Unlock hundreds more features
Save your Quiz to the Dashboard
View and Export Results
Use AI to Create Quizzes and Analyse Results

Sign inSign in with Facebook
Sign inSign in with Google
Quizzes > High School Quizzes > Technology

VLANs Practice Quiz: Module 3.6.4

Sharpen your VLAN knowledge with engaging practice

Difficulty: Moderate
Grade: Grade 12
Study OutcomesCheat Sheet
Colorful paper art promoting a VLANs Unlocked trivia quiz for IT and networking students.

Use this 20‑question quiz to check your understanding of VLANs, including 802.1Q tags, trunks, and inter‑VLAN routing. You'll spot weak areas fast, so you can review the right parts of the 3.6.4 module before class or an exam. It's a quick, focused practice set for Grade 12 networking.

What does VLAN stand for?
Verified Local Area Node
Variable Local Access Node
Virtual Linear Access Network
Virtual Local Area Network
Virtual Local Area Network is the correct expansion of VLAN. This term describes the logical segmentation of devices within a network regardless of their physical location.
Which of the following best describes a VLAN?
A wireless grouping of routers
A physical grouping of cables in a network
A routing method that bypasses the switch
A logical grouping of devices in a network that creates separate broadcast domains
A VLAN is a logical grouping that clusters devices together even if they are not on the same physical network. This segmentation improves security and simplifies network management.
What is one primary benefit of using VLANs in a school or office network?
Reduced network segmentation
Increased cable clutter
Lower network security
Enhanced broadcast traffic management
VLANs isolate broadcast domains, effectively reducing unnecessary traffic across the network. This results in enhanced performance and improved security by logically segmenting different user groups.
Which of these devices usually supports VLAN configuration?
Unmanaged hubs
Managed switches
Basic modems
Wireless repeaters
Managed switches are designed with configuration options that allow VLAN setup and management. Unmanaged devices do not support the tagging and segmentation required for VLANs.
In the context of VLANs, what does segmentation refer to?
Dividing a network into smaller, isolated broadcast domains
Merging broadcast domains into a larger group
Installing segmentation hardware
Combining various physical networks into one
Segmentation means dividing the network into smaller sections, each representing a separate broadcast domain. This aids in reducing congestion and enhances security by isolating traffic.
How do VLANs help in reducing broadcast traffic in a network?
By eliminating the need for routers
By isolating broadcast domains and confining traffic to each domain
By merging multiple networks into one broadcast domain
By increasing the number of connected devices
VLANs segment the network into multiple broadcast domains, so broadcasts are limited to specific groups. This containment reduces overall broadcast traffic and improves network efficiency.
What is VLAN tagging and why is it used?
The process of adding a VLAN identifier to Ethernet frames for correct routing
A technique to merge different VLANs into one broadcast domain
A method to secure the physical ports of the switch
Labeling network cables with colored tags
VLAN tagging inserts a specific identifier into Ethernet frames so that switches know to which VLAN the frame belongs. This becomes critical on trunk links carrying multiple VLANs, ensuring traffic is delivered to the right destination.
Which IEEE standard is commonly associated with VLAN trunking?
IEEE 802.11
IEEE 802.3
IEEE 802.1X
IEEE 802.1Q
IEEE 802.1Q is the standard that defines VLAN tagging for trunk links. It allows multiple VLANs to be carried over a single physical link while maintaining proper separation.
Which protocol is often used to establish VLAN trunking on Cisco switches?
Dynamic Trunking Protocol (DTP)
Rapid Spanning Tree Protocol (RSTP)
Spanning Tree Protocol (STP)
Routing Information Protocol (RIP)
Dynamic Trunking Protocol (DTP) is used on Cisco switches to automatically negotiate trunk links between devices. It simplifies the process of trunk configuration but must be managed carefully to avoid security issues.
What distinguishes a native VLAN from other VLANs on a trunk link?
It supports only tagged frames
It is always the default VLAN on any network
It carries untagged traffic
It operates only in wired networks
The native VLAN is designated to carry untagged traffic on a trunk link. This is important for devices that do not insert tags into their frames, ensuring proper traffic handling.
What is the most common method for enabling inter-VLAN routing?
Quantum routing
Router-on-a-stick configuration
Cross-VLAN switching
Spanning Tree bridging
Router-on-a-stick uses a single physical router interface with subinterfaces to route traffic between VLANs. This is a cost-effective and widely implemented method for enabling inter-VLAN communication.
Why might an organization implement VLAN segmentation from a security standpoint?
To increase the number of available IP addresses
To limit broadcast traffic and restrict access to sensitive data
To merge wired and wireless networks
To reduce the need for encryption
VLAN segmentation isolates different types of traffic, which can help contain and limit security breaches. By restricting access between segments, organizations can better protect sensitive information.
Which command is typically used on Cisco switches to assign a port to a specific VLAN?
switchport access vlan
set vlan port
vlan assign
port vlan-add
The command 'switchport access vlan ' is standard on Cisco switches to assign a port to a particular VLAN. This command ensures that the port only accepts untagged frames for that VLAN.
What is the main purpose of a trunk port in VLAN configurations?
To carry traffic for multiple VLANs between switches
To provide backup connectivity
To isolate a single VLAN's traffic
To connect wireless devices only
A trunk port is designed to transport traffic from several VLANs simultaneously through tagging. This allows multiple VLANs to communicate across switches over a single physical link.
Which VLAN mode allows switches to automatically negotiate the trunking interface role?
Uplink mode
Dynamic Desirable mode
Hybrid mode
Static Access mode
Dynamic Desirable mode enables a switch port to actively negotiate forming a trunk link with its connected device. This helps streamline network setup by automating trunk establishment.
What are potential consequences of an improper VLAN configuration on network performance?
No impact on network performance
Complete network isolation with no traffic
Enhanced load balancing and improved performance
Increased broadcast storms and reduced network efficiency
An improper VLAN configuration can lead to unintentional broadcast storms which cause congestion. This degradation in network efficiency can severely impact overall performance and connectivity.
How can VLANs be used to isolate traffic among different departments in a large organization?
By disabling router interfaces
By physically separating the network cables of each department
By creating separate VLANs for each department and using inter-VLAN routing for controlled communication
By placing all departments in a single VLAN and using ACLs afterwards
Creating separate VLANs for each department effectively isolates the traffic, ensuring that broadcast and sensitive data remain confined to the intended group. Inter-VLAN routing can then be used to manage and control any needed communication between departments.
When configuring switch ports, what is the key difference between an access port and a trunk port?
Access ports carry traffic for a single VLAN while trunk ports carry traffic for multiple VLANs
Access ports tag the traffic and trunk ports do not
There is no significant difference
Trunk ports only work with wireless devices
Access ports are assigned to one VLAN and do not tag the traffic, whereas trunk ports use VLAN tagging to handle traffic from multiple VLANs simultaneously. This fundamental difference is essential for proper network design and segmentation.
What issues might arise if there is a native VLAN mismatch on a trunk link between two switches?
The network will bypass VLAN restrictions, increasing performance
The native VLAN mismatch has no significant effect on network communication
Inter-VLAN traffic may be misrouted, causing potential security risks and traffic loss
The trunk link will automatically convert to an access port
A mismatch in the native VLAN can cause untagged traffic to be misinterpreted, leading to improper routing and security vulnerabilities. This mismatch disrupts the expected behavior of trunk links and can result in traffic loss.
How does VLAN design influence the behavior of Spanning Tree Protocol (STP) in a large network?
VLAN design does not impact STP operations at all
STP only operates on wired connections, so VLAN design is irrelevant
A proper VLAN design disables STP to enhance speed
Misaligned VLAN design can cause multiple STP instances, potentially leading to loops and inefficient topology
VLAN design is integral to how STP is implemented; poorly designed VLANs can lead to multiple and sometimes conflicting STP instances. This can result in network loops and suboptimal traffic paths, highlighting the importance of a well-planned VLAN structure.
0
{"name":"What does VLAN stand for?", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"What does VLAN stand for?, Which of the following best describes a VLAN?, What is one primary benefit of using VLANs in a school or office network?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}

