Informative Quiz On CCNP

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By OsvaldoLaraP
O
OsvaldoLaraP
Community Contributor
Quizzes Created: 1 | Total Attempts: 663
| Attempts: 667
SettingsSettings
Please wait...
  • 1/134 Questions

    End-user PCs should be connected into which of the following hierarchical layers?

    • Distribution layer
    • Common layer
    • Access layer
    • Core layer
Please wait...
About This Quiz

Today we’ll be taking a look at some of the questions you’ll need to be able to answer if you ever want to reach the top levels of your Cisco career certifications. Would you like to be a CCNP? Answer the following informative questions and we’ll see if you have what it takes.

Informative Quiz On CCNP - Quiz

Quiz Preview

  • 2. 

    Layer 2 switching uses which of the following values to forward data?

    • IP address

    • IPX address

    • MAC address

    • RIP address

    • UDP port

    Correct Answer
    A. MAC address
    Explanation
    Layer 2 switching uses MAC addresses to forward data. MAC addresses are unique identifiers assigned to network interface cards (NICs) at the factory. Layer 2 switches use these addresses to determine the destination of the data and forward it to the appropriate device on the local network. IP addresses, IPX addresses, RIP addresses, and UDP ports are all used in different layers of the network stack and are not directly used by layer 2 switching.

    Rate this question:

  • 3. 

    Which of the following is a standardized method of trunk encapsulation?

    • 802.1d

    • 802.1Q

    • 802.3z

    • 802.1a

    Correct Answer
    A. 802.1Q
    Explanation
    802.1Q is a standardized method of trunk encapsulation in computer networking. It is a protocol that allows multiple VLANs to be carried over a single physical link, enabling the efficient use of network resources. This method adds a VLAN tag to the Ethernet frame, indicating the VLAN membership of the frame. By using 802.1Q, network administrators can create virtual LANs and segregate network traffic, improving network performance and security.

    Rate this question:

  • 4. 

    Which IOS command configures a Catalyst switch for VTP client mode?

    • Set vtp mode client

    • Vtp client

    • Vtp mode client

    • Vtp client mode

    Correct Answer
    A. Vtp mode client
    Explanation
    The correct answer is "vtp mode client". This command is used to configure a Catalyst switch for VTP client mode. VTP (VLAN Trunking Protocol) is a Cisco proprietary protocol used to manage VLAN configurations across a network. By setting the switch to client mode, it will receive VLAN information from a VTP server and synchronize its VLAN database accordingly.

    Rate this question:

  • 5. 

    Which Catalyst IOS switch command is used to assign a port to a VLAN?

    • Access vlan vlan-id

    • Switchport access vlan vlan-id

    • Vlan vlan-id

    • Set port vlan vlan-id

    Correct Answer
    A. Switchport access vlan vlan-id
    Explanation
    The correct answer is "switchport access vlan vlan-id". This command is used to assign a specific port on a Catalyst IOS switch to a VLAN. By specifying the VLAN ID, the port is configured to belong to that particular VLAN, allowing communication and traffic to flow within that VLAN.

    Rate this question:

  • 6. 

    Which of the following is not a Catalyst switch VTP mode?

    • Server

    • Client

    • Designated

    • Transparent

    Correct Answer
    A. Designated
    Explanation
    The Designated mode is not a valid VTP mode for Catalyst switches. The VTP (VLAN Trunking Protocol) is used to manage VLAN configurations in a network. The available VTP modes are Server, Client, and Transparent. The Server mode allows for creating, modifying, and deleting VLANs, while the Client mode can only receive and store VLAN information. The Transparent mode forwards VTP advertisements but does not synchronize VLAN information. The Designated mode is not a recognized VTP mode.

    Rate this question:

  • 7. 

    Which of these is one of the parameters used to elect a Root Bridge?

    • Root Path Cost

    • Path Cost

    • Bridge Priority

    • BPDU revision number

    Correct Answer
    A. Bridge Priority
    Explanation
    The Bridge Priority is one of the parameters used to elect a Root Bridge. The Root Bridge is the bridge with the lowest Bridge Priority value, and it serves as the root of the spanning tree. Each bridge in a network has a Bridge Priority value assigned to it, and the bridge with the lowest value becomes the Root Bridge. This parameter is important in determining the topology of the spanning tree network and ensuring efficient forwarding of data packets.

    Rate this question:

  • 8. 

    What is the Cisco proprietary method for trunk encapsulation?

    • CDP

    • EIGRP

    • ISL

    • DSL

    Correct Answer
    A. ISL
    Explanation
    ISL (Inter-Switch Link) is the Cisco proprietary method for trunk encapsulation. It is a protocol used to carry multiple VLANs over a single physical link between switches. ISL encapsulates the entire Ethernet frame with a header and trailer, adding additional information to identify the VLAN to which the frame belongs. This allows for the transmission of VLAN information across the network. CDP (Cisco Discovery Protocol) is a Cisco proprietary protocol used for device discovery. EIGRP (Enhanced Interior Gateway Routing Protocol) is a Cisco proprietary routing protocol. DSL (Digital Subscriber Line) is a technology used for high-speed internet access.

    Rate this question:

  • 9. 

    What information is used to forward frames in a Layer 2 switch?

    • Source MAC address

    • Destination MAC address

    • Source switch port

    • IP addresses

    Correct Answer
    A. Destination MAC address
    Explanation
    The Layer 2 switch uses the destination MAC address to forward frames. Each device on a network has a unique MAC address, and the switch uses this address to determine where to send the frame. By examining the destination MAC address, the switch can determine which port to forward the frame to, ensuring that it reaches the correct device. The source MAC address, source switch port, and IP addresses are not used by the switch for forwarding frames.

    Rate this question:

  • 10. 

    What type of cable should you use to connect two switches back to back using their FastEthernet 10/100 ports?

    • Rollover cable

    • Transfer cable

    • Crossover cable

    • Straight-through cable

    Correct Answer
    A. Crossover cable
    Explanation
    To connect two switches back to back using their FastEthernet 10/100 ports, a crossover cable should be used. A crossover cable is designed to connect two similar devices, such as switches, directly to each other without the need for a hub or a switch in between. It allows the transmit signals of one device to be connected to the receive signals of the other device, ensuring proper communication between the switches.

    Rate this question:

  • 11. 

    A VLAN is which of the following?

    • Collision domain

    • Spanning-tree domain

    • Broadcast domain

    • VTP domain

    Correct Answer
    A. Broadcast domain
    Explanation
    A VLAN (Virtual Local Area Network) is a logical grouping of devices in a network that are grouped together based on their function, department, or any other criteria. Within a VLAN, devices can communicate with each other as if they were connected to the same physical network, while being isolated from devices in other VLANs. A broadcast domain refers to the area in a network where broadcast packets are forwarded. In the context of the given options, a VLAN can be considered a broadcast domain as devices within the same VLAN can receive and process broadcast packets sent within that VLAN.

    Rate this question:

  • 12. 

    What is a VLAN primarily used for?

    • To segment a collision domain

    • To segment a broadcast domain

    • To segment an autonomous system

    • To segment a spanning-tree domain

    Correct Answer
    A. To segment a broadcast domain
    Explanation
    A VLAN, or Virtual Local Area Network, is primarily used to segment a broadcast domain. By dividing a network into multiple VLANs, broadcast traffic is contained within each VLAN, reducing unnecessary network congestion and improving network performance. This segmentation allows for better control over network traffic and enhances security by isolating different groups of devices or users. Additionally, VLANs enable easier management and configuration of network resources, as they can be logically grouped together based on specific requirements or organizational structures.

    Rate this question:

  • 13. 

    What is the maximum cable distance for a Category 5 100BASE-TX connection?

    • 100 feet

    • 100 m

    • 328 m

    • 500 m

    Correct Answer
    A. 100 m
    Explanation
    The maximum cable distance for a Category 5 100BASE-TX connection is 100 meters. This is because Category 5 cables are designed to support Fast Ethernet speeds of up to 100 Mbps, and the maximum cable length for this speed is 100 meters. Beyond this distance, the signal strength may degrade and cause data transmission issues.

    Rate this question:

  • 14. 

    What type of interface represents an EtherChannel as a whole?

    • Channel

    • Port

    • Port-channel

    • Channel-port

    Correct Answer
    A. Port-channel
    Explanation
    A Port-channel interface represents an EtherChannel as a whole. This interface combines multiple physical Ethernet links into a single logical link, providing increased bandwidth and redundancy. It allows for load balancing and fault tolerance by distributing traffic across the bundled links. The Port-channel interface acts as a single entity, allowing for easier configuration and management of the EtherChannel.

