Review Questions


1.

What is one advantage of using switches instead of hubs at a customer location?

  1. Each port in a switch creates its own broadcast domain.

  2. Each port in a switch creates its own collision domain.

  3. Each port in a switch creates its own broadcast and collision domains.

  4. It depends on the type of servers.

bindividual collision domains per switch port provide for a more efficient network design. hubs create a flat network design and can be very inefficient since workstations must share the bandwidth.

2.

Your customer asks you why they should upgrade to Fast Ethernet. After you tell the customer it is 10 times faster, they ask what are the disadvantages of upgrading. What do you tell them?

  1. Installation difficulty.

  2. Expense.

  3. The physical distance.

  4. There are no disadvantages.

cthe timing in fast ethernet is shorter (10 times faster than 10mbps ethernet). the maximum frame size (time slot) is 1,518 bytes. the physical distance is reduced because both fast ethernet and regular ethernet specifications state that the round-trip time must not exceed 512 bit times. since fast ethernet transmits faster, a signal of 512 bits covers a shorter distance.

3.

You have excessive broadcasts on your customer’s LANs. What solutions would benefit the customer? (Choose all that apply.)

  1. Adding more hubs

  2. Adding Layer 3 switching

  3. Creating VLANs

  4. Using more routers

b, cby using a combination of layer 3 switches and vlans, you can break up broadcast domains and create more bandwidth where needed.

4.

Which of the following is a characteristic of a switch, but not of an active hub?

  1. Switches forward packets based on the IPX or IP address in the frame.

  2. Switches forward packets based only on the IP address in the packet.

  3. Switches forward packets based on the IP address in the frame.

  4. Switches forward packets based on the MAC address in the frame.

da switch forwards packets based on the mac address of the frame; an active hub only repeats signals.

5.

How does the cut-through switching technique work?

  1. The LAN switch copies the entire frame into its on-board buffers and then looks up the destination address in its forwarding (switching) table and determines the outgoing interface.

  2. The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets.

  3. Cut-through switching uses broadcast addresses as source addresses.

  4. Cut-through switching uses a Class II repeater in a collision domain.

bafter the first 64 bytes are received and checked for fragments, the frame is forwarded to the destination hardware address.

6.

How do switches use the store-and-forward switching technique?

  1. The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets.

  2. The LAN switch copies the entire frame into its on-board buffers and then looks up the destination address in its forwarding (switching) table and determines the outgoing interface.

  3. The switch uses a Class II repeater in a collision domain.

  4. The switch uses broadcast addresses as source addresses.

bstore-and-forward switching has the highest latency but provides for the most error-free network design.

7.

Which of the following are needed to support full-duplex Ethernet? (Choose all that apply.)

  1. Multiple paths between multiple stations on a link

  2. Full-duplex NICs

  3. Loopback and collision detection disabled

  4. Automatic detection of full-duplex operation by all connected stations

b, cmost nics support full-duplex configuration, which disables loopback and collision detection.

8.

Which of the following are not used by full-duplex Ethernet? (Choose all that apply.)

  1. Collision detection

  2. MAC addressing

  3. 10-megabit transmission

  4. Loopback

a, dwhen an nic is configured for full-duplex ethernet, the collision detection and loopback are disabled.

9.

You are creating VLANs at your customer location. The manager comes by to ask why and reminds you of your statement that spending money on switches would solve all their problems. What do you tell her? (Choose all that apply.)

  1. You need to break up the collision domains.

  2. You need to break up the broadcast domains.

  3. VLANs help to extend the time-to-live in the IP header.

  4. Security between departments can be accomplished with VLANs since no traffic leaves a VLAN unless it is first routed.

b, dvlans are a configuration option available in switches, and they allow further control of network traffic.

10.

Which of the following are among the advantages of creating VLANs? (Choose all that apply.)

  1. Datagram filtering

  2. Breaking up broadcast domains

  3. Creating networks by function rather than by location

  4. Long time-to-live packet control when using IP

b, cwhen vlans are used to control broadcast traffic, the need for routers is reduced. vlans also serve the purpose of controlling traffic regardless of the physical port connection in the switch fabric.

11.

Which two of the following statements describe frame tagging?

  1. Frame tagging examines particular info about each frame.

  2. An ID is placed in the header of each frame as it traverses the switch fabric.

  3. A user-assigned ID is added to each frame.

  4. Filter tables are built as part of frame tagging.

b, ctwo methods of identifying a frame as it moves throughout the switch fabric are adding a vlan id to each frame and adding a user- assigned id to each frame.

12.

Which of the following statements describes a full-duplex transmission?

  1. Full-duplex transmission uses a single cable.

  2. Full-duplex transmission uses a point-to-point connection from the transmitter of the transmitting station to the receiver of the receiving station.

  3. Full-duplex transmission involves data transmission in both directions, but only one direction at a time.

  4. Full-duplex transmission involves data transmission in only one direction.

busing multiple parallel lines, full-duplex transmission allows for simultaneous transmit and receive paths.

13.

If a frame is received at a switch and only the destination hardware address is read before the frame is forwarded, what type of switching method are you using?

  1. Cut-through

  2. Store-and-forward

  3. Store-and-cut

  4. FragmentFree

acut-through switching is the fastest of the switching types but is more likely to forward fragmented or damaged frames.

14.

Which two Layer 2 features are used on Cisco switches to optimize multicast?

