Você está na página 1de 15

CCNA3 Study Guide

Chapter 2
1. The set of rules that Ethernet uses is based on the IEEE
___________________________________________technology:
2. _____________________ is only used with half-duplex communication typically
found in hubs. ull-duplex switches do not use __________________________.
!. "ommunications in a switched #$% networ& occur in three ways. #ist' explain'
and gi(e an example of each:

.
). The Ethernet frame structure adds _________________________ around the
#ayer ! *+, to __________________________ the message being sent.
-. #ist and briefly describe each of the se(en sections.fields/ of an Ethernet 012.!
rame:
2. $n Ethernet 3$" address is a two-part _______-bit binary (alue expressed as
_________________hexadecimal digits.
1
CCNA3 Study Guide
Chapter 2
4. The ____________ is the first part of a 3$" address. It is _____ bits long and
identifies ______________________________________________________.
0. The (endor-assigned part of the 3$" address is __________ bits long and
____________________________________ the Ethernet hardware.
5. 6ummari7e each of the two types of duplex settings used for communications on
an Ethernet networ&:
11. 6tandard' shared hub-based Ethernet configuration efficiency is typically rated at
_________________________ percent of the 11-3b8s bandwidth. ull-duplex
ast Ethernet' compared to 11-3b8s bandwidth' offers ______________ percent
efficiency in both directions ._______-3b8s transmit and _______-3b8s recei(e/.
11. #ist and explain each of the duplex settings on "isco "atalyst switches:
12. 9hat is a possible problem with autonegotation and what can you do to a(oid
this situation:
2
CCNA3 Study Guide
Chapter 2
1!. Explain the auto-3+I; feature and what command you use to enable it:
1). <ow does a switch build its 3$" address table:
1-. 9hat does a switch do when an incoming data frame is recei(ed and the
destination 3$" address is not in the table:
12. 9hat is a collision domain and what effect do hubs and switches ha(e on
collision domains:
14. 9hat is a =microsegment .microsegmentation/:
10. $ collection of interconnected switches forms a single _______________domain.
>nly a #ayer ! entity' such as a ____________' or a _____________________'
can stop a #ayer 2 broadcast domain.
15. 9hen two switches are connected' the ________________domain is increased.
3
CCNA3 Study Guide
Chapter 2
21. #ist and describe three sources of latency:
21. Explain why switches add less latency to a networ& than routers:
22. The predominant cause of networ& latency in a switched #$% is more a function
of the ____________________________________' routing protocols used' and
_____________________________________________ running on the networ&.
2!. #ist the most common causes of networ& congestion:
2). +escribe the distinctions between a bridge and a switch:
2-. 9hat is a =bottlenec&?: +escribe some ways of remo(ing networ& bottlenec&s:
22. #ist and describe two switch forwarding methods:
4
CCNA3 Study Guide
Chapter 2
24. #ist and describe two (ariants of cut-through switching:
20. +escribe the differences between symmetric and asymmetric switching
25. +escribe how Ethernet switches use memory buffering:
!1. #ist and describe two methods of memory buffering used by switches:
!1. <ow does a #ayer ! 6witch differ from a #ayer 2 #$% 6witch:
!2. 9ith the ad(ent of #ayer ! 6witching technology' why do we still need routers:
5
CCNA3 Study Guide
Chapter 2
!!. 9hat are the similarities between na(igating through the "ommand #ine
Interface 3odes on a "isco switch and a "isco @outer:
!). #ist some A,I-based $lternati(es to the "#I:
!-. The "isco I>6 "#I offers two types of help. Briefly describe them:
!2. #ist the tas&s you can complete with the command history feature:
!4. By default' command history is _______________' and the system records the
last ______ command lines in its history buffer. Cou can use the _____________
command to (iew recently entered E;E" commands.
!0. The command history can be disabled for the ____________________________
only by using the ______________________________ in user or
________________________ mode.
!5. +escribe the Boot 6eDuence of a "isco switch:
6
CCNA3 Study Guide
Chapter 2
)1. <ow can the Boot #oader help in reco(ering from a system crash:
)1. 9hen the switch is powered on' the *>6T begins. +uring *>6T' the #E+s blin&
while a series of tests determine that the switch is functioning properly. 9hen the
*>6T has completed' the 6C6T #E+ rapidly blin&s ____________. If the switch
fails *>6T' the 6C6T #E+ turns _____________. 9hen a switch fails the *>6T
test' it is necessary to ____________________________________.
)2. Explain why you would assign an I* address to a switch e(en though it is a
#ayer 2 de(ice:
)!. To configure an I* address and subnet mas& on the management E#$% of the
switch' you must be in _________________________________________ mode.
)). To configure a default gateway for the switch' use the _____________________
command in _________________________ mode.
)-. +escribe the purpose of the ip http authentication enable command:
)2. +ynamic addresses are ______________ 3$" addresses that the switch learns
and then ages when they are not in use. Cou can change the aging time setting
for 3$" addresses. The default time is _________ seconds.
)4. 9hat are the implications of setting the aging time too short or too long:
7
CCNA3 Study Guide
Chapter 2
)0. 9hy would a networ& administrator specifically assign static 3$" addresses to
certain ports on a switch:
)5. 9hat command would be used to assign these static mappings:
-1. #ist some of the =show? commands that can be used to (erify the configuration of
a "isco switch:
-1. 9hy would you not regularly use the copy startup-config running-config
command to restore a switchFs configuration:
-2. #ist the steps to upload a configuration file from a switch to a TT* ser(er for
storage:
-!. #ist the steps to restore a configuration file to a switch from a TT* ser(er:
-). To clear the contents of your startup configuration' use the ________________
or the ____________________________________ pri(ileged E;E" command.
8
CCNA3 Study Guide
Chapter 2
--. To delete a file from lash memory' use the ____________________________
pri(ileged E;E" command.
Be sure to do the PT Activity 2.3.8 on Basic Switch Management!
-2. To ensure that a user on the console port is reDuired to enter the password' use
the __________________ command. E(en when a password is defined' it is not
reDuired to be entered until the _________________ command has been issued.
-4. 9hat will happen if you input the login command in line configuration mode but
do not define a password:
-0. <ow many (ty ports are a(ailable on a "isco 2521 switch:
-5. The enable password global configuration command allows you to specify a
password to restrict access to pri(ileged E;E" mode. 9hat is the problem with
this and what mechanism does "isco pro(ide to protect switch security from this
problem:
21. 9hat command will ensure that all system passwords are stored in an encrypted
form:
21. 6ummari7e the method you would need to use to regain access to a "isco
de(ice in the case of lost or forgotten passwords:
9
CCNA3 Study Guide
Chapter 2
22. Cou can define a customi7ed banner to be displayed before the username and
password login prompts by using the _________________________ command
in __________________________________________ mode. Enclose the
banner text in Duotations or using a ______________________ different from
any character appearing in the 3>T+ string.
10
CCNA3 Study Guide
Chapter 2
2!. "ompare and contrast the use of Telnet (s. 66< for remotely accessing a (ty on
a "isco switch:
2). If you ha(e switched the transport protocol on the (ty lines to permit only 66<'
what commands could you use .and in what mode/ to re-enable the Telnet
protocol to permit Telnet access:
2-. 66< supports the _______________________________________ algorithm'
the ______________________________ algorithm' and password-based user
authentication.
22. +E6 offers ___________ encryption' and !+E6 offers ___________ encryption.
24. Explain 66<Fs use of an @6$ &ey:
20. 6ummari7e how an attac&er could use 3$" $ddress flooding to ma&e a switch
act li&e a hub:
11
CCNA3 Study Guide
Chapter 2
25. Explain what happens in a +<"* spoofing attac&:
41. 9hat is +<"* snooping and how does it protect against +<"* spoof attac&s:
41. Explain why you should disable the use of "+* on de(ices that do not need to
use it:
42. 9hat are two types of Telnet attac&s: .briefly explain each/:
4!. #ist the functions performed by %etwor& 6ecurity $udits and %etwor& *enetration
Testing:
12
CCNA3 Study Guide
Chapter 2
4). #ist %etwor& 6ecurity Tools eatures and ,ses:
4-. #ist some things you could accomplish by implementing port security on switch
ports:
42. #ist and describe 6ecure 3$" $ddress types:
44. 9hat is accomplished when you enable stic&y learning on a switch interface:
40. #ist characteristics of 6tic&y secure 3$" addresses:
13
CCNA3 Study Guide
Chapter 2
45. 9hat situations constitute a port security (iolation:
01. #ist and summari7e port security (iolation modes:
01. #ist port security features and their default settings:
02. #ist the command seDuence .and corresponding modes/ you would enter in a
"isco "atalyst switch to configure dynamic port security on interface
astEthernet 1811:
0!. #ist the command seDuence .and corresponding modes/ you would enter in a
"isco "atalyst switch to configure stic&y port security on interface astEthernet
181):
0). To display port security settings for the switch or for the specified interface' use
the ____________________________________________________ command.
14
CCNA3 Study Guide
Chapter 2
0-. To display all secure 3$" addresses configured on all switch interfaces or on a
specified interface with aging information for each' use the
_________________________________________________________ address
command.
02. or security' what should you do with all unused switch ports' and how would you
do this:
15

Você também pode gostar