Question 1. _____ control(s) which end devices are allowed to communicate on the network.
The access layer
Question 2. _____ will determine the design requirements for a network.
None of the above
Question 3. Which of the following illustrates properly designed hierarchical networks that achieve near-wire speed among all devices?
The core layer
Question 4. Startup configuration is stored in ________.
Question 5. The average amount of data that is actually transmitted as opposed to the rating of the port is _____.
source MAC address
Question 6. _____ is a Layer 2 identifier for the frame's originating NIC or interface.
Source MAC address
Question 7. _____ is a dedicated connection between two hosts.
Question 8. A _____ is a frame that is sent from one host and addressed to one specific destination.
source MAC address
Question 9. Extended-range VLANs are identified by a VLAN ID between which of the following ranges?
Question 10. A _____ VLAN is a VLAN that is configured to carry only user-generated traffic. These VLANs are sometimes referred to as user VLANs.
none of the above
Question 11. Which VLANs are allowed over the link when a new trunk link is configured on an IOS-based switch?
All defined VLANs are allowed on the trunk by default.
Each VLAN, or VLAN range, that is specified with the switchport mode command
Each VLAN, or VLAN range, that is specified with the vtp domain command
Each VLAN, or VLAN range, that is specified with the VLAN database command
Question 12. Which would not be one of the characteristics of a typical VLAN?
VLANs logically divide a switch into multiple, independent switches at Layer 2.
Trunk links can carry traffic for multiple VLANs.
VLAN implementation significantly increases traffic due to added trunking information.
A VLAN can span multiple switches.
Question 13. Which of the following configures the port to negotiate a trunk?
Switchport mode trunk
Switchport mode dynamic desirable
Switchport mode access