A. True
B. False
C.
D.
Explanation: Virtual local area networks can be created by dividing the switch logically. Virtual local area networks reduce the number of devices as they use a single switch for multiple local area networks.
A. Port numbers of the switch
B. Ip addresses of the stations
C. Port numbers of the stations
D. Mac addresses of the stations
Explanation: Port number of a station cannot be considered as a characteristic to partition a switch, because a single station may have multiple port. Remaining all characteristics are unique to identify each station individually.
A. Tdm
B. Frame tagging and table maintenance
C. Frame tagging and tdm
D. Tdm, frame tagging and table maintenance
Explanation: Communication between two virtual area networks can be possible using a router or backbone switch. When back bone switch is used, then any one of the three methods can be used to establish communication between different VLANs.
A. To identify which VLAN they belong to
B. To identify which switch they belong to
C. To identify which host they belong to
D. To identify which router they belong to
Explanation: Generally, no host knows to which VLAN it belongs to and it is the switch who takes the responsibility of tagging VLAN identifiers to frames. Before placing a packet on the trunk link, the packet should have VLAN identifier to be identified uniquely.
A. Security and cost reduction
B. Security, cost reduction, efficiency and application management
C. Efficiency and application management
D. Security, cost reduction and efficiency
Explanation: Main purpose of VLANs is providing security. Along with security it reduces the cost by reducing usage of many devices, improves efficiency and it makes application easy to maintain.
A. Division of domains
B. Adds security
C. Latency reduction
D. VLAN hooping
Explanation: In VLAN hooping an attacker can access all the VLANs. The attacker gets the access by penetrating other VLANs with traffic. There are two ways to do this hooping, they are switch spoofing and double tagging.
A. VLAN 2-1001
B. VLAN 0-4095
C. VLAN 1002-1005
D. VLAN 1006-4094
Explanation: VLAN 2-1001 is a normal range where we can create the VLANs. These VLANs are editable means we can create, delete and update. Actually 1-4094 is the complete valid range to create the VLANs.
A. Data VLAN
B. Management VLAN
C. Default VLAN
D. Native VLAN
Explanation: When a switch encounters a frame without a VALN tag, then it routes the frame to the native VLAN. Basically, a native VLAN is VLAN1. But it is not advisable to let the VLAN1 be a native VLAN.
A. Manual and semi-automatic configuration
B. Manual and automatic configuration
C. Automatic, manual and semi-automatic
D. Automatic and semi-automatic
Explanation: VLAN configuration uses VLAN software and in that software, if we type all the addresses then it is manual. If a particular criterion is used to create the VLAN then it is automatic. In semi-automatic, we use manual configuration only for initializing.
A. 16 bits
B. 12 bits
C. 12 bytes
D. 2 bytes
Explanation: VLAN identifier occupies 12 bits in a frame tag to be distinguished from other VLANs. A tag field is present in between a source MAC address and ethernet type in the ethernet frame. This tag contains VLAN identifier.