SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the GLBP AVG?
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
Change in trunk encap
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
2. What is an ESS?
Trunk
When the AP uplinks to an Ethernet network.
Checks the destination MAC in the header against the target MAC in the ARP reply
Etherchannel ports have inconsistent config
3. can root guard and udld be used together?
Hashing algorithm
The master router can share the VIP
Yes
Using a mobility exchange message
4. What is unique about HSRP group numbers?
Globally
One that can be detected on a switch interface (ie. Up/down)
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Half because transmitting and receiving stations use the same frequency
5. What is step 1 of enabling IP source guard?
All fiber-optic links between switches (must be enabled on both ends)
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
Configure and enable DHCP snooping
Almost eliminates listening and learning states for single hosts on an access link
6. What is a community secondary VLAN?
The standby becomes active and stays active by default. Preemption can be configured
Full duplex
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
Needs hardware upgrade over WEP - uses AES encryption
7. where does L2 switching occur?
On ports where you never expect to find a root bridge for a VLAN
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
If any BDUP is received on a port - it puts the port into the errdisable state
Between interfaces that are assigned to L2 VLANs or L2 trunks
8. FE connectors use...
1500B
2 strand MMF with MT-RJ or SC connectors
Globally
An ac adaptor that plugs into a wall outlet.
9. RSTP point to point port
Port that connects to another switch and becomes a designated port
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
Regions and instances
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
10. How does DSCP handle IP precedence?
5 classes with 3 drop precedences
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
Isl - dot1q - negotiate (default)
Immediate (class 2)
11. What is backbonefast?
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
Differentiated services code point
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
12. What is the portr ID?
16 bits (8b port priority - 8b port number)
Globally
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
1/2 and 3/6
13. What are dynamic VLANs based on?
By brining up a tunnel between them to carry 802.11 related messages and client data.
MAC of the end device
FE - GE - and aggregated FE/GE Etherchannels
Configuration and TCN
14. Automatically configure STP timers
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
MAC of the end device
Half because transmitting and receiving stations use the same frequency
Use the spanning-tree root macro
15. What happens when switches receive a configuration BDPU?
If any BDUP is received on a port - it puts the port into the errdisable state
Root
A group of wireless devices that share a common SSID
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
16. What is portfast?
Almost eliminates listening and learning states for single hosts on an access link
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
Either desirable or auto mode
17. What does Root Guard do?
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
Controls where candidate root bridges can be connected and found on a network
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
That they aren't using the same frequencies.
18. What are the 5 steps to manualy configure STP?
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
After forwarding delay - port can learn new MAC addresses
Sends a voltage across the receive pairs to detect a 25k ohm resistance
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
19. What happens if both 802.1D and RSTP BDPUs are received?
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
To the virtual port-channel interface
0-255
20. Where should STP timers be configured and why?
0000.0c07.acxx where xx is the group number as a 2-digit hex value
RADIUS
1 to 64
On root - because the root bridge propagates timers with config BDPU
21. RSTP edge port
Only a single host connects . If one BDPU is received - it is no longer an edge port
Switches make an effort to move packets as quickly as possible
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
22. what do multilayer switches do?
A point to point port type
The DCF interframe space- the random backoff time before a wireless set can transmit
Both layer 2 switching and IVR
Switching Database Manager - configures and prunes TCAM partitions
23. What is 802.1x auto?
When the AP uplinks to an Ethernet network.
1 per segment
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
24. RSTP BPDU structure
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
3 seconds. Holdtime =3 hellos + 1
From the DHCP snooping database or from static entries
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
25. What is errdisable pagp-flap?
Globally
The same as a standby group in HSRP
Etherchannel ports have inconsistent config
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
26. What are the 5 STP states?
Untrusted
Reboots and searches for a new WLC
Disabled - blocking - listening - learning - forwarding
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
27. How are GLBP timers used?
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
A packet can't be switched in hardware with the FIB and must go to the L3 engine
Distributed coordinion function - the use of timers to prevent wireless collisions
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
28. How do you configure IP source guard for hosts that don't use DHCP?
Weak key rotation
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
By creating a static IP binding
29. How are errdisable triggers tuned?
Trunk - dynamic auto - dynamic desireable (default)
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
By short-circuiting the max age timer
Globally
30. How does HSRP plain text authentication work?
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
A key string of up to 8 characters is sent. Default is cisco.
Yes
Option 43
31. What is BDPU Guard?
Using a single WAP to centralize access and control over a group of wireless devices.
If any BDUP is received on a port - it puts the port into the errdisable state
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
32. What does the switchport host macro do?
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
Packets must be sent to the L3 engine for further processing
Forces the router to wait for a period of time before attempting overthrow
Enables portfast - sets the port to access and disables PAgP
33. How does HSRP election work?
Distributed coordinion function - the use of timers to prevent wireless collisions
When the AP uplinks to an Ethernet network.
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
Based on priority (0-255). Default is 100. Highest IP is tie breaker
34. How do IP phones communicate with each other?
Once the CCM gives them the parameters - they use RTP
The standby becomes active and stays active by default. Preemption can be configured
Root - designated - alternate - and backup
Determines when the AVG will stop using the old VMAC in ARP replies
35. What is an untrusted port under dhcp snooping?
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
The time that a port spends in both listening and learning states . Default 15 seconds
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
36. What is an indirect topology change?
Checks the destination MAC in the header against the target MAC in the ARP reply
By short-circuiting the max age timer
Immediate (class 2)
The link status stays up - but something between them has failed or is filtering traffic
37. How does ISL handle COS?
Value - mask - and result (VMR) combinations
Manually
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Virtual Router Redundancy Protocol - pretty much the same as HSRP
38. what I s distributed CEF (dCEF)?
Only a single host connects . If one BDPU is received - it is no longer an edge port
Port is forced to never authorize any connected client
A VLAN that spans the entire fabric
CEF is distributed completely among multiple L3 forwarding engines.
39. How are VACLs applied
To a VLAN and not to a VLAN interface (SVI)
Prevents the dhcp binding DB from being checked.
Each frame transmits its expected duration time
The link status stays up - but something between them has failed or is filtering traffic
40. What are the three basic types of QOS?
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
Best effort delivery - integrated services model - and differentiated services model
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
41. How does every HSRP config command begin?
Port stays up - packets from violating MACs dropped - no logging
Switch(config-if)# standby xx where x= group number
They disguise the origin of an attack
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
42. What is RPVST+?
Half-duplex
Frames are forwarded
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
Switch(config-if)# standby xx where x= group number
43. What is a cell?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
44. static vlans offer ____ based membership
1-65535 (def 32768) lower priority - higher probability
Port
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
Port that connects to another switch and becomes a designated port
45. Where is the QoS trust boundary usually configured on an IP phone?
Checks the source MAC in the header against the sender MAC in the ARP reply
Usually QoS from VOIP but not PC dataa
Manages addition - deletion and renaming VLANs across the network
Reboots and searches for a new WLC
46. What are the characteristics of the access layer?
Yes
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
A packet can't be switched in hardware with the FIB and must go to the L3 engine
47. What is the default MTU?
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
1500B
48. What is common spanning tree (CST)?
Automatically using DTP and CDP
Trunk
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
A MAC is seen on a different port
49. How does GLBP work?
All L2 connectivity should be contained within the access layer.
Configure and enable DHCP snooping
Routers are assigned to common GLBP group. All routers can be active and can load balance
Matching SSID - compatible data rate - authentication credentials
50. RSTP alternate port
The port is forced to always authorize any connected client with no authentication necessary (default)
No
Change in trunk encap
Port with alternative path to root less desirable than root