Call
whatsapp
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
Cisco Training in Trivandrum, Trinity Technologies

No.1 Training Institute in Kerala

CCNA QUESTIONS : PART 8

What are three benefits of implementing VLANs? (Choose three.)

 

A higher level of network security can be reached by separating sensitive data traffic from other network traffic.

 A more efficient use of bandwidth can be achieved allowing many physical groups to use the same network infrastructure.

A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure.

 Broadcast storms can be mitigated by increasing the number of broadcast domains, thus reducing their size.

 Broadcast storms can be mitigated by decreasing the number of broadcast domains, thus increasing their size.

VLANs make it easier for IT staff to configure new logical groups, because the VLANs all belong to the same broadcast
domain.

 Port-based VLANs increase switch-port use efficiency, thanks to 802.1Q trunks.

SHOW ANSWER

Which three statements accurately describe Layer 2 Ethernet switches? (Choose three.)

 

Spanning Tree Protocol allows switches to automatically share VLAN information.

 Establishing VLANs increases the number of broadcast domains.

 Switches that are configured with VLANs make forwarding decisions based on both Layer 2 and Layer 3 address
information.

 Microsegmentation decreases the number of collisions on the network.

 In a properly functioning network with redundant switched paths, each switched segment will contain one root bridge with all
its ports in the forwarding state. All other switches in that broadcast domain will have only one root port.

 If a switch receives a frame for an unknown destination, it uses ARP to resolve the address.

SHOW ANSWER

When an interface is configured with PortFast BPDU guard, how does the interface respond when
it receives a BPDU?

 

It continues operating normally.

 It goes into a down/down state.

 It becomes the root bridge for the configured VLAN.

 It goes into an errdisable state.

SHOW ANSWER

What is the status of port-channel if LACP is misconfigured?

 

Forwarding

 Enabled

Disabled

 Errdisabled

SHOW ANSWER

What is true about DTP? (Choose Three.)

 

Layer 2 protocol

 Layer 3 protocol

Proprietary protocol

enabled by default

 disabled by default

SHOW ANSWER

How to create a trunk port and allow VLAN 20? (Choose Three.)

switchport trunk encapsulation dot1q

 switchport mode trunk

 switchport trunk allowed vlan 20

 switchport trunk native vlan 20

switchport mode dynamic desirable

SHOW ANSWER

Which mode is compatible with Trunk, Access, and desirable ports?

 

Trunk Ports

 Access Ports

 Dynamic Auto

Dynamic Desirable

SHOW ANSWER

Two hosts are attached to a switch with the default configuration. Which statement about the
configuration is true?

 

 IP routing must be enabled to allow the two hosts to communicate.

 The two hosts are in the same broadcast domain.

 The switch must be configured with a VLAN to allow the two hosts to communicate.

 Port security prevents the hosts from connecting to the switch.

SHOW ANSWER

What parameter can be different on ports within an EtherChannel?

 

speed

 DTP negotiation settings

 trunk encapsulation

 duplex

SHOW ANSWER

Which spanning-tree protocol rides on top of another spanning-tree protocol?

MSTP

 RSTP

PVST+

 Mono Spanning Tree

SHOW ANSWER

A network administrator needs to configure port security on a switch. Which two statements are
true? (Choose two.)

The network administrator can apply port security to dynamic access ports.

The network administrator can apply port security to EtherChannels.

The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.

When dynamic MAC address learning is enabled on an interface, the switch can learn new addresses, up to the
maximum defined.

 The network administrator can configure static secure or sticky secure MAC addresses in the voice VLAN

SHOW ANSWER

Which switching method duplicates the first six bytes of a frame before making a switching
decision?

 

fragment-free switching

 store-and-forward switching

 cut-through switching

 ASIC switching

SHOW ANSWER

Which command can you enter to determine whether a switch is operating in trunking mode?

show ip interface brief

 show vlan

show interfaces

show interface switchport

SHOW ANSWER
BACK | NEXT
TRINITY SOFTWARE SOLUTIONS
IInd floor, Radheyam Towers, Gandhari Amman Kovil Road, Pulimood, Trivandrum - 1
0471-2334855 | 2335855 | 9447387064 | 9847003556 info@trinitytechnology.in