logo

CuriousTab

CuriousTab

Discussion


Home Networking Virtual LANs See What Others Are Saying!
  • Question
  • Which of the following protocols are used to configure trunking on a switch?

    1. VLAN Trunk Protocol
    2. VLAN
    3. 802.1Q
    4. ISL


  • Options
  • A. 1 only
  • B. 3 only
  • C. 3 and 4
  • D. 1, 3 and 4

  • Correct Answer
  • 3 and 4 

    Explanation
    Cisco has a proprietary trunking protocol called ISL. The IEEE version is 802.1Q.

  • More questions

    • 1. What should the configuration register value be after you successfully complete the password recovery procedure and return the router to normal operation?

    • Options
    • A. 0x2100
    • B. 0x2101
    • C. 0x2102
    • D. 0x2142
    • Discuss
    • 2. Which of the following network types have a designated router and a backup designated router assigned?

      1. Broadcast
      2. Point-to-point
      3. NBMA
      4. NBMA point-to-point

    • Options
    • A. 1, 2 and 3
    • B. 1 and 3
    • C. 3 and 4
    • D. All of the above
    • Discuss
    • 3. You telnet into a remote device and type debug ip rip, but no output from the debug command is seen. What could the problem be?

    • Options
    • A. You must type the show ip rip command first.
    • B. IP addressing on the network is incorrect.
    • C. You must use the terminal monitor command.
    • D. Debug output is sent only to the console.
    • Discuss
    • 4. Using the following illustration, what would be the IP address of E0 if you were using the eighth subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. The zero subnet should not be considered valid for this question.

    • Options
    • A. 192.168.10.142
    • B. 192.168.10.66
    • C. 192.168.100.254
    • D. 192.168.10.143
    • E. 192.168.10.126
    • Discuss
    • 5. What are the two main types of access control lists (ACLs)?

      1. Standard
      2. IEEE
      3. Extended
      4. Specialized

    • Options
    • A. 1 and 3
    • B. 2 and 4
    • C. 3 and 4
    • D. 1 and 2
    • Discuss
    • 6. What does the command o/r 0x2142 provide?

    • Options
    • A. It is used to restart the router.
    • B. It is used to bypass the configuration in NVRAM.
    • C. It is used to enter ROM Monitor mode.
    • D. It is used to view the lost password.
    • Discuss
    • 7. The configuration register setting of 0x2102 provides what function to a router?

    • Options
    • A. Tells the router to boot into ROM monitor mode
    • B. Provides password recovery
    • C. Tells the router to look in NVRAM for the boot sequence
    • D. Boots the IOS from a TFTP server
    • Discuss
    • 8. What is the purpose of flow control?

    • Options
    • A. To ensure that data is retransmitted if an acknowledgment is not received.
    • B. To reassemble segments in the correct order at the destination device.
    • C. To provide a means for the receiver to govern the amount of data sent by the sender.
    • D. To regulate the size of each segment.
    • Discuss
    • 9. Which three commands can be used to check LAN connectivity problems on a router?

      1. show interfaces
      2. show ip route
      3. tracert
      4. ping
      5. dns lookups

    • Options
    • A. 1 ,2 and 4
    • B. 2 and 5
    • C. 3 and 5
    • D. None of the above
    • Discuss
    • 10. Which command will configure a switch port to use the IEEE standard method of inserting VLAN membership information into Ethernet frames?

    • Options
    • A. Switch(config)# switchport trunk encapsulation isl
    • B. Switch(config)# switchport trunk encapsulation ietf
    • C. Switch(config)# switchport trunk encapsulation dot1q
    • D. Switch(config-if)# switchport trunk encapsulation isl
    • E. Switch(config-if)# switchport trunk encapsulation dot1q
    • Discuss


    Comments

    There are no comments.

Enter a new Comment