UGRD IT6223B DATA COMMUNICATIONS and NETWORK2
UGRD IT6223B DATA COMMUNICATIONS and NETWORK2
UGRD IT6223B DATA COMMUNICATIONS and NETWORK2
& NETWORK2
This is the practice of inserting a VLAN ID into a packet header in order to identify which
VLAN (Virtual Local Area Network) the packet belongs to.
Select one:
a. VLAN tagging
b. VLAN linkage
c. VLAN insertion
d. VLAN building
Select one:
a.
Join native VLAN to VLAN.
b.
Shut down unused switch ports to prevent unauthorized access
c.
Configure all the ports on all switches to be associated with VLANs other than VLAN 1.
d.
Separate management and user data traffic.
This is a point-to-point link between two network devices that carries more than one VLAN.
Select one:
In troubleshooting VLANs, what command should be used to check whether the port
belongs to the expected VLAN?
Select one:
a. show vlan
b. check vlan
c. display vlan
d. view vlan
Select one:
a. FTP
b. SSH
c. HTTP
d. TCP/IP
The network segments that share the same bandwidth between devices.
Select one:
a. Broadcast domain
b. Collision domain
c. Shared domain
d. Common domain
Select one:
a. Asynchronous link cable
b. Cross cable
c. Console cable
d. UTP Network cable
If the port is assigned to the wrong VLAN, what command to be command to change the
VLAN membership on a particular port?
Select one:
a. configure port vlan
b. vlan port default
c. Switchport access vlan
d. set port vlan
True or False.
If two devices in the same VLAN have different subnet addresses, they cannot communicate.
Select one:
True
False
This is a proprietary protocol that all Cisco devices can be configured to use. This checks
other Cisco devices that are directly connected, which allows the devices to auto-configure
their connection.
Select one:
a. Cisco Auto Configure
b. Cisco Auto Connect Protocol
c. Cisco Configuration Protocol
d. Cisco Discovery Protocol
The ________________ switches do not support features or options beyond those that
originally came with the switch.
Select one:
a. Modular configuration
b. Remote configuration
c. Server side configuration
d. Fixed configuration
Which of the following is the command to configure the IP domain name of the network
(mycompany.com)
Select one:
a. Ipconfig mycompany.com
b. Ip configure mycompany.com
c. Config mycompany -ipdomain
d. Ip domain-name mycompany.com
To troubleshoot issues when a trunk is not forming or when VLAN leaking is occurring, what
command to be used to check whether the local and peer native VLANs match?
Select one:
a. show interfaces trunk
b. view trunk - match
c. check vlan connection
d. check match vlan
Stackable that are arranged one on top of the other with cables linking the switches in a
_____________ connection.
Select one:
a. Cross cable
b. Daisy Chain
c. Parallel
d. Straight cable
In this attack, the attacker exploits a flaw in the Telnet server software running on the switch
that renders the Telnet service unavailable. This sort of attack prevents an administrator
from remotely accessing switch management functions. This can be combined with other
direct attacks on the network as part of a coordinated attempt to prevent the network
administrator from accessing core devices during the breach.
Select one:
a. Crack password attack
b. Telnet password attack
c. Telnet DoS attack
d. Brute force password attack
TRUE or FALSE. Store-and-forward switching has two primary characteristics that distinguish
it from cut-through: error checking and automatic buffering.
Select one:
True
False
Select one:
a. between 1006 and 4094
b. between 1006 and 3064
c. between 1006 and 5000
d. between 1006 and 2048
What is the command used to determine the status of both physical and virtual interfaces
including IP address?
Select one:
a. display all ip interface
b. status ip interface /all
c. list ip interface /all
d. show ip interface brief
Select one:
a. VLAN 0
b. VLAN 1
c. VLAN default
d. VLAN local
Select one:
a. All of the Choices
b. None of the Choices
c. FDDI VLANs
d. Token Ring VLANs
Select one:
a. Switches from other vendors do not support Dynamic Trunking Protocol.
b. All of the choices
c. Dynamic Trunking Protocol is a proprietary networking protocol developed by Cisco
Systems.
d. Dynamic Trunking Protocol is disable by default.
Select one:
a. 8080
b. 80
c. 23
d. 22
Select one:
a. Dividing Layer 1,2 and 3 networks into multiple physical workgroups reduces
unnecessary traffic on the network and boosts performance.
b.
Groups that have sensitive data are separated from the rest of the network, decreasing the
chances of confidential information breaches.
c. VLANs make it easier to manage the network because users with similar network
requirements share the same VLAN.
d. Cost savings result from reduced need for expensive network upgrades and more
efficient use of existing bandwidth and uplinks.
Select one:
a. Layer 1, 2 and 3 Layer
b. Sender, Processor, Receiver Layer
c. Access, distribution and Core layer
d. Source, Middle, Destination layer
Select one:
a. Use the dynamic auto or dynamic desirable switch port mode.
b. Use only access switch port mode.
c. Do not use trunk switch port mode.
d. Do not use the dynamic auto or dynamic desirable.
A switch forwarding method that makes a forwarding decision on a frame after it has
received the entire frame and then checked the frame for errors.
Select one:
a. Cut-through switch method
b. Store-and-forward switching
c. Rapid Frame forwarding
d. Automatic-forward switching
Select one:
a. Tunneling
b. Access Point
c. Trunks
d. None of the choices
In the Switch port LED status, if the LED is blinking green what is the status of switch?
Select one:
a. There is activity and the port is sending or receiving data.
b. The port is blocked.
c. A link is present.
d. There is a link fault error.