    Rate this question:

  • 15. 

    What is the default 802.1D STP bridge priority on a Catalyst switch?

    • 0

    • 1

    • 32,768

    • 65,535

    Correct Answer
    A. 32,768
    Explanation
    The default 802.1D STP bridge priority on a Catalyst switch is 32,768. This value determines the root bridge in a spanning tree network. The bridge with the lowest priority value becomes the root bridge, and all other bridges calculate their path cost to the root bridge based on this value.

    Rate this question:

  • 16. 

    Which Catalyst IOS command can you use to display the addresses in the CAM table?

    • Show cam

    • Show mac address-table

    • Show mac

    • Show cam address-table

    Correct Answer
    A. Show mac address-table
    Explanation
    The correct answer is "show mac address-table". This command is used to display the addresses in the CAM (Content Addressable Memory) table on a Catalyst switch. The CAM table is responsible for mapping MAC addresses to corresponding ports on the switch. By using this command, network administrators can view the MAC addresses and their associated ports, which is useful for troubleshooting network connectivity and identifying devices on the network.

    Rate this question:

  • 17. 

    Switches provide VLAN connectivity at which layer of the OSI model?

    • Layer 1

    • Layer 2

    • Layer 3

    • Layer 4

    Correct Answer
    A. Layer 2
    Explanation
    Switches provide VLAN connectivity at Layer 2 of the OSI model. Layer 2 is the Data Link layer, which is responsible for the reliable transfer of data between nodes on a network. Switches operate at this layer by using MAC addresses to forward data packets between devices within the same VLAN. By assigning devices to specific VLANs, switches can segregate network traffic and improve network performance and security. Layer 2 switches are also capable of performing basic network functions such as filtering, forwarding, and error checking at this layer.

    Rate this question:

  • 18. 

    Which of these is a method for negotiating an EtherChannel?

    • PAP

    • CHAP

    • LAPD

    • LACP

    Correct Answer
    A. LACP
    Explanation
    LACP (Link Aggregation Control Protocol) is a method for negotiating an EtherChannel. It is a protocol used to automatically bundle multiple physical links into a single logical link, providing increased bandwidth and redundancy. LACP allows network devices to exchange information and negotiate the formation of an EtherChannel, ensuring that all links in the channel are properly configured and operational. This protocol is commonly used in Ethernet networks to optimize link utilization and improve network performance.

    Rate this question:

  • 19. 

    Where should the STP PortFast feature be used?

    • An access-layer switch port connected to a PC

    • An access-layer switch port connected to a hub

    • A distribution-layer switch port connected to an access layer switch

    • A core-layer switch port

    Correct Answer
    A. An access-layer switch port connected to a PC
    Explanation
    The STP PortFast feature should be used on an access-layer switch port connected to a PC. This feature allows the switch port to immediately transition to the forwarding state, bypassing the usual listening and learning states of the Spanning Tree Protocol. This is useful in situations where a fast convergence is required, such as when connecting end devices like PCs that do not participate in the Spanning Tree Protocol.

    Rate this question:

  • 20. 

    What happens to a port that is neither a Root Port nor a Designated Port?

    • It is available for normal use.

    • It can be used for load balancing.

    • It is put into the Blocking state.

    • It is disabled.

    Correct Answer
    A. It is put into the Blocking state.
    Explanation
    When a port is neither a Root Port nor a Designated Port, it means that it is not the best path to reach the Root Bridge or the designated switch. In this case, the port is put into the Blocking state. The Blocking state is a temporary state in the Spanning Tree Protocol (STP) where the port is still enabled but does not forward any data. This is done to prevent loops in the network and ensure a stable and loop-free topology.

    Rate this question:

  • 21. 

    Which of the following protocols can be used as a tool to discover a network topology?

    • RIP

    • CDP

    • STP

    • ICMP

    Correct Answer
    A. CDP
    Explanation
    CDP (Cisco Discovery Protocol) is a protocol used by Cisco devices to discover and gather information about neighboring devices on a network. It allows network administrators to obtain details about the devices connected to their Cisco network, such as their IP addresses, capabilities, and platform information. By using CDP, administrators can effectively map out the network topology, identifying the connections between devices and understanding how they are interconnected. Therefore, CDP is a suitable tool for discovering a network topology.

    Rate this question:

  • 22. 

    Ethernet autonegotiation determines which of the following?

