ICND P2 V1 M2

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Asmt458
A
Asmt458
Community Contributor
Quizzes Created: 4 | Total Attempts: 552
Questions: 31 | Attempts: 160

SettingsSettingsSettings
ICND Quizzes & Trivia

ICND Part 2 Vol 1 Module 2


Questions and Answers
  • 1. 

    Which feature is required for multiple VLANs to span multiple switches? (Source:Implementing VLANs and Trunks)

    • A.

      A trunk to connect the switches

    • B.

      A router to connect the switches

    • C.

      A bridge to connect the switches

    • D.

      A VLAN configured between the switches

    Correct Answer
    A. A trunk to connect the switches
    Explanation
    To span multiple switches with multiple VLANs, a trunk is required. A trunk is a network link that carries traffic for multiple VLANs between switches. It allows for the transmission of VLAN-tagged frames across switches, ensuring that each switch can correctly identify and forward traffic to the appropriate VLAN. Trunks use protocols such as IEEE 802.1Q to tag VLAN information onto Ethernet frames, enabling the switches to differentiate between VLANs and maintain their integrity across the network. Without a trunk, VLANs would be isolated to individual switches, limiting their ability to communicate with each other.

    Rate this question:

  • 2. 

    What does a VMPS map to VLAN assignments? (Source: Implementing VLANs and Trunks)

    • A.

      Host IDs

    • B.

      usernames

    • C.

      IP addresses

    • D.

      MAC addresses

    Correct Answer
    D. MAC addresses
    Explanation
    A VMPS (VLAN Membership Policy Server) maps to VLAN assignments based on MAC addresses. This means that the VMPS uses the MAC address of a device to determine which VLAN it should be assigned to. By associating MAC addresses with specific VLANs, the VMPS can effectively manage VLAN membership and ensure that devices are placed in the correct VLAN based on their MAC address.

    Rate this question:

  • 3. 

    What are two reasons for using 802.1Q? (Choose two.) (Source: Implementing VLANs and Trunks)

    • A.

      To allow switches to share a trunk link with nontrunking clients

    • B.

      To allow clients to see the 802.1Q header

    • C.

      To provide inter-VLAN communications over a bridge

    • D.

      To load-balance traffic between parallel links using STP

    • E.

      To provide trunking between Cisco switches and other vendor switches

    Correct Answer(s)
    A. To allow switches to share a trunk link with nontrunking clients
    E. To provide trunking between Cisco switches and other vendor switches
    Explanation
    802.1Q is used to allow switches to share a trunk link with nontrunking clients, which means that multiple VLANs can be transmitted over a single physical link. It also provides trunking between Cisco switches and other vendor switches, allowing for interoperability between different network equipment.

    Rate this question:

  • 4. 

    What primary benefit does VTP offer? (Source: Implementing VLANs and Trunks)

    • A.

      Allows trunking to provide redundancy

    • B.

      Minimizes redundancy on a switched network

    • C.

      Allows you to run several VLANs over a single trunk

    • D.

      D) minimizes misconfigurations and configuration inconsistencies

    Correct Answer
    D. D) minimizes misconfigurations and configuration inconsistencies
    Explanation
    VTP (VLAN Trunking Protocol) minimizes misconfigurations and configuration inconsistencies in a switched network. It does this by allowing for centralized management of VLAN configurations, ensuring that all switches in the network have consistent VLAN information. This helps to prevent errors and inconsistencies that can occur when manually configuring VLANs on individual switches. By minimizing misconfigurations and inconsistencies, VTP improves network reliability and reduces the chances of network issues caused by incorrect VLAN configurations.

    Rate this question:

  • 5. 

    How many VTP domains can you configure for a switch? (Source: Implementing VLANs and Trunks)

    • A.

      One

    • B.

      Two

    • C.

      Four

    • D.

