SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is a community secondary VLAN?
Automatically negotiates a common trunk mode between switches
Yes
Yes
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
2. How do you enable CEF?
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
It is enabled by default on all CEF capable switches
7 switches from root bridge
They disguise the origin of an attack
3. What are spoofed addresses?
By encapsulating each frame in a header and trailer
On root - because the root bridge propagates timers with config BDPU
They disguise the origin of an attack
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
4. What address does HSRP send hello packets to?
The redundant SUP is booted and sup and route engine is init'd. No L2 or L3 functions are started. Allows switchports to retain state
From the DHCP snooping database or from static entries
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
224.0.0.2 (all routers)
5. What is a QoS trust boundary?
The wireless clients communicate directly with no other means of connectivity such as a WAP
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
Receives the first packet of a traffic flow and routes it
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
6. How many potential links can LACP define?
Isl - dot1q - negotiate (default)
16 - of which up to 8 are active. The others are in standby
Dynamic arp inspection
After forwarding delay - port can learn new MAC addresses
7. What is arp throttling?
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
2 - one for control messages and one for data
8. What are the two private vlan association modes?
Between interfaces that are assigned to L2 VLANs or L2 trunks
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
A group of wireless devices that share a common SSID
Promiscuous and host
9. What are the two etherchannel negotiation protocols?
With the skinny protocol
Best effort delivery - integrated services model - and differentiated services model
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
PAgP (Cisco proprietary) and LACP (standards-based)
10. How many 802.3af power classes are there?
5 (0-4 with 4 being the highest)
Both ends should be on because on modes doesn't send PAgP or LACP packets
Value - mask - and result (VMR) combinations
Dynamic WEP keys that change periodically
11. What is the range of HSRP group numbers?
0-255
Yes
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
19
12. unknown unicast flooding
Packets are discarded due to an ACL or policy action
Yes
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
Trunk
13. How is an RSTP edge port configured
Interim solution - uses same hardware as WEP - but uses TKIP encryption
With portfast
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
Once the CCM gives them the parameters - they use RTP
14. What does the minimum keyword do in HSRP?
Forces the router to wait for a period of time before attempting overthrow
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
Between interfaces that are assigned to L2 VLANs or L2 trunks
PAgP (Cisco proprietary) and LACP (standards-based)
15. What happens if both 802.1D and RSTP BDPUs are received?
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
Route once - switch many
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
16. Which fiber is the receive?
On the left as you face the connector
Route once - switch many
After forwarding delay - port can learn new MAC addresses
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
17. If there are 2 ports with same root cost - how is the tie broken for designated port?
Isl - dot1q - negotiate (default)
An AP's coverage area
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
18. How far chould a VLAN extend?
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
Half-duplex
Real-time Transport Protocol
Distribution layer
19. How does L3 QOS classification happen?
A key string of up to 8 characters is sent. Default is cisco.
The TOS field in the header is used. 2 methods 3 bits or 6 bits
TCAM
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
20. What is an indirect topology change?
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
All ARP packets that arrive on untrusted ports are inspected.
The link status stays up - but something between them has failed or is filtering traffic
802.1x with EAP over LAN (EAPOL)
21. How can you tell if a switch block is too large?
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
By creating a static IP binding
Switch(config-if)# standby xx where x= group number
Trusted ports
22. What is an isolated secondary VLAN?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
23. How does VRRP do tracking?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
24. What can the Etherchannel hash use?
Using digital certificates
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Src-dst-ip
25. What does the standby HSRP router do?
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
Arp for local subnet - if on different subnet - will arp for dgw
Only the standby monitors the hello messages from the active router
224.0.0.2 (all routers)
26. How do Cisco IP phones communicate with the CCM?
Hashing algorithm
When the AP uplinks to an Ethernet network.
To a VLAN and not to a VLAN interface (SVI)
With the skinny protocol
27. How should the switch port to which a WLC be configured?
0-255 (lower is better)
Packets must be sent to the L3 engine for further processing
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Trunk
28. How does dot1q do trunking?
Embeds the tag within the frame
All user ports that have portfast enabled
If the switch or the powered device doesn't suport power class discovery
Manually
29. How is the IPT 802.1 trunk negotiated?
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
Automatically using DTP and CDP
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
By encapsulating each frame in a header and trailer
30. What can cause a wireless client to switch between Aps?
Port is forced to never authorize any connected client
With portfast
When the AP uplinks to an Ethernet network.
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
31. What does UDLD do?
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
When a client roams between Aps in different subnets
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
Incoming frames dropped - but MACs learned
32. What are the 5 steps a LAP uses to establish communication with a WLC?
Both layer 2 switching and IVR
The TOS field in the header is used. 2 methods 3 bits or 6 bits
Using a single WAP to centralize access and control over a group of wireless devices.
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
33. What is the STP Max Age timer?
Disabled - blocking - listening - learning - forwarding
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
2 strand MMF with MT-RJ or SC connectors
34. What is the GLBP redirect timer?
Determines when the AVG will stop using the old VMAC in ARP replies
Distribution layer
On all switches in network to enable RLQ request and reply
Matching SSID - compatible data rate - authentication credentials
35. What is the cost of a 10Gbps link?
SC fiber or RJ-45
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
Collision domain
2
36. 802.11b
Either desirable or auto mode
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
37. How does 802.3af do power discovery?
Arp for local subnet - if on different subnet - will arp for dgw
The ASIC
Sends a voltage across the receive pairs to detect a 25k ohm resistance
10-15%
38. How does an L2 switch do QOS?
1500B
An L2 switch can only forward frames best effort unless going across a trunk
Will trunk if asked
Both ends should be on because on modes doesn't send PAgP or LACP packets
39. What is UDLD normal mode?
It is enabled by default on all CEF capable switches
Routers are assigned to common GLBP group. All routers can be active and can load balance
Two distribution switches that aggregate one or more access switches
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
40. What is errdisable pagp-flap?
Distribution layer
Two distribution switches that aggregate one or more access switches
All ARP packets that arrive on untrusted ports are inspected.
Etherchannel ports have inconsistent config
41. How does IPT behave when the voice VLAN is in dot1p mode?
2
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
Isl - dot1q - negotiate (default)
42. What is step 1 of enabling IP source guard?
Configure and enable DHCP snooping
The ASIC
When a wireless station transmits a frame - the receiving one must send an ack
By brining up a tunnel between them to carry 802.11 related messages and client data.
43. What contains the next-hop entries?
An L2 switch can only forward frames best effort unless going across a trunk
Roughly 50%
FIB
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
44. How is a QoS trust bondary configured?
After forwarding delay - port can learn new MAC addresses
Every switch and router in a network must be configured with appropriate QoS features and policies
Port stays up - packets from violating MACs dropped - no logging
By brining up a tunnel between them to carry 802.11 related messages and client data.
45. Where should STP timers be configured and why?
Configuration and TCN
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
On root - because the root bridge propagates timers with config BDPU
46. What is the format of the VRRP virtual MAC?
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
26-byte header - 4-byte trailer with CRC
0000.5e00.01xx
Port with best root path cost
47. What is the VRRP master router?
3 seconds. Holdtime =3 hellos + 1
The active router. All other routers are in backup state
12 kbps with headers and compression
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
48. What are the 4 steps to extend QoS trust?
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
Variation in delay
0-65535 (def 32768) lower=better
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
49. For QoS - switch uplinks should always be considered as ____ _____?
Trusted ports
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
From the DHCP snooping database or from static entries
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
50. What is unique about HSRP group numbers?
Disabled - blocking - listening - learning - forwarding
Admin down
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP