Home > CCNA – Switch Questions

CCNA – Switch Questions

February 22nd, 2011 Go to comments

Here you will find answers about Switch Questions – Part 1

Question 1

Which two commands can be used to verify a trunk link configuration status on a Cisco switch? (choose two)

A. show interfaces trunk
B. show interfaces switchport
C. show ip interface brief
D. show interfaces vlan

 

Answer: A B

Explanation

The “show interfaces trunk” command and “show interfaces switchport” command can be used to verify the status of an interface (trunking or not). The outputs of these commands are shown below (port Ethernet 1/0 has been configured as trunk):

Switch_show_interfaces_trunk.jpg

show_interfaces_switchport.jpg

The “show ip interface brief” command only gives us information about the IP address, the status (up/down) of an interface:

show_ip_interface_brief.jpg

The “show interfaces vlan” command only gives us information about that VLAN, not about which ports are the trunk links:

show_interfaces_vlan.jpg

Question 2

Refer to the exhibit. The following commands are executed on interface fa0/1 of 2950Switch.

2950Switch(config-if)#switchport port-security
2950Switch(config-if)#switchport port-security mac-address sticky
2950Switch(config-if)#switchport port-security maximum 1

The Ethernet frame that is shown arrives on interface fa0/1. What two functions will occur when this frame is received by 2950Switch? (Choose two)

switch_port_security.jpg

A. The MAC address table will now have an additional entry of fa0/1 FFFF.FFFF.FFFF.
B. Only host A will be allowed to transmit frames on fa0/1.
C. This frame will be discarded when it is received by 2950Switch.
D. All frames arriving on 2950Switch with a destination of 0000.00aa.aaaa will be forwarded out fa0/1.
E. Hosts B and C may forward frames out fa0/1 but frames arriving from other switches will not be forwarded out fa0/1.
F. Only frames from source 0000.00bb.bbbb, the first learned MAC address of 2950Switch, will be forwarded out fa0/1.

 

Answer: B D

Explanation

Please read the explanation at http://www.9tut.net/icnd2/icnd2-operations

Question 3

Which Cisco Catalyst feature automatically disables the port in an operational PortFast upon receipt of a BPDU?

A. BackboneFast
B. UplinkFast
C. Root Guard
D. BPDU Guard
E. BPDU Filter

 

Answer: D

Explanation

We only enable PortFast feature on access ports (ports connected to end stations). But if someone does not know he can accidentally plug that port to another switch and a loop may occur when BPDUs are being transmitted and received on these ports.

With BPDU Guard, when a PortFast receives a BPDU, it will be shut down to prevent a loop -> D is correct.

Question 4

Why will a switch never learn a broadcast address?

A. Broadcast frames are never sent to switches.
B. Broadcast addresses use an incorrect format for the switching table.
C. A broadcast address will never be the source address of a frame.
D. Broadcasts only use network layer addressing.
E. A broadcast frame is never forwarded by a switch.

 

Answer: C

Question 5

Which three statements accurately describe layer 2 Ethernet switches? (choose three)

A. Microsegmentation decreases the number of collisions on the network.
B. If a switch receives a frame for an unknown destination, it uses ARP to resolve the address.
C. Spanning Tree Protocol allows switches to automatically share vlan information.
D. In a property functioning network with redundant switched paths, each switched segment will contain one root bridge with all its ports in the forwarding state. All other switches in that broadcast domain will have only one root port.
E. Establishing vlans increases the number of broadcast domains.
F. Switches that are configured with vlans make forwarding decisions based on both layer 2 and layer 3 address information.

 

Answer: A D E

Explanation

Microsegmentation is a network design (functionality) where each workstation or device on a network gets its own dedicated segment (collision domain) to the switch. Each network device gets the full bandwidth of the segment and does not have to share the segment with other devices. Microsegmentation reduces and can even eliminate collisions because each segment is its own collision domain -> A is correct.

Note: Microsegmentation decreases the number of collisions but it increases the number of collision domains.

D and E are correct based on the theory of STP and VLAN.

Question 6

Switch ports operating in which two roles will forward traffic according to the IEEE 802.1w standard? (Choose two)

A. alternate
B. backup
C. designated
D. disabled
E. root

 

Answer: C E

Explanation

IEEE 802.1w is the standard of Rapid Spanning Tree Protocol (RSTP). There are 5 port roles in this standard: Root port, Designated port, Alternative port, Backup port and Disabled port. In these 5 port roles, only Root port and Designated port can forward traffic.

Question 7

Select the action that results from executing these commands:

Switch(config-if)# switchport port-security
Switch(config-if)# switchport port-security mac-address sticky

A. A dynamically learned MAC address is saved in the startup-configuration file.
B. A dynamically learned MAC address is saved in the running-configuration file.
C. A dynamically learned MAC address is saved in the VLAN database.
D. Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.
E. Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.

 

Answer: B

Explanation

The full syntax of the second command is:

switchport port-security mac-address sticky [MAC]

If we don’t specify the MAC address (like in this question) then the switch will dynamically learn the attached MAC Address and place it into your running-configuration -> B is correct.

Question 8

What is valid reason for a switch to deny port access to new devices when port security is enabled?

A. The denied MAC addresses have already been learned or configured on another secure interface in the same VLAN.
B. The denied MAC address are statically configured on the port.
C. The minimum MAC threshold has been reached.
D. The absolute aging times for the denied MAC addresses have expired.

 

Answer: A

Explanation

A security violation occurs in either of these situations:

* When the maximum number of secure MAC addresses is reached on a secure port and the source MAC address of the ingress traffic is different from any of the identified secure MAC addresses, port security applies the configured violation mode.

* If traffic with a secure MAC address that is configured or learned on one secure port attempts to access another secure port in the same VLAN, applies the configured violation mode.

From the second statement we can figure out A is the correct answer. But for your information we will discuss other answers as well.

Answer B is not correct because we can’t configured which MAC address will be denied. We can only configure which MAC is allowed.

We can only configure the maximum MAC threshold, not the minimum threshold -> C is not correct.

The aging times are only configured for allowed MAC addresses, not for denied MAC -> D is correct.

For your information about aging time:

When the aging type is configured with the absolute keyword, all the dynamically learned secure addresses age out when the aging time expires

This is how to configure the secure MAC address aging type on the port:

Router(config-if)# switchport port-security aging type absolute

and configure the aging time (aging time = 120 minutes)

Router(config-if)# switchport port-security aging time 120

When this command is used, all the dynamically learned secure addresses age out when the aging time expires

(Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/port_sec.html)

Question 9

A network administrator needs to configure port security on a switch. Which two statements are true? (Choose two)

A. The network administrator can apply port security to dynamic access ports
B. The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
C. The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
D. The network administrator can apply port security to EtherChannels.
E. When dynamic mac address learning is enabled on an interface, the switch can learn new addresses up to the maximum defined.

 

Answer: C E

Explanation

Follow these guidelines when configuring port security:

+ Port security can only be configured on static access ports, trunk ports, or 802.1Q tunnel ports.
+ A secure port cannot be a dynamic access port.
+ A secure port cannot be a destination port for Switched Port Analyzer (SPAN).
+ A secure port cannot belong to a Fast EtherChannel or Gigabit EtherChannel port group.
+ You cannot configure static secure or sticky secure MAC addresses on a voice VLAN.
+ When you enable port security on an interface that is also configured with a voice VLAN, you must set the maximum allowed secure addresses on the port to at least two.
+ If any type of port security is enabled on the access VLAN, dynamic port security is automatically enabled on the voice VLAN.
+ When a voice VLAN is configured on a secure port that is also configured as a sticky secure port, all addresses seen on the voice VLAN are learned as dynamic secure addresses, and all addresses seen on the access VLAN (to which the port belongs) are learned as sticky secure addresses.
+ The switch does not support port security aging of sticky secure MAC addresses.
+ The protect and restrict options cannot be simultaneously enabled on an interface.

(Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst3550/software/release/12.1_19_ea1/configuration/guide/swtrafc.html)

Question 10

Refer to the exhibit. Which statement is true?

show_spanning-tree_vlan_20.jpg

A. The Fa0/11 role confirms that SwitchA is the root bridge for VLAN 20.
B. VLAN 20 is running the Per VLAN Spanning Tree Protocol.
C. The MAC address of the root bridge is 0017.596d.1580.
D. SwitchA is not the root bridge, because not all of the interface roles are designated.

 

Answer: D

Explanation

Only non-root bridge can have root port. Fa0/11 is the root port so we can confirm this switch is not the root bridge -> A is not correct.

From the output we learn this switch is running Rapid STP, not PVST -> B is not correct.

0017.596d.1580 is the MAC address of this switch, not of the root bridge. The MAC address of the root bridge is 0017.596d.2a00 -> C is not correct.

All of the interface roles of the root bridge are designated. SwitchA has one Root port and 1 Alternative port so it is not the root bridge -> D is correct.

