Difference: ICNDChapter2 (2 vs. 3)

Revision 32013-02-06 - JimSkon

Line: 1 to 1
 
META TOPICPARENT name="CiscoICND1Prep"

Chapter 2. Switching Foundations

Line: 14 to 14
 
  • Verify network status and switch operation using basic utilities (including ping, traceroute, telnet, SSH, arp, ipconfig), and theSHOW and DEBUG commands.

  • Implement and verify basic security for a switch (port security, deactivate ports).

  • Identify, prescribe, and resolve common switched network media issues, configuration issues, auto-negotiation, and switch hardware failures.

Changed:
<
<
1. In today’s networks, more and more corporations are replacing hubs with switches. Which of the following is a reason for switching to a Catalyst switch from a hub?
>
>

1. In today’s networks, more and more corporations are replacing hubs with switches. Which of the following is a reason for switching to a Catalyst switch from a hub?
 
Line: 64 to 66
 
3. What are the default configuration settings on a Catalyst switch? (Choose three.)
Changed:
<
<
<table cellspacing="0" cellpadding="5" frame="void" rules="none" border="0"> <colgroup align="left" span="2"> <td align="left" valign="top">
>
>
<table cellspacing="0" cellpadding="5" frame="void" rules="none" border="0"> <colgroup align="left" span="2">
 
Line: 95 to 95
 
Changed:
<
<
4. A junior network administrator at your company asks you to brief him on the differences and similarities between bridges and switches. What should you tell him? (Choose two.)
>
>
4. A junior network administrator at your company asks you to brief him on the differences and similarities between bridges and switches. What should you tell him? (Choose two.)
 

Line: 117 to 116
 
Changed:
<
<
5. You are configuring a switch for remote access. What command must be issued in Global Configuration mode to allow the switch to be accessed from a subnet other than its own?
>
>
5. You are configuring a switch for remote access. What command must be issued in Global Configuration mode to allow the switch to be accessed from a subnet other than its own?
 

Line: 139 to 137
 
Changed:
<
<
6. While verifying some configurations on your switch, you see that the Spanning-Tree Protocol (STP) is enabled. The junior network administrator working with you at the time asks you what STP does. What do you tell her?
>
>
6. While verifying some configurations on your switch, you see that the Spanning-Tree Protocol (STP) is enabled. The junior network administrator working with you at the time asks you what STP does. What do you tell her?
 

Line: 161 to 158
 
Changed:
<
<
7. What is the effective throughput for each of 24 PCs connecting to a Catalyst switch’s FastEthernet ports operating in half-duplex mode?
>
>
7. What is the effective throughput for each of 24 PCs connecting to a Catalyst switch’s FastEthernet ports operating in half-duplex mode?
 

Line: 183 to 179
 
Changed:
<
<
8. You want to configure the FastEthernet 0/20 port on your Catalyst switch for port security. If anyone other than the MAC address 0001.3232.AABB connects to the port, it should immediately shut down. Which of the following configurations accomplishes this objective?
>
>
8. You want to configure the FastEthernet 0/20 port on your Catalyst switch for port security. If anyone other than the MAC address 0001.3232.AABB connects to the port, it should immediately shut down. Which of the following configurations accomplishes this objective?
 
A.

interface fa0/20

Line: 899 to 894
 

QuizSolutionsCh2ICND1

Changed:
<
<
>
>
 \ No newline at end of file
 
This site is powered by the TWiki collaboration platformCopyright &© by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback