What is the purpose of a VLAN database on a switch?
β Correct Answer: Stores VLAN IDs and names for configuration and reference
π Explanation: The VLAN database keeps track of configured VLANs and their associated details, allowing for consistent application.
π Practical Use Case: A network admin uses the VLAN database to check which VLAN IDs are already in use before creating a new one.
π Exam Objective Reference: 2.2 β VLAN database
π Follow-Up: How can you view or modify the VLAN database on a Cisco switch?
What is a Switch Virtual Interface (SVI) used for?
β Correct Answer: Provides Layer 3 IP connectivity to a VLAN
π Explanation: SVIs allow switches to route between VLANs by assigning IP addresses to virtual interfaces.
π Practical Use Case: A network uses SVIs to route traffic between VLAN 10 and VLAN 20 internally without a separate router.
π Exam Objective Reference: 2.2 β Switch Virtual Interface (SVI)
π Follow-Up: What command is used to assign an IP address to an SVI?
What is the function of a native VLAN on a trunk port?
β Correct Answer: Carries untagged traffic across the trunk link
π Explanation: The native VLAN allows untagged traffic to pass on trunk ports, typically used for management or legacy devices.
π Practical Use Case: A printer that doesn’t support VLAN tagging is placed on the native VLAN so it can still communicate.
π Exam Objective Reference: 2.2 β Native VLAN
π Follow-Up: What risk is associated with an unconfigured native VLAN?
How is a voice VLAN different from a data VLAN?
β Correct Answer: It prioritizes traffic for IP phones using QoS
π Explanation: Voice VLANs are configured to ensure voice traffic receives higher priority over data on the same link.
π Practical Use Case: IP phones and computers share a port; the phone uses the voice VLAN for guaranteed call quality.
π Exam Objective Reference: 2.2 β Voice VLAN
π Follow-Up: What switch configuration enables a port to support both voice and data VLANs?
What does 802.1Q tagging allow on a trunk link?
β Correct Answer: It allows multiple VLANs to be identified over a single physical connection
π Explanation: 802.1Q tagging inserts VLAN ID headers into Ethernet frames for proper delivery across trunk links.
π Practical Use Case: A switch uses 802.1Q to send VLAN 10 and VLAN 20 traffic to another switch over the same port.
π Exam Objective Reference: 2.2 β 802.1Q tagging
π Follow-Up: What field in the Ethernet frame is modified by 802.1Q?
What is the benefit of link aggregation?
β Correct Answer: Increases bandwidth and provides redundancy between switches
π Explanation: Link aggregation combines multiple physical links into a single logical link to improve performance and failover.
π Practical Use Case: Two switches are connected with four Ethernet cables in an aggregated group to improve throughput.
π Exam Objective Reference: 2.2 β Link aggregation
π Follow-Up: What protocols are used for link aggregation negotiation?
What does configuring a switch port for auto speed do?
β Correct Answer: Allows the port to negotiate speed with the connected device
π Explanation: Auto speed enables devices to negotiate the highest mutually supported speed during connection setup.
π Practical Use Case: A technician plugs a laptop into a switch, and the port auto-negotiates to 1 Gbps based on the NIC.
π Exam Objective Reference: 2.2 β Speed
π Follow-Up: What happens if auto speed fails to negotiate properly?
What is a common symptom of a duplex mismatch between two switch ports?
β Correct Answer: Slow network performance and high collisions
π Explanation: Duplex mismatches result in one side using full duplex while the other uses half, causing frame loss and retransmissions.
π Practical Use Case: A user reports slow file transfers because their PC is set to full duplex, but the switch port is on half duplex.
π Exam Objective Reference: 2.2 β Duplex
π Follow-Up: How can you check duplex settings on a Cisco switch?
What is the primary function of Spanning Tree Protocol (STP)?
β Correct Answer: Prevents switching loops by blocking redundant paths
π Explanation: STP detects and disables redundant switch paths to prevent broadcast storms and loops.
π Practical Use Case: A network uses STP to block one of two paths between switches to avoid looping broadcast traffic.
π Exam Objective Reference: 2.2 β Spanning Tree
π Follow-Up: What is the default STP protocol version used by most modern switches?
What is a jumbo frame?
β Correct Answer: An Ethernet frame that exceeds the standard 1500-byte MTU
π Explanation: Jumbo frames allow larger payloads (often 9000 bytes) to reduce overhead in high-throughput environments.
π Practical Use Case: A storage network enables jumbo frames to optimize file transfers over a 10 Gbps link.
π Exam Objective Reference: 2.2 β MTU / Jumbo Frames
π Follow-Up: Why must all devices in a path support jumbo frames for them to work correctly?
What does BPDU Guard do in Spanning Tree Protocol?
β Correct Answer: Disables a port if a BPDU is received, protecting the STP topology
π Explanation: BPDU Guard prevents edge ports from participating in STP if a BPDU is received, protecting against rogue switches.
π Practical Use Case: BPDU Guard shuts down a user port that mistakenly receives a BPDU from an unauthorized switch.
π Exam Objective Reference: 2.2 β Spanning Tree (BPDU Guard)
π Follow-Up: When should BPDU Guard be enabled on access ports?
What is the purpose of Loop Guard in Spanning Tree Protocol?
β Correct Answer: Prevents loops by blocking ports that stop receiving BPDUs
π Explanation: Loop Guard maintains STP stability by blocking non-designated ports if BPDUs stop arriving unexpectedly.
π Practical Use Case: A port stops receiving BPDUs due to a unidirectional link; Loop Guard keeps the port in a blocking state.
