CCNA

0.0(0)
studied byStudied by 1 person
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

60 Terms

1
New cards

What is the purpose of VLANs?

To logically separate networks at Layer 2, reducing broadcast domains and improving security and performance.

2
New cards

What happens if a VLAN is not allowed on a trunk?

Traffic for that VLAN will not pass between switches.

3
New cards

Do devices in the same VLAN need a router to communicate?

No, Layer 2 switching is sufficient.

4
New cards

What command controls which VLANs pass over a trunk?

switchport \ trunk \ allowed \ vlan

5
New cards

Why is an SVI (Switch Virtual Interface) needed?

To give a VLAN a Layer 3 gateway for communication outside the VLAN.

6
New cards

Can a switch have an IP address?

Yes — via an SVI, usually for management or routing.

7
New cards

What happens if a VLAN has no SVI or router interface?

It cannot communicate with other VLANs.

8
New cards

What triggers a port-security violation?

A MAC address not allowed on the port sends traffic.

9
New cards

What is the default port-security violation action?

Shutdown (err-disabled).

10
New cards

How do you recover an err-disabled port?

shutdown then no \ shutdown (or errdisable recovery).

11
New cards

Why is port security used?

To prevent unauthorized devices from accessing the network.

12
New cards

What is the purpose of Spanning Tree Protocol (STP)?

To prevent Layer 2 loops.

13
New cards

Which switch becomes the root bridge in STP?

The switch with the lowest bridge ID (priority + MAC).

14
New cards

Why might you manually choose a root bridge?

To control traffic flow and optimize paths.

15
New cards

Can different VLANs have different root bridges?

Yes (PVST - Per-VLAN Spanning Tree).

16
New cards

What does PortFast do?

Immediately places an access port into the forwarding state.

17
New cards

Why should PortFast NOT be used on trunk ports?

Because trunks may connect to switches, risking loops.

18
New cards

What does BPDU Guard do?

Shuts down a PortFast port if a Bridge Protocol Data Unit (BPDU) is received.

19
New cards

Why might BPDU Guard not “show” in STP output?

It only triggers when a BPDU is received.

20
New cards

If a PC can ping the same VLAN but not other VLANs, what layer is the issue?

Layer 3 (routing / gateway).

21
New cards

What are two causes for a PC not getting DHCP when the VLAN exists?

Missing DHCP scope, missing helper address, or trunk VLAN missing.

22
New cards

In what order should you troubleshoot network issues?

Physical → VLAN → Trunk → IP → Routing → Services

23
New cards

What protocol is used for VLAN tagging on Ethernet trunks?

IEEE 802.1Q

24
New cards

What happens if the native VLANs do not match on a trunk?

Traffic may leak between VLANs and STP issues may occur.

25
New cards

Does the native VLAN carry tagged or untagged traffic?

Untagged traffic.

26
New cards

Can an access port carry more than one VLAN?

No.

27
New cards

Which command shows whether a port is access or trunk?

show \ interfaces \ switchport

28
New cards

What is Router-on-a-Stick (ROAS)?

Inter-VLAN routing using a single trunk link between a router and a switch.

29
New cards

What must be configured on router subinterfaces for ROAS?

  1. Encapsulation (encapsulation \ dot1q \ [vlan-id])

  2. IP address (gateway)

30
New cards

If PCs can ping their gateway but not other VLANs, what is likely missing?

Routing between VLANs or router subinterface misconfiguration.

31
New cards

What is the purpose of DHCP?

To automatically assign IP configuration to hosts.

32
New cards

What is the default DHCP lease behavior?

Temporary IP assignment that must be renewed.

33
New cards

Why is ip \ helper-address used?

To forward DHCP broadcasts to a remote DHCP server across subnets.

34
New cards

On which interface is ip \ helper-address configured?

The gateway interface (SVI or subinterface) for the client VLAN.

35
New cards

What happens if a DHCP pool overlaps another network?

DHCP may fail or assign incorrect addresses.

36
New cards

Which switch becomes root bridge by default in STP?

The switch with the lowest MAC address (if priorities reach a tie).

37
New cards

What is the default STP priority?

32768

38
New cards

What are the STP port states?

Blocking, Listening, Learning, Forwarding, and Disabled.

39
New cards

What port role forwards traffic toward the root bridge?

Root port.

40
New cards

What port role blocks redundant paths in STP?

Alternate port.

41
New cards

Why does PortFast exist?

To allow end devices to connect quickly without encountering STP transition delays.

42
New cards

What happens if a BPDU is received on a BPDU Guard–enabled port?

The port is put into an err-disabled state.

43
New cards

Why is BPDU Guard used with PortFast?

To protect the network from accidental loops occurring on edge ports.

44
New cards

Where should PortFast be enabled?

On access ports connected to end devices only.

45
New cards

What is EtherChannel?

Multiple physical links bundled into one logical link to increase bandwidth and redundancy.

46
New cards

What happens if EtherChannel is misconfigured?

STP may block redundant ports or a loop may occur.

47
New cards

Must all EtherChannel member ports match configuration?

Yes (speed, duplex, VLANs, and trunking mode).

48
New cards

What type of NAT allows many private devices to share one public IP?

PAT (Port Address Translation).

49
New cards

Why is NAT commonly used?

To conserve public IPv4 addresses.

50
New cards

What is an ACL used for?

To permit or deny traffic based on defined rules.

51
New cards

Where are extended ACLs ideally placed?

As close to the source as possible.

52
New cards

What is the implicit rule at the end of every ACL?

deny \ ip \ any \ any

53
New cards

How many bits is an IPv6 address?

128 bits.

54
New cards

What does :: represent in IPv6?

A compressed series of zeros (used once per address).

55
New cards

Which wireless security protocol is currently most secure?

WPA2 or WPA3

56
New cards

What is an SSID?

The wireless network name (Service Set Identifier).

57
New cards

What device connects wired and wireless networks?

Wireless Access Point (AP).

58
New cards

If a PC cannot ping its gateway, what should you check first?

IP address, subnet mask, and VLAN assignment.

59
New cards

If a PC can ping the gateway but not the internet, what is the likely issue?

A routing issue or NAT configuration error.

60
New cards

If a switch is reachable via console but not SSH, what should you check?

Management IP, VTY line config, transport input, domain name, and RSA keys.