A single core router provides all the routing between VLANs.
The failure of a switch block will not impact all end users.
This is a security feature that is available on all new Catalyst switches.
This is network application software that prevents the failure of a single network device.
It decreases the size of the failure domain to contain the impact of failures.
It protects the edge of the enterprise network from malicious activity.
It disables redundant paths to eliminate Layer 2 loops.
It combines multiple switch trunk links to act as one logical link for increased bandwidth.
HTTP access to the device
A terminal emulation client
Telnet or SSH access to the device
A direct connection to the console or AUX port
A connection to an operational network interface on the device
Configuring trunk links on the VTP server
Configuring or changing the VTP password
Configuring or changing the VTP domain name
Configuring or changing the VTP version number
Configuring or deleting a VLAN or creating a VLAN name
In the default VTP mode, VLANs can be created and modified on a switch.
Switches in VTP server mode store VLANs in the vlan.dat database.
VTP-enabled switches exchange three types of advertisements: summary routes, subnet advertisements, and advertisement requests from transparent bridges.
The switch configuration must be saved and the switch reloaded to reset a configuration revision number.
VTP updates are exchanged across trunk links only.
Switches in different VTP domains can exchange updates if revision numbers are the same.
Configure the correct VTP domain name and password on the new switch.
Associate all ports of the new switch to a VLAN that is not VLAN 1.
Configure the VLANs on the new switch.
Configure all ports on the new switch to access mode.
It holds the running configuration.
It holds the saved configuration.
It holds the VLAN database.
It holds the operating system.
Port mode on the two switch FastEthernet ports
Router port configuration
Include a router in the topology.
Associate hosts A and B with VLAN 10 instead of VLAN 1.
Remove the native VLAN from the trunk.
Configure either trunk port in the dynamic desirable mode.
Add the switchport nonegotiate command to the configuration of SW2.
The other switches in the domain can be running either VTP version 1 or 2.
There is a risk that the switch may cause incorrect VLAN information to be sent through the domain.
VTP will block frame forwarding on at least one redundant trunk port that is configured on this switch.
VLAN configuration changes made on this switch will be sent to other devices in the VTP domain.
This switch will update its VLAN configuration when VLAN changes are made on a VTP server in the same domain.
Spanning Tree Protocol
Time to Live
The highest MAC address of all the ports in the switch
The lowest MAC address of all the ports in the switch
the VTP revision number
the path cost
SW1 will become the root bridge.
SW2 will become the root bridge.
SW2 will get a port blocked.
SW4 will get a port blocked.
SW3 will become the root bridge.
SW4 will become the root bridge.
Any switch port will be error-disabled if it receives a BPDU.
Any trunk ports will be allowed to connect to the network immediately, rather than waiting to converge.
Any switch port that has been configured with PortFast will be error-disabled if it receives a BPDU.
Any switch port that receives a BPDU will ignore the BPDU message.
Providing redundant links that dynamically block or forward traffic
grouping multiple physical ports to increase bandwidth between two switches
grouping two devices to share a virtual IP address
Providing redundant devices to allow traffic to flow in the event of device failure
Channel-group 2 mode auto
Interface port-channel 2
channel-group 1 mode desirable
Interface range GigabitEthernet 0/4 – 5
The EtherChannel fails.
The remaining two interfaces continue to load balance traffic.
The remaining two interfaces become separate links between the two switches.
One interface becomes an active link for data traffic and the other becomes a backup link.
HSRP uses active and standby routers.
It uses ICMP messages in order to assign the default gateway to hosts.
It allows load balancing between a group of redundant routers.
HSRP is nonproprietary.