Difference: ICNDChapter2 (5 vs. 6)

Revision 62013-02-18 - JimSkon

Line: 1 to 1
 
META TOPICPARENT name="CiscoICND1Prep"

Chapter 2. Switching Foundations

Line: 358 to 358
 
Changed:
<
<
15. Refer to . HostA sends a single message into the switch. HostB , HostC , and HostD receive the message while HostE and HostF do not. What type of message was sent by HostA ?
>
>
15. Refer to figure 2.1 . HostA sends a single message into the switch. HostB , HostC , and HostD receive the message while HostE and HostF do not. What type of message was sent by HostA ?
 
Figure 2.1. Network diagram.
Line: 413 to 413
 
Changed:
<
<
17. Refer to . You have just finished configuring SwitchB , shown in the network diagram. You have tested SSH connectivity from HostD successfully; however, the junior network administrator is unable to connect from HostA . Further testing reveals that HostA can ping HostD , but cannot ping SwitchB . What is the most likely cause of the problem?
>
>
17. Refer to figure 2.2. You have just finished configuring SwitchB , shown in the network diagram. You have tested SSH connectivity from HostD successfully; however, the junior network administrator is unable to connect from HostA . Further testing reveals that HostA can ping HostD , but cannot ping SwitchB . What is the most likely cause of the problem?
 
Figure 2.2. Network diagram.
Line: 444 to 444
 
18. One of your users is reporting a slow connection speed to the corporate server from his PC. Further investigation reveals that the PC is connected to FastEthernet 0/18. You perform the following show command from the switch:
Deleted:
<
<
Code View: Scroll /
 
CAT3550#show interfaces FastEthernet 0/23
FastEthernet0/23 is up, line protocol is up (connected)
  Hardware is Fast Ethernet, address is 000c.854c.0517 (bia 000c.854c.0517)

Line: 476 to 475
 
Changed:
<
<
Based on this output, what is the most likely cause of the problem?
>
>
<Based on this output, what is the most likely cause of the problem?
 

Changed:
<
<
The user is sending too much traffic and is likely saturating the link.
>
>
The user is sending too much traffic and is likely saturating the link.
 
  • Changed:
    <
    <
    The Ethernet cable length between the host and the server is too long.
    >
    >
    The Ethernet cable length between the host and the server is too long.
     
  • Changed:
    <
    <
    The switch is not configured to handle the multicast messages it is receiving.
    >
    >
    The switch is not configured to handle the multicast messages it is receiving.
     
  • Line: 497 to 496
     
    Changed:
    <
    <
    19. How do two devices connected to a LAN respond when a collision is detected?
    >
    >
    19. How do two devices connected to a LAN respond when a collision is detected?
     

    Changed:
    <
    <
    The devices will first transmit a jam signal.
    >
    >
    The devices will first transmit a jam signal.
     
  • Changed:
    <
    <
    The devices will wait a specific amount of time and then retransmit their data.
    >
    >
    The devices will wait a specific amount of time and then retransmit their data.
     
  • Changed:
    <
    <
    The devices will ignore the collision and continue to transmit data.
    >
    >
    The devices will ignore the collision and continue to transmit data.
     
  • Changed:
    <
    <
    One device will transmit a specialized beam using the Ethernet cable, which causes the other device to melt.
    >
    >
    One device will transmit a specialized beam using the Ethernet cable, which causes the other device to melt.
     
    Changed:
    <
    <
    20. Some users in your organization have reported network connectivity issues from their PCs. While physically inspecting the switch, you notice that the System LED is blinking green. What does this indicate?
    >
    >
    20. Some users in your organization have reported network connectivity issues from their PCs. While physically inspecting the switch, you notice that the System LED is blinking green. What does this indicate?
     
    Line: 529 to 528
     
  • Changed:
    <
    <
    One or more of the ports on the switch are experiencing a speed or duplex mismatch.
    >
    >
    One or more of the ports on the switch are experiencing a speed or duplex mismatch.
     
  • Changed:
    <
    <
    The devices attached to the switch have flapping interfaces.
    >
    >
    The devices attached to the switch have flapping interfaces.
     