      Eight

    Correct Answer
    A. One
    Explanation
    The correct answer is one because a switch can only belong to a single VTP (VLAN Trunking Protocol) domain at a time. VTP allows for the synchronization of VLAN information across multiple switches in a network, but each switch can only be part of one domain.

    Rate this question:

  • 6. 

    Which command correctly configures a switch for transparent mode in the VTP domain “switchlab”? (Source: Implementing VLANs and Trunks)

    • A.

      Vtp mode trunk on

    • B.

      Vtp mode transparent

    • C.

      Vtp domain switchlab

    • D.

      Vtp domain switchlab transparent

    Correct Answer
    B. Vtp mode transparent
    Explanation
    The correct answer is "vtp mode transparent" because this command is used to configure a switch in transparent mode in the VTP domain "switchlab". In transparent mode, the switch does not participate in VTP updates and does not advertise its VLAN configuration to other switches. This mode is typically used when you want to manually configure VLANs on a switch without affecting the VTP domain.

    Rate this question:

  • 7. 

    Which is the default VTP mode on a Cisco Catalyst switch? (Source: Implementing VLANs and Trunks)

    • A.

      Off

    • B.

      Client

    • C.

      Server

    • D.

      Transparent

    Correct Answer
    C. Server
    Explanation
    The default VTP mode on a Cisco Catalyst switch is "server". In this mode, the switch can create, modify, and delete VLANs and share this information with other switches in the VTP domain. It also synchronizes VLAN information received from other switches and can advertise this information to other switches in the domain. The server mode is typically used in larger networks where multiple switches need to be managed and configured centrally.

    Rate this question:

  • 8. 

    Which information does the show vian command display? (Source: Implementing VLANs and Trunks)

    • A.

      VTP domain parameters

    • B.

      VMPS server configuration parameters

    • C.

      Which ports are configured as trunks

    • D.

      Names of the VLANs and the ports assigned to the VLANs

    Correct Answer
    D. Names of the VLANs and the ports assigned to the VLANs
    Explanation
    The "show vian" command displays the names of the VLANs and the ports assigned to those VLANs. This command provides information about the VLAN configuration on a network device, allowing administrators to see which VLANs are configured and which ports are assigned to each VLAN.

    Rate this question:

  • 9. 

    Which command displays the spanning-tree configuration status of the ports on a Cisco Catalyst 2960 Series Switch? (Source: Implementing VLANs and Trunks)

    • A.

      Show vlan

    • B.

      Show trunk

    • C.

      Show spanning-tree

    • D.

      Show spantree config

    Correct Answer
    C. Show spanning-tree
    Explanation
    The correct answer is "show spanning-tree." This command is used to display the spanning-tree configuration status of the ports on a Cisco Catalyst 2960 Series Switch. It provides information about the spanning-tree protocol, including the root bridge, port roles, and port states. This command is commonly used for troubleshooting and monitoring the spanning-tree topology on the switch.

    Rate this question:

  • 10. 

    When you delete a VLAN from a VTP domain, where should you perform the change? (Source: Implementing VLANs and Trunks)

    • A.

      On a switch in VTP server mode

    • B.

      On every switch in VTP client mode

    • C.

      On a switch in VTP transparent mode

    • D.

      On every switch, regardless of VTP mode

    Correct Answer
    A. On a switch in VTP server mode
    Explanation
    When you delete a VLAN from a VTP domain, you should perform the change on a switch in VTP server mode. This is because VTP server mode is responsible for managing and propagating VLAN information to other switches in the domain. By deleting the VLAN on a switch in VTP server mode, the change will be communicated to all other switches in the VTP domain, ensuring that the VLAN is removed from their configurations as well.

    Rate this question:

  • 11. 

    Suppose that VTP is not updating the configuration on other switches when the VLAN configuration changes. Which command would you use to determine if the switch is in VTP transparent mode? (Source: Implementing VLANs and Trunks)

    • A.

      Show trunk

    • B.

      Show spantree

    • C.

      Show interfaces

    • D.

