logo

CuriousTab

CuriousTab

Discussion


Home Networking Spanning Tree Protocol Comments

  • Question
  • If a switch receives a frame and the source MAC address is not in the MAC address table but the destination address is, what will the switch do with the frame?


  • Options
  • A. Discard it and send an error message back to the originating host
  • B. Flood the network with the frame
  • C. Add the source address and port to the MAC address table and forward the frame out the destination port
  • D. Add the destination to the MAC address table and then forward the frame

  • Correct Answer
  • Add the source address and port to the MAC address table and forward the frame out the destination port 

    Explanation
    Since the source MAC address is not in the MAC address table, the switch will add the source address and the port it is connected to into the MAC address table and then forward the frame to the outgoing port.

  • Spanning Tree Protocol problems


    Search Results


    • 1. What is the result of segmenting a network with a bridge (switch)?

      1. It increases the number of collision domains.
      2. It decreases the number of collision domains.
      3. It increases the number of broadcast domains.
      4. It decreases the number of broadcast domains.
      5. It makes smaller collision domains.
      6. It makes larger collision domains.

    • Options
    • A. 1 and 5
    • B. 2, 3 and 5
    • C. 3, 4 and 6
    • D. 1, 3 and 6
    • Discuss
    • 2. Layer 2 switching provides which of the following?

      1. Hardware-based bridging (ASIC)
      2. Wire speed
      3. Low latency
      4. Low cost

    • Options
    • A. 1 and 3
    • B. 2 and 4
    • C. 1, 2 and 4
    • D. All of the above
    • Discuss
    • 3. You have two switches connected together with two crossover cables for redundancy, and STP is disabled. Which of the following will happen between the switches?

    • Options
    • A. The routing tables on the switches will not update.
    • B. The MAC forward/filter table will not update on the switch.
    • C. Broadcast storms will occur on the switched network.
    • D. The switches will automatically load-balance between the two links.
    • Discuss
    • 4. What command will display the forward/filter table?

    • Options
    • A. show mac filter
    • B. show run
    • C. show mac address-table
    • D. show mac filter-table
    • Discuss
    • 5. Which of the following statements are true regarding the command ip route 172.16.4.0 255.255.255.0 192.168.4.2?

      1. The command is used to establish a static route.
      2. The default administrative distance is used.
      3. The command is used to configure the default route.
      4. The subnet mask for the source address is 255.255.255.0.

    • Options
    • A. 1 and 2
    • B. 2 and 4
    • C. 3 and 4
    • D. All of the above
    • Discuss
    • 6. Which of the following statement is true?

    • Options
    • A. A switch creates a single collision domain and a single broadcast domain. A router creates a single collision domain.
    • B. A switch creates separate collision domains but one broadcast domain. A router provides a separate broadcast domain.
    • C. A switch creates a single collision domain and separate broadcast domains. A router provides a separate broadcast domain as well.
    • D. A switch creates separate collision domains and separate broadcast domains. A router provides separate collision domains.
    • Discuss
    • 7. What are the distinct functions of layer 2 switching that increase available bandwidth on the network?

      1. Address learning
      2. Routing
      3. Forwarding and filtering
      4. Creating network loops
      5. Loop avoidance
      6. IP addressing

    • Options
    • A. 1, 3 and 5
    • B. 2, 4 and 6
    • C. 2 and 6
    • D. 3 and 5
    • Discuss
    • 8. In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN?

    • Options
    • A. During high-traffic periods
    • B. After broken links are reestablished
    • C. When upper-layer protocols require high reliability
    • D. In an improperly implemented redundant topology
    • Discuss
    • 9. Which of the following is a layer 2 protocol used to maintain a loop-free network?

    • Options
    • A. VTP
    • B. STP
    • C. RIP
    • D. CDP
    • Discuss
    • 10. You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?

      1. Switch(config-if)# ip access-group 10
      2. Switch(config-if)# switchport port-security maximum 1
      3. Switch(config)# access-list 10 permit ip host 1
      4. Switch(config-if)# switchport port-security violation shutdown
      5. Switch(config)# mac-address-table secure

    • Options
    • A. 1 and 3
    • B. 2 and 4
    • C. 2, 3 and 5
    • D. 4 and 5
    • Discuss


    Comments

    There are no comments.

Enter a new Comment