SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does GLBP work?
Routers are assigned to common GLBP group. All routers can be active and can load balance
Embeds the tag within the frame
Switch(config-if)# glbp xx where xx = group number
0000.0c07.acxx where xx is the group number as a 2-digit hex value
2. What scope is 802.1x enabled?
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
Globally
By using a trunk link
3. What are the RSTP port roles?
Either desirable or auto mode
300 sec
Root - designated - alternate - and backup
Globally or per-port
4. What is a null adjacency?
Because each frame is checked
The redundant SUP is booted and sup and route engine is init'd. No L2 or L3 functions are started. Allows switchports to retain state
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
Used to switch packets destined for the null interface
5. What is the FM?
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
When a port moves into forwarding or from fowarding or learning to blocking.
Prevents the dhcp binding DB from being checked.
6. How many potential links can LACP define?
Port with best root path cost
Packets are discarded due to an ACL or policy action
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
16 - of which up to 8 are active. The others are in standby
7. What is the default network diameter?
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
Either desirable or auto mode
3 seconds. Holdtime =3 hellos + 1
7 switches from root bridge
8. What's the easiest way to configure GLBP timers?
Yes
1 per segment
Configure the timer on the AVG and let it propagate
BGP - EIGRP - OSPF - and IS-IS.
9. What does the RP do?
Switches make an effort to move packets as quickly as possible
Receives the first packet of a traffic flow and routes it
Port with best root path cost on segment
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
10. What is the VRRP master router?
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
FE and GE
The active router. All other routers are in backup state
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
11. What must you be sure of if AP cells overlap?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. What are 2 ways to configure VLAN and VTP information?
It can't
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
Needs hardware upgrade over WEP - uses AES encryption
13. What is layer 2 roaming?
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
Hashing algorithm
14. How does adding option-82 to DHCP snooping affect things?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. How does the CEF L3 engine operate?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
16. How does DAI work?
2
All ARP packets that arrive on untrusted ports are inspected.
Embeds the tag within the frame
Using a mobility exchange message
17. What does the static keyword do when applying an arp ACL?
0000.0c07.acxx where xx is the group number as a 2-digit hex value
Prevents the dhcp binding DB from being checked.
Root - designated - blocking - alternate - forwarding (host)
Manually
18. What is the STP Max Age timer?
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
By brining up a tunnel between them to carry 802.11 related messages and client data.
Sends a voltage across the receive pairs to detect a 25k ohm resistance
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
19. How should backbonefast be configured?
Priority (class 1)
By creating a static IP binding
On all switches in network to enable RLQ request and reply
Untrusted
20. What is the DIFS?
The DCF interframe space- the random backoff time before a wireless set can transmit
1 second. Backup routers can learn the interval from the master
10-15%
Flash (class 3)
21. What is the STP listening state?
Round robin - weighted - or host-dependent
Can send and receive BDPUs
Use sh interface on the interface and look for error counts > 10
802.1w
22. How does a Cisco IP phone connect upstream?
A point to point port type but the neighboring device runs traditional 802.1D STP
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Interim solution - uses same hardware as WEP - but uses TKIP encryption
Via an 802.1Q trunk or a single VLAN access port
23. How does NSF work?
Flash override (class 4)
All ports where root isn't expected
No
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
24. What does VTP do?
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
900 MHz - 2.4Ghz - and 5-6GHz
Manages addition - deletion and renaming VLANs across the network
Used when there are 1 or more VLANs mapped to a single STP instance
25. How does DSCP handle IP precedence?
The ASIC
Access
5 classes with 3 drop precedences
16 - of which up to 8 are active. The others are in standby
26. What is an IBSS?
4
The wireless clients communicate directly with no other means of connectivity such as a WAP
Trusted ports
Automatically using DTP and CDP
27. What is the portr ID?
16 bits (8b port priority - 8b port number)
On all switches in network to enable RLQ request and reply
Turn on port security
By using a hash of a key string
28. What categories can ports be in with dhcp snooping enabled?
A point to point port type but the neighboring device runs traditional 802.1D STP
Trusted or untrusted
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
PAgP (Cisco proprietary) and LACP (standards-based)
29. How can you load-balance with HSRP?
All nondesignated ports - but ok for all ports
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
Connects with SONET or SDH
30. RSTP root port
Port with best root path cost
Port
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
All ports where root isn't expected
31. If you want IP source guard to detect spoofed MAC addresses - what must you do?
Turn on port security
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
32. How does 802.3af do power discovery?
Sends a voltage across the receive pairs to detect a 25k ohm resistance
By name - config revision - and instance to vlan mapping table
The number of times the entry has been updated since the table was generated
Distribution
33. What does the standby HSRP router do?
Only the standby monitors the hello messages from the active router
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
All fiber-optic links between switches (must be enabled on both ends)
FE - GE - and aggregated FE/GE Etherchannels
34. What is layer 3 roaming?
When a client roams between Aps in different subnets
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
The port asks the other end to trunk
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
35. What is DCF?
No
Connects with SONET or SDH
Distributed coordinion function - the use of timers to prevent wireless collisions
Interim solution - uses same hardware as WEP - but uses TKIP encryption
36. What is a VRRP group?
The same as a standby group in HSRP
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
37. What must be supported for port-based security to occur?
After forwarding delay - port can learn new MAC addresses
Using a mobility exchange message
802.1x with EAP over LAN (EAPOL)
By encapsulating each frame in a header and trailer
38. Can loop guard and udld be used together?
VTP server for domain null with no password or secure mode
The link status stays up - but something between them has failed or is filtering traffic
Yes
The same as a standby group in HSRP
39. What are the restrictions for bundling into an Etherchannel?
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Collision domain
All L2 connectivity should be contained within the access layer.
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
40. What are spoofed addresses?
Time between BDPUs sent by root bridge. Default of 2 seconds
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
They disguise the origin of an attack
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
41. What are the 5 steps a LAP uses to establish communication with a WLC?
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
All user ports that have portfast enabled
Only the standby monitors the hello messages from the active router
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
42. can root guard and bdpu guard be used together?
Distribution layer
An AP's coverage area
By default weight is 100. Can be made dynamic per interface
No
43. What cabling do GBICs use?
2 strand MMF with MT-RJ or SC connectors
As a VLAN access map
SC fiber or RJ-45
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
44. How do you renable an err-disable port by default?
Can send and receive BDPUs
Manually
Automatically negotiates a common trunk mode between switches
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
45. What is the STP disabled state?
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
A client can roam to any WLC as long as it stays in a mobility group
Admin down
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
46. How do IP phones communicate with each other?
Src-dst-ip
Once the CCM gives them the parameters - they use RTP
No
Distribution layer
47. What is the RSTP default hello interval?
2 seconds
802.1w
To the virtual port-channel interface
Via an 802.1Q trunk or a single VLAN access port
48. What is the cost of a 100Mbps link?
19
The distribution layer should have only L3 links
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
49. How is a QoS trust bondary configured?
The L3 forwarding engine can't forward the packet in hardware because there is no L2 next-hop address - so the packet is sent to the L3 engine to generate the ARP response
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
Both ends should be on because on modes doesn't send PAgP or LACP packets
Every switch and router in a network must be configured with appropriate QoS features and policies
50. How is root port decided upon?
Lowest cumulative cost to root
When each AP stands alone within the larger network.
Isl - dot1q - negotiate (default)
All fiber-optic links between switches (must be enabled on both ends)