Data Communications and Networking 3: Dashboard MIS6314 Week 2: LAN Redundancy Assignment 002

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Data Communications and Networking 3

1. Dashboard
2. My courses
3. MIS6314
4. Week 2: LAN Redundancy
5. Assignment 002
Question 1
Correct
Mark 1.00 out of 1.00

Flag question
Question text
As discussed in this chapter, what is an advantage of PVST+?
Select one:
a.
PVST+ requires fewer CPU cycles for all the switches in the network.
b.
PVST+ reduces bandwidth consumption compared to traditional implementations of STP that use CST.
c.
PVST+ optimizes performance on the network through autoselection of the root bridge.
d.
PVST+ optimizes performance on the network through load sharing.

Question 2
Correct
Mark 1.00 out of 1.00

Flag question
Question text
Multiple frame transmission is used even without some loop-avoidance process each switch that can flood
broadcasts endlessly.
Select one:
True
False
Question 3
Correct
Mark 0.67 out of 1.00
Flag question
Question text
In this chapter, which is a characteristic of a Layer 2 loop?
Select one:
a.
The Time-to-Live attribute of a frame is set to infinity.
b.
Broadcast frames are forwarded back to the sending switch.
c.
Routers continually forward packets to other routers.
d.
A switch is continually forwarding the same unicast frame.
Question 4
Correct
Mark 1.00 out of 1.00

Flag question
Question text
You can use the show standby command to verify the HSRP state.
Select one:
True
False
Question 4
Correct
Mark 1.00 out of 1.00

Flag question
Question text
You can use the show standby command to verify the HSRP state.
Select one:
True
False
Question 5
Correct
Mark 0.67 out of 1.00

Flag question
Question text
As per our current module discussion, which non-proprietary protocol provides router redundancy for a
group of routers which support IPv4 LANs?
Select one:
a.
GLBP
b.
HSRP
c.
SLB
d.
VRRPv2
Question 6
Correct
Mark 1.00 out of 1.00

Flag question
Question text
The RSTP is also known as IEEE 802.1D.
Select one:
True
False
Question 7
Correct
Mark 1.00 out of 1.00

Flag question
Question text
There are three (3) components combined to form a bridge ID, those are MAC address, bridge priority,
and port ID.
Select one:
True
False
Question 8
Correct
Mark 0.33 out of 1.00

Flag question
Question text
In this chapter, which two types of spanning tree protocols can cause sub-optimal traffic flows because
they assume only one spanning-tree instance for the entire bridged network?
Select one:
a.
Rapid PVST+ & RSTP
b.
PVST+ & VRRP
c.
STP & MSTP
d.
STP & RSTP
Question 9
Correct
Mark 1.00 out of 1.00

Flag question
Question text
In FHRP operation, two or more routers are represented as a single virtual router.
Select one:
True
False
Question 10
Correct
Mark 0.00 out of 1.00
Flag question
Question text
The root bridge serves as a reference point for all spanning tree calculations to determine which
redundant paths to block.
Select one:
True
False

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy