Check Your Understanding Questions
Complete all the review questions listed here to test your understanding of the topics and concepts in this chapter. The appendix “Answers to ‘Check Your Understanding’ Questions” lists the answers.
For what reason would a network administrator use the show interfaces trunk command on a switch?
- To view the native VLAN
- To examine DTP negotiation as it occurs
- To verify port association with a particular VLAN
- To display an IP address for any existing VLAN
What is the purpose of the switch command switchport access vlan 99?
- To enable port security
- To make the port operational
- To assign the port to a particular VLAN
- To designate the VLAN that does not get tagged
- To assign the port to the default native VLAN (VLAN 99)
Which step should be performed first when deleting a VLAN that has member switch ports?
- Reload the switch.
- Implement the delete vlan.dat command.
- Reassign all VLAN member ports to a different VLAN.
- Back up the running config.
All access ports on a switch are configured with the administrative mode of dynamic auto. An attacker, connected to one of the ports, sends a malicious DTP frame. What is the intent of the attacker?
- VLAN hopping attack
- DHCP spoofing attack
- MAC flooding attack
- ARP poisoning attack
Which of the following statements accurately describe DTP? (Choose two.)
- DTP is a Cisco-proprietary protocol.
- DTP supports IEEE 802.1Q.
- Cisco switches require DTP to establish trunks.
- DTP must be enabled on only one side of the trunk link.
- Trunk ports that are configured for dynamic auto will request to enter the trunking state.
Match the action to the corresponding command.
- Assigns VLAN 10 for untagged traffic
- Activates the current interface as trunk
- Prohibits VLAN 10 on the trunk interface
- Switch(config-if)# switchport trunk allowed vlan remove 10
- Switch(config-if)# switchport mode trunk
- Switch(config-if)# switchport trunk native vlan 10
What is one way to prevent the VLAN hopping attack?
- Disable DTP negotiation on all ports.
- Change the native VLAN to an unused VLAN.
- Designate a different default VLAN.
- Remove all user VLANs from the trunk.
What security issue is of concern regarding the VLAN configuration of switches?
- All interfaces are in the same user VLAN.
- The management VLAN is using the same VLAN ID as a user VLAN is using.
- The “black hole” VLAN is not configured.
- The native VLAN has not been changed from the default setting.
In which location are the normal-range VLANs stored on a Cisco switch by default?
- Flash memory
- Startup config
- Running config
Which of the following statements describe the benefits of VLANs? (Choose two.)
- VLANs improve network performance by regulating flow control and window size.
- VLANs enable switches to route packets to remote networks through VLAN ID filtering.
- VLANs reduce network cost by reducing the number of physical ports required on switches.
- VLANs improve network security by isolating users that have access to sensitive data and applications.
- VLANs divide a network into smaller logical networks, resulting in lower susceptibility to broadcast storms.
An administrator is investigating an inoperational trunk link between a Cisco switch and a switch from another vendor. After a few show commands, the administrator notices that the switches are not negotiating a trunk. What is a probable cause for this issue?
- Both switches are in trunk mode.
- Both switches are in nonegotiate mode.
- Switches from other vendors do not support DTP.
- DTP frames are flooding the entire network.
Which distinct type of VLAN is used by an administrator to access and configure a switch?
- Default VLAN
- Native VLAN
- Data VLAN
- Management VLAN