Reduced contention for bandwidth
Reduced size of the physical layout
Increased fault tolerance of the network
Elimination of the need for layer three functionality
Simplification of management and troubleshooting
An Ethernet switch
A wireless access point
Another wireless computer
A hard-wired computer on the network
The hosts transmit a jam signal to ensure that all hosts on the network are aware that a collision has occurred.
Because they are operating in full-duplex mode, the hosts resume listening for traffic in preparation for sending future messages.
Because the hub will temporarily block traffic from one of the hosts, that host will be allowed to-transmit once the wire is clear.
Hosts A and C are assigned shorter back off values to provide them priority to access the media for retransmission.
After the back off period of a host, the host checks to determine if the line is idle before retransmitting.
Spanning Tree Protocol is disabled.
All switch ports are assigned to VLAN1.
The flash directory contains the IOS image.
VLAN1 is configured with a management IP address.
All interfaces are set to auto-negotiation of speed and duplex.
After sending its jam signal
After host A and host B have completed transmission
After the jam signal clears and its backoff delay expires
SW3-VLAN 10,20 SW4-VLAN 10,20
SW3-VLAN 10,20,100 SW4-VLAN 10,20,100
SW3-VLAN 10,20,100 SW4-VLAN 10,20,40,50,100
SW3-VLAN 10,20,40,50,100 SW4-VLAN 10,20,40,50,100
Use SSH version 1.
Reconfigure the RSA key.
Configure SSH on a different line.
Modify the transport input command.
Switch1# copy startup-config flash:filename
Switch1# copy running-config startup-config
Switch1# copy startup-config running-config
Switch1# copy flash:config.txt running-config
The service password-encryption command is entered at the privileged EXEC mode prompt.
The service password-encryption command encrypts only passwords for the console and VTY ports.
The service password-encryption command encrypts all previously unencrypted passwords in the running configuration.
To see the passwords encrypted by the service password-encryption command, enter the no service password-encryption command.
Change the flow control to hardware.
Replace the cable with a rollover cable.
Alter the data rate to 115,200 bits per second.
Move the cable from the console port to an Ethernet port and use Telnet.
A new RSA key pair is created.
The switch defaults to allowing Telnet connections only.
The switch is no longer able to make SSH connections as an SSH client.
The switch allows remote connections only after a new RSA key pair is generated.
The SSH version number is wrong.
SSH has been configured on the wrong line.
Telnet and SSH cannot be configured simultaneously.
The transport input command is configured incorrectly.
Show VTP Status VTP Version: 2 Configuration Revision: 0 VTP Operating Mode: client VTP Domain Name: cisco1 VTP V2 Mode: enabled
Show VTP Status VTP Version: 2 Configuration Revision: 0 VTP Operating Mode: client VTP Domain Name: cisco03 VTP V2 Mode: enabled
Show VTP Status VTP Version: 2 Configuration Revision: 25 VTP Operating Mode: client VTP Domain Name: cisco1 VTP V2 Mode: enabled
Show VTP Status VTP Version: 2 Configuration Revision: 0 VTP Operating Mode: Server VTP Domain Name: cisco1 VTP V2 Mode: enabled
Designated ports, non designated ports, root bridge, root ports
Non designated ports, designated ports, root ports, root bridge
Root bridge, root ports, designated ports, non designated ports
Root ports, root bridge, non designated ports, designated ports
Allows for redundant links by eliminating loops
Provides greater scalability by eliminating collisions
Reduces switch processor load by reducing broadcast traffic on trunk links
Reduces administrative overhead by sharing VLAN databases between switches across the network
Frames are forwarded to the correct VLAN based on the VLAN tag.
Frames are always forwarded to the native VLAN when exiting a trunk.
Frames are forwarded to the correct VLAN based on the source IP address.
Frames are forwarded to the correct VLAN based on information in the MAC address table.
Configure the trunk port in a desirable mode on SW2.
Include VLAN 20 in the list of allowed VLANs on the trunk link on SW2.
Configure VLAN 1 to be the native VLAN for both networks on SW1 and SW2.
Remove VLAN 20 from the allowed VLANs on the trunk link on SW2, an action that will enableall VLANs on the trunk link.
Fa0/1 interface of switch A
Fa0/2 interface of switch A
Fa0/1 interface of switch B
Fa0/2 interface of switch B
Fa0/1 interface of switch C
SW1 connects via two Fast-Ethernet links to reach the root switch.
The cost represents the numeric value for the fastest path from SW1 to the root switch.
A cost of 38 is the value that is being advertised out port 26 on the upstream switch, which is closer to the root switch.
The root switch is advertising a cost of 38, which is lower than any other switch that participates in the VLAN0001 spanning-tree domain.
SW1 connects via a Fast-Ethernet link to an upstream switch that in turn is directly connected to the root switch via a Gigabit Ethernet link.
It is only used at Layer 2.
It is configured on routers.
It eliminates Layer 2 loops in network topologies.
It limits the number of valid MAC addresses allowed on a port.
It allows VLAN information to propagate to other switches in the network.
Port Fa0/11 is in the wrong VLAN.
RTB does not have an active routing protocol.
The IP address of computer B is in the wrong logical network.
Router interface Fa0/1 has the wrong trunk encapsulation type configured.
Computer B and Router1
Computer C and Router1
Computer B, computer C, computer D, computer E and Router1
Computer A, computer B, computer C, computer D, computer E and Router1
The switch ports are on different VLANs.
The switch IP address is on the wrong subnet.
The hosts are configured on different logical networks.
A router is required to forward traffic between Host1 and Host2.
The host default gateway addresses must be on the same logical network.