Correct Answer: A switch creates separate collision domains but one broadcast domain. A router provides a separate broadcast domain.
Explanation:
Switches break up collision domains, and routers break up broadcast domains.
2. If a switch receives a frame and the source MAC address is not in the MAC address table but the destination address is, what will the switch do with the frame?
Options
A. Discard it and send an error message back to the originating host
B. Flood the network with the frame
C. Add the source address and port to the MAC address table and forward the frame out the destination port
D. Add the destination to the MAC address table and then forward the frame
Correct Answer: Add the source address and port to the MAC address table and forward the frame out the destination port
Explanation:
Since the source MAC address is not in the MAC address table, the switch will add the source address and the port it is connected to into the MAC address table and then forward the frame to the outgoing port.
3. What is the result of segmenting a network with a bridge (switch)?
Switches, unlike bridges, are hardware based. Cisco says its switches are wire speed and provide low latency, and I guess they are low cost compared to their prices in the 1990s.
5. You have two switches connected together with two crossover cables for redundancy, and STP is disabled. Which of the following will happen between the switches?
Options
A. The routing tables on the switches will not update.
B. The MAC forward/filter table will not update on the switch.
C. Broadcast storms will occur on the switched network.
D. The switches will automatically load-balance between the two links.
Correct Answer: In an improperly implemented redundant topology
Explanation:
If the Spanning Tree Protocol is not running on your switches and you connect them together with redundant links, you will have broadcast storms and multiple frame copies.
7. Which of the following is a layer 2 protocol used to maintain a loop-free network?
The Spanning Tree Protocol is used to stop switching loops in a switched network with redundant paths.
8. You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?
Switch(config-if)# ip access-group 10
Switch(config-if)# switchport port-security maximum 1
The
switchport port-security is an important command, and it's super easy with the CNA; however, from the CLI, you can set the maximum number of MAC addresses allowed into the port, and then set the penalty if this maximum has been passed.
9. You want to run the new 802.1w on your switches. Which of the following would enable this protocol?
802.1w is the also called Rapid Spanning Tree Protocol. It is not enabled by default on Cisco switches, but it is a better STP to run since it has all the fixes that the Cisco extensions provide with 802.1d.
10. Which statement describes a spanning-tree network that has converged?
Options
A. All switch and bridge ports are in the forwarding state.
B. All switch and bridge ports are assigned as either root or designated ports.
C. All switch and bridge ports are in either the forwarding or blocking state.
D. All switch and bridge ports are either blocking or looping.
Correct Answer: All switch and bridge ports are in either the forwarding or blocking state.
Explanation:
Convergence occurs when all ports on bridges and switches have transitioned to either the forwarding or blocking states. No data is forwarded until convergence is complete. Before data can be forwarded again, all devices must be updated.