Tag - cisco

1
Why we use Trunk Port
2
How many VLAN Create on Router
3
CCNA Switching Question
4
CCNA – EIGRP Questions
5
Short Question CCNA EIGRP

Why we use Trunk Port

Question : We can connect two switches via Ethernet cable why we use trunk port between switches ?

Ans:

Trunk links are required to pass VLAN information between switches. A port on a Cisco switch is either an access port or a trunk port. Access ports belong to a single VLAN and do not provide any identifying marks on the frames that are passed between switches. Access ports also carry traffic that comes from only the VLAN assigned to the port. A trunk port is by default a member of all the VLANs that exist on the switch and carry traffic for all those VLANs between the switches. To distinguish between the traffic flows, a trunk port must mark the frames with special tags as they pass between the switches. Trunking is a function that must be enabled on both sides of a link. If two switches are connected together, for example, both switch ports must be configured for trunking, and they must both be configured with the same tagging mechanism (ISL or 802.1Q).

Back

How many VLAN Create on Router

Ans : Vlan create on Switches not router :p

All the following information is taken from the data sheets for these devices, on the Cisco website.

  • The Cisco Catalyst 3550 switches support up to 1,005 VLANs.
  • The Cisco Cataylst 3750 switches support up to 1,005 VLANs per stack.

Both support up to 4000 VLAN IDs, but only 1,005 VLANs configured on these (some VLAN IDs will come from other switches). Unless you are a service provider, you will never configure anything like these numbers.

Please also note that the 3550 is now end-of-life, you should look at the 3560 switches instead.

 

Back

CCNA Switching Question

Question 1

Which of the following are true regarding bridges and switches? (Choose two)

A. Bridges are faster than switches because they have fewer ports.
B. A switch is a multiport bridge.
C. Bridges and switches learn MAC addresses by examining the source MAC address of each frame received.
D. A bridge will forward a broadcast but a switch will not.
E. Bridges and switches increase the size of a collision domain.

 

Answer: B C

Question 2

Which two commands correctly verily whether port security has been configured on port FastEthernet 0/12 on a switch? (Choose two)

A. SW1# show switchport port-security interface FastEthernet 0/12
B. SW1# show switchport port-secure interface FastEthernet 0/12
C. SW1# show port-security interface FastEthernet 0/12
D. SW1# show running-config

 

Answer: C D

Question 3

Assuming the default switch configuration which vlan range can be added modified and removed on a Cisco switch?

A. 2 through 1001
B. 1 through 1001
C. 1 through 1002
D. 2 through 1005

 

Answer: A

Question 4

Which set of commands is recommended to prevent the use of a hub in the access layer?

A.
switch(config-if)#switchport mode trunk
switch(config-if)#switchport port-security maximum 1

B.
switch(config-if)#switchport mode trunk
switch(config-if)#switchport port-security mac-address 1

C.
switch(config-if)#switchport mode access
switch(config-if)#switchport port-security maximum 1

D.
switch(config-if)#switchport mode access
switch(config-if)#switchport port-security mac-address 1

 

Answer: C

Explanation

Port security is only used on access port (which connects to hosts) so we need to set that port to “access” mode, then we need to specify the maximum number of hosts which are allowed to connect to this port -> C is correct.

Note: If we want to allow a fixed MAC address to connect, use the “switchport port-security mac-address <MAC address>” command.

Question 5

A Catalyst 2950 needs to be reconfigured. What steps will ensure that the old configuration is erased? (Choose three)

A. Erase flash.
B. Restart the switch.
C. Delete the VLAN database.
D. Erase the running configuration.
E. Erase the startup configuration.
F. Modify the configuration register.

 

Answer: B C E

Question 6

The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?

A. Lower the bridge priority number.
B. Change the MAC address of the switch.
C. Increase the VTP revision number for the domain.
D. Lower the root path cost on the switch ports.
E. Assign the switch an IP address with the lowest value.

 

Answer: A

Question 7

Which two of these are characteristics of the 802.1Q protocol? (Choose two)

A. It is a layer 2 messaging protocol which maintains vlan configurations across network.
B. It includes an 8-bit field which specifies the priority of a frame.
C. It is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.
D. It modifies the 802.3 frame header and thus requires that the FCS be recomputed.
E. It is a trunking protocol capable of earring untagged frames.

 

Answer: D E

Explanation

IEEE 802.1Q is the networking standard that supports Virtual LANs (VLANs) on an Ethernet network. It is a protocol that allows VLANs to communicate with one another using a router. 802.1Q trunks support tagged and untagged frames.

If a switch receives untagged frames on a trunk port, it believes that frame is a part of the native VLAN. Also, frames from a native VLAN are not tagged when exiting the switch via a trunk port.

The 802.1q frame format is same as 802.3. The only change is the addition of 4 bytes fields. That additional header includes a field with which to identify the VLAN number. Because inserting this header changes the frame, 802.1Q encapsulation forces a recalculation of the original FCS field in the Ethernet trailer.

Note: Frame Check Sequence (FCS) is a four-octet field used to verify that the frame was received without loss or error. FCS is based on the contents of the entire frame.

Question 8

What are two advantages of Layer 2 Ethernet switches over hubs? (Choose two)

A. decreasing the number of collision domains
B. filtering frames based on MAC addresses
C. allowing simultaneous frame transmissions
D. increasing the size of broadcast domains
E. increasing the maximum length of UTP cabling between devices

 

Answer: B C

Explanation

Hub is considered a layer 1 device. When a packet arrives at one port, it is copied to the other ports without checking the content of that packet.

Switch operates at layer 2. When a packet arrives at one port, it checks in its database (based on MAC address) to see which port it should forward that packet out -> B is correct.

Remember that hubs can only communicate in half duplex mode, which means that a computer can only send data when it is not receiving. Switches can run in full duplex mode, which allows data to be sent and received at the same time. Switches effectively double the speed of the network when compared to hubs -> C is correct.

Switch increases the number of collision domains (which is better) -> A is not correct.

Switch does not have any effect on the size of broadcast domains. When using switch, the size of broadcast domains remain the same -> D is not correct.

Both hub and switch increase the maximum length of UTP cabling between devices so it is not an advantage of switch over hub -> E is not correct.

Question 9

Which command will show the MAC addresses of stations connected to switch ports?

A. show mac-address
B. show arp
C. show table
D. show switchport

 

Answer: B

Explanation

There is no “show mac-address” command. But notice the “show mac-address-table” and “show mac address-table” do exist.

If option A is “show mac-address-table” then both A & B are correct!

CCNA – EIGRP Questions

Here you will find answers to EIGRP Questions

Question 2:

As a Cisco technician, you need to know EIGRP protocol very well. Which of the following is true about EIGRP successor routes? (Choose two)

A – A successor route is used by EIGRP to forward traffic to a destination
B – Successor routes are stored in the neighbor table following the discovery process
C – Successor routes are flagged as “active” in the routing table
D – A successor route may be backed up by a feasible successor route

Answer: A D

Explanation:

B is not correct because neighbor table only contains a list of directly connected EIGRP routers that have an adjacency with this router, it doesn’t contain successor routes.

C is not correct because successor routes are not flagged as “active”, they are always the best route to reach remote networks and are always used to send packets.

A and D are correct because successor route is the best and primary route to a remote network. It is stored in the routing table and topology table. If this route fails, a backup route (called feasible successor route) in the topology table will be used to route traffic to a destination.

Question 3:

Which two statements are true regarding EIGRP? (Choose two)

A – Passive routes are in the process of being calculated by DUAL
B – EIGRP supports VLSM, route summarization, and routing update authentication
C – EIGRP exchanges full routing table information with neighboring routers with every update
D – If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route
E – A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information

Answer: B E

Explanation:

Diffusing Update Algorithm (DUAL) is the algorithm for selecting and maintaining the best path to each remote network. DUAL tracks all the routes advertised by neighbors and selects routes based on feasible successors. It inserts lowest cost paths into the routing table (these routes are known as primary routes or successor routes) -> A is not correct.

EIGRP is still a distance-vector protocol, but has certain features that belong to link-state algorithms (like OSPF) than distance-vector algorithms. For example, EIGRP sends a partial routing table update, which includes just routes that have been changed, not the full routing table like distance-vector algorithms -> C is not correct.

The feasible successor route will become the primary route when its advertised distance is higher than the feasible distance of the successor route. The feasible successor route can be used in the event that the successor route goes down. Notice that the feasible successor route does not get installed in the routing table but is kept in the topology table as a backup route -> D is not correct.

“Support VLSM, route summarization, and routing update authentication” are the features of EIGRP -> B is correct.

When a route fails and has no feasible successor, EIGRP uses a distributed algorithm called Diffusing Update Algorithm (DUAL) to discover a replacement for a failed route. When a new route is found, DUAL adds it to the routing table -> E is correct.

Short Question CCNA EIGRP

146- After how long keep alive messages exchange in EIGRP?

5 SECONDS

147- Which type of updates EIGRP protocol do?

INCREMENTAL UPDATES (CHANGE BASE)

148- What is the draw back of EIGRP protocol?

CONFIGURE ONLY ON CISCO ROUTERS

149- What is the matric of EIGRP protocol?

i) Bandwidth

ii) Load

iii) Delay

iv) Reliability

v) MTU

vi) Maximum Transmission Unit

150- In EIGRP metric parameters which 2 Options are enable by default?

i) Bandwidth

ii) Delay

151- Which protocol can do load balancing on unequal cost also?

EIGRP

152- 1350 value in which type of Access-list?

STANDARD ACCESS-LIST

153- 1900 value in which type of Access list?

STANDARD ACCESS-LIST

154- 2500 value in which type of Access list?

EXTENDED ACCESS-LIST

155- What is the difference between named and Extended ACL?

In named Access-list we can edit and also give name

156- When we use standard Access-List?

When there is no Destination

157- When we use extended Access-List?

When there is source and Destination

158- What is the default behavior of Access-List?

Deny

159- On which interface we always Apply Access-List?

Fast Ethernet

160- Wild card mask always in odd value or even

ODD

CCNA Interview Question Part 1

CCNA Interview Question Part 2

CCNA Interview Question Part 3

CCNA Interview Question Part 4

CCNA Interview Question Part 5

CCNA Interview Question Part 6

CCNA Interview Question Part 7

CCNA Interview Question Part 8

CCNA Interview Question Part 9

CCNA Interview Question Part 10

CCNA Interview Question Part 11

CCNA Interview Question Part 12

CCNA Interview Question Part 13

CCNA Interview Question Part 14

Copyright © 2024. Created by IT Learning. Powered by DumpsForAll | Terms of Use | Privacy Policy