SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the port number range?
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
By default weight is 100. Can be made dynamic per interface
0-255
Each frame transmits its expected duration time
2. What method of QOS does voice traffic use most frequently?
Differentiated services
The station can transmit immediately and wait for an ack
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
3. where does L2 switching occur?
Between interfaces that are assigned to L2 VLANs or L2 trunks
Trunk
A key string of up to 8 characters is sent. Default is cisco.
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
4. What is a QoS trust boundary?
By using a trunk link
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
Show standby
Completed dhcp bindings - mac addresses - IP addresses - etc.
5. Can MSTP interoperate with 802.1q and/or PVST+?
Root
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
Yes to both
Yes
6. What scope is 802.1x enabled?
Multicast to 01-80-c2-00-00-00
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
Globally
7. How does every VRRP command begin?
That they aren't using the same frequencies.
Switch(config-if)# vrrp xx where xx= group number
A single broadcast domain
Will trunk if asked
8. What is backbonefast?
Disabled - init - listen - speak - standby - active
Only for trusted Cisco gear - especially phones
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
9. What types of ports autonegotiate?
FE and GE
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
L2
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
10. What are the 4 steps to extend QoS trust?
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
26-byte header - 4-byte trailer with CRC
11. How does Root Guard work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. What is the port priority range?
0-255 (lower is better)
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
Only a single host connects . If one BDPU is received - it is no longer an edge port
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
13. How often are VRRP advertisements sent?
Forces the router to wait for a period of time before attempting overthrow
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
2
1 second. Backup routers can learn the interval from the master
14. How do you show HSRP status
Show standby
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
Used when there are 1 or more VLANs mapped to a single STP instance
Differentiated services code point
15. How does ISL do trunking?
Distribution
By encapsulating each frame in a header and trailer
Trunk - dynamic auto - dynamic desireable (default)
Only when a nonedge port transitions to forwarding
16. What are the 5 steps a LAP uses to establish communication with a WLC?
Enables portfast - sets the port to access and disables PAgP
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
Value - mask - and result (VMR) combinations
Limits the number if dhcp requests on a port
17. What types of authentication does HSRP allow?
Switches make an effort to move packets as quickly as possible
Plain text or md5
All ports where root isn't expected
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
18. What does the switchport host macro do?
Discarding - learning - forwarding
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
Half because transmitting and receiving stations use the same frequency
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
19. How do VRRP routers handle preemption?
On by default
Round robin - weighted - or host-dependent
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
Sends a voltage across the receive pairs to detect a 25k ohm resistance
20. At what layer does EAPOL run?
Dynamic WEP keys that change periodically
No shut
A point to point port type
L2
21. what if a secondary VLAN?
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
134 bits
Completed dhcp bindings - mac addresses - IP addresses - etc.
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
22. What is an IBSS?
Time between BDPUs sent by root bridge. Default of 2 seconds
Switch(config-if)# vrrp xx where xx= group number
The wireless clients communicate directly with no other means of connectivity such as a WAP
If the switch or the powered device doesn't suport power class discovery
23. What is the adjacency table?
Reboots and searches for a new WLC
Cisco recommends only on the root bridge
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
24. What is the PVLAN host mode?
From the DHCP snooping database or from static entries
Between interfaces that are assigned to L2 VLANs or L2 trunks
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
The time that a port spends in both listening and learning states . Default 15 seconds
25. What does VTP do?
1 IP subnet
Manages addition - deletion and renaming VLANs across the network
The ASIC
Two distribution switches that aggregate one or more access switches
26. What is a CEF glean?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
27. What does the src-mac option do when checking ARP replies
300 sec
By name - config revision - and instance to vlan mapping table
Checks the source MAC in the header against the sender MAC in the ARP reply
300 sec by default
28. can root guard and udld be used together?
Yes
0-255 (lower is better)
1 to 64
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
29. what I s distributed CEF (dCEF)?
Flash override (class 4)
Between any type of interface as long as the interface can have an L3 address assigned
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
CEF is distributed completely among multiple L3 forwarding engines.
30. If a wireless station needs to transmit and no other device is transmitting - what happens?
Access
Isl - dot1q - negotiate (default)
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
The station can transmit immediately and wait for an ack
31. What is dynamic auto?
Will trunk if asked
Only the standby monitors the hello messages from the active router
Priority (class 1)
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
32. If the WLC connects to an Etherchannel - how should the channel be configured and why?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
33. What is a BSS?
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Using a single WAP to centralize access and control over a group of wireless devices.
2
Configure and enable DHCP snooping
34. What is the STP forward delay timer?
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
The time that a port spends in both listening and learning states . Default 15 seconds
802.1D
Weak key rotation
35. How does IPT behave when the voice VLAN is in dot1p mode?
5 (0-4 with 4 being the highest)
Prevents the dhcp binding DB from being checked.
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
36. When DHCP snooping is turned on - by default - it considers all ports ______
Untrusted
0-255
Lowest cumulative cost to root
Turn on port security
37. What is 802.1x force-authorized?
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
The port is forced to always authorize any connected client with no authentication necessary (default)
Using a single WAP to centralize access and control over a group of wireless devices.
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
38. How can BDPU Guard be configured?
Half-duplex
Globally or per-port
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Using a single WAP to centralize access and control over a group of wireless devices.
39. What pins does FE use?
1/2 and 3/6
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
Receives the first packet of a traffic flow and routes it
Globally
40. What is the RSTP default hello interval?
Virtual Router Redundancy Protocol - pretty much the same as HSRP
Globally or per-port
2 seconds
Use sh interface on the interface and look for error counts > 10
41. Where shoul dmultilayer switches be implemented?
Distribution layer
It's a router that maintains routes (static or dynamic) - and populates the FIB
Both layer 2 switching and IVR
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
42. What is unique about HSRP group numbers?
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
1 IP subnet
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
43. if the switchport is part of an etherchannel - Where is the network assigned
To the virtual port-channel interface
Plain text or md5
Port
Used when ACLs specify port ranges...used by TCAM
44. How do you prevent switch spoofing?
Incoming frames dropped - but MACs learned
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
By configuring every switch port to have an expected and controlled behavior
On all switches in network to enable RLQ request and reply
45. RSTP alternate port
Differentiated services code point
Regions and instances
Configuration and TCN
Port with alternative path to root less desirable than root
46. RSTP discarding state
Full duplex
Incoming frames are dropped (combination of disabled - blocking - and listening)
Trunk
Use the spanning-tree root macro
47. Does VTP pass private VLAN configuration?
Incoming frames are dropped (combination of disabled - blocking - and listening)
No because they only participate if asked
No
Used when there are 1 or more VLANs mapped to a single STP instance
48. What is the default network diameter?
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
7 switches from root bridge
Access or trunk
The standby becomes active and stays active by default. Preemption can be configured
49. What is a VRRP group?
FE - GE - and aggregated FE/GE Etherchannels
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
The same as a standby group in HSRP
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
50. Where should STP timers be configured and why?
Manually
On root - because the root bridge propagates timers with config BDPU
The number of times the CEF table has bee flushed and regenerated as a whole
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.