CCNA Exploration 3, Chapter 2. “Basic Switch Concepts and

advertisement
CCNA Exploration 3, Chapter 2.
“Basic Switch Concepts and Configuration” Worksheet
CISCO Networking Academy
Name:
1. The set of rules that Ethernet uses is based on the IEEE
________________________________________________________________
technology:
2. _____________________ is only used with half-duplex communication typically
found in hubs. Full-duplex switches do not use __________________________.
3. Communications in a switched LAN network occur in three ways. List, explain,
and give an example of each:
.
4. The Ethernet frame structure adds _________________________ around the
Layer 3 PDU to __________________________ the message being sent.
5. List and briefly describe each of the seven sections of an Ethernet 802.3 Frame:
1
CCNA Exploration 3, Chapter 2.
“Basic Switch Concepts and Configuration” Worksheet
CISCO Networking Academy
6. An Ethernet MAC address is a two-part _______-bit binary value expressed as
_________________hexadecimal digits.
7. The ____________ is the first part of a MAC address. It is _____ bits long and
identifies ______________________________________________________.
8. The vendor-assigned part of the MAC address is __________ bits long and
____________________________________ the Ethernet hardware.
9. Summarize each of the two types of duplex settings used for communications on
an Ethernet network:
10. Standard, shared hub-based Ethernet configuration efficiency is typically rated at
_________________________ percent of the 10-Mb/s bandwidth. Full-duplex
Fast Ethernet, compared to 10-Mb/s bandwidth, offers ______________ percent
efficiency in both directions (_______-Mb/s transmit and _______-Mb/s receive).
11. List and explain each of the duplex settings on Cisco Catalyst switches:
2
CCNA Exploration 3, Chapter 2.
“Basic Switch Concepts and Configuration” Worksheet
CISCO Networking Academy
12. What is a possible problem with autonegotation and what can you do to avoid
this situation?
13. Explain the auto-MDIX feature and what command you use to enable it:
14. How does a switch builds its MAC address table?
15. What does a switch do when an incoming data frame is received and the
destination MAC address is not in the table?
16. What is a collision domain and what effect do hubs and switches have on
collision domains?
17. What is a “microsegment (microsegmentation)?
3
CCNA Exploration 3, Chapter 2.
“Basic Switch Concepts and Configuration” Worksheet
CISCO Networking Academy
18. A collection of interconnected switches forms a single _______________domain.
Only a Layer 3 entity, such as a ____________, or a _____________________,
can stop a Layer 2 broadcast domain.
19. When two switches are connected, the ________________domain is increased.
20. List and describe three sources of latency:
21. Explain why switches add less latency to a network than routers:
22. The predominant cause of network latency in a switched LAN is more a function
of the ____________________________________, routing protocols used, and
_____________________________________________ running on the network.
23. List the most common causes of network congestion:
24. Describe the distinctions between a bridge and a switch:
4
CCNA Exploration 3, Chapter 2.
“Basic Switch Concepts and Configuration” Worksheet
CISCO Networking Academy
25. What is a “bottleneck”? Describe some ways of removing network bottlenecks:
26. List and describe two switch forwarding methods:
27. List and describe two variants of cut-through switching:
28. Describe the differences between symmetric and asymmetric switching
29. Describe how Ethernet switches use memory buffering:
5
CCNA Exploration 3, Chapter 2.
“Basic Switch Concepts and Configuration” Worksheet
CISCO Networking Academy
30. List and describe two methods of memory buffering used by switches:
31. How does a Layer 3 Switch differ from a Layer 2 LAN Switch?
32. With the advent of Layer 3 Switching technology, why do we still need routers?
33. What are the similarities between navigating through the Command Line
Interface Modes on a Cisco switch and a Cisco Router?
34. List some GUI-based Alternatives to the CLI:
35. The Cisco IOS CLI offers two types of help. Briefly describe them:
6
CCNA Exploration 3, Chapter 2.
“Basic Switch Concepts and Configuration” Worksheet
CISCO Networking Academy
36. List the tasks you can complete with the command history feature:
37. By default, command history is _______________, and the system records the
last ______ command lines in its history buffer. You can use the _____________
command to view recently entered EXEC commands.
38. The command history can be disabled for the ____________________________
only by using the ______________________________ in user or
________________________ mode.
39. Describe the Boot Sequence of a Cisco switch:
40. How can the Boot Loader help in recovering from a system crash?
41. When the switch is powered on, the POST begins. During POST, the LEDs blink
while a series of tests determine that the switch is functioning properly. When the
POST has completed, the SYST LED rapidly blinks ____________. If the switch
fails POST, the SYST LED turns _____________. When a switch fails the POST
test, it is necessary to ____________________________________.
7
CCNA Exploration 3, Chapter 2.
“Basic Switch Concepts and Configuration” Worksheet
CISCO Networking Academy
42. Explain why you would assign an IP address to a switch even though it is a
Layer 2 device:
43. To configure an IP address and subnet mask on the management VLAN of the
switch, you must be in _________________________________________ mode.
44. To configure a default gateway for the switch, use the _____________________
command in _________________________ mode.
45. Describe the purpose of the ip http authentication enable command:
46. Dynamic addresses are ______________ MAC addresses that the switch learns
and then ages when they are not in use. You can change the aging time setting
for MAC addresses. The default time is _________ seconds.
47. What are the implications of setting the aging time too short or too long?
48. Why would a network administrator specifically assign static MAC addresses to
certain ports on a switch?
8
CCNA Exploration 3, Chapter 2.
“Basic Switch Concepts and Configuration” Worksheet
CISCO Networking Academy
49. What command would be used to assign these static mappings?
50. List some of the “show” commands that can be used to verify the configuration of
a Cisco switch:
51. Why would you not regularly use the copy startup-config running-config
command to restore a switch’s configuration?
52. List the steps to upload a configuration file from a switch to a TFTP server for
storage:
53. List the steps to restore a configuration file to a switch from a TFTP server:
54. To clear the contents of your startup configuration, use the ________________
or the ____________________________________ privileged EXEC command.
55. To delete a file from Flash memory, use the ____________________________
privileged EXEC command.
9
CCNA Exploration 3, Chapter 2.
“Basic Switch Concepts and Configuration” Worksheet
CISCO Networking Academy
56. To ensure that a user on the console port is required to enter the password, use
the __________________ command. Even when a password is defined, it is not
required to be entered until the _________________ command has been issued.
57. What will happen if you input the login command in line configuration mode but
do not define a password?
58. How many vty ports are available on a Cisco 2960 switch?
59. The enable password global configuration command allows you to specify a
password to restrict access to privileged EXEC mode. What is the problem with
this and what mechanism does Cisco provide to protect switch security from this
problem?
60. What command will ensure that all system passwords are stored in an encrypted
form?
61. Summarize the method you would need to use to regain access to a Cisco
device in the case of lost or forgotten passwords:
10
CCNA Exploration 3, Chapter 2.
“Basic Switch Concepts and Configuration” Worksheet
CISCO Networking Academy
62. You can define a customized banner to be displayed before the username and
password login prompts by using the _________________________ command
in __________________________________________ mode. Enclose the
banner text in quotations or using a ______________________ different from
any character appearing in the MOTD string.
63. Compare and contrast the use of Telnet vs. SSH for remotely accessing a vty on
a Cisco switch:
64. If you have switched the transport protocol on the vty lines to permit only SSH,
what commands could you use (and in what mode) to re-enable the Telnet
protocol to permit Telnet access?
65. SSH supports the _______________________________________ algorithm,
the ______________________________ algorithm, and password-based user
authentication.
66. DES offers ___________ encryption, and 3DES offers ___________ encryption.
67. Explain SSH’s use of an RSA key:
11
CCNA Exploration 3, Chapter 2.
“Basic Switch Concepts and Configuration” Worksheet
CISCO Networking Academy
68. Summarize how an attacker could use MAC Address flooding to make a switch
act like a hub:
69. Explain what happens in a DHCP spoofing attack:
70. What is DHCP snooping and how does it protect against DHCP spoof attacks?
71. Explain why you should disable the use of CDP on devices that do not need to
use it:
12
CCNA Exploration 3, Chapter 2.
“Basic Switch Concepts and Configuration” Worksheet
CISCO Networking Academy
72. What are two types of Telnet attacks? (briefly explain each):
73. List the functions performed by Network Security Audits and Network Penetration
Testing:
74. List Network Security Tools Features and Uses:
75. List some things you could accomplish by implementing port security on switch
ports:
13
CCNA Exploration 3, Chapter 2.
“Basic Switch Concepts and Configuration” Worksheet
CISCO Networking Academy
76. List and describe Secure MAC Address types:
77. What is accomplished when you enable sticky learning on a switch interface?
78. List characteristics of Sticky secure MAC addresses:
79. What situations constitute a port security violation?
80. List and summarize port security violation modes:
81. List port security features and their default settings:
14
CCNA Exploration 3, Chapter 2.
“Basic Switch Concepts and Configuration” Worksheet
CISCO Networking Academy
82. List the command sequence (and corresponding modes) you would enter in a
Cisco Catalyst switch to configure dynamic port security on interface
FastEthernet 0/10:
83. List the command sequence (and corresponding modes) you would enter in a
Cisco Catalyst switch to configure sticky port security on interface FastEthernet
0/14:
84. To display port security settings for the switch or for the specified interface, use
the ____________________________________________________ command.
85. To display all secure MAC addresses configured on all switch interfaces or on a
specified interface with aging information for each, use the
_________________________________________________________ address
command.
86. For security, what should you do with all unused switch ports, and how would you
do this?
15
Download