Lan Switch Practice Test

  • IEEE 802.1D
  • IEEE 802.1w
  • IEEE 802.1s
Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Apalani
A
Apalani
Community Contributor
Quizzes Created: 17 | Total Attempts: 80,705
| Attempts: 123 | Questions: 25
Please wait...
Question 1 / 25
0 %
0/100
Score 0/100
1. This layer provides segmentation and terminates collision domains as well as broadcast domains.

Explanation

The Distribution Layer is responsible for providing segmentation and terminating collision domains as well as broadcast domains. This layer acts as an intermediary between the Access Layer and the Core Layer, facilitating communication between different network segments and controlling the flow of data. It helps to improve network performance, scalability, and security by efficiently managing the distribution of data packets across the network.

Submit
Please wait...
About This Quiz
Lan Switch Practice Test - Quiz

The 'LAN Switch Practice Test' assesses knowledge on LAN switching technologies, covering multicast protocols, UTP cabling standards, spanning tree optimization, multilayer switching, and command-line verification of network configuration. It's designed for professionals enhancing their networking skills in high-density broker environments.

Personalize your quiz and earn a certificate with your name on it!
2. A root bridge _____.

Explanation

A root bridge is the reference point that all switches use to determine if there are loops in the network. This means that the root bridge is the central point in the network that all other switches connect to. By designating a root bridge, switches can determine the best path for forwarding data and avoid creating loops in the network, which can cause network congestion and instability.

Submit
3. The ip security command disables multilayer switching on an interface.

Explanation

The IP security command is used to enable or disable IP Security (IPsec) on an interface. When the IP security command is enabled, it can disable multilayer switching on that particular interface. This means that the interface will not perform any multilayer switching functions, such as routing or switching between different network layers. Therefore, the given statement that the IP security command disables multilayer switching on an interface is true.

Submit
4. In which of the following VTP modes will switches forward VTP advertisements?

Explanation

In all three VTP modes - Server mode, Client mode, and Transparent mode (version 2) - switches will forward VTP advertisements. Server mode is responsible for creating, modifying, and deleting VLANs and VTP information, and it also forwards VTP advertisements to other switches. Client mode receives VTP advertisements from servers and forwards them to other switches. Transparent mode (version 2) does not synchronize VLAN information, but it still forwards VTP advertisements to other switches. Therefore, in all three modes, switches will forward VTP advertisements.

Submit
5. Spanning-Tree Algorithm is used in bridged or switched LANs to _____.

Explanation

The Spanning-Tree Algorithm is used in bridged or switched LANs to avoid broadcast storms by eliminating loops in the network. By creating a loop-free topology, the algorithm ensures that there is only one active path between any two network devices, preventing the circulation of broadcast frames indefinitely. This helps to optimize network performance and prevent excessive network traffic.

Submit
6. Which command is used to verify a default gateway on a Set command-based switch?

Explanation

The correct answer is "Switch(enable) show ip route". This command is used to display the IP routing table on a Set command-based switch, which includes information about the default gateway. By using this command, the user can verify the default gateway configured on the switch.

Submit
7. When connecting the 10BasetT switch ports to servers, workstations, and routers, ensure that you use a crossover cable.

Explanation

When connecting the 10BasetT switch ports to servers, workstations, and routers, it is not necessary to use a crossover cable. This is because 10BasetT switches are designed to automatically detect and adjust the wiring configuration, allowing for straight-through cables to be used instead. Therefore, the statement that a crossover cable should be used is false.

Submit
8. Which of the following statements best describe a trunk link?

Explanation

A trunk link is a type of connection that allows multiple VLANs to be carried over a single physical link between switches. The native VLAN refers to the default VLAN that is used for untagged traffic on a trunk link. In the event of a failure on the trunk link, the native VLAN is used to maintain connectivity. Therefore, the given answer correctly describes a trunk link.

Submit
9. Which of the following multicast routing protocols is most appropriate for the following scenario? I. M. Bhossi, the CEO, for the ABC Toy Company, wants to implement a "Happy Teddy Bear Friday" program to promote goodwill within the company. However, most of his divisions are oversees. These divisions need to tune into a replay broadcast when it is convenient for them.

