SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the STP hello timer?
With portfast
Time between BDPUs sent by root bridge. Default of 2 seconds
Etherchannel ports have inconsistent config
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
2. What are the RSTP port states?
Discarding - learning - forwarding
Automatically negotiates a common trunk mode between switches
They disguise the origin of an attack
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
3. What is layer 3 roaming?
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
Bridge priority and MAC
When a client roams between Aps in different subnets
Packets are discarded due to an ACL or policy action
4. What is UDLD normal mode?
Between interfaces that are assigned to L2 VLANs or L2 trunks
Value - mask - and result (VMR) combinations
No
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
5. what must be done on an SVI before it is activated?
When a wireless station transmits a frame - the receiving one must send an ack
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
No shut
Completed dhcp bindings - mac addresses - IP addresses - etc.
6. How much BW does a voip connection use?
That they aren't using the same frequencies.
Silent
12 kbps with headers and compression
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
7. How does every HSRP config command begin?
Prevents the dhcp binding DB from being checked.
Needs hardware upgrade over WEP - uses AES encryption
Switch(config-if)# standby xx where x= group number
FE - GE - and aggregated FE/GE Etherchannels
8. static vlans offer ____ based membership
Sends a voltage across the receive pairs to detect a 25k ohm resistance
Port
Checks the destination MAC in the header against the target MAC in the ARP reply
Root - designated - alternate - and backup
9. RSTP forwarding state
Incoming frames dropped - but MACs learned
Frames are forwarded
Using a single WAP to centralize access and control over a group of wireless devices.
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
10. What is a punt adjacency?
BGP - EIGRP - OSPF - and IS-IS.
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
Packets must be sent to the L3 engine for further processing
Usually QoS from VOIP but not PC dataa
11. How does HSRP do MD5 authentication?
1-65535 (def 32768) lower priority - higher probability
By using a hash of a key string
Disabled - init - listen - speak - standby - active
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
12. What categories can ports be in with dhcp snooping enabled?
Trusted or untrusted
Used when there are 1 or more VLANs mapped to a single STP instance
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
13. Define VRRP
Virtual Router Redundancy Protocol - pretty much the same as HSRP
Packets are discarded due to an ACL or policy action
No
Normal and aggressive
14. If one end of an Etherchannel (either type) is set to on and the channel doesn't form - what should you check?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. What is an autonomous mode AP?
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
The total delay from start to finish
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
When each AP stands alone within the larger network.
16. What does the switchport host macro do?
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Access
17. How does packet forwarding work
Used when there are 1 or more VLANs mapped to a single STP instance
Arp for local subnet - if on different subnet - will arp for dgw
Can hear only BDPUs
Packets must be sent to the L3 engine for further processing
18. What are the restrictions for bundling into an Etherchannel?
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
When the AP uplinks to an Ethernet network.
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
Only for the offending VLAN on the port
19. What are the 2 choices for VLANs with IPT?
Configuration and TCN
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
Value - mask - and result (VMR) combinations
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
20. What happens during HSRP failover?
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
The standby becomes active and stays active by default. Preemption can be configured
Incoming frames are dropped (combination of disabled - blocking - and listening)
1/2 and 3/6
21. EAP encryption
Configure non-silent submode
Etherchannel ports have inconsistent config
Dynamic WEP keys that change periodically
By name - config revision - and instance to vlan mapping table
22. What are the steps to configuring HSRP MD5 authentication?
When the AP uplinks to an Ethernet network.
The campus network's backbone
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
Half-duplex
23. What is the 80/20 rule?
A point to point port type but the neighboring device runs traditional 802.1D STP
Between interfaces that are assigned to L2 VLANs or L2 trunks
80% of the user traffic should stay in the VLAN
No
24. What is a null adjacency?
The TOS field in the header is used. 2 methods 3 bits or 6 bits
Used to switch packets destined for the null interface
The configureable UDLD interval must be less than max age plus two intervals of forward delay
