31. Which mode allows a switch to connect two VLANs and route traffic between them?
- a) Access mode
- b) Trunk mode
- c) Router mode
- d) Inter-VLAN routing
Answer: d) Inter-VLAN routing
Inter-VLAN routing allows traffic to be routed between VLANs on a switch, typically using a Layer 3 switch.
32. Fill in the blank: The _____ command enables the display of the current VLAN configuration on a switch.
- a)
show vlan
- b)
show switch
- c)
display vlan
- d)
vlan status
Answer: a) show vlan
The
show vlan
command displays the current VLAN configuration and status on a switch.
33. Which command is used to set the speed of a switch port to 100 Mbps?
- a)
speed 10
- b)
speed 100
- c)
speed auto
- d)
speed 1000
Answer: b) speed 100
The
speed 100
command sets the speed of the switch port to 100 Mbps.
34. Which IP address is reserved for loopback testing?
- a) 192.168.0.1
- b) 127.0.0.1
- c) 10.0.0.1
- d) 172.16.0.1
Answer: b) 127.0.0.1
Explanation: The IP address
127.0.0.1
is reserved for loopback testing, which allows the network interface to communicate with itself.
35. Which of the following is true about a broadcast domain?
- a) It is limited by switches.
- b) It is limited by routers.
- c) It encompasses all devices on a VLAN.
- d) It is the same as a collision domain.
Answer: b) It is limited by routers.
Broadcast domains are separated by routers, while switches do not break broadcast domains.
36. Which protocol is used by switches to prevent loops in a network?
- a) OSPF
- b) RIP
- c) STP
- d) EIGRP
Answer: c) STP
The Spanning Tree Protocol (STP) is used by switches to prevent loops in a network.
37. Fill in the blank: The _____ command shows the MAC address table on a Cisco switch.
- a)
show mac
- b)
show mac-address-table
- c)
show address
- d)
show mac-table
Answer: b) show mac-address-table
The
show mac-address-table
command displays the MAC address table, showing which MAC addresses are associated with which ports.
38. Which command is used to secure a switch by filtering IP addresses?
- a)
ip filter
- b)
access-list
- c)
ip access-group
- d)
ip secure
Answer: b) access-list
The
access-list
command is used to create rules that filter traffic based on IP addresses, enhancing switch security.
39. Which of the following commands would you use to initiate an SSH session from one device to another?
- a)
ssh
- b)
telnet
- c)
rlogin
- d)
ftp
Answer: a) ssh
The
ssh
command is used to start a secure shell session for encrypted communication between devices.
40. What is the maximum number of host IP addresses in a Class C network?
- a) 256
- b) 254
- c) 512
- d) 1024
Answer: b) 254
A Class C network with a subnet mask of 255.255.255.0 allows for 254 usable host IP addresses.