Home > Articles

  • Print
  • + Share This
This chapter is from the book

Check Your Understanding Questions

Complete all the review questions listed here to test your understanding of the topics and concepts in this chapter. The appendix, “Answers to the ‘Check Your Understanding’ Questions,” lists the answers.

  1. Which three options correctly associate the command with the paired behavior? (Choose three.)

    1. switchport port-security violation protect: Frames with unknown source addresses are dropped and a notification is sent.
    2. switchport port-security violation restrict: Frames with unknown source addresses are dropped and no notification is sent.
    3. switchport port-security violation shutdown: Frames with unknown source addresses result in the port becoming error-disabled, and a notification is sent.
    4. switchport port-security mac-address sticky: Allows dynamically learned MAC addresses to be stored in the running-configuration.
    5. switchport port-security maximum: Defines the number of MAC addresses associated with a port.
  2. What is the effect of entering the following command on a Fast Ethernet switch port?

    SW1(config-if)# duplex full
    1. The connected device communicates in two directions, but only one direction at a time.
    2. The switch port returns to its default configuration.
    3. If the device connected to this port is also set for full duplex, the device participates in collision-free communication.
    4. The efficiency of this configuration is typically rated at 50 to 60 percent.
    5. The connected device should be configured as half duplex.
  3. Which two tasks does autonegotiation in an Ethernet network accomplish? (Choose two.)

    1. Sets the link speed
    2. Sets the IP address
    3. Sets the link duplex mode
    4. Sets MAC address assignments on switch port
    5. Sets the ring speed
  4. Why should a default gateway be assigned to a switch?

    1. So that there can be remote connectivity to the switch via such programs as Telnet and ping
    2. So that frames can be sent through the switch to the router
    3. So that frames generated from workstations and destined for remote networks can pass to a higher level
    4. So that other networks can be accessed from the command prompt of the switch
  5. The network administrator wants to configure an IP address on a Cisco switch. How does the network administrator assign the IP address?

    1. In privileged EXEC mode
    2. On the switch interface FastEthernet0/0
    3. On the management VLAN
    4. On the physical interface connected to the router or next-hop device
  6. Which option correctly associates the Layer 2 security attack with the description?

    1. MAC address flooding: Broadcast requests for IP addresses with spoofed MAC addresses.
    2. DHCP starvation: Using proprietary Cisco protocols to gain information about a switch.
    3. CDP attack: The attacker fills the switch MAC address table with invalid MAC addresses.
    4. Telnet attack: Using brute force password attacks to gain access to a switch.
  7. What is an advantage of using SSH over Telnet when remotely connecting to a switch?

    1. Encryption
    2. More connection lines
    3. Connection-oriented services
    4. Username and password authentication
  8. Consider the configuration. Which two commands are not needed on the switch in order for a remote network administrator to access the switch using SSH?

    1. Switch(config)# ip domain-name mydomain.com
    2. Switch(config)# crypto key generate rsa
    3. Switch(config)# ip ssh version 2
    4. Switch(config)# line vty 0 15
    5. Switch(config-if)# transport input ssh
  9. What is an advantage of having the correct date and time on a network device?

    1. Network administrators are provided with correct timestamps on log messages.
    2. When working at the console prompt, the network administrator has a good idea how long the configuration or troubleshooting process is taking.
    3. Other devices can use CDP to discover neighbor device information if the time and date are synchronized between the two devices.
    4. Secure remote connectivity can be accomplished if the date and time are accurate.
  10. What is the purpose of DHCP snooping?

    1. Ensures devices are configured for automatic IP address assignment
    2. Prevents unauthorized DHCP servers
    3. Prevents DHCP messages from going across a trunk
    4. Prevents DHCP messages from being sent to another network
  11. What is a Cisco best practice for deploying switches?

    1. When a server connects to a switch, the switch port should have the port speed manually configured, but the autonegotiation feature used for duplex.
    2. A compound word should be used as a password on an infrastructure network device such as a switch.
    3. Telnet should be used whenever possible on the switch vty lines.
    4. The enable secret password should be used when configuring a switch to use SSH on the vty lines.
  12. When would auto-MDIX be best to use?

    1. When a switch connects to a router
    2. When a switch connects to another switch
    3. When any device connects to an access layer switch
    4. When the cable type is unknown
  • + Share This
  • 🔖 Save To Your Account