π Exam Objective Reference: 2.2 β Spanning Tree (Loop Guard)
π Follow-Up: How does Loop Guard differ from Root Guard?
What are the main STP port states during convergence?
β Correct Answer: Blocking, Listening, Learning, Forwarding, Disabled
π Explanation: STP transitions ports through several states to safely establish a loop-free topology.
π Practical Use Case: A technician observes a port in the learning state while STP recalculates after a topology change.
π Exam Objective Reference: 2.2 β Spanning Tree
π Follow-Up: Which port state learns MAC addresses but doesn’t forward frames?
What happens when MTU values are mismatched between switches?
β Correct Answer: Traffic may be dropped or fragmented, causing performance issues
π Explanation: MTU mismatches lead to dropped frames or fragmentation, especially with jumbo frames.
π Practical Use Case: A switch fails to transfer large backup files due to MTU mismatch with the upstream core switch.
π Exam Objective Reference: 2.2 β MTU
π Follow-Up: What command can verify MTU on a Cisco interface?
How can you verify if jumbo frames are supported on a switch port?
β Correct Answer: Check the MTU setting and supported frame size on the interface
π Explanation: You must confirm the interface supports higher-than-standard MTU and that jumbo frames are enabled.
π Practical Use Case: An admin enables jumbo frames to support a SAN that requires 9000-byte frames.
π Exam Objective Reference: 2.2 β Jumbo Frames
π Follow-Up: How do you test jumbo frame support using ping?
What does ‘allowed VLANs’ mean in trunk configuration?
β Correct Answer: Specifies which VLANs are permitted to traverse the trunk link
π Explanation: Allowed VLANs limit trunk traffic to only those explicitly listed, enhancing control and security.
π Practical Use Case: An admin restricts a trunk to only carry VLANs 10, 20, and 30 to prevent broadcast storms.
π Exam Objective Reference: 2.2 β Trunking
π Follow-Up: What command shows which VLANs are allowed on a trunk?
What occurs if a VLAN is not allowed on a trunk link?
β Correct Answer: Traffic for that VLAN is dropped at the trunk port
π Explanation: If a VLAN isnβt part of the trunkβs allowed list, frames tagged with that VLAN are discarded.
π Practical Use Case: VLAN 50 traffic doesnβt pass between switches because it’s not included in the trunk’s allowed VLAN list.
π Exam Objective Reference: 2.2 β Trunking
π Follow-Up: How do you add a VLAN to the allowed list on a trunk port?
What is a sign of misconfigured voice and data VLANs on a switch port?
β Correct Answer: Phones fail to get IP addresses or register with the call server
π Explanation: Incorrect VLAN assignment can prevent IP phones from communicating with DHCP or VoIP services.
π Practical Use Case: An office reports all phones offline because the switch ports have no voice VLAN configured.
π Exam Objective Reference: 2.2 β Voice VLAN
π Follow-Up: What Cisco command assigns a voice VLAN to a port?
What issue arises when two trunk ports have different native VLANs?
β Correct Answer: Untagged traffic is misinterpreted, leading to VLAN confusion
π Explanation: Mismatch in native VLANs causes untagged frames to be misrouted or discarded.
π Practical Use Case: A network sees management traffic dropped between switches due to mismatched native VLANs.
π Exam Objective Reference: 2.2 β Native VLAN
π Follow-Up: What command checks native VLAN on both sides of a trunk?
What causes a link aggregation group to fail even if physical links are connected?
β Correct Answer: Inconsistent port settings (speed, duplex, VLANs)
π Explanation: All physical interfaces in an aggregation group must have identical configurations.
π Practical Use Case: Only 2 of 4 aggregated ports come online due to a speed mismatch on one port.
π Exam Objective Reference: 2.2 β Link Aggregation
π Follow-Up: Which show command helps verify port-channel consistency?
How can you test if STP is blocking a redundant link?
β Correct Answer: Use show spanning-tree to check port state
π Explanation: The show spanning-tree command displays each portβs STP state, confirming if itβs forwarding or blocking.
π Practical Use Case: An admin sees one uplink in blocking state to prevent loops due to STP topology decisions.
π Exam Objective Reference: 2.2 β Spanning Tree
π Follow-Up: What causes a port to enter blocking state in STP?
Why is the native VLAN a potential security risk?
β Correct Answer: Untagged traffic can be intercepted or misrouted if not secured
π Explanation: Since untagged traffic travels on the native VLAN, attackers can exploit misconfigurations or spoof VLANs.
π Practical Use Case: An attacker gains access to sensitive data by injecting untagged traffic into a trunk link using the native VLAN.
π Exam Objective Reference: 2.2 β Native VLAN
π Follow-Up: How can you secure the native VLAN on trunk ports?
What happens if both ends of a trunk port are set to different native VLANs?
β Correct Answer: Traffic may be misrouted or dropped due to VLAN mismatch
π Explanation: A native VLAN mismatch can cause confusion about which VLAN untagged traffic belongs to, disrupting communication.
π Practical Use Case: Two switches on a trunk link fail to pass management traffic due to native VLAN mismatch.
π Exam Objective Reference: 2.2 β Native VLAN
π Follow-Up: What command shows native VLAN configuration on a trunk?
How does a switch treat voice traffic in a configured voice VLAN?
β Correct Answer: It tags voice traffic for prioritization over data
π Explanation: Voice VLANs tag voice traffic for QoS, ensuring lower latency and jitter.
π Practical Use Case: An IP phone on a switch port sends voice traffic over the voice VLAN and data traffic from a PC on the same port over the data VLAN.
π Exam Objective Reference: 2.2 β Voice VLAN
π Follow-Up: Which command assigns a voice VLAN to a switch port?