Question 11

Switch_remote_access.jpg

A technician has installed SwithchB and needs to configure it for remote access from the management workstation connected SwitchA. Which set of commands is required to accomplish this task?

A.
SwitchB(config)#interface FastEthernet 0/1
SwitchB(config)#ip address 192.168.8.252 255.255.255.0
SwitchB(config)#no shutdown

B.
SwitchB(config)#ip default-gateway 192.168.8.254
SwitchB(config)#interface vlan 1
SwitchB(config)#ip address 192.168.8.252 255.255.255.0
SwitchB(config)#no shutdown

C.
SwitchB(config)#interface vlan 1
SwitchB(config)#ip address 192.168.8.252 255.255.255.0
SwitchB(config)#ip default-gateway 192.168.8.254 255.255.255.0
SwitchB(config)#no shutdown

D.
SwitchB(config)#ip default-network 192.168.8.254
SwitchB(config)#interface vlan 1
SwitchB(config)#ip address 192.168.8.252 255.255.255.0
SwitchB(config)#no shutdown

 

Answer: B

Explanation

To remote access to SwitchB, it must have a management IP address on a VLAN on that switch. Traditionally, we often use VLAN 1 as the management VLAN (but in fact it is not secure).

In the exhibit, we can recognize that the Management Workstation is in a different subnet from the SwitchB. For intersubnetwork communication to occur, you must configure at least one default gateway. This default gateway is used to forward traffic originating from the switch only, not to forward traffic sent by devices connected to the switch.

Question 12

A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1? (Choose two)

A. Configure port Fa0/1 to accept connections only from the static IP address of the server.
B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
C. Configure the MAC address of the server as a static entry associated with port Fa0/1.
D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

 

Answer: C E

Explanation

We can”configure the MAC address of the server as a static entry associated with port Fa0/1″ with this command:

Switch(config-if)#switchport port-security mac-address sticky 0000.00AA.AAAA.AAAA

and “configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server” with these commands:

Switch(config-if)#switchport port-security maximum 1 (only allow 1 MAC address and that is the static MAC address)

Also we often define what will the switch do if the security is violated:

Switch(config-if)#switchport port-security violation shutdown

Question 13

The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy? (Choose two)

A. Switch1(config-if)#switchport port-security maximum 1
B. Switch1(config)#mac-address-table secure
C. Switch1(config)#access-list 10 permit ip host
D. Switch1(config-if)#switchport port-security violation shutdown
E. Switch1(config-if)#ip access-group 10

 

Answer: A D

Comments (241) Comments
Comment pages
1 2 3 5 926
  1. mmallery@embarqmail.com
    November 8th, 2011

    Question 11

    What is the difference between answere B and D?

  2. 9tut
    November 8th, 2011

    @mmallery: The difference is B – ip default-gateway while D – ip default-network

  3. xterm
    November 9th, 2011

    @9tut: It would be great if you wrapped Answers with css or html tags, which would hide letters – like color=white:
    Answers: A B C

  4. Abhi
    November 11th, 2011

    Ans for question 8 is B in dumps….wich is true A or B????

  5. Chad
    November 15th, 2011

    @Abhi:

    Answer ‘A’ – The denied MAC addresses have already been learned or configured on another secure interface in the same VLAN.

    This is correct because the question states port security is enabled. A little background on a switch, a secure port and static MAC address configuration are mutually exclusive. Therefore, they cannot be applied at the same time, so answer ‘A’ has to be correct.

    I hope that helps. Correct me someone if I’m wrong.

  6. Igor
    November 16th, 2011

    What is EtherChannel from question 9, and why we can’t apply port-security for that interf?

  7. zuhud
    November 16th, 2011

    @Abhi

    Answer B for Question 8 cannot be correct because you do not configure a deny mac address statement but rather you configure an acceptable mac-address

    switchport port-security mac-address xxxxxxx

    The statement
    B. The denied MAC address are statically configured on the port.

    Cannot be true unless it was worded like

    B. The denied MAC address are statically configured on another port on the same switch or vlan.

    That is why A is correct.

  8. zuhud
    November 16th, 2011

    @Igor

    Etherchannel are two or more trunk ports configured to work as a single virtual link i think.

    I maybe wrong but it initially came about so that if you had two trunks connecting to another switch STP will disable one two prevent switching loops. This however is not effecient as you are not using all the available bandwidth so that is why they came up with Etherchannel.

    So if you had two fastethernet interface trunks the switch will see it as a single 200mb link.

    The port security commands being discussed in the question are not relevant to trunk ports.

  9. zuhud
    November 16th, 2011

    @Igor

    OOps made a mistake on the above answer. Etherchannel interfaces do not need to be trunk ports (thought that is where they are used most of the time). You can for instance use this for a server that has more than one connection to the same switch.

    You do not configure port-security on the Etherchannel but on each physical access switchport that is part of the Etherchannel group.

    Hope that makes sense :-)

  10. Sanneh24@hotmail.com
    November 19th, 2011

    hi guys what is the different between default network & default gateway i e question 11

  11. xallax
    November 19th, 2011

    @sanneh24
    the default network is configured on a L3 device and is the point where the router directs all the traffic that has a destination which is unknown to this router (destination network is not in the routing table)

    the default gateway is the place where a device on the network will send the traffic that has to leave the network and go to a different one (PC on 10.0.0.0/16 sends ping to 172.16.1.1)

  12. misha
    November 22nd, 2011

    Can someone help me?

    Which command will show the MAC address of stations connected to switch ports?
    a. show mac-address
    b. show arp
    c. show table
    d. show switchport

    thanks..

  13. xallax
    November 22nd, 2011

    @misha
    B. show arp.

  14. misha
    November 22nd, 2011

    @xallax.. thanks..

    I have another question..

    In the communication between host1 and host2 over the point-to-point WAN, which protocol or technology is represented by dashed line A?

    A
    PC1———————————-PC2
    B
    SW1—————————–SW2
    C
    R1—————————R2
    D
    CSU/DSU——CSU/DSU

    a. IP
    b. T1
    C.PPP
    d. IEEE 802.3

    Thanks!

  15. xallax
    November 22nd, 2011
  16. Eng-Support
    November 23rd, 2011

    @ misha 1st Q

    i think the answer is show mac-address-table if u wanna c mac address of stations connected not the mac address of the switch itself.

    2nd questions u type i don’t got it ,, describe the question in other way or by pic may be useful

    good luck

  17. Eng-Support
    November 23rd, 2011

    @Xallax & @Misha

    i saw Xallax’s link & have a gr8 description that would b answer A

  18. xallax
    November 23rd, 2011

    @eng-support
    regarding misha’s first question…
    there is not such thing as “show mac-address”

    please trust me on this: the answer is B. show arp

  19. misha
    November 24th, 2011

    now im confused.. i think what they meant by option A is show mac-address-table
    im confused between the two (a or b)
    can you guys explain the difference between the two?

    @9tut.. what’s your final say?

    Thanks guys..

  20. 9tut
    November 24th, 2011

    @misha: There is no “show mac-address” command. But notice the “show mac-address-table” and “show mac address-table” do exist.

    If the option A is “show mac-address-table” then both A & B are correct!

  21. misha
    November 24th, 2011

    thanks 9tut!

  22. misha
    November 26th, 2011

    thanks 9tut! i passed the exam today and scored 986! awesome site!

  23. yoni
    November 26th, 2011

    Question 13
    I think no need to set ” Port switchport port-security violation shutdown”
    Because it’s there by difolt

  24. Ahmed
    November 27th, 2011

    Question 12

    A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1? (Choose two)

    A. Configure port Fa0/1 to accept connections only from the static IP address of the server.
    B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
    C. Configure the MAC address of the server as a static entry associated with port Fa0/1.
    D. Bind the IP address of the sewer to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
    E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
    F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

    why not A – replace – C

  25. Eng-Support
    November 28th, 2011

    @Ahmed

    seems to be a little confusion to u !!!

    this is switch >>> layer 2 device >>> that will learn MACs & configure them

    A not correct as it is said from static “IP” address

    hope it is clear to you

    good luck

  26. joy
    December 1st, 2011

    if i havent read ur comments regarding show-mac and show arp..i wouldnt realize the exact answer. coz i thought before that its show-mac. oh my. i hope i wont overlook the words on my exam. need to be extra careful in reading.

  27. dat
    December 5th, 2011

    friend i giv exm iat 15 which is latest ccna dumpssssss

  28. z
    December 5th, 2011

    plz somebody explain Q 9

  29. z
    December 5th, 2011

    hey guyz
    what is the difference between Rapid STP and PVST ?

  30. xallax
    December 6th, 2011

    @z
    RSTP is done only for 1 VLAN
    PVSTP is done for each VLAN

  31. xallax
    December 6th, 2011

    @z
    A. The network administrator can apply port security to dynamic access ports
    false (reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.2/25sg/configuration/guide/port_sec.pdf )
    dynamic ports are managed by VMPS

    B. The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
    nope, you can’t. false

    C. The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
    true

    D. The network administrator can apply port security to EtherChannels.
    false

    E. When dynamic mac address learning is enabled on an interface, the switch can learn new addresses up to the maximum defined.
    true, you just specify how many after “sticky”

  32. Kaviya
    December 7th, 2011

    @Eng-support – could u pls send me the latest dumps to this mail id rkaviya09@gmail.com.

