Cisco Systems 2 manual How does a bridge function?, Answer C Explanation

Page 137

640 - 607

A.Bridge between management and sites.

B.Routers to provide the most secure segmentation.

C.A hub to provide the ease of management and a satisfactory alternative for the network security.

D.An Ethernet switch to secure separation through programming the access list of each port of the switch.

Answer: B.

Explanation:

Routers provide better separation, dividing the segments into both separate collision and broadcast domains, and provide access lists for controlling security.

Incorrect Answers:

A, C, D are Layer 2 devices which breaks up the collision domains, but is still one broadcast domain. Security and filtering within these devices are primitive (although switching is a little more advanced). Any filtering that can be done at layer 2 is primitive and requires a lot of administrative effort.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 18-28.

Q. 222

How does a bridge function?

A.It maintains a table of the IP address of the host connected to its internet segment

B.It passes packets outside of its network segment if its IP address cannot be found on its table.

C.It looks up the frames destination in its address table and sends the frame towards the destination.

D.It maintains the table of the data link layer and network layer addresses for the host connected to its network segment.

Answer: C.

Explanation:

A transparent bridge stores information in memory in what is called a “forwarding table”. The forwarding table lists each end station (from which the bridge has heard a frame within a particular time period) and the segment on which it resides. When a bridge hears a frame on the network, it views the destination address and compares it to the forwarding table to determine whether to filter, flood or copy the frame into another segment.

Incorrect Answers:

A is incorrect; the forwarding table does not contain a list of IP address. Rather it contains a list of devices that it is connect to and on which segment each device resides.

B is incorrect; if the destination device is unknown to the bridge, the bridge forwards the frame to all segments except the one on which it was received. This process is known as flooding.

D is incorrect; the device maintains a list of the data link layer addresses for host connected to its network segment.

Leading the way in IT testing and certification tools, www.testking.com

- 137 -

Image 137
Contents Ccna Important Note Please Read Carefully Answer D Which command displays the configuration register setting?Incorrect Answers Answer D ExplanationAnswer B Explanation Answer C ExplanationExhibit Answer a Explanation Answer B Answer C During encapsulation in which order is information packaged?Answer E Explanation Answer A, B, E Answer F Explanation Answer a What is the result of segmenting a network with a bridge?Physical layer Data layer Network layer Transport layer Host 1-1 can ping Host Answer B, D, F Answer A, B and EAnswer A, B, D 640 Answer A, D, F Answer B, C, E Answer A, D Cable #1 Cable #2 Cable #3 Cable #4 Answer A, B 640 Answer D What is the likely cause of this problem? Answer A, C, D Answer Answer B, F 640 RIP Ospf Eigrp Igrp Answer Explanation Answer A, B, D, E Answer D Is incorrect this is not a valid command Answer B Answer D Answer A, C, D, E Answer E Which of the following are true?What is a benefit of a virtual LAN VLAN? Answer C, D Answer B Given the configuration example Answer D, E Explanation Answer A, E, F How does inter-VLAN communication take place? Which two statements about IP RIP are true? Choose twoAnswer D, F Answer A, B, C, and D CSMA/CD Answer A, D Which two statements about a bridge are true. Choose two Which statement about an IP network is true? Answer A, B, C, G 10.0.0.0 to 172.16.0.0 to 192.168.0.0 toExplanation Which statement is true? Incorrect Options Answer A, B, D ExplanationAnswer A, C, E Which two protocol tools use ICMP? Choose two Answer a and BAnswer A, C Which command successfully ping an individual IP address?One Two None Several Which commands should you use to enable Igrp routing? Answer E Answer A, B, C Explanation Answer A, B, C Answer B, DWhat is the bandwidth capacity of an Isdn B channel? Answer a Which statement about Ethernet networks is true? What is the distance limitation for 100BaseT? Which command sets the clock rate to 56 Kbps on serial0? Setup dialogue what do the square bracket indicate? Which command retrieves the configuration file from NVRAM? What is the most common Layer 2 device? SAP Hdlc ARP Novellether Answer a Answer D Answer A, C What are two components of an IPX address? Answer B, C Explanation Answer C, D, E, F Answer F Answer a and d Which two statements are true? Choose twoWhat is a backoff on an 802.3 network? What is a key use of a device hardware address? 16,382 65,534 Session Network Transport Maintenance 640 Answer A, C Explanation What are the characteristics of UDP? MAC LLC SAP LCP Tab Ctrl R Spacebar Right Arrow PPP Lapd Isdn Hdlc Answer B, C What does the command show access-list 101 list?Which two commands show your access lists? Choose two IP and IPX IP and PPP PPP and Sdlc PPP and Hdlc 640 What are two functions of Icmp protocol? Choose Two Answer C, D, E ExplanationAnswer D, E 172.37.2.55 to What does the term ‘Base’ refer to in 100BaseT? Click the task button & Place the encapsulation Answer Explanation IP-Space enable From where does the router boot? When you issue the command show version, your router returns101 What is the most common mail to device? 103 104 105 106 Which statement about Ethernet switches is true? 108 109 110 111 Answer A, B, F 113 Which operation is most likely to follow? You just entered the following command115 Answer A, B, C, D What is back off on an 802.3 network? 118 Answer B, E Which command displays access list 111?120 121 122 123 124 125 126 Answer E, F, G 128 Answer A, D Explanation 130 What are the generic parts of a network layer address? What is an advantage of local area network LAN segmentation?132 133 134 135 136 How does a bridge function? 138 What are two purposes for using switches? Choose two What is an example of a valid MAC address? 141 Answers C, D Which two physical interfaces does PPP support? Choose two143 144 145 146 147 148 149 What is the purpose of ISL and 802.lq frame tagging? 151 152 Which of the following describes isdn bri servie? 154 Answer B What do you use for loop avoidance? Choose two 156 Answer B Diagram 158 Answer A, B, E Identify the effect of Ctrl-Z? 160 161 162 163 Answer a How do you change the Console password to cisco? 165 166 167 Answer C 301 Answer D Q299Answer a 304 Answer D 302Answer C 303 Answer B, C 307 Answer B 310 Answer D 309 What is the purpose of DLCIs in Frame Relay?172 173 Answer C 318 175 176 177 178 179 180 Q327 Answer Unknown 328 Answer Unknown
Related manuals
Manual 40 pages 55.56 Kb Manual 100 pages 60.16 Kb