    • Spanning Tree mode

    • Duplex mode

    • Quality of service mode

    • Error threshold

    Correct Answer
    A. Duplex mode
    Explanation
    Ethernet autonegotiation determines the duplex mode. Duplex mode refers to the communication method used between two devices on a network. It determines whether the devices can send and receive data simultaneously (full duplex) or only one at a time (half duplex). Autonegotiation allows devices to automatically negotiate and select the appropriate duplex mode based on their capabilities, ensuring efficient and reliable communication.

    Rate this question:

  • 23. 

    Which of the following is a valid EtherChannel negotiation mode combination between two switches?

    • PAgP auto, PAgP auto

    • PAgP auto, PAgP desirable

    • On, PAgP auto

    • LACP passive, LACP passive

    Correct Answer
    A. PAgP auto, PAgP desirable
    Explanation
    PAgP (Port Aggregation Protocol) is a Cisco proprietary protocol used for negotiating and creating EtherChannels. "auto" means that the interface will respond to PAgP messages but will not initiate the negotiation, while "desirable" means that the interface will actively try to form an EtherChannel by sending PAgP messages. Therefore, the combination of "PAgP auto, PAgP desirable" is a valid negotiation mode combination between two switches.

    Rate this question:

  • 24. 

    How many different VLANs can an 802.1Q trunk support?

    • 256

    • 1024

    • 4096

    • 32,768

    • 65,536

    Correct Answer
    A. 4096
    Explanation
    An 802.1Q trunk is capable of supporting up to 4096 different VLANs. This is the maximum number of VLANs that can be assigned on a single trunk.

    Rate this question:

  • 25. 

    Which of these parameters should you change to make a switch become a Root Bridge?

    • Switch MAC address

    • Path cost

    • Port priority

    • Bridge priority

    Correct Answer
    A. Bridge priority
    Explanation
    To make a switch become a Root Bridge, you need to change the Bridge priority parameter. The Bridge priority is a value assigned to each switch, and the switch with the lowest Bridge priority becomes the Root Bridge. By changing the Bridge priority to a lower value than the other switches in the network, you can ensure that the switch becomes the Root Bridge.

    Rate this question:

  • 26. 

    What does a switch do if a MAC address cannot be found in the CAM table?

    • The frame is forwarded to the default port.

    • The switch generates an ARP request for the address.

    • The switch floods the frame out all ports (except the receiving port).

    • The switch drops the frame.

    Correct Answer
    A. The switch floods the frame out all ports (except the receiving port).
    Explanation
    When a switch receives a frame with a destination MAC address that is not found in the CAM table, it means that the switch does not know the port to which the frame should be forwarded. In this case, the switch will flood the frame out to all ports (except the receiving port) in order to reach the intended destination. This flooding technique ensures that the frame reaches the correct destination by sending it to all connected devices, allowing the device with the correct MAC address to respond and update the switch's CAM table accordingly.

    Rate this question:

  • 27. 

    What switch command can be used to change from PVST+ to MST?

    • Spanning-tree mst enable

    • No spanning-tree pvst+

    • Spanning-tree mode mst

    • Spanning-tree mst

    Correct Answer
    A. Spanning-tree mode mst
    Explanation
    The correct answer is "spanning-tree mode mst". This command is used to change the spanning tree mode from PVST+ (Per VLAN Spanning Tree Plus) to MST (Multiple Spanning Tree). MST is a more advanced and efficient spanning tree protocol that allows for the grouping of VLANs into multiple instances, reducing the number of spanning tree instances required in the network.

    Rate this question:

  • 28. 

    What is the purpose of breaking a campus network into a hierarchical design?

    • To facilitate documentation

    • To follow political or organizational policies

    • To make the network predictable and scalable

    • To make the network more redundant and secure

    Correct Answer
    A. To make the network predictable and scalable
    Explanation
    Breaking a campus network into a hierarchical design helps in making the network predictable and scalable. This design allows for easy management and troubleshooting by dividing the network into smaller, manageable segments. It also helps in efficient allocation of resources and bandwidth, as well as easy expansion as the network grows. Additionally, a hierarchical design enables better performance and reduces the chances of network congestion by controlling the flow of traffic.

    Rate this question:

  • 29. 

    What does the IEEE 802.3 standard define?

    • Spanning Tree Protocol

    • Token Ring

    • Ethernet

    • Switched Ethernet

    Correct Answer
    A. Ethernet
    Explanation
    The IEEE 802.3 standard defines Ethernet. Ethernet is a widely used networking technology that allows devices to communicate over a local area network (LAN). It specifies the physical and data link layer protocols for wired Ethernet networks, including the types of cables, connectors, and signaling used, as well as the format and transmission of data packets. The standard ensures compatibility and interoperability between different Ethernet devices and networks.

    Rate this question:

  • 30. 

    Which one of the following is needed for VTP communication?

    • A management VLAN

    • A trunk link

    • An access VLAN

    • An IP address

    Correct Answer
    A. A trunk link
    Explanation
    A trunk link is needed for VTP communication because it allows multiple VLANs to be transmitted over a single physical link between switches. This enables the switches to exchange VLAN information and synchronize their VLAN databases. Trunk links use VLAN tagging to identify and separate the different VLANs, ensuring that the correct VLAN information is maintained and communicated between switches. Without a trunk link, VTP communication would not be possible as the VLAN information would not be able to traverse between switches.

    Rate this question:

  • 31. 

    Which one of the following VTP modes does not allow any manual VLAN configuration changes?

    • Server

    • Client

    • Designated

    • Transparent

    Correct Answer
    A. Client
    Explanation
    In VTP (VLAN Trunking Protocol), the Client mode does not allow any manual VLAN configuration changes. In this mode, the switch receives VLAN information from VTP servers and forwards it to other switches in the network. However, it cannot create, modify, or delete VLANs. The Client mode is typically used in larger networks where centralized VLAN management is preferred, and switches are configured as either servers or clients based on their role in the network.

    Rate this question:

  • 32. 

    If a switch has 10 VLANs defined and active, how many instances of STP will run using PVST+ versus CST?

    • 1 for PVST+, 1 for CST

    • 1 for PVST+, 10 for CST

    • 10 for PVST+, 1 for CST

    • 10 for PVST+, 10 for CST

    Correct Answer
    A. 10 for PVST+, 1 for CST
    Explanation
    In a switch with 10 VLANs defined and active, PVST+ (Per VLAN Spanning Tree Plus) will run 10 instances of STP, one for each VLAN. This is because PVST+ creates a separate spanning tree for each VLAN. On the other hand, CST (Common Spanning Tree) will only run one instance of STP for all VLANs. Therefore, the correct answer is 10 for PVST+, 1 for CST.

    Rate this question:

  • 33. 

    Which of the following features protects a switch port from accepting BPDUs when PortFast is enabled?

    • STP loop guard

    • STP BPDU guard

    • STP root guard

    • UDLD

    Correct Answer
    A. STP BPDU guard
    Explanation
    When PortFast is enabled on a switch port, it allows the port to transition directly from blocking to forwarding state without going through the listening and learning states. However, this can cause issues if a BPDU (Bridge Protocol Data Unit) is received on that port, as it could potentially create a loop in the network. STP BPDU guard is a feature that protects the switch port from accepting BPDUs when PortFast is enabled. If a BPDU is received on a port with BPDU guard enabled, the port will be put into an error-disabled state, preventing any potential loop from occurring.

    Rate this question:

  • 34. 

    What mechanism is used to set STP timer values for all switches in a network?

    • Configuring the timers on every switch in the network.

    • Configuring the timers on the Root Bridge switch.

    • Configuring the timers on both primary and secondary Root Bridge switches.

    • The timers can’t be adjusted.

    Correct Answer
    A. Configuring the timers on the Root Bridge switch.
    Explanation
    The correct answer is configuring the timers on the Root Bridge switch. In a spanning tree protocol (STP) network, the Root Bridge switch is responsible for determining the topology and path selection. By configuring the timers on the Root Bridge switch, the network administrator can control the values for the various STP timers such as hello time, forward delay, and maximum age. These timers determine how quickly the STP protocol reacts to changes in the network and how long it takes for switches to transition between states.

    Rate this question:

  • 35. 

    How many layers are recommended in the hierarchical campus network design model?

    • 1

    • 2

    • 3

    • 4

    • 7

    Correct Answer
    A. 3
    Explanation
    The hierarchical campus network design model recommends having three layers. This design consists of the core layer, distribution layer, and access layer. The core layer is responsible for high-speed switching and routing, connecting different buildings or campuses. The distribution layer provides connectivity between the core and access layers, handling traffic filtering and policy enforcement. The access layer connects end devices, such as computers and printers, to the network. Having three layers in the hierarchical model helps to improve network performance, scalability, and manageability.

    Rate this question:

  • 36. 

    Which of the following devices performs transparent bridging?

    • Ethernet hub

    • Layer 2 switch

    • Layer 3 switch

    • Router

    Correct Answer
    A. Layer 2 switch
    Explanation
    A Layer 2 switch performs transparent bridging. Transparent bridging is a technique used in computer networks to connect multiple network segments together. It operates at the data link layer (Layer 2) of the OSI model and uses MAC addresses to forward data packets between different network segments. A Layer 2 switch can learn and store MAC addresses in its forwarding table, allowing it to make forwarding decisions based on MAC addresses. This allows for efficient and fast switching of data packets between different network segments, making Layer 2 switches ideal for creating local area networks (LANs).

    Rate this question:

  • 37. 

    Which one of the following is needed to pass data between two PCs, each connected to a different VLAN?

    • Layer 2 switch

    • Layer 3 switch

    • Trunk

    • Tunnel

    Correct Answer
    A. Layer 3 switch
    Explanation
    A Layer 3 switch is needed to pass data between two PCs connected to different VLANs because it operates at both Layer 2 (Data Link Layer) and Layer 3 (Network Layer) of the OSI model. It can route traffic between different VLANs by examining the IP addresses in the packets and making forwarding decisions based on the destination IP address. This allows the PCs in different VLANs to communicate with each other.

    Rate this question:

  • 38. 

    Which VLAN number is never eligible for VTP pruning?

    • 0

    • 1

    • 1000

    • 1001

    Correct Answer
    A. 1
  • 39. 

    Which command can be used to see the status of an EtherChannel’s links?

    • Show channel link

    • Show etherchannel status

    • Show etherchannel summary

    • Show ether channel status

    Correct Answer
    A. Show etherchannel summary
    Explanation
    The command "show etherchannel summary" can be used to see the status of an EtherChannel's links. This command provides a summary of the EtherChannel configuration, including information about the individual links in the EtherChannel and their status. It allows the user to quickly check the status of the links and ensure that they are functioning properly.

    Rate this question:

  • 40. 

    What logical operation is performed to calculate EtherChannel load balancing as a function of two addresses?

    • OR

    • AND

    • XOR

    • NOR

    Correct Answer
    A. XOR
    Explanation
    The logical operation performed to calculate EtherChannel load balancing as a function of two addresses is XOR. XOR (exclusive OR) is a logical operation that returns true only if the inputs are different. In the context of EtherChannel load balancing, XOR is used to determine which link in the channel will be used for transmitting a packet based on the source and destination addresses of the packet. If the addresses are different, XOR will result in true, indicating that the packet should be transmitted through one link. If the addresses are the same, XOR will result in false, indicating that the packet should be transmitted through the other link.

    Rate this question:

  • 41. 

    Which of the following show interface output information can you use to diagnose a switch port problem?

    • Port state.

    • Port speed.

    • Input errors.

    • Collisions.

    • All of these answers are correct.

    Correct Answer
    A. All of these answers are correct.
    Explanation
    All of the options listed (port state, port speed, input errors, and collisions) can provide valuable information for diagnosing a switch port problem. The port state can indicate if the port is up or down, the port speed can help identify any speed mismatches, input errors can indicate issues with incoming data, and collisions can suggest problems with network congestion. Therefore, all of these answers are correct in helping diagnose a switch port problem.

    Rate this question:

  • 42. 

    In the core layer of a hierarchical network, which of the following are aggregated?

    • Routing tables

    • Packet filters

    • Distribution switches

    • Access-layer switches

    Correct Answer
    A. Distribution switches
    Explanation
    In the core layer of a hierarchical network, distribution switches are aggregated. The core layer is responsible for moving large amounts of data quickly and efficiently. Distribution switches are used to aggregate traffic from access-layer switches and route it to the appropriate destination. They help to optimize network performance by distributing traffic across multiple paths and providing redundancy. Therefore, distribution switches play a crucial role in aggregating and managing the flow of data in the core layer of a hierarchical network.

    Rate this question:

  • 43. 

    When a PC is connected to a Layer 2 switch port, how far does the collision domain spread?

    • No collision domain exists.

    • One switch port.