  • Line: 541 to 540
     
    Changed:
    <
    <
    21. Telnet sessions to one of your switches in your organization continually fail. After connecting to the console port of your switch, you execute the following command:
    >
    >
    21. Telnet sessions to one of your switches in your organization continually fail. After connecting to the console port of your switch, you execute the following command:
     
    Deleted:
    <
    <
    Code View: Scroll /
     
    CAT3550#show interfaces vlan 1
    Vlan1 is administratively down, line protocol is down
      Hardware is EtherSVI, address is 000c.854c.0500 (bia 000c.854c.0500)
    
    
    Line: 569 to 567
     
    Changed:
    <
    <
    What is the cause of the problem?
    >
    >
    What is the cause of the problem?
     

    Changed:
    <
    <
    The interface has an unusually high number of output drops.
    >
    >
    he interface has an unusually high number of output drops.
     
  • Line: 590 to 588
     
    Changed:
    <
    <
    22. You want to configure the IP default gateway to 192.168.1.1 on your Catalyst switch. Which of the following commands will accomplish this objective?
    >
    >
    22. You want to configure the IP default gateway to 192.168.1.1 on your Catalyst switch. Which of the following commands will accomplish this objective?
     
    Line: 608 to 606
     
  • Changed:
    <
    <
    Switch(config-if)#ip address 192.168.1.1 255.255.255.0
    >
    >
    Switch(config-if)#ip address 192.168.1.1 255.255.255.0
     
    Changed:
    <
    <
    23. Observe the following output:
    >
    >
    23. Observe the following output:
     
    Deleted:
    <
    <
    Code View: Scroll /
     
    Cisco IOS Software, C3550 Software (C3550-I5K91L2Q3-M), Version 12.2(25)SEA, RELEASE SOFTWARE (fc)
    Copyright (c) 1986-2005 by Cisco Systems, Inc.
    Compiled Tue 25-Jan-05 23:50 by antonino
    
    
    Line: 670 to 667
     
    Changed:
    <
    <
    24. Observe the following output:
    >
    >
    24. Observe the following output:
      Code View: Scroll /
    CAT3550#show mac-address-table
    
    
    Line: 698 to 695
     
    Changed:
    <
    <
    How did the Static and Dynamic MAC addresses end up in the CAM table?
    >
    >
    How did the Static and Dynamic MAC addresses end up in the CAM table?
     

    Changed:
    <
    <
    The Static MAC addresses had to be input by an administrator; the Dynamic MAC addresses were learned by the switch.
    >
    >
    The Static MAC addresses had to be input by an administrator; the Dynamic MAC addresses were learned by the switch.
     
  • Changed:
    <
    <
    The Static MAC addresses belong to the switch itself; the Dynamic MAC addresses were learned by the switch.
    >
    >
    The Static MAC addresses belong to the switch itself; the Dynamic MAC addresses were learned by the switch.
     
  • Changed:
    <
    <
    The Static MAC addresses had to be learned by the switch; the Dynamic MAC addresses were input by an administrator.
    >
    >
    The Static MAC addresses had to be learned by the switch; the Dynamic MAC addresses were input by an administrator.
     
  • Changed:
    <
    <
    The Static MAC addresses are reversed duplicates of the Dynamic MAC addresses and were learned by the switch.
    >
    >
    The Static MAC addresses are reversed duplicates of the Dynamic MAC addresses and were learned by the switch.
     
    Changed:
    <
    <
    25. The switch pictured in receives a frame destined for the MAC address 00aa:911b:9cc3. How is this frame handled?
    >
    >
    25. The switch pictured in figure 2.2 receives a frame destined for the MAC address 00aa:911b:9cc3. How is this frame handled?
     
    Figure 2.3. Network diagram.
    Line: 728 to 725
     
    Changed:
    <
    <
    The frame is dropped.
    >
    >
    The frame is dropped.
     
  • Changed:
    <
    <
    The frame is sent out Fa0/3.
    >
    >
    The frame is sent out Fa0/3.
     
