration Worksheet


PLP CISCO Networking Academy JMB, Instructor

61. Summarize the method you would need to use to regain access to a Cisco device in the case of lost or forgotten passwords:

62. You can define a customized banner to be displayed before the username and password login prompts by using the _________________________ command in __________________________________________ mode. Enclose the banner text in quotations or using a ______________________ different from any character appearing in the MOTD string. 63. Compare and contrast the use of Telnet vs. SSH for remotely accessing a vty on a Cisco switch:

64. If you have switched the transport protocol on the vty lines to permit only SSH, what commands could you use (and in what mode) to re-enable the Telnet protocol to permit Telnet access?

11

CCNA Exploration 3, Chapter 2. Basic Switch Concepts and Configuration Worksheet


PLP CISCO Networking Academy JMB, Instructor

65. SSH supports the _______________________________________ algorithm, the ______________________________ algorithm, and password-based user authentication. 66. DES offers ___________ encryption, and 3DES offers ___________ encryption. 67. Explain SSHs use of an RSA key:

68. Summarize how an attacker could use MAC Address flooding to make a switch act like a hub:

69. Explain what happens in a DHCP spoofing attack:

12

CCNA Exploration 3, Chapter 2. Basic Switch Concepts and Configuration Worksheet


PLP CISCO Networking Academy JMB, Instructor

70. What is DHCP snooping and how does it protect against DHCP spoof attacks?

71. Explain why you should disable the use of CDP on devices that do not need to use it:

72. What are two types of Telnet attacks? (briefly explain each):

73. List the functions performed by Network Security Audits and Network Penetration Testing:

13

CCNA Exploration 3, Chapter 2. Basic Switch Concepts and Configuration Worksheet


PLP CISCO Networking Academy JMB, Instructor

74. List Network Security Tools Features and Uses:

75. List some things you could accomplish by implementing port security on switch ports:

76. List and describe Secure MAC Address types:

77. What is accomplished when you enable sticky learning on a switch interface?

78. List characteristics of Sticky secure MAC addresses:

14

CCNA Exploration 3, Chapter 2. Basic Switch Concepts and Configuration Worksheet


PLP CISCO Networking Academy JMB, Instructor

79. What situations constitute a port security violation?

80. List and summarize port security violation modes:

81. List port security features and their default settings:

82. List the command sequence (and corresponding modes) you would enter in a Cisco Catalyst switch to configure dynamic port security on interface FastEthernet 0/10:

83. List the command sequence (and corresponding modes) you would enter in a Cisco Catalyst switch to configure sticky port security on interface FastEthernet 0/14:

15

CCNA Exploration 3, Chapter 2. Basic Switch Concepts and Configuration Worksheet


PLP CISCO Networking Academy JMB, Instructor

84. To display port security settings for the switch or for the specified interface, use the ____________________________________________________ command. 85. To display all secure MAC addresses configured on all switch interfaces or on a specified interface with aging information for each, use the _________________________________________________________ address command. 86. For security, what should you do with all unused switch ports, and how would you do this?

Be sure that you do PT Activity 2.4.7: Configure Switch Security and PT Activity 2.5.1: Basic Switch Configuration. You are not required to submit any of this chapters labs for grading.

16

You might also like