Professional Documents
Culture Documents
Assignment B
Question 1(a): Describe the benefits and purpose of VTP
Question 1(b): Explain the purpose and operation of ACLs? Explain the filtering
process?
Question 2: Describe and compare the Ethernet concepts and techniques used by LA
N switches.
Question 3a): The router IOS images should be stored on a TFTP server on the net
work. A network TFTP server can be used to restore lost or corrupted IOS images
to network devices. In your own words, answer the following questions about IOS
image management. What information is required when using the copy command to up
load or download a system image file?
Question 3b): What happens to a router when the IOS is deleted from flash?
Case Study
Q 4 Refer to Figure 1 for all the questions in this command exercise.
Q.I Allow only Host A from the 172.16.1.0/27 subnet access to the E-Mail server.
Use the last usable number in the extended list range. Host A should not have a
ccess to any of the other servers. Write all the commands
Q.II Allow only Host B access to the Internet, and deny everyone else. Use an ex
tended named ACL to accomplish this task, and name the ACL Internet. Write all t
he commands
Q.III No one from the 172.16.1.0/27 subnet is allowed access to the File Server,
but all other traffic should be permitted. Use an extended named ACL to accompl
ish this task, and name the ACL No Access. Write all the commands
Q.IV Allow only hosts on the R3 LAN to communicate with hosts on the R1 LAN. The
y are allowed access to the Internet, but deny them access to the servers on the
R2 LAN. Use the first usable number in the extended IP range to accomplish this
task. Write all the commands
Assignment C
1.
Which layer of the hierarchical network design model is refered to as t
he high-speed backbone of the internetwork, where high availability and redundan
cy are critical?
A.
access layer
B.
core layer
C.
data-link layer
D.
distribution layer
2.
Which feature supports higher throughput in switched networks by combin
ing multiple switch ports?
A.
convergence
B.
redundant links
C.
link aggregation
D.
network diameter
3.
Which hierarchical design model layer controls the flow of network traf
fic using policies and delineates broadcast domains by performing routing functi
ons between virtual LANs (VLANs)?
A.
application
B.
access
C.
distribution
D.
network
E.
core
4.
What is the likely impact of moving a conventional company architecture
to a completely converged network?
A.
Local analog phone service can be completely outsourced to cost-effecti
ve providers.
B.
C.
ge.
D.
E.
5.
Configuring communication between devices on different VLANs requires t
he use of which layer of the OSI model?
A.
Layer 1
B.
Layer 3
C.
Layer 4
D.
Layer 5
6.
Which layer of the OSI model does an access layer LAN switch use to mak
e a forwarding decision?
A.
Layer 1
B.
Layer 2
C.
Layer 3
D.
Layer 4
7.
Which hierarchical design characteristic would be recommended at both t
he core and distribution layers to protect the network in the case of a route fa
ilure?
A.
PoE
B.
redundancy
C.
aggregation
D.
access lists
8.
At which hierarchical layer are switches normally not required to proce
ss all ports at wire speed?
A.
core layer
B.
distribution layer
C.
access layer
D.
entry layer
9.
For organizations that are implementing a voice over IP solution, what
functionality should be enabled at all three layers of the hierarchical network?
A.
B.
quality of service
C.
D.
inter-VLAN routing
core only
B.
C.
D.
11.
A.
a slim-line chassis
B.
C.
D.
flexible characteristics
12.
Which layer of the hierarchical design model provides a means of connect
ing devices to the network and controlling which devices are allowed to communic
ate on the network?
A.
application
B.
access
C.
distribution
D.
network
E.
core
A.
B.
C.
D.
B.
C.
word
D.
cess
to configure the privilege exec password that will be used for remote ac
15
Which command line interface (CLI) mode allows users to configure switch
parameters, such as the hostname and password?
A.
B.
C.
D.
16
What happens when the transport input ssh command is entered on the swit
ch vty lines?
A.
B.
C.
A username/password combination is no longer needed to establish a secur
e remote connection to the switch.
D.
17
A network administrator uses the CLI to enter a command that requires se
veral parameters. The switch responds with "% Incomplete command". The administr
ator cannot remember the missing parameters. What can the administrator do to ge
t the parameter information?
A.
B.
C.
D.
18
When a switch receives a frame and the source MAC address is not found i
n the switching table, what action will be taken by the switch to process the in
coming frame?
A.
The switch will request that the sending node resend the frame.
B.
The switch will issue an ARP request to confirm that the source exists.
C.
The switch will map the source MAC address to the port on which it was r
eceived.
D.
The switch ends an acknowledgement frame to the source MAC of this incom
ing frame.
19 Which statement is true about the command banner login "Authorized personnel
Only" issued on a switch?
A.
B.
The command will cause the message Authorized personnel Only to display
before a user logs in.
C.
The command will generate the error message Ambiguous command: "banner m
otd" "to be displayed.
D.
