a. Native VLAN is always 1 by default in Cisco IOS. | |
d. The interface is manually configured for 801.1Q trunking. | |
c. The interface is a member of access VLAN and may negotiate to a trunk port. |
b. VLAN 2 is the trunk native VLAN based on the configuration shown in Example 4-32. | |
c. The interface can negotiate to become a trunk port if the peer interface is configured for dynamic, desirable, or trunk. | |
a. VLAN 1 is the access mode VLAN as indicated by the access mode VLAN output in configuration Example 4-32. | |
b. One of the benefits of implementing VLANs is that doing so constrains broadcast traffic. | |
a and c. Local VLANs, typically used in the Building Access submodule, are easier to manage and conceptualize than VLANs that span different areas of the network. | |
b. Switch(vlan)# indicates that the switch is in the VLAN database configuration mode of Cisco IOS. | |
a. Access ports do not listen to or send DTP packets. | |
a. ISL-encapsulated frames have a 4-byte FCS field. This field contains a 32-bit CRC value, based on header information in the ISL frame. | |
b. 802.1Q trunking adds a tag in the standard Layer 2 Ethernet header after the SA (source MAC address) field and before the Type (ethertype) field. | |
c. The switchport trunk encapsulation isl command is used to configure trunks for ISL encapsulation. | |
d. The command switchport trunk native vlan vlan-id is used to configure the native VLAN when an interface is operating as a trunk. | |
a and e. Trunks are only established between link partners operating in auto trunk or dynamic desirable modes. | |
c. All Cisco Catalyst products operate in VTP server mode by default. | |
d. In VTP version 2, the switch performs consistency checks on new information entered through CLI or SNMP. | |
d. The vtp version 1 or no vtp version 2 command can be used to configure VTP version 1 in Cisco IOS. | |
b, c, and d. VTP versions 1 and 2 support server, client, and transparent mode. | |
a. The show vtp status command is the command to verify the VTP configuration in Cisco IOS. | |
d. The vtp password password-string command is used to configure or change VTP passwords. | |
VTP pruning uses VLAN advertisements to determine when a trunk connection is flooding traffic needlessly. | |
pVLANs provide security and reduce the use of IP subnets by isolating traffic between the end stations even though they are in the same VLAN. | |
If workstations A and B are members of the same community pVLAN, they can communicate with each other, but they cannot communicate if each workstation is a member of a different community pVLAN or a member of the same isolated pVLAN. In any case, all ports that are members of either isolated or community pVLANs can communicate with promiscuous ports. |
False. If redundant paths exist, a Layer 2 loop will occur if STP is disabled. STP prevents loops in such scenarios by blocking redundant paths, providing a single, loop-free topology. | |
False. If you have only a few VLANs, the amount of CPU resource usage saved with MST is not significant enough to warrant changes from default STP mode. | |
False. Secondary root bridges typically have a higher bridge priority than the primary root bridge. | |
a. The lowest bridge priority possible is zero and hence is the best possible bridge priority for a root switch. | |
e. The show spanning-tree root Cisco IOS command shows the root bridge information for all VLANs configured on a switch. | |
b. The spanning-tree vlan vlan-id root primary command configures a distribution switch to be the primary root switch. | |
c. Refer to Figure 5-22. RSTP has three operational states: discarding, learning, and forwarding. | |
b. STP operates on Layer 2 of the OSI model and operates independent of the upper-level protocols. | |
e. The time it takes for the proposal and agreement to be exchanged between the two switches on a link is less than 1 second. | |
d. The default message interval for BPDUs in RSTP remains at 2 seconds, identical to the 802.1D hello interval. The hello interval can be modified by a CLI command. | |
Bridge A is elected root because it has a lower MAC address compared to the other switches with equal priority values. | |
The port on root bridge A would be the designated port. The designated port is the port sending the best BPDU on a segment. Because root bridge A has the best BPDU, its port would act as the designated port. | |
The primary root switch needs to be centrally located in the network with enough switching capacity to accommodate all the packets that need to pass through the root switch between different building distribution and access layer switches. In addition, the CPU power of the primary root switch needs to be sufficiently high to handle all functions needed. |
False. Aggressive mode UDLD has additional benefits to detect UDLD conditions when one side of the link is up and the other side is down. Also, aggressive mode UDLD detects situations where a link remains up but the port is not communicating due to a software or hardware anomaly. | |