      Show vtp status

    Correct Answer
    D. Show vtp status
    Explanation
    The "show vtp status" command would be used to determine if the switch is in VTP transparent mode. This command displays the VTP configuration information, including the VTP mode. By checking the mode, you can determine if the switch is in transparent mode, which means it does not participate in VTP updates and does not synchronize its VLAN configuration with other switches.

    Rate this question:

  • 12. 

    Which three frame types are flooded to all ports except the source port on a switch?(Choose three.) (Source: Improving Performance with Spanning Tree)

    • A.

      Unicast frames

    • B.

      Multicast frames

    • C.

      Broadcast frames

    • D.

      Frames with a known destination address

    • E.

      Frames with an unknown destination address

    Correct Answer(s)
    B. Multicast frames
    C. Broadcast frames
    E. Frames with an unknown destination address
    Explanation
    Unicast frames are not flooded to all ports except the source port on a switch. Frames with a known destination address are not flooded either, as they can be forwarded directly to the intended recipient. However, multicast frames, broadcast frames, and frames with an unknown destination address are flooded to all ports except the source port to reach all potential recipients.

    Rate this question:

  • 13. 

    Which term commonly describes the endless flooding or looping of frames? (Source: Improving Performance with Spanning Tree)

    • A.

      Flood storm

    • B.

      Loop overload

    • C.

      Broadcast storm

    • D.

      Broadcast overload

    Correct Answer
    C. Broadcast storm
    Explanation
    A broadcast storm refers to the excessive flooding of broadcast packets in a network, causing a loop and overwhelming the network's resources. This can result in degraded network performance and can even lead to a network outage.

    Rate this question:

  • 14. 

    Which term describes multiple copies of a frame arriving on different ports of a switch? (Source: Improving Performance with Spanning Tree)

    • A.

    Explanation
    The term that describes multiple copies of a frame arriving on different ports of a switch is "broadcast storm". A broadcast storm occurs when a switch receives a broadcast frame and forwards it out of all its ports, causing each switch in the network to receive and forward the same frame again. This can lead to network congestion and performance issues. Spanning Tree Protocol (STP) helps prevent broadcast storms by blocking redundant paths in a network.

    Rate this question:

  • 15. 

    When does STP automatically reconfigure switch or bridge ports? (Source: Improving Performance with Spanning Tree)

    • A.

      When the network topology changes

    • B.

      When the forward delay timer expires

    • C.

      When an administrator specifies a recalculation

    • D.

      When a new BPDU is not received within the forward delay

    Correct Answer
    A. When the network topology changes
    Explanation
    STP automatically reconfigures switch or bridge ports when the network topology changes. This means that when there is a change in the way the devices are interconnected or when a new device is added or removed from the network, STP will dynamically adjust the forwarding paths to prevent loops and ensure a stable network. This automatic reconfiguration is essential for maintaining network stability and preventing broadcast storms or other network issues that can arise from changes in the topology.

    Rate this question:

  • 16. 

    Q17) How does STP provide a loop-free network? (Source: Improving Performance with Spanning Tree)

    • A.

      by placing all ports in the blocking state

    • B.

      by placing all bridges in the blocking state

    • C.

      by placing some ports in the blocking state

    • D.

      by placing some bridges in the blocking state

    Correct Answer
    C. by placing some ports in the blocking state
    Explanation
    STP provides a loop-free network by placing some ports in the blocking state. This means that certain ports on the switches are temporarily disabled, preventing them from forwarding traffic. By selectively blocking ports, STP ensures that there are no loops in the network, which can cause broadcast storms and degrade network performance. The blocked ports are only activated when there is a failure in the network, ensuring that redundant paths are available if needed, but without creating loops.

    Rate this question:

  • 17. 

    Which port is the lowest-cost path from the nonroot bridge to the root bridge? (Source:Improving Performance with Spanning Tree)

    • A.

      root

    • B.

      blocking

    • C.

      designated

    • D.

      nondesignated

    Correct Answer
    A. root
    Explanation
    The lowest-cost path from the nonroot bridge to the root bridge is through the root port. The root port is the port on the nonroot bridge that offers the shortest path to reach the root bridge. It is the port that receives the best BPDU (Bridge Protocol Data Unit) information from the root bridge, indicating the lowest cost path. This port is responsible for forwarding traffic towards the root bridge.

    Rate this question:

  • 18. 

    How does STP select the designated port on a segment? (Source: Improving Performance with Spanning Tree)

    • A.

      Lowest-cost path to the root bridge

    • B.

      Highest-cost path to the root bridge

    • C.

      Lowest-cost path to the closest nonroot bridge

    • D.

      Highest-cost path to the closest nonroot bridge

    Correct Answer
    A. Lowest-cost path to the root bridge
    Explanation
    STP (Spanning Tree Protocol) selects the designated port on a segment based on the lowest-cost path to the root bridge. The root bridge is the bridge with the lowest bridge ID in the network. By selecting the lowest-cost path to the root bridge, STP ensures that the designated port is on the most efficient path for forwarding traffic. This helps to prevent loops and ensures that the network operates with optimal performance.

    Rate this question:

  • 19. 

    Which statement is true of a port in the listening state? (Source: Improving Performance with Spanning Tree)

    • A.

      The port is able to check for BPDUs and populate the MAC table.

    • B.

      The port is able to check for BPDUs, but not yet populate its MAC table.

    • C.

      The port is able to populate its MAC table, but not yet forward user frames.

    • D.

      The port is able to forward user frames, but not yet populate its MAC table.

    Correct Answer
    B. The port is able to check for BPDUs, but not yet populate its MAC table.
    Explanation
    In the listening state, a port in Spanning Tree Protocol (STP) is able to receive and process Bridge Protocol Data Units (BPDUs) to determine the network topology. However, it does not yet populate its MAC table, which means it does not learn or store MAC addresses. The listening state is a transitional state before the learning state, where the port starts populating its MAC table. Therefore, the correct answer is that the port is able to check for BPDUs, but not yet populate its MAC table.

    Rate this question:

  • 20. 

    Regarding STP, what is the state of a nondesignated port? (Source: Improving Performance with Spanning Tree)

    • A.

      Blocking

    • B.

      Learning

    • C.

      Listening

    • D.

      Forwarding

    Correct Answer
    A. Blocking
    Explanation
    A nondesignated port in STP is in the blocking state. This means that the port is not part of the active network path and does not forward any frames. It is essentially "blocked" from participating in the network communication to prevent loops and ensure a stable network topology. The blocking state helps in preventing network congestion and ensures that only designated ports are actively forwarding traffic.

    Rate this question:

  • 21. 

    Regarding STP, what is the state of a root port? (Source: Improving Performance withSpanning Tree)

    • A.

      Blocking

    • B.

      Learning

    • C.

      Listening

    • D.

      Forwarding

    Correct Answer
    D. Forwarding
    Explanation
    The state of a root port in STP is forwarding. In Spanning Tree Protocol (STP), the root port is the port on a non-root bridge that offers the shortest path to the root bridge. It is responsible for forwarding data packets towards the root bridge. The forwarding state allows the port to actively send and receive data packets, ensuring efficient communication within the network.

    Rate this question:

  • 22. 

    On which SIP bridge are all ports designated ports? (Source: Improving Performance with Spanning Tree)

    • A.

      Root bridge

    • B.

      Nonroot bridge

    • C.

      Bridge with the lowest priority

    • D.

      Bridge with the highest bridge ID

    Correct Answer
    A. Root bridge
  • 23. 

    Which event is required for SIP to detect a topology change? (Source: Improving Performance with Spanning Tree)

    • A.

      A BPDU is not received within two seconds.

    • B.

      Device does not respond to a handshake message.

    • C.

      The maxage timer has expired without receiving a BPDU.

    • D.

      A device does not respond quickly enough to a handshake request.

