CCNP_SWITCH_PT.1

  1. Which method of Layer 3 switching uses a forwarding information base? (FIB)*

    A. Topology-based switching
    B. Demand-based switching
    C. Route Caching
    D. Flow-Based Switching
    E. None of the other alternatives apply




    • A. Topology-based switching
  2. If you needed to transport traffic coming from multiple VLANs (connected between switches), and your CTO was insistent on using an open standard, which protocol would you use?*






    A. 802.1Q
  3. Under what circumstances should an administrator prefer local VLANs over end-to-end VLANs?





    B. Eighty percent of traffic on the network is destined for Internet sites.
  4. What are some virtues of implementing end-to-end VLANs? *




    D. Users are grouped into VLANs independent of a physical location.

    C. Each VLAN has a common set of security and resource requirements for all members.
  5. Which of the following statements is true about the 80/20 rule (Select all that apply)?*




    • B. no more than 20 percent of the network traffic should be able to move across a backbone.
    • D. 80 percent of the traffic on a network segment should be local
  6. The Company LAN is becoming saturated with broadcasts and multicast traffic. What could you do to help a network with many multicasts and broadcasts?*





    A. Creating smaller broadcast domains by implementing VLANs.
  7. The Company LAN switches are being configured to support the use of Dynamic VLANs. Which of the following are true of dynamic VLAN membership (Select all that apply)*





    • D. VLAN membership of a user always remains the same even when he/she is moved to another location.
    • C. Membership can be static or dynamic.
  8. The Company LAN switches are being configured to support the use of Dynamic VLANs. What should be considered when implementing a dynamic VLAN solution? *

    A. Each switch port is assigned to a specific VLAN.
    B. Dynamic VLANs require a VLAN Membership Policy Server.
    C. Devices are in the same VLAN regardless of which port they attach to.
    D. Dynamic VLAN assignments are made through the command line interface.
    • B. Dynamic VLANs require a VLAN Membership Policy Server.
    • C. Devices are in the same VLAN regardless of which port they attach to.
  9. In the three-layer hierarchical network design model; what's associated with the access layer? (Select two)*






    • A. high port density
    • E. local VLANs
  10. You are assigning VLANs to the ports of switch R1. What VLAN number value is an assigned to the default VLAN?*





    C. VLAN 1
  11. The VLANs in switch R1 are being modified. Which of the following are updated in R1 every time a VLAN is modified? (Select all that apply)*





    • B. Configuration revision number
    • D. Configuration revision database
  12. What is a characteristic of a static VLAN membership assignment?*



    D. Easy to configure
  13. Static VLANs are being used on the Company network. What is true about static VLANs?*




    A. Attached devices are unaware of any VLANs.
  14. Two Company switches are connected via a trunk using VTP. Which VTP information does a Catalyst switch advertise on its trunk ports when using VTP? (Select two)

    A. STP root status
    B. VTP mode
    C. Negotiation status
    D. Management domain
    E. Configuration revision number
    • D. Management domain
    • E. Configuration revision number
  15. The lack of which two prevents VTP information from propagating between switches?*





    • C. A trunk port
    • D. VLAN 1
  16. What is the default VTP advertisement for subset advertisements in Catalyst switches that are in server or client mode?*






    B. 5 minute
  17. What must be configured on a Cisco switch in order to advertise VLAN information?*






    D. VTP domain name
  18. The Company switches have all been upgraded to use VTP version 2. What are two benefits provided in VTP Version 2 that are not available in VTP Version 1? *

    A. VTP version 2 supports Token Ring VLANs
    B. VTP version 2 allows VLAN consistency checks
    C. VTP version 2 allows active redundant links when used with spanning tree
    D. VTP version 2 reduces the amount of configuration necessary
    E. VTP version 2 saves VLAN configuration memory
    • A. VTP version 2 supports Token Ring VLANs
    • B. VTP version 2 allows VLAN consistency checks
  19. What action should a network administrator take to enable VTP pruning on an entire management domain?*

    A. Enable VTP pruning on any switch in the management domain
    B. Enable VTP pruning on any client switch in the domain
    C. Enable VTP pruning on a VTP server in the management domain
    D. Enable VTP pruning on every switch in the domain
    E. None of the other alternatives apply
    C. Enable VTP pruning on a VTP server in the management domain
  20. What are two benefits provided in VTP Version 2 but NOT in VTP Version 1? *

    A. Supports Token Ring VLANs.
    B. Allows VLAN consistency checks.
    C. Saves VLAN configuration memory.
    D. Reduces the amount of configuration necessary.
    E. Allows active redundant links when used with spanning tree.
    • A. Supports Token Ring VLANs.
    • B. Allows VLAN consistency checks.
  21. The Company switches are configured to use VTP. What's true about the VLAN trunking protocol (VTP)? (Select two)*