False. LACP is the implementation of the IEEE 803.2ad link aggregation protocol; hence, LACP can be used to form an EtherChannel between Catalyst switches and non-Cisco devices. PAgP, on the other hand, can only be used between Cisco switches. Cisco has licensed PAgP to some NIC vendors. | |
c. The IEEE version of the port channeling protocol, 803.2ad, is referred to in Cisco Catalyst switches as LACP. | |
b. UDLD operates at Layer 2 of the OSI model because it sends frames. UDLD does use Layer 1 mechanisms. | |
d. The maximum default size of Ethernet frames, including the Ethernet header and CRC (FCS), is 1518 bytes. | |
b. The 802.1Q tag is 4 bytes in length; along with the standard Ethernet frame size of 1518 bytes, the total frame size of an 802.1Q tagged frame is 1522 bytes. | |
e. The size of CRC (FCS) in 802.3 Ethernet is 4 bytes. The total header plus CRC overhead is 18 bytes. The maximum payload or data portion of an Ethernet frame is 1500 bytes. | |
d. The default message interval setting of UDLD is 15 seconds, and detection of an UDLD condition is three times the message interval. | |
d. The desirable mode of operation belongs exclusively to Cisco EtherChannel using PAgP. | |
Aggressive mode UDLD offers additional benefits over UDLD, as described in Table 7-6. | |
c. The default recovery time is 300 seconds. | |
d. Route flap is not an error condition that the error-disable feature would act upon. | |
d. IEEE 802.3 defines the standard for the flow control protocol, which is followed between two devices when the downstream switch receiver buffer is congested. | |
CDP sends various information about the sending device as described in the “CDP” section of this chapter, such as the IP addresses of the sending interface, routing or switching platform type, software version, and so on. This information, when exchanged on a public interface, could divulge enough information for an attacker to attack this device with traffic destined to management addresses or exploit any known software vulnerabilities existing in the Cisco IOS version. Hence, it is strongly recommended to turn off CDP on public interfaces. |
False. CEF-based MLS Catalyst switches prepopulate IP CEF FIB and adjacency tables in hardware. | |
True. Distributed switching uses multiple forwarding engines, where the sum of all forwarding engines is the total available bandwidth of the switch. | |
b. Punt adjacencies are used to send frames requiring special handling to the Layer 3 engine. | |
c. The TCAM mask associated with the access list is 16 bits of the source address because the remaining 16 bits are wildcard bits. | |
d. Because the IP routing table and the ARP table build the CEF FIB and adjacency tables, respectively, those tables should be verified as a first step in troubleshooting issues with CEF-based MLS. | |
a. CEF-based MLS Catalyst switches use the IP CEF FIB and adjacency tables to build FIB and adjacency tables in TCAM for hardware switching. CEF-based MLS does not use the IP routing or ARP tables directly to build the FIB and adjacency tables in hardware, nor is CEF-based MLS an on-demand technology. | |
See the section entitled “Sample CEF-Based MLS Operation” earlier in Chapter 9. |
False. Deploying QoS is highly recommended in multilayer switched networks, regardless of interface bandwidth. | |
b and c. Voice VLANs separate workstation (data) traffic and IP phone (voice) traffic into separate VLANs. This separation of data and voice traffic also aids in troubleshooting. | |
b. In Example 13-2, the switch is configured for an access VLAN of 2. Therefore, the switch associates the received frames with VLAN 2 and transmits frames to the workstation without an 802.1Q VLAN tag, because VLAN 2 is the access VLAN. | |
b. VLAN 2 is configured as the access VLAN. | |
b. VoIP uses UDP because a retransmission of a VoIP packet is not necessary, as the voice frame is no longer important by the time of retransmission, and UDP has slightly less overhead. | |
a. Although answer b appears to be the correct answer, there is no specific mechanism in the configuration to strictly trust CoS of attached IP phones. | |
d. 802.1Q packet tagging is used to distinguish voice VLAN traffic from the native VLAN. | |
c. Voice traffic is marked at Layer 3 using DSCP values. | |
c. The STP PortFast feature, enabled on a per-port basis, speeds availability of a Cisco IP Phone after reboot because the Catalyst switch ports move immediately into the forwarding state, allowing frames to pass faster than if the feature were not enabled. See Chapters 5 and 6 for more details on the STP PortFast feature. | |
a and c. A-UDLD and QoS are required in every submodule of the Enterprise Composite Network Model for IP telephony deployments. HSRP and VRRP are specific to Layer 3 routing, and spanning-tree features are specific to Layer 2 regions. |
3.149.214.32