    Thanks in advance

  33. Naren
    December 7th, 2011

    @abhi- pls forward the ccna latest dumps if u have to this mail id nareninfo39@gmail.com

  34. ap
    December 14th, 2011

    could someone forward me the latest dumps to apage74@gmail.com , thanks

  35. lucia67
    December 14th, 2011

    Hi,
    what should be a correct answer to this question, please?
    How does using the service password-encryption command on a router provide additional
    security?

    A. by encrypting all passwords passing through the router
    B. by encrypting passwords in the plain text configuration file
    C. by requiring entry of encrypted passwords for access to the device
    D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing
    exchanges
    E. by automatically suggesting encrypted passwords for use in configuring the router

    Dump is saying B but I would ratger choose A. Can you advise? Thanks

  36. lucia67
    December 14th, 2011

    please, disregard my question, it is B.

  37. Saini525
    December 16th, 2011

    Question 11 all are incorrect in my knowledge because as soon as you put in command “interface FastEthernet 0/1″ or “interface vlan 1″ the prompt changes to Switch(config-if)# , not one of these answers has this prompt. How can any of these answers be correct if you are entering at the incorrect prompt? Please change the answers scheme to show the correct prompt.

  38. Saini525
    December 16th, 2011

    B is correct if it had the correct prompt on the last two lines

  39. ashok
    December 17th, 2011

    Which command will show the MAC address of stations connected to switch ports?
    a. show mac-address this command wrong show mac-address table
    b. show arp this command wrong show ip arp (Displays arp cache)
    c. show tabl
    d. show switchport

    right ans A or B

  40. xallax
    December 17th, 2011

    @ashok
    correct answer: B

  41. xallax
    December 20th, 2011

    @9tut
    regarding the explanation of the 8th question:
    “The aging times are only configured for allowed MAC addresses, not for denied MAC -> D is NOT correct.”
    thank you

  42. fE
    December 23rd, 2011

    Q8 -> C. The minimum MAC threshold has been reached. Why Its not correct?
    I did a simulation, i changed the ports and the MAC were denied (Answer A OK). But, if i put a new pc on the port, the MAC also will be denied.

    So, I think that the answer are A and C.

  43. ifyllenium
    January 5th, 2012

    @xalla; i executed the show mac-address command on a switch in my packet tracer v5.3.1 and it displayed d dynamically learned mac address of a local host dt i connected to the switch…….but when i executed the show arp command on the same switch it displayed absolutely nothing in the output……..any comments?

  44. xallax
    January 5th, 2012

    @ifyllenium

    i had the same dilemma :)
    here’s my explanation to it http://www.ciscovce.com/old/index.php?route=information/news&news_id=13

  45. Anonymous
    January 7th, 2012

    How to add ip address and subnet mask on an interface of a switch?
    I use the command “ipconfig ip-address subnet-mask”
    But whenever i use it i get this dialogue opened up-:
    Switch(config)#ip config 192.168.1.2 255.255.255.0
    ^
    % Invalid input detected at ‘^’ marker.

    Is there anything else i have to do, pls let me know about it ? And i m using PT version 5.3.0.0088

  46. xallax
    January 7th, 2012

    @anonymous
    try this:

    enable
    config terminal
    interface vlan 1
    no shutdown
    ip address 192.168.1.2 255.255.255.0

    on switches you don’t set the IP address on physical interface, you set it on a logical interface (a vlan interface)

  47. xyz
    January 8th, 2012

    HIII FRIENDS..CAN ANYONE TELL ME THE CURRENT EXAM FORMAT OF CCNA.. DO THEY ASK FILL IN THE BLANKS??
    PLZ REPLY …

  48. Anonymous
    January 12th, 2012

    @ Xallax

    Earlier also I was able to configure the ip address on a Vlan but didn’t know the reason why i wasn’t able to configure one on the interface.
    Thanks buddy !!!!

  49. xallax
    January 12th, 2012

    @xyz
    no, that type of questions (fill in the blank) has been removed from the exam.

  50. Irfan
    January 13th, 2012

    Q 7
    If the configuration not saved and , switch reset or reloaded, than the MAC of any new PC will be learned to same port. the port security will be violated.
    any comments please

Comment pages
1 2 3 5 926
Add a Comment