    Correct Answer
    C. The maxage timer has expired without receiving a BPDU.
  • 24. 

    Which switched network issue does RSTP address? (Source: Improving Performance with Spanning Tree)

    • A.

      Network security

    • B.

      Size of the network

    • C.

      Redundant topology

    • D.

      Speed of convergence

    Correct Answer
    D. Speed of convergence
  • 25. 

    What is the RSTP equivalent of the SIP listening state? (Source: Improving Performance with Spanning Tree)

    • A.

      Blocking

    • B.

      Listening

    • C.

      Discarding

    • D.

      Forwording

    Correct Answer
    C. Discarding
  • 26. 

    With RSTP, which two port roles are included in the active topology? (Source: Improving Performance with Spanning Tree)

    • A.

      Root and alternate

    • B.

      Root and designated

    • C.

      Alternate and backup

    • D.

      Designated and backup

    Correct Answer
    B. Root and designated
  • 27. 

    Which command correctly assigns a subinterface to VLAN 50 using 802.1Q trunking? (Source: Routing Between VLANs)

    • A.

      Router(config) # encapsulation 50 dot1Q

    • B.

      Router(config) # encapsulation 802.1Q 50

    • C.

      Router(config-if) # encapsulation dot1Q 50

    • D.

      Router(config-if) # encapsulation 50 802.1Q

    Correct Answer
    C. Router(config-if) # encapsulation dot1Q 50
    Explanation
    The command "Router(config-if) # encapsulation dot1Q 50" correctly assigns a subinterface to VLAN 50 using 802.1Q trunking. This command specifies the encapsulation type as dot1Q, which is the standard for VLAN tagging, and assigns the VLAN ID as 50.

    Rate this question:

  • 28. 

    Which command restricts port usage to no more than ten devices? (Source: Securing the Expanded Network)

    • A.

      Switchport secure 10

    • B.

      Switchport max-mac-count 10

    • C.

      Switchport port-security maximum 10

    • D.

      Switchport port-security 10 max-mac

    Correct Answer
    C. Switchport port-security maximum 10
    Explanation
    The correct answer is "switchport port-security maximum 10." This command sets the maximum number of MAC addresses allowed on a switchport to 10. This helps to prevent unauthorized devices from connecting to the network by limiting the number of devices that can be connected to a specific port.

    Rate this question:

  • 29. 

    What happens to a switch port when you delete the VLAN to which it belongs? (Source: Troubleshooting Switched Networks)

    • A.

      The port becomes a member of the default VLAN 1.

    • B.

      The port becomes a member of the default VLAN 1 and becomes inactive.

    • C.

      The port remains in the deleted VLAN and becomes inactive.

    • D.

      A VLAN cannot be deleted when there are ports assigned to it.

    Correct Answer
    C. The port remains in the deleted VLAN and becomes inactive.
  • 30. 

    What happens when you try to create a trunk link between two switches that have their ports set to dynamic auto? (Source: Troubleshooting Switched Networks)

    • A.

      The link will become a trunk link.

    • B.

      The link will become a non-trunked link.

    • C.

      Both ports will be configured as access ports.

    • D.

      Both ports will become inactive.

    Correct Answer
    B. The link will become a non-trunked link.
  • 31. 

     Switch A is in VIP client mode and has VLANs 1 through 5 in its VLAN database. Switch B is added to the same VIP domain in VIP server mode and has VLANs 6 through 10 in its VLAN database. How do the VLAN databases of Switch A and Switch B appear after Switch B has been added to the network? (Source: Troubleshooting Switched Networks)

    • A.

      Both VLAN databases will have VLANs 1 through 10.

    • B.

      Both VLAN databases will have VLANs 1 through 5.

    • C.

      Both VLAN databases will have VLANs 6 through 10.

    • D.

      It depends upon which switch has the higher revision number.

    Correct Answer
    D. It depends upon which switch has the higher revision number.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 16, 2009
    Quiz Created by
    Asmt458
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.