SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is an IBSS?
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
1 second. Backup routers can learn the interval from the master
The wireless clients communicate directly with no other means of connectivity such as a WAP
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
2. At what layer should the WLC be connected?
Variation in delay
Distribution
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
Connects with SONET or SDH
3. What pins does FE use?
1 second. Backup routers can learn the interval from the master
The time that a port spends in both listening and learning states . Default 15 seconds
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
1/2 and 3/6
4. How do Cisco IP phones communicate with the CCM?
A MAC is seen on a different port
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
300 sec
With the skinny protocol
5. How is a WLC handoff handled when the WLCs are in different subnets?
By using an Ether-IP tunnel
By configuring every switch port to have an expected and controlled behavior
Root - designated - blocking - alternate - forwarding (host)
Can send and receive BDPUs
6. What does the reload keyword do in HSRP?
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
Group (0-1023) priority (1-255 higher better def 100)
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
FIB
7. How can BDPU Guard be configured?
Globally or per-port
Switchpotrt nonegotiate
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
Yes
8. How many users should be within a switch block?
Roughly 2000
Embeds the tag within the frame
300 sec by default
Etherchannel ports have inconsistent config
9. What does UDLD do?
With portfast
No
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
10. Can MSTP interoperate with 802.1q and/or PVST+?
Yes to both
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
The link status stays up - but something between them has failed or is filtering traffic
Used when there are 1 or more VLANs mapped to a single STP instance
11. How do you implement MST?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. What is the cost of a 10Gbps link?
2
On root - because the root bridge propagates timers with config BDPU
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
1 second. Backup routers can learn the interval from the master
13. What does the static keyword do when applying an arp ACL?
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Switch(config-if)# vrrp xx where xx= group number
Receives the first packet of a traffic flow and routes it
Prevents the dhcp binding DB from being checked.
14. What does the switchport host macro do?
Enables portfast - sets the port to access and disables PAgP
Collision domain
When a client roams between Aps in different subnets
It is enabled by default on all CEF capable switches
15. What is the range of PAgP channel group numbers?
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
Half because transmitting and receiving stations use the same frequency
1 to 64
16. Where shoul dmultilayer switches be implemented?
CEF is distributed completely among multiple L3 forwarding engines.
0-65535 (def 32768) lower=better
Distribution layer
Matching SSID - compatible data rate - authentication credentials
17. If a port is configured for errdisable auto recovery - how long does it stay down?
300 sec by default
Trusted or untrusted
MAC of the end device
The wireless clients communicate directly with no other means of connectivity such as a WAP
18. What is a null adjacency?
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
A key string of up to 8 characters is sent. Default is cisco.
Used to switch packets destined for the null interface
Globally
19. What are the steps to configure a LACP port channel?
By using an Ether-IP tunnel
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
Lowest cumulative cost to root
20. What is the DIFS?
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
The DCF interframe space- the random backoff time before a wireless set can transmit
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
21. How are RSTP point to point ports determined?
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
The L3 forwarding engine can't forward the packet in hardware because there is no L2 next-hop address - so the packet is sent to the L3 engine to generate the ARP response
Distributed coordinion function - the use of timers to prevent wireless collisions
Change in trunk encap
22. What is a QoS trust boundary?
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
Effectively stops STP on filtered ports
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
23. How doed backbonefast work?
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
By short-circuiting the max age timer
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
26-byte header - 4-byte trailer with CRC
24. How does PAgP form etherchannels?
All ports where root isn't expected
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
25. What criteria are used to size a switch block?
Untrusted
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
Will trunk if asked
1 per segment
26. RSTP discarding state
Incoming frames are dropped (combination of disabled - blocking - and listening)
Packets are discarded due to an ACL or policy action
Yes
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
27. What is the default network diameter?
The port asks the other end to trunk
7 switches from root bridge
Yes
Used when there are 1 or more VLANs mapped to a single STP instance
28. What is dynamic auto?
Cisco recommends only on the root bridge
Only when a nonedge port transitions to forwarding
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
Will trunk if asked
29. What is the size of ISL encapsulation?
26-byte header - 4-byte trailer with CRC
Yes
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
30. What types of links can be trunked?
Switch(config-if)# vrrp xx where xx= group number
Only for trusted Cisco gear - especially phones
FE - GE - and aggregated FE/GE Etherchannels
CEF is distributed completely among multiple L3 forwarding engines.
31. What does Root Guard do?
Switch(config-if)# glbp xx where xx = group number
Controls where candidate root bridges can be connected and found on a network
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
32. Each switch port is a _____ ______
Another router must have a higher HSRP priority and have preemt set up
The number of times the entry has been updated since the table was generated
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
Collision domain
33. What is DCF?
2-8 FE - GE - or 10GE are bundled.
The standby becomes active and stays active by default. Preemption can be configured
Distributed coordinion function - the use of timers to prevent wireless collisions
Differentiated services code point
34. What does a LAP do if it loses communication with it's WLC?
Reboots and searches for a new WLC
The DCF interframe space- the random backoff time before a wireless set can transmit
Port with best root path cost on segment
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
35. What is latency?
When a port moves into forwarding or from fowarding or learning to blocking.
The total delay from start to finish
They disguise the origin of an attack
The DCF interframe space- the random backoff time before a wireless set can transmit
36. What are the 6 steps to configure 802.1x for port security?
Yes to both
Used when there are 1 or more VLANs mapped to a single STP instance
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
37. RSTP alternate port
Globally
Manages addition - deletion and renaming VLANs across the network
Port with alternative path to root less desirable than root
The number of times the CEF table has bee flushed and regenerated as a whole
38. How much BW does a voip connection use?
12 kbps with headers and compression
Roughly 2000
As a VLAN access map
Between any type of interface as long as the interface can have an L3 address assigned
39. How much overlap should a wireless repeater have?
Show standby
The station can transmit immediately and wait for an ack
Roughly 50%
Switching Database Manager - configures and prunes TCAM partitions
40. What happens during HSRP failover?
The standby becomes active and stays active by default. Preemption can be configured
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
Interim solution - uses same hardware as WEP - but uses TKIP encryption
41. How is DHCP snooping enabled (scope)?
Port is forced to never authorize any connected client
Globally
Another router must have a higher HSRP priority and have preemt set up
The station can transmit immediately and wait for an ack
42. How many links can be used in an EtherChannel?
Enables portfast - sets the port to access and disables PAgP
Differentiated services
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
2-8 FE - GE - or 10GE are bundled.
43. What are the characteristics of the access layer?
Use sh interface on the interface and look for error counts > 10
No
It is enabled by default on all CEF capable switches
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
44. What happens if both 802.1D and RSTP BDPUs are received?
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
Used when ACLs specify port ranges...used by TCAM
2
45. Where is root guard enabled?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
46. How often are BDPUs sent?
2 seconds (def)
Promiscuous and host
802.1w
Collision domain
47. How does ISL handle COS?
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
FE and GE
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
All user ports that have portfast enabled
48. What does BDPU filtering do?
On root - because the root bridge propagates timers with config BDPU
When each AP stands alone within the larger network.
Effectively stops STP on filtered ports
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
49. How does UDLD work?
80% of the user traffic should stay in the VLAN
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
0-255
Only for trusted Cisco gear - especially phones
50. What are the 3 RSTP port types?
Determines when the AVG will stop using the old VMAC in ARP replies
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
Edge - root - and point to point
Incoming frames are dropped (combination of disabled - blocking - and listening)