The 'LAN Switching and Wireless' quiz assesses knowledge in hierarchical network design, convergence of network services, and network analysis. It covers key aspects like traffic control, security policies, and benefits of integrating data, voice, and video, essential for networking professionals.
Layer 1
Layer 2
Layer 3
Layer 4
Layer 5
Layer 6
Rate this question:
A parameter is missing
The command was entered in the wrong CLI mode
The data of one of the parameters is incorrect
The command is ambiguous
Rate this question:
Broadcasting requests for IP addresses with spoofed MAC addresses
Using proprietary Cisco protocols to gain info about a switch
The attacker fills the switch Content Addressable Memory(CAM) table with invalid MAC addresses
Using brute force password attacks to gain access to a switch
OPEN
SHARED
WPA
WPA-PSK
Rate this question:
VLAN tagging using 802.1Q protocol
VLAN tagging using 802.1p protocol
VLAN multiplexing
VLAN set as native VLAN
Rate this question:
#Authorized Personnel Only!# appears after the user logs in
Authorized Personnel Only! appears only when the user makes a Telnet connection
#Authorized Personnel Only!# appears only when the user enters global config mode
Authorized Personnel Only! appears before the username and password login prompts for any connection
Rate this question:
Number of ports available on a single switch
Data rate that each port on the switch is capable of attaining
Processing capabilities of a switch by quantifying performance of the switch by how much data it can process per second
Ability to utilize multiple switch ports concurrently for higher throughput data communication
Rate this question:
Connects multiple wireless clients or stations to the wired LAN
Connects 2 separated, isolated wired networks together
Encodes a data stream onto an RF signal using the configd modulation technique
Rate this question:
5 - 10%
10 -15%
15 - 20%
20 - 25%
Rate this question:
AES
Disabled
RC4
TKIP
Rate this question:
Core -- interface for end devices
Distribution -- traffic control and security policies
Access -- interface for end devices
Distribution -- high-speed backbone
Core -- high-speed backbone
Access -- implementation of security policies
Rate this question:
48 Gbps
10 Mbps
1000 Mbps
100 Mbps
Rate this question:
Switch SW1 floods the message from Host A to all hosts attached to SW1
Switch SW1 floods the message from Host A to all hosts attached to both switches
Switch SW1 tags the frame with VLAN 10 and floods the frame to all hosts on switch SW2
Switch SW1 tags the frame with VLAN 10 and floods the frame to all hosts on switch SW2 that are members of VLAN 10
Rate this question:
Access port attached to a PC, config'd to use one VLAN for voice traffic and another VLAN for data traffic
Port on a switch that maintanis its assigned VLAN config'd until it is changed manually
Port on a switch using VMPS and associates a port to a VLAN based on the destination MAC address
Port on a switch that can change the manually assigned VLAN config'd dynamically
Access port attached to an IP phone, config'd to use one VLAN for voice traffic and another VLAN for data traffic
Port on a switch using VMPS and associates a port to a VLAN based on the source MAC address
Rate this question:
Broadcasting requests for IP addresses with spoofed MAC addresses
Using proprietary Cisco protocols to gain info about a switch
The attacker fills the switch Content Addressable Memory(CAM) table with invalid MAC addresses
Using brute force password attacks to gain access to a switch
Rate this question:
Both switches are configured to dynamic auto and will not negotiate a link
Not all the VLANs needed are allowed to traverse a trunk
Two VLANs are sharing the same address space
The VLAN configured for untagged frames is not the same on two switches connected by a trunk
Rate this question:
Connects multiple wireless clients or stations to the wired LAN
Connects 2 separated, isolated wired networks together
Encodes a data stream onto an RF signal using the configd modulation technique
Rate this question:
IP addressing
Wireless address translation
Wireless client authentication
Channel identification
Wireless client association
Rate this question:
AES
Disabled
RC4
TKIP
Rate this question:
Configures the port to negotiate a trunk
Configures the trunk to not send DTP packets
Configures the port as a permanent 802.1q trunk
Disables trunk mode
Rate this question:
Implementation of standard equipment sets for LAN design
Implementation of core-distribution-access design model for all sites in an enterprise
A point in the network where all traffic "converges" before transmission to the destination, normally the core switch
Combining conventional data with voice and video on a common network
Rate this question:
Broadcasting requests for IP addresses with spoofed MAC addresses
Using proprietary Cisco protocols to gain info about a switch
The attacker fills the switch Content Addressable Memory(CAM) table with invalid MAC addresses
Using brute force password attacks to gain access to a switch
Rate this question:
Number of ports available on a single switch
Data rate that each port on the switch is capable of attaining
Processing capabilities of a switch by quantifying performance of the switch by how much data it can process per second
Ability to utilize multiple switch ports concurrently for higher throughput data communication
Rate this question:
Show vlan id
Show vlan
Show vlan brief
Show interface f0/1 switchpot
Show interface f0/1
Rate this question:
Access port attached to a PC, config'd to use one VLAN for voice traffic and another VLAN for data traffic
Port on a switch that maintanis its assigned VLAN config'd until it is changed manually
Port on a switch using VMPS and associates a port to a VLAN based on the destination MAC address
Port on a switch that can change the manually assigned VLAN config'd dynamically
Access port attached to an IP phone, config'd to use one VLAN for voice traffic and another VLAN for data traffic
Port on a switch using VMPS and associates a port to a VLAN based on the source MAC address
Rate this question:
Broadcasting requests for IP addresses with spoofed MAC addresses
Using proprietary Cisco protocols to gain info about a switch
The attacker fills the switch Content Addressable Memory(CAM) table with invalid MAC addresses
Using brute force password attacks to gain access to a switch
Rate this question:
These devices operate at similar frequencies
These devices operate at the same frequencies and have higher RF power settings
These devices flood the entire frequency spectrum with low power noise, which may cause loss of signal for wireless devices trying to connect with an access point
The signal from the cordless device is non-polarized and combines with the access point polarized signal, thus reducing overall signal strength.
Rate this question:
1
2
4
8
12
24
Rate this question:
Show vlan id
Show vlan
Show vlan brief
Show interface f0/1 switchpot
Show interface f0/1
Rate this question:
Number of ports available on a single switch
Data rate that each port on the switch is capable of attaining
Processing capabilities of a switch by quantifying performance of the switch by how much data it can process per second
Ability to utilize multiple switch ports concurrently for higher throughput data communication
Rate this question:
Host A
Host B
Host A and B
Host A and D
Host B and D
Host A, B, and D
Rate this question:
Configures the port to negotiate a trunk
Configures the trunk to not send DTP packets
Configures the port as a permanent 802.1q trunk
Disables trunk mode
Rate this question:
PoE
VLANs
10 Gigabit Ethernet
Redundant components
Layer 3 support
Port security
Rate this question:
AES
Disabled
RC4
TKIP
Rate this question:
Both switches are configured to dynamic auto and will not negotiate a link
Not all the VLANs needed are allowed to traverse a trunk
Two VLANs are sharing the same address space
The VLAN configured for untagged frames is not the same on two switches connected by a trunk
Rate this question:
Specifies data rates of 1, 2, 5.5, and 11 Mbps due to differently sized spreading sequences specified in the DSSS modulation technique
Uses the 5.7 GHz band with less interference, but obstructions can affect performance and limit range
Uses multiple radios and antennae at endpoints, each broadcasting on the same freq to establish multiple streams
Uses the 802.11 MAC, but with higher data rates in the 2.4 GHx ISM band by using the OFDM modulation technique
Rate this question:
802.11 a
802.11 b
802.11 c
802.11 i
Rate this question:
Frames with unknown source addresses are dropped and notification is sent
Frames with unknown source addresses are dropped and no notification is sent
Frames with unknown source addresses make the port errdisabled and notification is sent
Defines the number of MAC addresses associated with a port
Allows dynamically learned MAC addresses to be stored in the running config
Rate this question:
WPA2
Use of multiple channels
Hiding the SSID
Open authentication
AES
Rate this question:
Configures the port to negotiate a trunk
Configures the trunk to not send DTP packets
Configures the port as a permanent 802.1q trunk
Disables trunk mode
Rate this question:
Port security
Layer 3 support
Redundant components
VLANs
10 Gigabit Ethernet
PoE
Rate this question:
Forward the frame out all interfaces
Forward the frame out all interfaces except interface 3
Discard the frame
Forward the frame out interface 1
Forward the frame out interface 2
Forward the frame out interface 3
Rate this question:
Predetermined number of ports
Fully redundant backplane
Support for Gigabit connectivity
Low bandwidth for inter-switch communications
PoE capability
Rate this question:
Frames with unknown source addresses are dropped and notification is sent
Frames with unknown source addresses are dropped and no notification is sent
Frames with unknown source addresses make the port errdisabled and notification is sent
Defines the number of MAC addresses associated with a port
Allows dynamically learned MAC addresses to be stored in the running config
Rate this question:
Frames with unknown source addresses are dropped and notification is sent
Frames with unknown source addresses are dropped and no notification is sent
Frames with unknown source addresses make the port errdisabled and notification is sent
Defines the number of MAC addresses associated with a port
Allows dynamically learned MAC addresses to be stored in the running config
Rate this question:
8 collision domains / 2 broadcast domains
8 collision domains / 3 broadcast domains
12 collision domains / 5 broadcast domains
13 collision domains / 2 broadcast domains
Rate this question:
Specifies data rates of 1, 2, 5.5, and 11 Mbps due to differently sized spreading sequences specified in the DSSS modulation technique
Uses the 5.7 GHz band with less interference, but obstructions can affect performance and limit range
Uses multiple radios and antennae at endpoints, each broadcasting on the same freq to establish multiple streams
Uses the 802.11 MAC, but with higher data rates in the 2.4 GHx ISM band by using the OFDM modulation technique
Rate this question:
Host 1 can ping Host 2
Host 1 cannot ping Host 2
Host 1 can ping Host 3
Host 1 cannot ping Host 3
Host 2 can ping Host 3
Host 2 cannot ping Host 3
Rate this question:
Quiz Review Timeline (Updated): Oct 5, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.