Assignment - 5 STP

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Summary

• During the implementation of Spanning Tree Protocol, all switches are


rebooted by the network administrator. What is the first step of the
spanning-tree election process?
• Each switch with a lower root ID than its neighbor will not send BPDUs.
• All the switches send out BPDUs advertising themselves as the root bridge.
• Each switch determines the best path to forward traffic.
• Each switch determines what port to block to prevent a loop from
occurring.
• Which STP port role is adopted by a switch port if there is no other port
with a lower cost to the root bridge?
• designated port
• root port
• alternate
• disabled port
• What is the function of STP in a scalable network?
• It decreases the size of the failure domain to contain the impact of failures.
• It protects the edge of the enterprise network from malicious activity.
• It combines multiple switch trunk links to act as one logical link for increased
bandwidth.
• It disables redundant paths to eliminate Layer 2 loops.
• What is a characteristic of spanning tree?
• It is enabled by default on Cisco switches.
• It is used to discover information about an adjacent Cisco device.
• It has a TTL mechanism that works at Layer 2.
• It prevents propagation of Layer 2 broadcast frames.
• What is the purpose of the Spanning Tree Protocol (STP)?
• creates smaller collision domains
• prevents routing loops on a router
• prevents Layer 2 loops
• allows Cisco devices to exchange routing table updates
• creates smaller broadcast domains
• What is the value used to determine which port on a non-root bridge will become a
root port in a STP network?
• the path cost
• the highest MAC address of all the ports in the switch
• the lowest MAC address of all the ports in the switch
• the VTP revision number
• Refer to the exhibit. Which switch will be the root bridge after the
election process is complete?

• S1
• S2
• S3
• S4
• What are two drawbacks to turning spanning tree off and having multiple paths through the Layer
2 switch network? (Choose two.)
• The MAC address table becomes unstable.
• The switch acts like a hub.
• Port security becomes unstable.
• Broadcast frames are transmitted indefinitely.
• Port security shuts down all of the ports that have attached devices.
• A small company network has six interconnected Layer 2 switches. Currently all switches are using
the default bridge priority value. Which value can be used to configure the bridge priority of one
of the switches to ensure that it becomes the root bridge in this design?
• 1
• 28672
• 32768
• 34816
• 61440
• Which two network design features require Spanning Tree Protocol (STP) to
ensure correct network operation? (Choose two.)
• static default routes
• implementing VLANs to contain broadcasts
• redundant links between Layer 2 switches
• link-state dynamic routing that provides redundant routes
• removing single points of failure with multiple Layer 2 switches
• What is the outcome of a Layer 2 broadcast storm?
• Routers will take over the forwarding of frames as switches become congested.
• New traffic is discarded by the switch because it is unable to be processed.
• CSMA/CD will cause each host to continue transmitting frames.
• ARP broadcast requests are returned to the transmitting host.

You might also like