Search Header Logo

Basic Questions

Authored by Mrtada .

Computers

Vocational training

Used 4+ times

Basic Questions
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which two statements about the purpose of the OSI model are accurate? (Choose two)

Defines the network functions that occur at each layer

Facilitates an understanding of how information travels throughout a network

Changes in one layer do not impact other layer

Ensures reliable data delivery through its layered approach

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the default behavior of a Layer 2 switch when a frame with an unknown destination

MAC address is received?

The Layer 2 switch drops the received frame

The Layer 2 switch floods packets to all ports except the receiving port in the given VLAN

The Layer 2 switch sends a copy of a packet to CPU for destination MAC address

learning

The Layer 2 switch forwards the packet and adds the destination MAC address to Its

MAC address table

Answer explanation

If the destination MAC address is not in the CAM table (unknown destination MAC address), the switch sends the frame out all other ports that are in the same VLAN as the received frame. This is called flooding. It does not flood the frame out the same port on which the frame was received.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the destination MAC address of a broadcast frame?

00:00:0c:07:ac:01

ff:ff:ff:ff:ff:ff

43:2e:08:00:00:0c

00:00:0c:43:2e:08

00:00:0crfHfrff

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which action is taken by a switch port enabled for PoE power classification override?

When a powered device begins drawing power from a PoE switch port a syslog message

is generated

As power usage on a PoE switch port is checked data flow to the connected device is

temporarily paused

If a switch determines that a device is using less than the minimum configured power it

assumes the device has failed and disconnects

If a monitored port exceeds the maximum administrative value for power, the port is

shutdown and err-disabled

Answer explanation

PoE monitoring and policing compares the Power consumption on ports with the administrative maximum value (either a configured maximum value or the port’s default

value). If the power consumption on a monitored port exceeds the administrative maximum value, the following actions occur:

+ A syslog message is issued.

+ The monitored port is shut down and error-disabled.

+ The allocated power is freed.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which way does a spine and-leaf architecture allow for scalability in a network when

additional access ports are required?

A spine switch and a leaf switch can be added with redundant connections between

A spine switch can be added with at least 40 GB uplinks

A leaf switch can be added with a single connection to a core spine switch

A leaf switch can be added with connections to every spine switch

Answer explanation

Media Image

Spine-leaf architecture is typically deployed as two layers: spines (such as an aggregation layer), and leaves (such as an access layer). Spine-leaf topologies provide high-bandwidth, low-latency, nonblocking server-to-server connectivity.

Leaf (access) switches are what provide devices access to the fabric (the network of spine and leaf switches) and are typically deployed at the top of the rack. Generally, devices connect to the leaf switches. Devices can include servers, Layer 4-7 services (firewalls and load balancers), and WAN or Internet routers. Leaf switches do not connect to other leaf switches. In spine-and-leaf architecture, every leaf should connect to every spine in a full mesh.

Spine (aggregation) switches are used to connect to all leaf switches and are typically deployed at the end or middle of the row. Spine switches do not connect to other spine switches.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A frame that enters a switch fails the Frame Check Sequence. Which two interface

counters are incremented? (Choose two)

runts

giants

frame

CRC

input errors

Answer explanation

Whenever the physical transmission has problems, the receiving device might receive a frame whose bits have changed values. These frames do not pass the error detection logic as implemented in the FCS field in the Ethernet trailer. The receiving device discards the frame and counts it as some kind of input error. Cisco switches list this error as a CRC error. Cyclic redundancy check (CRC) is a term related to how the FCS math detects an error.

The “input errors” includes runts, giants, no buffer, CRC, frame, overrun, and ignored counts.

The output below show the interface counters with the “show interface s0/0/0” command:

Router#show interface s0/0/0

Serial0/0/0 is up, line protocol is up 

  Hardware is M4T

  Description: Link to R2

  Internet address is 10.1.1.1/30

  MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, 

     reliability 255/255, txload 1/255, rxload 1/255

  --output omitted--

  5 minute output rate 0 bits/sec, 0 packets/sec

     268 packets input, 24889 bytes, 0 no buffer

     Received 0 broadcasts, 0 runts, 0 giants, 0 throttles

     0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort

     251 packets output, 23498 bytes, 0 underruns

     0 output errors, 0 collisions, 0 interface resets

     0 output buffer failures, 0 output buffers swapped out

     0 carrier transitions     DCD=up  DSR=up  DTR=up  RTS=up  CTS=up

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two reasons that cause late collisions to increment on an Ethernet interface?

(Choose two)

when the sending device waits 15 seconds before sending the frame again

when the cable length limits are exceeded

when one side of the connection is configured for half-duplex

when Carrier Sense Multiple Access/Collision Detection is used

when a collision occurs after the 32nd byte of a frame has been transmitted

Answer explanation

A late collision is defined as any collision that occurs after the first 512 bits (or 64th byte) of the frame have been transmitted. The usual possible causes are full-duplex/half-duplex mismatch, exceeded Ethernet cable length limits, or defective hardware such as incorrect cabling, non-compliant number of hubs in the network, or a bad NIC.

Late collisions should never occur in a properly designed Ethernet network. They usually occur when Ethernet cables are too long or when there are too many repeaters in the network.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?