Explanation

Sparse-Mode is the most appropriate multicast routing protocol for this scenario because it is designed for situations where there are a small number of receivers spread across a wide area network. In this case, the CEO wants to broadcast a replay of the program to divisions overseas, indicating that there are likely only a few receivers in different locations. Sparse-Mode efficiently delivers multicast traffic to only those receivers that have explicitly requested it, making it suitable for this scenario. Dense-Mode, on the other hand, is designed for situations where there are many receivers in a localized area, which does not align with the given scenario.

Submit
10. Access lists are a component of policies at the access layer.

Explanation

Access lists are not a component of policies at the access layer. Access lists are actually a component of policies at the network layer. Access lists are used to control the flow of traffic in and out of a network device by filtering packets based on certain criteria such as source or destination IP address, protocol, or port number. These access control policies are typically implemented at the network layer to secure the network and control the traffic flow. Therefore, the correct answer is False.

Submit
11. Given the following scenario: A stock exchange company requires its 1000 stockbrokers to have stock market continual feeds to the brokers computers. All brokers reside in the same building on Wall Street. Which multicast routing protocol is most appropriate?

Explanation

Dense-Mode is the most appropriate multicast routing protocol in this scenario because it is designed for situations where there is a high density of receivers in a specific area, such as the brokers all residing in the same building on Wall Street. Dense-Mode is optimized for efficient delivery of multicast traffic to a large number of receivers within a limited geographical area. Sparse-Mode, on the other hand, is more suitable for scenarios where there are widely dispersed receivers and network resources need to be conserved.

Submit
12. Which of the following statements accurately describe the functions of the hierarchical model?

Explanation

The correct answer accurately describes the functions of the hierarchical model by stating that it defines building blocks that encompass both distributed network services and network intelligence. This means that the hierarchical model organizes the network infrastructure into different layers, each with its own specific functions and responsibilities. These building blocks allow for the distribution of network services and intelligence throughout the network, ensuring efficient and effective communication and resource management.

Submit
13. To configure the preempt status of a router, enter the

Explanation

The correct answer is "standby group number preempt command in interface configuration mode." This is because the "standby preempt" command is used to configure the preempt status of a router in the interface configuration mode. By specifying the group number, the router can determine which group should preempt the active router and become the new active router in case of a failure.

Submit
14. Which of the following commands accurately depicts the mode and command used to configure a default gateway on an IOS command-based switch.

Explanation

The correct answer is "Switch(config)ip default-gateway ip address." This command is used to configure a default gateway on an IOS command-based switch. The "config" mode indicates that the command is being entered in global configuration mode, where the switch's global settings can be configured. The "ip default-gateway" command is used to specify the IP address of the default gateway for the switch. By setting the default gateway, the switch knows where to send traffic that is destined for a network outside of its own local network.

Submit
15. All UTP connections between the end devices and switch must be within _____ meters.

Explanation

All UTP connections between the end devices and switch must be within 90 meters. This is because the maximum distance for UTP (Unshielded Twisted Pair) cables, which are commonly used for Ethernet connections, is 100 meters. Going beyond this distance can result in signal degradation and loss of data. Therefore, to ensure optimal performance and reliable connections, it is recommended to keep UTP connections within 90 meters.

Submit
16. Which of the following statements most accurately list the required components of the Cisco Systems multilayer switching implementation?

Explanation

The correct answer is "The MLS-SE, the MLS-RP, the MLSP." In a Cisco Systems multilayer switching implementation, the MLS-SE (Multilayer Switching Service Engine) is used to provide high-performance switching capabilities. The MLS-RP (Multilayer Switching Route Processor) is responsible for making forwarding decisions based on routing protocols. The MLSP (Multilayer Switching Protocol) is used to establish communication between the MLS-SE and MLS-RP, allowing for efficient packet forwarding. These three components work together to enable multilayer switching in the Cisco Systems implementation.

Submit
17. Which of the following statements accurately identify VLAN characteristics?

Explanation

All devices in a VLAN are members of the same broadcast domain. This means that they can communicate with each other directly without the need for routing. VLANs are used to segment a network into smaller broadcast domains, improving network performance and security. By grouping devices together based on their VLAN membership, broadcast traffic is contained within the VLAN, reducing the amount of broadcast traffic that needs to be processed by each device.

Submit
18. Multilayer switching is based on the _____ model.