    • D. VTP messages will not be forwarded over nontrunk links.
    • D. A device in "transparent" VTP v.1 mode will not forward VTP messages.
  22. Switch R1 and R2 both belong to the Company VTP domain. What's true about the switch operation in VTP domains? (Select all that apply)*

    A. A switch can only reside in one management domain
    B. A switch is listening to VTP advertisements from their own domain only
    C. A switch is listening to VTP advertisements from multi domains
    D. A switch can reside in one or more domains
    E. VTP is no longer supported on Catalyst switches
    • A. A switch can only reside in one management domain
    • B. A switch is listening to VTP advertisements from their own domain only
  23. VTP devices in a network track the VTP revision number. What is a VTP configuration revision number?*




    C. A number for identifying changes to the network topology.
  24. Switch R1 is configured to use the VLAN Trunking Protocol (VTP). What does R1 advertise in its VTP domain?*

    A. The VLAN ID of all known VLANs, the management domain name, and the total number of trunk links on the switch.
    B. The VLAN ID of all known VLANs, a 1-bit canonical format (CF1 Indicator), and the switch configuration revision number.
    C. The management domain name, the switch configuration revision number, the known VLANs, and their specific parameters.
    D. A 2-byte TPID with a fixed value of 0x8100 for the management domain number, the switch configuration revision number, the known VLANs, and their specific parameters.
    E. None of the other alternatives apply.
    C. The management domain name, the switch configuration revision number, the known VLANs, and their specific parameters.
  25. VTP switches use advertisements to exchange information with each other. Which of the following advertisement types are associated with VTP? (Select all that apply)*

    A. Domain advertisements
    B. Advertisement requests from clients
    C. Subset advertisements
    D. Summary advertisements
    • B. Advertisement requests from clients
    • C. Subset advertisements
    • D. Summary advertisements
  26. Switch R1 is part of the Company VTP domain. What's true of VTP Pruning within this domain? (Select all that apply)*

    A. It does not prune traffic from VLANs that are pruning-ineligible
    B. VLAN 1 is always pruning-eligible
    C. it will prune traffic from VLANs that are pruning-ineligible
    D. VLAN 2 is always pruning-ineligible
    E. None of the other alternatives apply.
    A. It does not prune traffic from VLANs that are pruning-ineligible
  27. What action should a network administrator take to enable VTP pruning on an entire management domain?*





    E. Enable VTP pruning on a VTP server in the management domain.
  28. Switch R1 is configured with VTP. Which two VTP modes will make R1 capable of creating and deleting VLANs on itself? (Select two)*

    A. Client
    B. Server
    C. Transparent
    D. Pass-through
    E. No-negotiate
    • B. Server
    • C. Transparent
  29. When the Catalyst switch R1 is enabled to use VTP, which information does it advertise on its trunk ports (Select two)*

    A. VTP mode
    B. STP root status
    C. Negotiation status
    D. Management domain
    E. Configuration revision number
    • D. Management domain
    • E. Configuration revision number
  30. Two Company switches are connected via a trunk link. In this network, the original frame is encapsulated and an additional header is added before the frame is carried over a trunk link. At the receiving end, the header is removed and the frame is forwarded to the assigned VLAN. This describes which technology? *






    F. ISL
  31. The Company core switches use 802.1Q trunks to connect to each other. How does 802.1Q trunking keep track of multiple VLANs? *





    B. None of the other alternatives applyA. It tags the data frame with VLAN information and recalculates the CRC value
  32. Which three statements are correct with regard to the IEEE 802.1Q standard? *

    A. The IEEE 802.1Q frame format adds a 4 byte field to a Ethernet frame
    B. The packet is encapsulated with a 26 byte header and a 4 byte FCS
    C. The protocol uses point-to-multipoint connectivity
    D. The protocol uses point-to-point connectivity
    E. The IEEE 802.1Q frame uses multicast destination of 0x01-00-0c-00-00
    F. The IEEE 802.1Q frame retains the original MAC destination address
    • A. The IEEE 802.1Q frame format adds a 4 byte field to a Ethernet frame
    • D. The protocol uses point-to-point connectivity
    • F. The IEEE 802.1Q frame retains the original MAC destination address
  33. Switch R1 has been configured with DTP using the desirable option. Which statement describes Dynamic Trunking Protocol (DTP) desirable mode?*





    B. The interface actively attempts to convert the link to a trunk link.
  34. Which switch command enables a trunking protocol that appends a four byte CRC to the packet?*





    E. CompanySwitch(config-if)#switchport trunk encapsulation isl
  35. While using a packet analyzer, you notice four additional bytes being added to the packets in the Company network. Which protocol inserts a four byte tag into the Ethernet frame and recalculates CRC value?*





    E. 802.1Q
  36. You need to configure a new Company switch to support DTP. Which DTP switchport mode parameter sets the switch port to actively send and respond to DTP negotiation frames?*