Study Outcomes

  1. Understand the basic principles of VLAN architecture and segmentation.
  2. Analyze how VLANs optimize network traffic and enhance security.
  3. Apply VLAN configuration techniques in simulated networking environments.
  4. Evaluate the impact of VLAN design on network performance and scalability.
  5. Troubleshoot common VLAN issues using industry-standard practices.

3.6.4 VLAN Quiz Review Cheat Sheet

  1. Understand VLAN basics - VLANs let you carve up one physical network into multiple logical ones, cutting down on traffic chaos and boosting security like digital bouncers. Imagine hosting different parties in one hall but keeping the playlists and snack tables separate - no gate-crasher in sight!
  2. Dive into IEEE 802.1Q tagging - The IEEE 802.1Q standard defines how VLAN tags stick to Ethernet frames so switches know exactly which network each packet belongs to. With support for up to 4,094 VLANs, it's like giving every little subnet its own VIP wristband.
  3. Enforce policies with VLAN ACLs - VLAN Access Control Lists act as traffic referees, letting only approved IP addresses, protocols, or ports cross the field. They're your toolkit for granular security that stops unwanted chatter in its tracks.
  4. Assign VLANs to specific switch ports - Port-based VLAN assignment automates device placement so your printers, phones, and servers land in the right lane every time. It's like setting up automatic ticket gates - no manual ticket checks, fewer human errors.
  5. Limit VLAN broadcast domains - Smaller broadcast domains mean fewer shout-outs to every device, which reduces noise and speeds up your network performance. Think of it as having quieter conversations in cozy rooms versus shouting across a stadium.
  6. Use clear VLAN naming conventions - Give each VLAN a memorable name based on function (e.g., "Student_Net"), location, or team to make configs and troubleshooting a breeze. Good names are like clear street signs - you'll never get lost!
  7. Create a dedicated management VLAN - Isolating your network management traffic keeps your admin tools away from user data, boosting security and reliability. Your switches and routers get their own VIP lounge - safe from prying eyes.
  8. Disable DTP and lock down STP settings - Turning off Dynamic Trunking Protocol on trunk ports prevents rogue devices from tagging new VLANs, while finely tuned Spanning Tree settings block network loops. It's like sealing the back door and tightening up your fire drills.
  9. Implement port security - Cap the number of MAC addresses per port to stop unauthorized devices from waltzing onto your network. Think of it as a VIP list at the door - no uninvited connections allowed!
  10. Enable DHCP snooping - DHCP snooping filters out rogue DHCP servers by only trusting responses from approved sources. It's like having a bouncer who only admits legit IP addresses - no fake leases, no drama.
Powered by: Quiz Maker