SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does 802.1q handle COS?
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
2. What's the easiest way to configure GLBP timers?
When a client roams between Aps in different subnets
A client can roam to any WLC as long as it stays in a mobility group
Configure the timer on the AVG and let it propagate
By creating a static IP binding
3. What is an indirect topology change?
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
The link status stays up - but something between them has failed or is filtering traffic
4. How do you configure IP source guard for hosts that don't use DHCP?
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Trunk - dynamic auto - dynamic desireable (default)
By creating a static IP binding
5. How many designated ports are there?
19
1 per segment
1 second. Backup routers can learn the interval from the master
Distribution layer
6. EAP encryption
Dynamic WEP keys that change periodically
10-15%
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
7. What is a baby giant frame?
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
Frames that barely exceed 1518B or 1622B due to headers
The number of times the entry has been updated since the table was generated
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
8. How are VACLs configured?
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
Edge - root - and point to point
Trusted ports
As a VLAN access map
9. What is Per VLAN STP (PVST)?
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
Port
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
10. What are the 5 STP port roles?
Root - designated - blocking - alternate - forwarding (host)
The distribution layer should have only L3 links
Configuration and TCN
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
11. Where should you change the network diameter value?
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
The distribution layer should have only L3 links
Cisco recommends only on the root bridge
Edge - root - and point to point
12. If a port is configured for errdisable auto recovery - how long does it stay down?
Either desirable or auto mode
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
300 sec by default
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
13. How does 802.3af do power discovery?
0000.5e00.01xx
Sends a voltage across the receive pairs to detect a 25k ohm resistance
Packets are discarded due to an ACL or policy action
The ASIC
14. How is a WLC handoff handled when the WLCs are in different subnets?
By using an Ether-IP tunnel
16 bits (8b port priority - 8b port number)
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
All user ports that have portfast enabled
15. How does HSRP port tracking work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
16. What is 802.1x force-unauthorized?
A point to point port type but the neighboring device runs traditional 802.1D STP
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
Real-time Transport Protocol
Port is forced to never authorize any connected client
17. What is layer 2 roaming?
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
By using a hash of a key string
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
Configure and enable DHCP snooping
18. What pins does FE use?
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
1/2 and 3/6
19. In a converged fabric - which switch(es) send config BDPUs?
Root
Packets must be sent to the L3 engine for further processing
All fiber-optic links between switches (must be enabled on both ends)
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
20. What data does DHCP snooping track?
1-1005 (1 and 1002-1005 are reserved)
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
Completed dhcp bindings - mac addresses - IP addresses - etc.
Sends a voltage across the receive pairs to detect a 25k ohm resistance
21. What is the acceptible range of VLANS?
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
1-1005 (1 and 1002-1005 are reserved)
22. What happens during HSRP failover?
The standby becomes active and stays active by default. Preemption can be configured
A packet can't be switched in hardware with the FIB and must go to the L3 engine
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
23. How does loop guard block ports?
Only for the offending VLAN on the port
BGP - EIGRP - OSPF - and IS-IS.
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
Automatically using DTP and CDP
24. What does IP source guard do?
RPR - RPR+ - and SSO
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
Completed dhcp bindings - mac addresses - IP addresses - etc.
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
25. What is a cell?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
26. What 2 tunnelling mechanisms do the LAP and WLC use to communicate?
LACP port priority
Those that connect to other switches
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
Roughly 2000
27. What are spoofed addresses?
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
PAgP (Cisco proprietary) and LACP (standards-based)
Matching SSID - compatible data rate - authentication credentials
They disguise the origin of an attack
28. For QoS - switch uplinks should always be considered as ____ _____?
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
Trusted ports
1-65535 (def 32768) lower priority - higher probability
29. What are the 2 types of secondary VLAN?
Dynamic WEP keys that change periodically
Frames are forwarded
Isolated and community
On root - because the root bridge propagates timers with config BDPU
30. How are RSTP point to point ports determined?
Flash (class 3)
Only for the offending VLAN on the port
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
Needs hardware upgrade over WEP - uses AES encryption
31. What 2 conditions does IP source guard check for?
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
With the skinny protocol
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
2
32. What are the 5 steps to manualy configure STP?
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
Receives the first packet of a traffic flow and routes it
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
FE and GE
33. How can you load-balance with HSRP?
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
The wireless clients communicate directly with no other means of connectivity such as a WAP
34. What is backbonefast?
5 (0-4 with 4 being the highest)
A point to point port type
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
Yes
35. Where is root guard enabled?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. How can you tell if a switch block is too large?
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
Weak key rotation
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
37. How is a QoS trust bondary configured?
Flash (class 3)
900 MHz - 2.4Ghz - and 5-6GHz
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
Every switch and router in a network must be configured with appropriate QoS features and policies
38. What is a wireless mobility group?
An L2 switch can only forward frames best effort unless going across a trunk
Half because transmitting and receiving stations use the same frequency
A client can roam to any WLC as long as it stays in a mobility group
Needs hardware upgrade over WEP - uses AES encryption
39. What is the switch block?
Globally or per-port
Two distribution switches that aggregate one or more access switches
No shut
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
40. How is UDLD configured?
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
Isolated and community
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
41. What is DCF?
It is enabled by default on all CEF capable switches
To a VLAN and not to a VLAN interface (SVI)
The campus network's backbone
Distributed coordinion function - the use of timers to prevent wireless collisions
42. What is the port number range?
By short-circuiting the max age timer
Once the CCM gives them the parameters - they use RTP
0-255
900 MHz - 2.4Ghz - and 5-6GHz
43. How many potential links can LACP define?
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
16 - of which up to 8 are active. The others are in standby
All ports where root isn't expected
The TOS field in the header is used. 2 methods 3 bits or 6 bits
44. How can BDPU Guard be configured?
Promiscuous and host
802.1x with EAP over LAN (EAPOL)
That they aren't using the same frequencies.
Globally or per-port
45. What is the DIFS?
The DCF interframe space- the random backoff time before a wireless set can transmit
Switches make an effort to move packets as quickly as possible
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Reboots and searches for a new WLC
46. When looking at the sh spanning tree output - What does P2P denote?
By using a hash of a key string
12 kbps with headers and compression
A point to point port type
Weak key rotation
47. By default - what layer do catalyst switchports operate on?
Using digital certificates
5 classes with 3 drop precedences
Yes to both
L2
48. What is PVST plus (PVST+)?
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
Receives the first packet of a traffic flow and routes it
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
Both layer 2 switching and IVR
49. How many virtual MACs can GLBP have?
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Discarding - learning - forwarding
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
50. If one end of an Etherchannel (either type) is set to on and the channel doesn't form - what should you check?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183