    • One VLAN.

    • All ports on the switch.All ports on the switch.

    Correct Answer
    A. One switch port.
    Explanation
    When a PC is connected to a Layer 2 switch port, the collision domain is limited to that specific switch port. This means that collisions can only occur between devices connected to that particular port. The switch itself helps to eliminate collisions by creating separate collision domains for each port, allowing for simultaneous communication between devices connected to different ports without interference. Therefore, in this scenario, the collision domain does not extend beyond the switch port to any other ports or VLANs.

    Rate this question:

  • 44. 

    Assume that you have just entered the configure terminal command. To configure the speed of the first FastEthernet interface on a Cisco IOS Software–based Catalyst switch to 100 Mbps, which one of these commands should you enter first?

    • Speed 100 mbps

    • Speed 100

    • Interface fastethernet 0/1

    • Interface fast ethernet 0/1

    Correct Answer
    A. Interface fastethernet 0/1
    Explanation
    To configure the speed of the first FastEthernet interface on a Cisco IOS Software-based Catalyst switch to 100 Mbps, the first command to enter should be "interface fastethernet 0/1". This command allows the user to access the configuration settings for the specified interface. By specifying "fastethernet 0/1", the user is indicating that they want to configure the first FastEthernet interface on the switch.

    Rate this question:

  • 45. 

    How is a bridging loop best described?

    • A loop formed between switches for redundancy

    • A loop formed by the Spanning Tree Protocol

    • A loop formed between switches where frames circulate endlessly

    • The round-trip path a frame takes from source to destination

    Correct Answer
    A. A loop formed between switches where frames circulate endlessly
    Explanation
    A bridging loop is best described as a loop formed between switches where frames circulate endlessly. This occurs when there are multiple paths between switches and the Spanning Tree Protocol is not properly configured to prevent loops. The frames keep circulating within the loop, causing network congestion and potentially leading to network failures.

    Rate this question:

  • 46. 

    What is the maximum number of Root Ports that a Catalyst switch can have?

    • 1

    • 2

    • Unlimited

    • None

    Correct Answer
    A. 1
    Explanation
    A Catalyst switch can have a maximum of 1 Root Port. The Root Port is the switch port that offers the fastest path to reach the root bridge in a Spanning Tree Protocol (STP) network. In a network, there can only be one root bridge, and each switch will have only one Root Port to connect to the root bridge. Therefore, the maximum number of Root Ports that a Catalyst switch can have is 1.

    Rate this question:

  • 47. 

    What is the default “hello” time for IEEE 802.1D?

    • 1 second

    • 2 seconds

    • 30 seconds

    • 60 seconds

    Correct Answer
    A. 2 seconds
    Explanation
    The default "hello" time for IEEE 802.1D is 2 seconds. This refers to the interval at which bridge devices in a network send hello messages to each other to ensure connectivity and exchange information.

    Rate this question:

  • 48. 

    When a switch running RSTP receives an 802.1D BPDU, what happens?

    • The BPDU is discarded or dropped.

    • An ICMP message is returned.

    • The switch begins to use 802.1D rules on that port.

    • The switch disables RSTP.

    Correct Answer
    A. The switch begins to use 802.1D rules on that port.
    Explanation
    When a switch running RSTP receives an 802.1D BPDU, it begins to use 802.1D rules on that port. This is because 802.1D BPDU is the standard protocol used by Spanning Tree Protocol (STP), while RSTP is an enhanced version of STP. When a switch receives an 802.1D BPDU, it recognizes that the connected device is using STP and switches its operation to use 802.1D rules on that specific port. This allows the switch to maintain compatibility and communicate effectively with the connected device using STP.

    Rate this question:

  • 49. 

    Which of the following does a multilayer switch perform?

    • Forwarding according to MAC address.

    • Forwarding according to IP address.

    • Forwarding according to UDP/TCP port numbers.

    • All of these answers are correct.

    Correct Answer
    A. All of these answers are correct.
    Explanation
    A multilayer switch performs all of the mentioned tasks. It is capable of forwarding data packets based on MAC addresses, IP addresses, and UDP/TCP port numbers. This allows the switch to efficiently route traffic at both the data link layer and network layer, making it a versatile networking device.

    Rate this question:

Quiz Review Timeline (Updated): Sep 2, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 02, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 06, 2011
    Quiz Created by
    OsvaldoLaraP
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.