  1. OSPF Multicast

  2. CGMP

  3. Multicast IP forwarding

  4. IGMP snooping

b, done problem is that the default for an l2 switch is to forward all multicast traffic to every port that belongs to the same vlan on the switch. the commonly used solutions are cisco group management protocol (cgmp) and igmp snooping.

15.

Which of the following statements is true for the store-and-forward switching method?

  1. It is the default switching method for all Cisco switches.

  2. It only reads the destination hardware address before forwarding the frame.

  3. Latency varies depending on frame length.

  4. Latency is constant.

calthough store-and-forward has the highest latency of the switching methods, it checks the entire contents of each frame, thus providing for error-free delivery.

16.

What does the spanning-tree algorithm (STA) do?

  1. STA is implemented by STP to prevent loops.

  2. STA forwards packets through a switch.

  3. STA restores lost frames.

  4. STA prevents API duplication in bridged networks.

athe spanning-tree algorithm calculates the best path from each bridge or switch port to a root bridge or switch and provides for loop- free networks.

17.

What are three advantages of a Layer 3 backbone over a Layer 2 backbone?

  1. Reducing the number of connections between L3 switches (peering)

  2. Multiple spanning-tree instances

  3. Scalability to a very large size

  4. Multicast and broadcast control on the backbone

a, c, dby using an l3 switching backbone over an l2 backbone you can reduce the number of connections between backbone switches; this process is called peering. since it is layer 3, stp is not used. in addition, you can scale to a very large size and provide broadcast control, which is not possible in an l2 backbone without creating multiple vlans.

18.

What is the IEEE specification for the Spanning-Tree Protocol (STP)?

  1. 802.2u

  2. 802.3q

  3. 802.1d

  4. 802.6

c802.1d is the ieee specification for stp.

19.

A Layer 3 switch transmits data outside the source network by using which of the following?

  1. Bridging tables

  2. EIGRP tables

  3. Route processors

  4. RIP

ca layer 3 switch uses a route processor to determine how a packet is forwarded outside the source network. a layer 2 switch uses a mac address table to create forward/filter decisions.

20.

Of the three switching types, which one has the highest latency?

  1. Cut-through

  2. FragmentFree

  3. Store-and-forward

  4. Store-and-cut

cstore-and-forward is the slowest of the switching methods, but it provides for error detection.

Answers

1.

B Individual collision domains per switch port provide for a more efficient network design. Hubs create a flat network design and can be very inefficient since workstations must share the bandwidth.

2.

C The timing in Fast Ethernet is shorter (10 times faster than 10Mbps Ethernet). The maximum frame size (time slot) is 1,518 bytes. The physical distance is reduced because both Fast Ethernet and regular Ethernet specifications state that the round-trip time must not exceed 512 bit times. Since Fast Ethernet transmits faster, a signal of 512 bits covers a shorter distance.

3.

B, C By using a combination of Layer 3 switches and VLANs, you can break up broadcast domains and create more bandwidth where needed.

4.

D A switch forwards packets based on the MAC address of the frame; an active hub only repeats signals.

5.

B After the first 64 bytes are received and checked for fragments, the frame is forwarded to the destination hardware address.

6.

B Store-and-forward switching has the highest latency but provides for the most error-free network design.

7.

B, C Most NICs support full-duplex configuration, which disables loopback and collision detection.

8.

A, D When an NIC is configured for full-duplex Ethernet, the collision detection and loopback are disabled.

9.

B, D VLANs are a configuration option available in switches, and they allow further control of network traffic.

10.

B, C When VLANs are used to control broadcast traffic, the need for routers is reduced. VLANs also serve the purpose of controlling traffic regardless of the physical port connection in the switch fabric.

11.

B, C Two methods of identifying a frame as it moves throughout the switch fabric are adding a VLAN ID to each frame and adding a user- assigned ID to each frame.

12.

B Using multiple parallel lines, full-duplex transmission allows for simultaneous transmit and receive paths.

13.

A Cut-through switching is the fastest of the switching types but is more likely to forward fragmented or damaged frames.

14.

B, D One problem is that the default for an L2 switch is to forward all multicast traffic to every port that belongs to the same VLAN on the switch. The commonly used solutions are Cisco Group Management Protocol (CGMP) and IGMP snooping.

15.

C Although store-and-forward has the highest latency of the switching methods, it checks the entire contents of each frame, thus providing for error-free delivery.

16.

A The spanning-tree algorithm calculates the best path from each bridge or switch port to a root bridge or switch and provides for loop- free networks.

17.

A, C, D By using an L3 switching backbone over an L2 backbone you can reduce the number of connections between backbone switches; this process is called peering. Since it is Layer 3, STP is not used. In addition, you can scale to a very large size and provide broadcast control, which is not possible in an L2 backbone without creating multiple VLANs.

18.

C 802.1d is the IEEE specification for STP.

19.

C A Layer 3 switch uses a route processor to determine how a packet is forwarded outside the source network. A Layer 2 switch uses a MAC address table to create forward/filter decisions.

20.

C Store-and-forward is the slowest of the switching methods, but it provides for error detection.




CCDA. Cisco Certified Design Associate Study Guide
CCDA: Cisco Certified Design Associate Study Guide, 2nd Edition (640-861)
ISBN: 0782142001
EAN: 2147483647
Year: 2002
Pages: 201

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net