
Basic Questions
Authored by Mrtada .
Computers
Vocational training
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which two statements about the purpose of the OSI model are accurate? (Choose two)
Defines the network functions that occur at each layer
Facilitates an understanding of how information travels throughout a network
Changes in one layer do not impact other layer
Ensures reliable data delivery through its layered approach
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the default behavior of a Layer 2 switch when a frame with an unknown destination
MAC address is received?
The Layer 2 switch drops the received frame
The Layer 2 switch floods packets to all ports except the receiving port in the given VLAN
The Layer 2 switch sends a copy of a packet to CPU for destination MAC address
learning
The Layer 2 switch forwards the packet and adds the destination MAC address to Its
MAC address table
Answer explanation
If the destination MAC address is not in the CAM table (unknown destination MAC address), the switch sends the frame out all other ports that are in the same VLAN as the received frame. This is called flooding. It does not flood the frame out the same port on which the frame was received.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the destination MAC address of a broadcast frame?
00:00:0c:07:ac:01
ff:ff:ff:ff:ff:ff
43:2e:08:00:00:0c
00:00:0c:43:2e:08
00:00:0crfHfrff
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which action is taken by a switch port enabled for PoE power classification override?
When a powered device begins drawing power from a PoE switch port a syslog message
is generated
As power usage on a PoE switch port is checked data flow to the connected device is
temporarily paused
If a switch determines that a device is using less than the minimum configured power it
assumes the device has failed and disconnects
If a monitored port exceeds the maximum administrative value for power, the port is
shutdown and err-disabled
Answer explanation
PoE monitoring and policing compares the Power consumption on ports with the administrative maximum value (either a configured maximum value or the port’s default
value). If the power consumption on a monitored port exceeds the administrative maximum value, the following actions occur:
+ A syslog message is issued.
+ The monitored port is shut down and error-disabled.
+ The allocated power is freed.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In which way does a spine and-leaf architecture allow for scalability in a network when
additional access ports are required?
A spine switch and a leaf switch can be added with redundant connections between
A spine switch can be added with at least 40 GB uplinks
A leaf switch can be added with a single connection to a core spine switch
A leaf switch can be added with connections to every spine switch
Answer explanation
Spine-leaf architecture is typically deployed as two layers: spines (such as an aggregation layer), and leaves (such as an access layer). Spine-leaf topologies provide high-bandwidth, low-latency, nonblocking server-to-server connectivity.
Leaf (access) switches are what provide devices access to the fabric (the network of spine and leaf switches) and are typically deployed at the top of the rack. Generally, devices connect to the leaf switches. Devices can include servers, Layer 4-7 services (firewalls and load balancers), and WAN or Internet routers. Leaf switches do not connect to other leaf switches. In spine-and-leaf architecture, every leaf should connect to every spine in a full mesh.
Spine (aggregation) switches are used to connect to all leaf switches and are typically deployed at the end or middle of the row. Spine switches do not connect to other spine switches.
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A frame that enters a switch fails the Frame Check Sequence. Which two interface
counters are incremented? (Choose two)
runts
giants
frame
CRC
input errors
Answer explanation
Whenever the physical transmission has problems, the receiving device might receive a frame whose bits have changed values. These frames do not pass the error detection logic as implemented in the FCS field in the Ethernet trailer. The receiving device discards the frame and counts it as some kind of input error. Cisco switches list this error as a CRC error. Cyclic redundancy check (CRC) is a term related to how the FCS math detects an error.
The “input errors” includes runts, giants, no buffer, CRC, frame, overrun, and ignored counts.
The output below show the interface counters with the “show interface s0/0/0” command:
Router#show interface s0/0/0
Serial0/0/0 is up, line protocol is up
Hardware is M4T
Description: Link to R2
Internet address is 10.1.1.1/30
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
--output omitted--
5 minute output rate 0 bits/sec, 0 packets/sec
268 packets input, 24889 bytes, 0 no buffer
Received 0 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
251 packets output, 23498 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
0 output buffer failures, 0 output buffers swapped out
0 carrier transitions DCD=up DSR=up DTR=up RTS=up CTS=up
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are two reasons that cause late collisions to increment on an Ethernet interface?
(Choose two)
when the sending device waits 15 seconds before sending the frame again
when the cable length limits are exceeded
when one side of the connection is configured for half-duplex
when Carrier Sense Multiple Access/Collision Detection is used
when a collision occurs after the 32nd byte of a frame has been transmitted
Answer explanation
A late collision is defined as any collision that occurs after the first 512 bits (or 64th byte) of the frame have been transmitted. The usual possible causes are full-duplex/half-duplex mismatch, exceeded Ethernet cable length limits, or defective hardware such as incorrect cabling, non-compliant number of hubs in the network, or a bad NIC.
Late collisions should never occur in a properly designed Ethernet network. They usually occur when Ethernet cables are too long or when there are too many repeaters in the network.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?