The command will cause the message End with the character "%" to be disp
layed after thecommand is entered into the switch.
20.
When a collision occurs in a network using CSMA/CD, how do hosts with da
ta to transmit respond after the backoff period has expired?
A.
B.
C.
D.
The hosts extend their delay period to allow for rapid transmission.
21.
A.
DRAM
B.
NVRAM
C.
ROM
D.
startup-config.text
22
Which statement is true when VTP is configured on a switched network tha
t incorporates VLANs?
A.
B.
C.
in.
VTP allows a switch to be configured to belong to more than one VTP doma
D.
VTP dynamically communicates VLAN changes to all switches in the same VT
P domain.
23
A network administrator is replacing a failed switch with a switch that
was previously on the network. What precautionary step should the administrator
take on the replacement switch to avoid incorrect VLAN information from propagat
ing through the network?
A.
B.
C.
D.
24
What does a client mode switch in a VTP management domain do when it rec
eives a summary advertisement with a revision number higher than its current rev
ision number?
A.
B.
C.
D.
E.
nges.
B.
C.
D.
26.
A.
Layer 2 broadcast
B.
Layer 2 multicast
C.
Layer 2 unicast
D.
Layer 3 broadcast
E.
Layer 3 multicast
F.
Layer 3 unicast
27.
ink?
A.
B.
VLANs 1 to 1005
C.
only VLAN 1
D.
all VLANs
E.
no VLANs
28
Switch port faO/1 was manually configured as a trunk, but now it will be
used to connect a host to the network. How should the network administrator rec
onfigure switch portFaO/1?
A.
Disable DTP.
B.
C.
Administratively shut down and re-enable the interface to return it to d
efault.
D.
e.
Enter the switch port mode access command in interface configuration mod
29
What is a valid consideration for planning VLAN traffic across multiple
switches?
A.
Configuring inters witch connections as trunks will cause all hosts on
any VLAN to receive broadcasts from the other VLANs.
B.
A trunk connection is affected by broadcast storms on any particular VL
AN that is carried by that trunk.
C.
Restricting trunk connections between switches to a single VLAN will imp
rove efficiency of port usage.
D.
Carrying all required VLANs on a single access port will ensure proper t
raffic separation.
B.
C.
d.
802. lq does NOT require the FCS of the original frame to be recalculate
D.
802. lq will not perform operations on frames that are forwarded out acc
ess ports.
31.
Which access method does a wireless access point use to allow for multip
le user connectivity and distributed access?
A.
CSMA/CD
B.
token passing
C.
CSMA/CA
D.
polling
32.
A network administrator is removing several VLANs from a switch. When th
e administrator enters the no vlan 1 command, an error is received. Why did this
command generate an error?
A.
B.
C.
VLAN 1 can not be deleted until all ports have been removed from it.
D.
VLAN 1 can not be deleted until another VLAN has been assigned its
responsibilities.
33.
What happens to the member ports of a VLAN when the VLAN is deleted?
A.
B.
C.
D.
The ports remain a part of that VLAN until the switch is rebooted. They
then become members of the management VLAN.
34.
What switch port modes will allow a switch to successfully form a trunki
ng link if the neighboring switch port is in "dynamic desirable" mode?
A.
B.
C.
D.
35.
What must the network administrator do to remove Fast Ethernet port faO/
1 from VLAN 2 and assign it to VLAN 3?
A.
e.
Enter the no vlan 2 and the vlan 3 commands in global configuration mod
B.
ode.
C.
tion
mode.
D.
Enter the no shutdown in interface configuration mode to return it to th
e default configuration and then configure the port for VLAN 3.
36 Which statement or set of paired statements correctly compares STP with RSTP?
A.
STP and RSTP have the same BPDU format and flag field information.
B.
STP specifies backup ports. RSTP has only root ports, alternate ports,
and designated ports.
C.
STP port states are independent of port roles. RSTP ties together the po
rt state and port role.
D.
STP waits for the network to converge before placing ports into forwardi
ng state.
RSTP places designated ports into forwarding state immediately.
RSTP places designated ports into forwarding state immediately
37
How can a network administrator influence which STP switches become the
root bridge?
A.
Configure all the interfaces on the switch as the static root ports.
B.
Change the BPDU to a lower value than that of the other switches in the
network.
C.
Assign a lower IP address to the switch than that of the other switches
in the network.
D.
Set the switch priority to a smaller value than that of the other switch
es in the network.
38
In which STP state does a port record MAC addresses but not forward user
data?
A.
blocking
B.
learning
C.
disabling
D.
listening
E.
forwarding
39
When PVST+ was developed; the Bridge ID was modified to include which in
formation?
A.
bridge priority
B.
MAC address
C.
protocol
D.
VLANID
40
What is the first step in the process of convergence in a spanning treet
opology?
A.
B.
C.
D.
Contact www.solvedcare.com for best and lowest cost solution or email solvedcare
@gmail.com