MIS 6314 Long Quiz 1
MIS 6314 Long Quiz 1
MIS 6314 Long Quiz 1
1. Dashboard
2. My courses
3. MIS6314
4. Week 3: Long Quiz
5. Long Quiz 001
Question 1
Correct
Mark 1.00 out of 1.00
Question text
When first hop redundancy protocols are used, which two items will be shared by a set of routers that are
presenting the illusion of being a single router?
Select one:
a.IP address & BID
b.BID & static route
c.MAC address & IP address
d.hostname & MAC address
Question 2
Correct
Question text
Divides the network into functional components while still maintaining the core, distribution, and access
layers of the three-layer model as discussed in chapter 2 LAN Redundancy?
Select one:
a.Enterprise edge
b.Cisco Enterprise Architecture
c.Hierarchical network
d.Collapsed Core
Question 3
Crrect
Mark 1.00 out of 1.00
Flag question
Question text
As discussed in chapter 2 , what will exist when the spanning tree protocol has worked and the network
has converged?
Select one:
a.One root bridge per segment, one root port per non root bridge, one designated port per segment,
non-designated ports.
b.One root bridge per network, one root port per non root bridge, one designated port per segment,
non-designated ports.
c.One root bridge per network, one root port on each switch, one non-designated port on each
segment, other ports are blocked.
d.One root bridge per network, one root port on each bridge, one designated port on each bridge, all
non-designated ports are blocked.
Question 4
Correct
Question text
Which feature ensures that configured switch edge ports do not cause Layer 2 loops if a port is mistakenly
connected to another switch?
Select one:
a.PVST+
b.extended system ID
c.PortFast
d.BPDU guard
Question 5
Correct
Question text
In reference to module 2 of this course, which is true of the difference between STP and RSTP?
Select one:
a.STP stops sending user data while the whole network converges, but RSTP closes down and
converges each link separately.
b.RSTP is able to support VLANs by using Cisco proprietary enhancements but STP is not.
c.STP uses a proposal and agreement process to allow switches to negotiate on port roles, but RSTP
assigns the roles centrally.
d.RSTP is the default version on all Cisco switches now, but STP was the default until IOS version 11.4
Question 6
Correct
Question text
As discussed in Chapter 2, what do you called a design methodology for building networks in three layers
including access, distribution, and core.
Select one:
a.hierarchical network
b.STP
c.Etherchannel technology
d.Collapsed Core
Question 7
Correct
Question text
Why do a network administrator change a switch priority to a higher value than that of other switches in
the network?
Select one:
a.To make sure that the switch is chosen as the root bridge.
b.To make sure that no ports on the switch are blocked.
c.To make sure that the switch is not chosen as the root bridge.
d.To help the network converge more quickly.
Question 8
Correct
Question text
Which command is used to display information about the configured routing protocols on a router?
a.show running-config
b.show ip interfaces
c.show ip route
d.show ip protocols
Question 9
Correct
Question text
As discussed in chapter 1, the duplication of devices, services, or connections so that, in the event of a
failure, the redundant devices, services , or connections can perform the work of those that failed.
Select one:
a.Redundancy
b.Bundle
c.Duplication
d.Backup
Question 10
Correct
Question text
If the network administrator of Genesis Mobile Telecommunications wanted to disable STP on a port
connected to a server, which command would you use?
Select one:
a.disable spanning-tree
b.spanning-tree security
c.spanning-tree portfast
d.spanning-tree off
Question 11
Correct
Question text
In the above network diagram of DFA Headquarters core switches , which switch will be chosen as root
bridge and why?
Select one:
a.Sw-C, because it has the lowest priority
b.Sw-D, because it has the highest priority
c.Sw-A, because it has the lowest MAC address
d.Sw-B, because it has the highest MAC address
Question 12
Correct
Question text
As shown in the exhibit below, which protocol information is being displayed in the output?
Select one:
a.HSRP
b.GLBP
c.VRRP
d.FHRP
Question 13
Correct
Question text
_______ is used to protect data traffic from a failed router or circuit, such as HSRP and VRRP, while also
allowing load sharing between a group of redundant routers.
a.HSRP
b.VRRP
c.IRDP
d.GLBP
Question 14
Incorrect
Question text
As discussed in chapter 2, what states does a port go through from the time when a switch first start up to
the time when the port is fully operational?
Select one:
Flag question
Question text
A network link connected to a switch went down. How long can it take for a network using spanning tree
topology to converge again after a topology change?
Select one:
a.up to 20 seconds
b.up to 50 seconds
c.up to 10 seconds
d.up to 15 seconds
Question 16
Correct
Question text
A connection to a switch went down suddenly, how long can it take for a network using RSTP to converge
again after a topology change?
Select one:
a.10sec
b.15sec
c.6sec
d.50sec
Question 17
Correct
Question text
Which is the default STP operation mode on Cisco Catalyst switches?
Select one:
a.MSTP
b.RSTP
c.MST
d.PVST+
Question 18
Correct
Question text
Which non-proprietary protocol among the listed below provides router redundancy for a group of
routers which support IPv4 LANs?
Select one:
a.HSRP
b.SLB
c.VRRPv2
d.GLBP
Question 19
Correct
Question text
You want to run the new 802.1w on your switches. Which of the following command syntax would enable
this protocol?
Select one:
Question 20
Correct
Question text
Which technology is required when switched networks are designed to include redundant links?
Select one:
b.link aggregation
c.virtual LANs
Question 21
Correct
Question text
STP provides the mechanism to have redundant links at Layer 2 while avoiding the potential for loops and
MAC address database instability. It also uses the concepts of a root bridge and path costs to calculate
which links to use in a redundant topology.
Select one:
True
False
Question 22
Correct
Question text
As discussed which is true of the PVST+ protocol?
Select one:
a.It supports the use of VLANs and requires that ISL frame tagging should be used on VLAN trunk
links.
b.It was the first version of STP to include the PortFast feature that allows access ports to transition
directly to the forwarding state.
c.It allows different VLANs to have different root bridges and allows ports to be blocked for some
VLANs but not others.
Question 23
Correct
Question text
What is the most likely effect on the topology if Spanning Tree Protocol has been disabled?
Select one:
a.Excessive collisions
Question 24
Correct
Question text
The number of interfaces supported on a switch.
Select one:
a.Bandwidth Capacity
c.Etherchannel ports
d.Port Density
Question 25
Correct
Question text
In terms of network reliability, the ability of a network to be up most of the time. Sometimes referred to as
99.999, or "five nines".
Select one:
a.Scalability
b.Reliability
c.Flexibility
d.Integrity
Question 26
Correct
Question text
During the implementation of Spanning Tree Protocol, all switches are rebooted by the network
administrator. What is the first step of the spanning-tree election process?
Select one:
a.Each switch with a lower root ID than its neighbor will not send BPDUs.
c.All the switches send out BPDUs advertising themselves as the root bridge.
d.Each switch determines what port to block to prevent a loop from occurring.
Question 27
Correct
Question text
During the discussion in this chapter, what is a characteristic of in-band device management?
Select one:
a.It is used to monitor and make configuration changes to a network device over a network
connection.
Question 28
Correct
Question text
A switch port was configured to Portfast, What will be the port state after this configuration?
Select one:
a.blocking
b.listening
c.learning
d.forwarding
Question 29
Correct
Question text
In FHRP operation, two or more routers are represented as a single ______ router.
Select one:
a.Switch
b.Core
c.Virtual
d.Perimeter
Question 30
Correct
Question text
The Access layer provides high speed connectivity between distribution layer modules and the Enterprise
Edge modules.
Select one:
True
False