Switch Security

Which of the following connectivity hardware is used to create a VLAN?
Switch.
You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer.

What should you use for this situation?

VLAN
You manage a network that uses switches. In the lobby of your building are three RJ-45 ports connected to a switch.
You want to make sure that visitors cannot plug their computers to the free network and connect to the network. However, employees who plug into those same jacks should be able to connect to the network.
What feature should you configure?
Port authentication.
You manage a network that uses a single switch. All ports within your building connect through the single switch.
In the lobby of your building are three RJ-45 ports connected to a switch. You want to allow visitors to plug into these ports to gain Internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and Internet access.
Which feature should you implement?
VLANs.
Which type of device is required to implement port authentication throughout a switch?
RADIUS server.
Which of the following best describes the concept of virtual LAN?
Devices on the same network logically grouped as if they were on separate networks.
You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches.
Which feature allows the switches to pass VLAN traffic between the switches?
Trunking.
You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports.
You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch also in VLAN 1.
What should you configure to allow communication between these two devices through the switches?
Trunking.
Your company is a small start-up company that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides Internet access.
You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented?
VLAN.
You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports.
You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the same switch which is in VLAN 2.
What should you configure so that the two devices can communicate?q
Routing.
When configuring VLANs on a switch, what is used to identify VLAN membership of a device?
Switch port.
Which switch features are typically used with VoIP
VLAN.
PoE.
When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch?
Trunk ports.
Which of the following do switches and wireless access points use to control access through the device?
MAC filtering.