    C. Dynamic desirable
  37. A new Company switch was just configured using the "switchport trunk native vlan 7" command. What does this interface command accomplish?*





    E. Configures the trunking interface to send traffic from VLAN 7 untagged
  38. Which statement is true regarding the configuration of ISL trunks?*





    B. A Catalyst switch will report giants if one side is configured for ISL while the other side is not.
  39. Which of the following technologies would an Internet Service Provider use to support overlapping customer VLAN ID's over transparent LAN services?*





    E. 802.1q tunneling
  40. If you were to configure an ISL Ethernet trunk between two Cisco switches, named R1 and R2, what would you have to include at the end of the link for the trunk to operate correctly? (Select two)*




    • C. An identical speed/duplex.
    • D. An identical trunk encapsulation parameter.
  41. You are the network administrator at Company and switch R1 is configured as shown below:*

    Interface gigethernet 0/1
    Switchport mode trunk
    Switchport trunk
    encapsulation dot1q
    Switchport trunk native vlan 5

    If untagged frames are arriving on interface G0/1 of R1, which of the following statements are correct?





    C. Untagged frames are automatically assumed to be in VLAN 5.
  42. If you were to set up a VLAN trunk over a Fast Ethernet link on switch R1, which trunk mode would you set the local port to on R1 if you wanted it to respond to requests from its link partner (R2) and become a trunk?*




    A. Auto
  43. Which of the following trunking modes are unable to request their ports to convert their links into trunk links? (Select all that apply)*

    A. Negotiate
    B. Designate
    C. No negotiate
    D. Auto
    E. Manual
    F. Off
    • C. No negotiate
    • D. Auto
  44. ISL is being configured on a Company switch. Which of the following choices are true regarding the ISL protocol? (Select two)*




    • C. It calculates a new CRC field on top of the existing CRC field.
    • D. It adds 30 bytes of protocol-specific information to the original Ethernet frame.
  45. You are the network administrator tasked with designing a switching solution for the Company network. Which of the following statements describing trunk links are INCORRECT? (Select all that apply)*

    A. The trunk link belongs to a specific VLAN.
    B. Multiple trunk links are used to connect multiple end user devices.
    C. A trunk link only supports native VLAN.
    D. Trunk links use 802.10 to identify a VLAN.
    E. The native VLAN of the trunk link is the VLAN that the trunk uses for untagged packets.
    • A. The trunk link belongs to a specific VLAN.
    • B. Multiple trunk links are used to connect multiple end user devices.
    • C. A trunk link only supports native VLAN.
    • D. Trunk links use 802.10 to identify a VLAN.
  46. Switch R1 has been configured with the root guard feature. What statement is true if the spanning tree enhancement Root Guard is enabled?*




    C. If superior BPDUs are received on a designated port, the interface is placed into the rootinconsistent blocked state.
  47. What does the global command udld enable\ accomplish?*

    A. Enables all fiber-optic LAN ports for
    Unidirectional LINK Detection (UDLD)
    B. Enables all copper media LAN ports Unidirectional Link Detection (UDLD)
    C. Overrides the default UDLS setting for all ports
    D. Globally enables all ports on the device for Unidirectional Link Detection (UDLS)
    E. None of the other alternatives apply
    • A. Enables all fiber-optic LAN ports for
    • Unidirectional LINK Detection (UDLD)
  48. Which three statements about the Multiple Spanning Tree (MST) protocol (IEEE 802.1s) are true?*






    • F. To verify the MST configuration, the show pending command can be used in MST configuration mode.
    • E. An MST region is a group of MST switches that appear as a single virtual bridge to adjacent CST and MST regions.
    • F. Enabling MST with the "spanning-tree mode mst" global configuration command also enables RSTP.
  49. Company uses MSTP within their switched LAN. What is the main purpose of Multiple Instance Spanning Tree Protocol (MSTP)?*





    E. To reduce the total number of spanning tree instances necessary for a particular topology
  50. Which of the following specifications is a companion to the IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) algorithm, and warrants the use multiple spanning-trees?*





    C. IEEE 802.1s (MST)
  51. Which of the following specification will allow you to: associate VLAN groups to STP instances so you can provide multiple forwarding paths for data traffic and enable load balancing?*




    C. IEEE 802.1s (MST)
  52. Which three items are configured in MST configuration submode? *

    A. Region name
    B. Configuration revision number
    C. VLAN instance map
    D. IST STP BPDU hello timer
    E. CST instance map
    F. PVST+ instance map
    • A. Region name
    • B. Configuration revision number
    • C. VLAN instance map
  53. By default, all VLANs will belong to which MST
    instance when using Multiple STP?*




    A. MST00
Author
twsted1too
ID
97874
Card Set
CCNP_SWITCH_PT.1
Description
CCNP_SWITCH_PT.1
Updated