- Get a grip or you don't get the job
- Desktops of the future here today
- Researcher hides IE attack on Web
- Cisco third quarter 2008 channel stuffing
- Sci-Fi's goofiest gadgets and technology
A leading healthcare provider with a state-of-the-art electronic health record system, Allina Hospitals & Clinics required an efficient way to protect their rapidly growing laptop inventory from computer theft and data breach. Find out how the hospital system deployed a tracking solution to monitor 2,700 laptops on and off their network without having to invest in additional infrastructure.
Get the latest on storage technologies that allow IT professionals to better cope with new IT demands. Learn how storage technologies can help you successfully tackle e-Discover, regulatory compliance, green data center initiatives and the data explosion. Get all the details now.
Find out how you can consolidate Windows workloads and create a more efficient virtualized data center in this informative webcast, "Reduce Complexity and Cost - Windows Server Consolidation with Virtualization." Six concise webcast modules are available for your viewing. Watch them all consecutively or only the topics that interest you. The modules cover performance, user case studies, enterprise-level support, managing windows workloads, setup and configuration and the future of virtualization. Learn more today. Register below to learn more and be entered to win an Archos 605 Portable Media Player.
More Cisco Press book chapters from new and classic Cisco Press books.
Rate your favorite Cisco Press books.
This chapter covers the following ICND1 objectives that fall under the content area, Implement a small switched network:
Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts.
Explain the technology and media access control method for Ethernet technologies.
Explain network segmentation and basic traffic management concepts.
Explain the operation of Cisco switches and basic switching concepts.
Perform, save, and verify initial switch configuration tasks including remote access management.
Verify network status and switch operation using basic utilities (including ping, traceroute, telnet, SSH, arp, ipconfig), and the SHOW and DEBUG commands.
Implement and verify basic security for a switch (port security, deactivate ports).
Identify, prescribe, and resolve common switched network media issues, configuration issues, auto-negotiation, and switch hardware failures.
In today's networks, more and more corporations are replacing hubs with switches. Which of the following is a reason for switching to a Catalyst switch from a hub?
Catalyst switches take less time to process frames than hubs take.
Catalyst switches decrease the amount of bandwidth available to hosts.
Catalyst switches increase the number of collision domains in the network.
Catalyst switches do not forward broadcasts.
You want to configure your Cisco switch for remote access capabilities. Which of the following commands will move you into the correct mode for configuring the switch IP address?
interface fa0/1
interface loopback1
interface vlan1
interface fa0/24
configure terminal
What are the default configuration settings on a Catalyst switch? (Choose three.)
CDP Enabled
CDP Disabled
Ports set to 100Mbps/full duplex
Ports set to auto-negotiate
IP address set to 192.168.1.10
No IP address set
A junior network administrator at your company asks you to brief him on the differences and similarities between bridges and switches. What should you tell him? (Choose two.)
Switches are slower than bridges because they have fewer ports.
A switch is a multiport bridge.
Bridges and switches learn MAC addresses by examining the source MAC address of each frame received.
A bridge forwards a broadcast, but a switch does not.
You are configuring a switch for remote access. What command must be issued in Global Configuration mode to allow the switch to be accessed from a subnet other than its own?
ip default-gateway
router ip
router rip
routing enabled
While verifying some configurations on your switch, you see that the Spanning-Tree Protocol (STP) is enabled. The junior network administrator working with you at the time asks you what STP does. What do you tell her?
STP stops routing loops in your network.
STP minimizes broadcasts in your network.
TP allows routing loops in your network.
STP monitors and prevents loops in your switched network.
What is the effective throughput for each of 24 PCs connecting to a Catalyst switch's FastEthernet ports operating in half-duplex mode?
1Mbps
10Mbps
100Mbps
2400Mbps
You want to configure the FastEthernet 0/20 port on your Catalyst switch for port security. If anyone other than the MAC address 0001.3232.AABB connects to the port, it should immediately shut down. Which of the following configurations accomplishes this objective?
interface fa0/20
switchport mode access
switchport port-security
switchport port-security mac-address 0001.3232.AABB
switchport port-security violation shutdown
interface fa0/20
switchport mode access
mac-address 0001.3232.AABB
port-security violation shutdown
interface fa0/20
switchport mode access
port-security
mac-address 0001.3232.AABB
port-security violation shutdown
interface fa0/20
switchport mode access
switchport port-security
mac-address 0001.3232.AABB
switchport port-security violation shutdown
What command allows you to verify your port security configuration on interface FastEthernet 0/20?
show interface fa0/20
show ip interface fa0/20
show interface fa0/20 switchport
show port-security interface fa0/20
Your boss asks you to explain why you purchased switches instead of the "cheaper" hubs, because they do the same thing. What do you tell him to justify the purchase of the switches?
Hubs do not extend the length of an Ethernet segment.
Hubs do not offer half-duplex connections.
Hubs do not give dedicated bandwidth to each end user.
Hubs do not accept 100Mbps connections.
You have been asked to convert the management protocol for all the Cisco switches in your network from Telnet to SSH. You have entered the following configuration on one of the switches:
Switch(config)# username admin password cisco
Switch(config)# ip domain-name examcram.com
Switch(config)# crypto key generate rsa general-keys modulus 1024
Switch(config)# ip ssh version 2
Switch(config)# line vty 0 4
Switch(config-line)# login local
Switch(config-line)# transport input ssh
Does this configuration accomplish your objective?
Yes, this configuration accomplishes the objective.
No, to disable Telnet, you must also enter the command no transport input telnet.
No, SSH requires RSA keys that are 512 bits or less.
No, rather than using the VTY lines, you should be configuring SSH lines.
You are verifying your port security configuration and notice the following:
Switch#show port-security interface fa0/5 Port Security : Enabled Port Status : Secure-down Violation Mode : Shutdown Aging Time : 0 mins Aging Type : Absolute SecureStatic Address Aging : Disabled Maximum MAC Addresses : 1 Total MAC Addresses : 1 Configured MAC Addresses : 0 Sticky MAC Addresses : 1 Last Source Address:Vlan : 0015.c5af.ea37:1 Security Violation Count : 18
What does this output indicate?
A security violation has occurred, and the interface has been shut down.
There have been security violations in the past, but at present, there is no device connected to the port.
A MAC address is stuck on the interface and needs to be cleared.
Port security requires at least one configured MAC address to be entered and is presently keeping the interface in the down state.
Your current switch is completely saturated with devices and has no available ports. As a temporary solution, you decide to attach an additional hub to the network to provide more ports. What type of cable should you use when attaching the network switch to the hub?
Straight-through
Crossover
Rollover
Serial
What field exists at the end of every Ethernet frame to ensure data corruption does not occur during transmission?
Preamble
CheckSEQ
ACK
FCS
Refer to Figure 2.1. HostA sends a single message into the switch. HostB, HostC, and HostD receive the message while HostE and HostF do not. What type of message was sent by HostA?
Copy Editor Screwed up ?By Anonymous on April 22, 2008, 4:46 amWHERE are the EVEN numbered QUESTIONS ? EVEN numbered answers are there but NOT the relevant questions ?
Reply | Read entire comment
AuthorBy Anonymous on April 18, 2008, 8:09 amSuper excerpt by a great passionate CCIE. Jeremy is with CBT Nuggets and is an outstanding instructor.
Reply | Read entire comment
View all comments