click below
click below
Normal Size Small Size show me how
D3- Chapter 3
| Question | Answer |
|---|---|
| STP | Spanning Tree Protocol (50 secs) |
| CAM | Content Addressable Memory |
| ASIC | Application-Specific Integrated Circuit |
| BPDU | Bridge Protocol Data Units |
| VTP | VLAN Trunking Protocol |
| PVST | Per-VLAN Spanning Tree |
| RSTP | Rapid Spanning Tree Protocol (less than 1 sec) |
| TPID | Tag Protocol Identifier (0x8100) (4 Bytes) |
| VID | VLAN Identifier (12 bits) |
| CFI | Canonical Format Indicator (1 bit) |
| BID | Bridge Identifier |
| List the Switching Methods | -Store and Forward -Cut-through (fast-forward, fragment-free) -Adaptive Cut-through |
| 4 STP States a switch goes through when powered on | 1) Blocking 2) Listening 3) Learning 4) Forwarding *5) Disabled |
| 3 Designated STP ports | - Root - Designated - Blocked |
| 3 STP Recalculating Methods | - PortFast - UplinkFast - BackBoneFast |
| 3 RSTP States a switch goes through when powered on | - Discarding - Learning - Forwarding |
| What do trunk ports do? | Trunk ports carry traffic of multiple VLANS over a single link. |
| Another name for a switch? | Bridge |
| VTP's do what? (3) | - Add VLANs - Delete VLANs - Removed VLANs |
| Benefits of VLANs for wireless networks (3) | - Provides network separation - Provides a layer of Security - Allows guest access to a protected portion of your network. |
| VTP has 3 modes | - Server - Client - Transparent (default = server) |
| Traffic with no VLAN ID is called ? | Untagged |
| Switch ports can be configured for two different roles | - Trunk port - Access port |
| Most Common Frame Tagging Standard | IEEE 802.1Q (abr. dot1q) |
| When a VLAN is created, it is assigned what two things? | 1) Name 2) Number |
| Default bridge priority value | 32,768 |
| Switching loops create what three issues in a network? | - Broadcast Storms - Multiple Frame Transmission - Mac Database Instability |
| 6 ways to secure a switch | Physically secure the device Use secure passwords Enable SSH access Monitor access and traffic Disable http access Disable unused ports Enable port security Disable Telnet |