SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the duration time in a wireless frame?
The campus network's backbone
Silent
Collision domain
Each frame transmits its expected duration time
2. What are spoofed addresses?
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Once the CCM gives them the parameters - they use RTP
A point to point port type but the neighboring device runs traditional 802.1D STP
They disguise the origin of an attack
3. What are the RSTP port states?
No
Controls where candidate root bridges can be connected and found on a network
Via an 802.1Q trunk or a single VLAN access port
Discarding - learning - forwarding
4. What must the other end be set to if PAgP desirable or LACP active mode is selected?
Either desirable or auto mode
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
Root - designated - alternate - and backup
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
5. How does every GLBP command begin
Switch(config-if)# glbp xx where xx = group number
To the virtual port-channel interface
Connects with SONET or SDH
Can hear only BDPUs
6. How many 802.3af power classes are there?
Flash override (class 4)
Controls where candidate root bridges can be connected and found on a network
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
5 (0-4 with 4 being the highest)
7. If the WLC connects to an Etherchannel - how should the channel be configured and why?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
8. How are VACLs configured?
CEF is distributed completely among multiple L3 forwarding engines.
As a VLAN access map
Because each frame is checked
The TOS field in the header is used. 2 methods 3 bits or 6 bits
9. How does a WLC hand off a client's association to another WLC?
900 MHz - 2.4Ghz - and 5-6GHz
Switches make an effort to move packets as quickly as possible
Using a mobility exchange message
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
10. What is the traditional MLS view of switching?
Route once - switch many
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
The same as a standby group in HSRP
11. How many virtual MACs can GLBP have?
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
900 MHz - 2.4Ghz - and 5-6GHz
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
12. What can cause a wireless client to switch between Aps?
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
Matching SSID - compatible data rate - authentication credentials
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
13. WPA2 encryption
Needs hardware upgrade over WEP - uses AES encryption
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
Multicast to 01-80-c2-00-00-00
14. What is common spanning tree (CST)?
Between interfaces that are assigned to L2 VLANs or L2 trunks
Both ends should be on because on modes doesn't send PAgP or LACP packets
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
1500B
15. How do VRRP routers handle preemption?
4
On by default
Those that connect to other switches
Based on priority (0-255). Default is 100. Highest IP is tie breaker
16. What is DSCP?
Can send and receive BDPUs
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
Differentiated services code point
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
17. How does NSF work?
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
2 - one for control messages and one for data
SC fiber or RJ-45
300 sec by default
18. On what scope is DAI enabled?
Per VLAN
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
Distribution layer
802.1D
19. What is jitter?
Variation in delay
Switching Database Manager - configures and prunes TCAM partitions
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
Isl - dot1q - negotiate (default)
20. What is the STP disabled state?
802.11
On the left as you face the connector
Admin down
Trusted ports
21. How are multiple VLANs mapped to multiple SSIDs?
By using a trunk link
Trusted or untrusted
Src-dst-ip
Trunk - dynamic auto - dynamic desireable (default)
22. By default - what layer do catalyst switchports operate on?
L2
Interim solution - uses same hardware as WEP - but uses TKIP encryption
MAC of the end device
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
23. What is an IST instance?
Distribution
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
On ports where you never expect to find a root bridge for a VLAN
24. How does backbonefast determine whether alternative paths exist?
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
Immediate (class 2)
Yes
25. How does HSRP port tracking work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
26. what should you do if you expect a PAgP capable switch at the other end vs. a server or host?
By sending a gratuitous ARP
Configure non-silent submode
Only a single host connects . If one BDPU is received - it is no longer an edge port
Sends a voltage across the receive pairs to detect a 25k ohm resistance
27. How often are CAM table entries aged?
1 IP subnet
When a port moves into forwarding or from fowarding or learning to blocking.
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
300 sec
28. What does a LAP do if it loses communication with it's WLC?
Reboots and searches for a new WLC
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
4
By using a trunk link
29. What is the STP blocking state?
Only a single host connects . If one BDPU is received - it is no longer an edge port
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
Can hear only BDPUs
The distribution layer should have only L3 links
30. What is the portr ID?
A point to point port type
Automatically negotiates a common trunk mode between switches
The redundant SUP is booted and sup and route engine is init'd. No L2 or L3 functions are started. Allows switchports to retain state
16 bits (8b port priority - 8b port number)
31. What is GLBP weight?
Globally or per-port
By default weight is 100. Can be made dynamic per interface
LACP port priority
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
32. Define HSRP
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
19
1 per segment
300 sec by default
33. Each switch port is a _____ ______
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
Collision domain
Isolated and community
34. How do you configure a DHCP gateway?
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
Using a single WAP to centralize access and control over a group of wireless devices.
35. How does IPT behave when the voice VLAN is in vlan-id mode?
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
Route once - switch many
Turn on port security
36. What is an IBSS?
26-byte header - 4-byte trailer with CRC
The wireless clients communicate directly with no other means of connectivity such as a WAP
By brining up a tunnel between them to carry 802.11 related messages and client data.
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
37. WPA encryption
Group (0-255) - priority (1-254 254 is highest - 100 default)
Interim solution - uses same hardware as WEP - but uses TKIP encryption
By using a trunk link
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
38. What is the cost of a 1Gbps link?
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
FIB
2 strand MMF with MT-RJ or SC connectors
4
39. How are GLBP timers used?
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
After forwarding delay - port can learn new MAC addresses
Dynamic WEP keys that change periodically
40. Can MSTP interoperate with 802.1q and/or PVST+?
Control functions
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
Yes to both
41. How should UDLD be configured?
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
The configureable UDLD interval must be less than max age plus two intervals of forward delay
1/2 and 3/6
42. What is the cost of a 100Mbps link?
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Flash (class 3)
All ARP packets that arrive on untrusted ports are inspected.
19
43. How are RSTP point to point ports determined?
Root - designated - blocking - alternate - forwarding (host)
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
By default weight is 100. Can be made dynamic per interface
44. CAM table entries are purged when....
802.11
A MAC is seen on a different port
All ARP packets that arrive on untrusted ports are inspected.
Connects with SONET or SDH
45. How does UDLD work?
Cisco ILP and 802.3af
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
Switches make an effort to move packets as quickly as possible
46. What is the access layer best practice?
Controls where candidate root bridges can be connected and found on a network
Route once - switch many
The MST instance (MSTI) runs alongside the IST and represents an STP instance
All L2 connectivity should be contained within the access layer.
47. What is a CEF glean?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
48. How does adding option-82 to DHCP snooping affect things?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. can root guard and udld be used together?
802.11
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
Yes
Admin down
50. where does L2 switching occur?
The master router can share the VIP
Between interfaces that are assigned to L2 VLANs or L2 trunks
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
The link status stays up - but something between them has failed or is filtering traffic