Local only
25. What is the default FE duplex?
Full duplex
Use sh interface on the interface and look for error counts > 10
An AP's coverage area
Transmits keystrokes from phone and commands from CCM
26. What is the STP forward delay timer?
The time that a port spends in both listening and learning states . Default 15 seconds
A point to point port type
A private VLAN can be logically associated with a special secondary vlan
On the left as you face the connector
27. What is the PVLAN promiscuous mode?
A client can roam to any WLC as long as it stays in a mobility group
All fiber-optic links between switches (must be enabled on both ends)
Configure and enable DHCP snooping
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
28. How do you disable DTP when you configure both ends of the ISL manually?
Disabled - blocking - listening - learning - forwarding
Switchpotrt nonegotiate
Gateway load balancing protocol - cisco proprietary
Those that connect to other switches
29. What is a vlan?
A single broadcast domain
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
Dynamic arp inspection
Multicast to 01-80-c2-00-00-00
30. How do you prevent switch spoofing?
By configuring every switch port to have an expected and controlled behavior
The port is forced to always authorize any connected client with no authentication necessary (default)
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
0000.0c07.acxx where xx is the group number as a 2-digit hex value
31. How should the switch port to which a LAP be configured?
Controls where candidate root bridges can be connected and found on a network
2 seconds
The TOS field in the header is used. 2 methods 3 bits or 6 bits
Access
32. What is the default mode of load balancing?
Port is forced to never authorize any connected client
Src-dst-ip
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
Half because transmitting and receiving stations use the same frequency
33. What is the default network diameter?
Using a single WAP to centralize access and control over a group of wireless devices.
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
Time between BDPUs sent by root bridge. Default of 2 seconds
7 switches from root bridge
34. FE connectors use...
2 strand MMF with MT-RJ or SC connectors
Promiscuous and host
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
From the DHCP snooping database or from static entries
35. What does IP source guard do?
It is enabled by default on all CEF capable switches
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
A packet can't be switched in hardware with the FIB and must go to the L3 engine
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
36. What is dynamic desireable?
A point to point port type but the neighboring device runs traditional 802.1D STP
Use the spanning-tree root macro
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
The port asks the other end to trunk
37. What is an insignificant topology change?
Routers are assigned to common GLBP group. All routers can be active and can load balance
A host port goes up or down
The same as a standby group in HSRP
The standby becomes active and stays active by default. Preemption can be configured
38. How do you show HSRP status
Show standby
Per VLAN
Collision domain
By brining up a tunnel between them to carry 802.11 related messages and client data.
39. How is DHCP snooping enabled (scope)?
2 seconds
Flash override (class 4)
Globally
Silent
40. what I s distributed CEF (dCEF)?
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
LACP port priority
CEF is distributed completely among multiple L3 forwarding engines.
41. What is PVST plus (PVST+)?
Yes
Usually QoS from VOIP but not PC dataa
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
Plain text or md5
42. Where is the QoS trust boundary usually configured on an IP phone?
Usually QoS from VOIP but not PC dataa
0-255
0-65535 (def 32768) lower=better
Group (0-1023) priority (1-255 higher better def 100)
43. What are the steps to configure a LACP port channel?
LACP port priority
The ASIC
The number of times the CEF table has bee flushed and regenerated as a whole
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
44. What are the gotchas for uplinkfast?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
45. How does UDLD work?
Another router must have a higher HSRP priority and have preemt set up
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
1/2 and 3/6
All nondesignated ports - but ok for all ports
46. What does DTP do?
Automatically negotiates a common trunk mode between switches
The L3 forwarding engine can't forward the packet in hardware because there is no L2 next-hop address - so the packet is sent to the L3 engine to generate the ARP response
FE - GE - and aggregated FE/GE Etherchannels
Dynamic WEP keys that change periodically
47. How does loop guard block ports?
Only for the offending VLAN on the port
Enables portfast - sets the port to access and disables PAgP
The port asks the other end to trunk
Trunk
48. RSTP alternate port
Port with alternative path to root less desirable than root
Port with best root path cost on segment
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
49. What does uplinkfast do?
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
1 to 64
Critical...used most often for IPT
50. At what layer does EAPOL run?
L2
That they aren't using the same frequencies.
FIB
Only for trusted Cisco gear - especially phones