  • Line: 740 to 737
     
  • Changed:
    <
    <
    The frame is sent out all ports with the exception of the port on which it was received.
    >
    >
    The frame is sent out all ports with the exception of the port on which it was received.
     
    Changed:
    <
    <
    26. You want to implement port security in your company to protect against unauthorized network access. After logging in to the switch, you enter the following commands:
    >
    >
    26. You want to implement port security in your company to protect against unauthorized network access. After logging in to the switch, you enter the following commands:
     
    Switch(config)#interface range fa0/1-20
    Switch(config-if-range)#switchport mode access
    
    
    Line: 758 to 755
     
    Changed:
    <
    <
    Port security is enabled, and ports are limited to a maximum of one violation per port. The first MAC address to transmit data on the port will be the only MAC address allowed. After a second violation has occurred, the interface will shut down.
    >
    >
    Port security is enabled, and ports are limited to a maximum of one violation per port. The first MAC address to transmit data on the port will be the only MAC address allowed. After a second violation has occurred, the interface will shut down.
     
  • Changed:
    <
    <
    Port security is enabled, and the port is limited to an access port, which can only be used between switches. Only one upstream switch is allowed to connect to the port. All MAC addresses learned on the port will “stick” to the interface. If more than one upstream switch is attached, the port will shut down.
    >
    >
    Port security is enabled, and the port is limited to an access port, which can only be used between switches. Only one upstream switch is allowed to connect to the port. All MAC addresses learned on the port will “stick” to the interface. If more than one upstream switch is attached, the port will shut down.
     
  • Changed:
    <
    <
    Port security is enabled, and ports are limited to a maximum of one MAC address each. The first MAC address to transmit data on the port will be the only MAC address allowed. Any other MAC addresses will cause the interface to enter an err-disabled state.
    >
    >
    Port security is enabled, and ports are limited to a maximum of one MAC address each. The first MAC address to transmit data on the port will be the only MAC address allowed. Any other MAC addresses will cause the interface to enter an err-disabled state.
     
  • Changed:
    <
    <
    Port security is not enabled because the syntax “switchport port-security on” was not used. All other port-security commands will not take effect until this command is entered.
    >
    >
    Port security is not enabled because the syntax “switchport port-security on” was not used. All other port-security commands will not take effect until this command is entered.
     
    Changed:
    <
    <
    27. The switch pictured in does not have a green or amber light on the FastEthernet ports shown in the figure. What areas would you inspect on the switch? (Choose three.)
    >
    >
    27. The switch pictured in figure 2.4 does not have a green or amber light on the FastEthernet ports shown in the figure. What areas would you inspect on the switch? (Choose three.)
     
    Figure 2.4. Network diagram.
    Line: 783 to 780
     
    Changed:
    <
    <
    Ensure the cables being used are crossover cables.
    >
    >
    Ensure the cables being used are crossover cables.
     
  • Line: 807 to 804
     
    Changed:
    <
    <
    28. Workstation A needs to be able to telnet to SW_B (shown in ). What must be configured to make this connection possible?
    >
    >
    28. Workstation A needs to be able to telnet to SW_B (shown in figure 2.5). What must be configured to make this connection possible?
     
    Figure 2.5. Network diagram.
    Line: 836 to 833
     
    Changed:
    <
    <
    29. What are two advantages of switches over hubs? (Choose two.)
    >
    >
    29. What are two advantages of switches over hubs? (Choose two.)
     
    Line: 846 to 843
     
  • Changed:
    <
    <
    Increasing the maximum length of Category 5 UTP cable between devices
    >
    >
    Increasing the maximum length of Category 5 UTP cable between devices
     
  • Line: 858 to 855
     
  • Changed:
    <
    <
    Filtering frames based on the MAC address fields in the header
    >
    >
    Filtering frames based on the MAC address fields in the header
     
    Changed:
    <
    <
    30. What is the effect of entering the following command on a switch?
    >
    >
    <30. What is the effect of entering the following command on a switch?
     
    Switch(config)#service password-encryption
     
    This site is powered by the TWiki collaboration platformCopyright &© by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
    Ideas, requests, problems regarding TWiki? Send feedback