77范文网 - 专业文章范例文档资料分享平台

SWITCH交换机基础知识(5)

来源:网络收集 时间:2019-06-17 下载这篇文档 手机版
说明:文章内容仅供预览,部分内容可能不全,需要完整文档或者需要复制内容,请下载word后使用。下载word有问题请添加微信号:或QQ: 处理(尽可能给您提供完整文档),感谢您的支持与谅解。点击这里给我发消息

Refer to the exhibit. A technician has configured the FastEthernet 0/1 interface on Sw11 as an access link in VLAN 1. Based on the output from the show vlan brief command issued on Sw12, what will be the result of making this change on Sw11?

A. Only the hosts in VLAN 1 on the two switches will be able to communicate with each other. B. The hosts in all VLANs on the two switches will be able to communicate with each other. C. Only the hosts in VLAN 10 and VLAN 15 on the two switches will be able to communicate with each other.

D. Hosts will not be able to communicate between the two switches. Answer: A

在VLAN环境中,,如果没有置TRUNK,那么它默认会传送VLAN1 也就是管理LAN 的信息

配置成trunk的端口,不会出现在vlan列表中。

Answer: E. 可以这么说 当时老师讲的时候讲了一大堆 但结果还是mac低的留下。。。

You have a server that's directly connected to a Cisco switch by way of its Fa0/1 port, and you don't want any other MAC addresses from any other servers to access this port. How would you accomplish this? (Select two answer choices) A. Configure port Fa0/1 to accept connections only from the static IP address of the server.

B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.

C. Configure the MAC address of the server as a static entry associated with port Fa0/1.

D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.

E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.

F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1. Answer: C, E

Explanation: You can configure a MAC address to be associated only with a particular port, with the restriction that frames destined to that MAC address have to enter through that particular port. So answer choice C is correct.

By default, which of the following factors determines the spanning-tree path

cost?

A. It is the individual link cost based on latency B. It is the sum of the costs based on bandwidth C. It is the total hop count

D. It is dynamically determined based on load Answer: B

There are 4 STP states that a bridge port can be in: Blocking, Listening, Learning, and Forwarding:

The Testking switched LAN is displayed in the network below:

In the network shown in the diagram, which ports on Switch2 are receiving BPDUs?

A. Fa 0/1 only B. Fa 0/2 only C. Fa 0/3 only

D. Fa 0/1 and Fa 0/2 only E. Fa 0/1 and Fa 0/3 only F. All three ports

Answer: E ??F

In which Spanning-Tree states does a switch port learn MAC addresses? (Select two)

A. Blocking B. Listening C. Forwarding D. Learning E. Relaying Answer: C, D

* Listening - Listens to incoming Hello messages to ensure that there are no loops, but does not forward traffic or learn MAC addresses on the interface.

* Learning -learns MAC addresses and builds a filter table but does not forward frames.

* Forwarding - Sends and receives all data on the bridged port. * Blocking - are used to prevent network loops.

On a half-duplex Ethernet LAN, two hosts attempt to send data simultaneously, resulting in a collision. Following this collision, what will the hosts do? (Select all valid answers)

A. The destination host sends a request to the source for retransmission. B. The jam signal indicates that the collision has been cleared.

C. The hosts will attempt to resume transmission after a time delay has expired.

D. An electrical pulse indicates that the collision has cleared.

E. The router on the segment will signal that the collision has cleared.

F. The hosts will do nothing, as the higher layers are responsible for data error correction and re-transmission. Answer: C Explanation:

When a host on an Ethernet LAN has information to send, the following steps are taken:

1. A device with a frame to send listens until Ethernet is not busy. 2. When the Ethernet is not busy, the sender begins sending the frame. 3. The sender listens to make sure that no collision occurred.

4. Once the senders hear the collision, they each send a jamming signal, to ensure that all stations recognize the collision.

5. After the jamming is complete, each sender randomizes a timer and waits that long. 6. When each timer expires, the process starts over with step 1.

half-duplex and full-duplex Ethernet? (Select two answer choices.) A. Full-duplex Ethernet uses CSMA/CD to prevent collisions.

B. Half-duplex Ethernet uses a loopback circuit to detect collisions. C. A full-duplex Ethernet card allows 20Mbps for data transmission. D. Full-duplex Ethernet makes use of two pairs of wires for data.

E. An Ethernet hub can operate both half and full duplex simultaneously. Answer: B, D

What are the differences between full-duplex Ethernet and half-duplex Ethernet? (Select

all that apply)

A. Half-duplex Ethernet operates in a shared collision domain. B. Full-duplex Ethernet has a lower effective throughput.

C. Half-duplex Ethernet operates in a private collision domain. D. Full-duplex Ethernet allows two-way communication.

E. Half-duplex Ethernet operates in a private broadcast domain. Answer: A, D

Two stations on a LAN transmit at the same time, resulting in a collision. What happens when a collision occurs on the network? (Choose all that apply) A. Each device on the Ethernet segment stops transmitting for a short time. B. A jam signal informs all devices that a collision occurred.

C. When data transmission resumes, the devices that were involved in the collision have priority to transmit.

D. The devices that are involved in the collision stops transmitting for a short time. E. The collision invokes a random back-off algorithm. Answer: B, D, E

With regard to Ethernet media access methods, which of the following are true? (Choose all that apply.)

A. A device waits for an electronic signal before transmitting.

B. A device listens and waits until the media is not busy before transmitting.

C. All devices on an Ethernet segment see data that passes on the network medium. D. Only the sender and the receiver devices see data that passes on the network medium.

E. Ethernet networks allow you to configured devises with higher transmission priority.

Answer: B, C

百度搜索“77cn”或“免费范文网”即可找到本站免费阅读全部范文。收藏本站方便下次阅读,免费范文网,提供经典小说综合文库SWITCH交换机基础知识(5)在线全文阅读。

SWITCH交换机基础知识(5).doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印 下载失败或者文档不完整,请联系客服人员解决!
本文链接:https://www.77cn.com.cn/wenku/zonghe/660732.html(转载请注明文章来源)
Copyright © 2008-2022 免费范文网 版权所有
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ: 邮箱:tiandhx2@hotmail.com
苏ICP备16052595号-18
× 注册会员免费下载(下载后可以自由复制和排版)
注册会员下载
全站内容免费自由复制
注册会员下载
全站内容免费自由复制
注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: