Home > Articles

  • Print
  • + Share This
This chapter is from the book

Check Your Understanding Questions

Complete all the review questions listed here to test your understanding of the topics and concepts in this chapter. The appendix, “Answers to the ‘Check Your Understanding’ Questions,” lists the answers.

  1. What is the difference between an access port and a trunk port?

    1. A trunk port belongs to a single VLAN; an access port provides access for multiple VLANs between switches.
    2. An access port can have a native VLAN, but a trunk port cannot.
    3. An access port can have only one device attached.
    4. Multiple VLANs traverse a trunk port, but an access port can belong to a single VLAN.
  2. Switch S1 and Switch S2 are both configured with ports in the Faculty, Students, Voice, Guest, Printing, and Admin VLANs. Each VLAN contains 12 users. How many subnets are needed to address the VLANs?

    1. 1
    2. 2
    3. 4
    4. 6
    5. 8
    6. 12
    7. 24
  3. What mechanism is used to achieve the separation between different VLANs as they cross a trunk link?

    1. VLAN tagging using 802.1Q protocol
    2. VLAN tagging using 802.1p protocol
    3. VLAN multiplexing
    4. VLAN set as a native VLAN
  4. What are two options to consider when configuring a trunk link between two switches? (Choose two.)

    1. The switchport nonegotiate command must be configured for trunks that use DTP.
    2. Port security cannot be configured on the trunk interfaces.
    3. The native VLAN must be the same on both ends of the trunk.
    4. Different encapsulation types can be configured on both ends of the trunk link.
    5. Trunk ports can be configured only on Gigabit Ethernet interfaces.
  5. A 24-port switch has been configured to support three VLANs named Sales, Marketing, and Finance. Each VLAN spans four ports on the switch. The network administrator has deleted the Marketing VLAN from the switch. What two statements describe the status of the ports associated with this VLAN? (Choose two.)

    1. The ports are inactive.
    2. The ports are administratively disabled.
    3. The ports will become trunks to carry data from all remaining VLANs.
    4. The ports will remain part of the Marketing VLAN until reassigned to another VLAN.
    5. The ports were released from the Marketing VLAN and automatically reassigned to VLAN 1.
  6. Which three statements are true about hosts that are configured in the same VLAN? (Choose three.)

    1. Hosts in the same VLAN must be on the same IP subnet.
    2. Hosts in different VLANs can communicate with the aid of only the Layer 2 switch.
    3. Hosts in the same VLAN share the same broadcast domain.
    4. Hosts in the same VLAN share the same collision domain.
    5. Hosts in the same VLAN comply with the same security policy.
    6. Hosts in the same VLAN must be on the same physical segment.
  7. Refer to Figure 3-8. Host PC3 is unable to transfer data because it does not have the MAC address of the destination host. If PC3 sends out an ARP request broadcast, which of the other hosts will see the message?

    1. Only PC3
    2. Only PC4
    3. Only PC4 and PC5
    4. PC1, PC2, PC4, and PC5
    5. PC1, PC2, PC3, PC4, and PC5
  8. With each listed characteristic on the right, indicate in the blank on the left whether it reflects a normal range VLAN, an extended range VLAN, or VLAN 1. Use N for normal range VLAN, E for extended range VLAN, and 1 for VLAN 1.

    ________ 1–1005

    ________ 1006–4094

    ________ Stored in vlan.dat

    ________ Default management VLAN

    ________ Default native VLAN

    ________ All ports are a member of by default

    ________ Stored in running configuration file

  9. Refer to the following configuration. Host 1 is connected to interface Fa0/4 with IP address Host 2 is connected to interface Fa0/5 with IP address Host 3 is connected to interface F0/6 with IP address Select the three statements that describe the success of pinging from one host to another. (Choose three.)

         Switch(config)# vlan 10
         Switch(config-vlan)# name Faculty
         Switch(config-vlan)# vlan 20
         Switch(config-vlan)# name Staff
         Switch(config-vlan)# interface range fa0/4 , fa0/6
         Switch(config-if-range)# switchport mode access
         Switch(config-if-range)# switchport access vlan 10
         Switch(config-if-range)# interface fa0/5
         Switch(config-if)# switchport mode access
         Switch(config-if)# switchport access vlan 20
    1. Host 1 can ping Host 2.
    2. Host 1 cannot ping Host 2.
    3. Host 1 can ping Host 3.
    4. Host 1 cannot ping Host 3.
    5. Host 2 can ping Host 3.
    6. Host 2 cannot ping Host 3.
  10. Which three options accurately associate the Catalyst switch command with the result? (Choose three.)

    1. show vlan id vlan-id: displays information about a specific VLAN.
    2. show vlan: displays detailed information about all VLANs on the switch.
    3. show vlan brief: displays detailed information about all VLANs on the switch.
    4. show interfaces fa0/1 switchport: displays information about a specific port.
    5. show interfaces fa0/1: displays VLAN information about a specific port.
  11. Match the commands with the correct descriptions.

    ________ switchport mode trunk

    ________ switchport mode dynamic desirable

    ________ switchport nonegotiate

    ________ switchport mode access

    1. Configures the port to negotiate a trunk
    2. Configures the trunk to not send DTP packets
    3. Configures the port as a permanent 802.1Q trunk
    4. Disables trunk mode
  12. Match the problem definition with the correct problem description.

    ________ Native VLAN mismatch

    ________ Trunk mode mismatch

    ________ Incorrect VLAN list

    ________ VLAN subnet conflict

    1. Both switches are configured to dynamic auto and will not negotiate a link.
    2. Not all the VLANs needed are allowed to traverse a trunk.
    3. PCs on the same VLAN are not sharing the same address space.
    4. The VLAN configured for untagged frames is not the same on two switches connected by a trunk.
  13. The _____________ protocol is an industry standard for trunking.
  14. Which Layer 2 security issue sends a frame destined for one VLAN to a different VLAN by adding more than one VLAN ID to the header?

    1. Double-tagging
    2. Switch spoofing
    3. PVLAN edge
    4. Plaintext vty access
  15. Which two design considerations are best practices for switch VLAN design? (Choose two.)

    1. Unused ports should be left to the default configuration.
    2. The native VLAN should be an unused VLAN.
    3. All unused ports should be configured as a part of the black hole VLAN.
    4. All unused ports should be configured as a part of the native VLAN.
    5. A server should always be configured as a protected port.
    6. The management VLAN should be a VLAN not used by any type of user traffic.
    7. Disable DTP messages.
  • + Share This
  • 🔖 Save To Your Account