Explanation

Multilayer switching is based on the concept of switching packets at Layer 2 and then routing them at Layer 3. This means that the switch makes the initial decision on where to send the packet based on Layer 2 information, such as MAC addresses, and then the routing decision is made based on Layer 3 information, such as IP addresses. This allows for efficient forwarding of packets within the network, as the switch only needs to make the routing decision once for a group of packets that have the same destination.

Submit
19. Which of the following statements describes a characteristic of PortFast?

Explanation

PortFast is a feature in spanning-tree protocol that allows a port to bypass the listening and learning states and enter the forwarding state immediately. This is useful when connecting a link containing multiple end stations to a single switch port for the first time, as it reduces the time it takes for the port to become operational. By bypassing the listening and learning states, PortFast helps to minimize the STP convergence time and ensures that end stations can start communicating without delay.

Submit
20. Which of the following two methods can be used to control the routing information that is sent to the Core Block?

Explanation

Route summarization and distribution lists can be used to control the routing information that is sent to the Core Block. Route summarization involves aggregating multiple network addresses into a single summary address, reducing the size of the routing table and improving network performance. Distribution lists, on the other hand, allow network administrators to filter and control the flow of routing updates between routers, enabling them to selectively advertise or block specific routes. By using these methods, network administrators can have more control over the routing information that is sent to the Core Block.

Submit
21. Which of the following statements most accurately describes the configuration guidelines for configuring Fast EtherChannel technology?

Explanation

The statement that most accurately describes the configuration guidelines for configuring Fast EtherChannel technology is to configure the broadcast limit on the ports as a percentage limit for the channeled ports. This means that when setting a limit on the amount of broadcast traffic allowed on the ports, it should be configured as a percentage of the total bandwidth of the channeled ports. This ensures that the broadcast traffic is evenly distributed across all the ports in the channel, optimizing the performance and preventing any single port from being overwhelmed by excessive broadcast traffic.

Submit
22. Which of the following statements accurately lists the all the states and correct order in which a HSRP route processor may pass during initialization?

Explanation

During initialization, a HSRP route processor goes through the following states in order: Initial state, learn state, listen state, speak state, standby state, active state.

Submit
23. Which of the following statements accurately describes the characteristics of the HSRP Interface Tracking function?

Explanation

not-available-via-ai

Submit
24. Before you insert a new switch into a VTP domain, you should  _____.

Explanation

not-available-via-ai

Submit
25. You can improve the convergence time of Spanning Tree during a network reconfiguration by decreasing the forward delay timer. Which conditions must be met for UplinkFast to trigger a fast convergence?

Explanation

UplinkFast is a feature in Spanning Tree Protocol (STP) that helps to improve the convergence time during network reconfiguration. It works by immediately transitioning a blocked port to a forwarding state when a failure occurs on the Root port. This allows for faster restoration of connectivity. Therefore, for UplinkFast to trigger a fast convergence, the switch must have at least one blocked port and the failure must be on the Root port.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 19, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 28, 2011
    Quiz Created by
    Apalani
Cancel
  • All
    All (25)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
This layer provides segmentation and terminates collision domains as...
A root bridge _____.
The ip security command disables multilayer switching on an interface.
In which of the following VTP modes will switches forward VTP...
Spanning-Tree Algorithm is used in bridged or switched LANs...
Which command is used to verify a default gateway on a Set...
When connecting the 10BasetT switch ports to servers, workstations,...
Which of the following statements best describe a trunk link?
Which of the following multicast routing protocols is most appropriate...
Access lists are a component of policies at the access layer.
Given the following scenario: A stock exchange company requires its...
Which of the following statements accurately describe the functions of...
To configure the preempt status of a router, enter the
Which of the following commands accurately depicts the mode and...
All UTP connections between the end devices and switch must be within...
Which of the following statements most accurately list the required...
Which of the following statements accurately identify VLAN...
Multilayer switching is based on the _____ model.
Which of the following statements describes a characteristic of...
Which of the following two methods can be used to control the routing...
Which of the following statements most accurately describes the...
Which of the following statements accurately lists the all the states...
Which of the following statements accurately describes the...
Before you insert a new switch into a VTP domain, you...
You can improve the convergence time of Spanning Tree during a network...
Alert!

Advertisement