Q. 31:
What is the purpose of a root bridge in a spanning tree?
a) It blocks redundant links
b) It forwards all frames to end devices
c) It is the central point of the spanning tree, determining the best paths
d) It converts spanning trees to link-state
Answer: (c) It is the central point of the spanning tree, determining the best paths
Q. 32:
Which command would disable DTP on a Cisco switch port?
a) switchport mode access
b) switchport nonegotiate
c) switchport trunk off
d) no switchport negotiate
Answer: (b) switchport nonegotiate
Q. 33:
What is the main advantage of using VLANs in a network?
a) VLANs allow more devices to be connected to the same switch
b) VLANs increase the network speed
c) VLANs reduce broadcast traffic and enhance security
d) VLANs reduce the need for IP addresses
Answer: (c) VLANs reduce broadcast traffic and enhance security
Q. 34:
What protocol is used to synchronize VLAN databases between switches?
a) STP
b) VTP
c) DTP
d) CDP
Answer: (b) VTP (VLAN Trunking Protocol)
Q. 35:
How can you ensure that a port on a switch is assigned to VLAN 10?
a) switchport vlan 10
b) switchport access vlan 10
c) vlan assign 10
d) port vlan 10
Answer: (b) switchport access vlan 10
Q. 36:
What does the command switchport mode dynamic auto do?
a) Forces the port to become a trunk
b) Forces the port to become an access port
c) Allows the port to dynamically negotiate trunking
d) Disables trunking
Answer: (c) Allows the port to dynamically negotiate trunking.
Q. 37:
Which switch command is used to limit the number of MAC addresses learned on a port?
a) port security maximum
b) switchport mac-limit
c) switchport port-security maximum
d) port-security mac-address maximum
Answer: (c) switchport port-security maximum
Q. 38:
How can a switch port be placed in an err-disabled state?
a) By connecting to multiple VLANs
b) By receiving BPDUs on a port configured for PortFast
c) By exceeding the maximum number of allowed MAC addresses
d) By exceeding the bandwidth limit
Answer: (c) By exceeding the maximum number of allowed MAC addresses
Q. 39:
What is a characteristic of the 802.1Q trunking protocol?
a) It encapsulates the entire Ethernet frame
b) It inserts a VLAN tag in the Ethernet frame
c) It removes the destination MAC address
d) It operates only on fiber cables
Answer: (b) It inserts a VLAN tag in the Ethernet frame
Q. 40:
Which command can you use to verify the status of a switch port security feature?
a) show port-security
b) show interface security
c) show port secure
d) show port-security status
Answer: (a) show port-security