SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How are GLBP timers used?
RPR - RPR+ - and SSO
0000.0c07.acxx where xx is the group number as a 2-digit hex value
Usually QoS from VOIP but not PC dataa
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
2. When are RSTP bdpus sent?
2 strand MMF with MT-RJ or SC connectors
Sends a voltage across the receive pairs to detect a 25k ohm resistance
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
3. RSTP point to point port
Switches make an effort to move packets as quickly as possible
Port that connects to another switch and becomes a designated port
Per VLAN
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
4. What are the caveats for HSRP port tracking?
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
Another router must have a higher HSRP priority and have preemt set up
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
5. What is the core block?
6. What is backbonefast?
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
Roughly 50%
Manually
7. How many users should be within a switch block?
Half-duplex
Completed dhcp bindings - mac addresses - IP addresses - etc.
Roughly 2000
Using digital certificates
8. What are the RSTP port states?
Based on priority (0-255). Default is 100. Highest IP is tie breaker
Discarding - learning - forwarding
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
Dynamic WEP keys that change periodically
9. How many potential links can LACP define?
16 - of which up to 8 are active. The others are in standby
With portfast
No shut
26-byte header - 4-byte trailer with CRC
10. How many virtual MACs can GLBP have?
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
11. How does every HSRP config command begin?
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
802.1D
All fiber-optic links between switches (must be enabled on both ends)
Switch(config-if)# standby xx where x= group number
12. What does IP source guard do?
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
LACP port priority
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
13. What are the 3 ways GLBP load-balances?
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
Round robin - weighted - or host-dependent
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
Between any type of interface as long as the interface can have an L3 address assigned
14. How does an LAP bind with a WLC?
Globally
BGP - EIGRP - OSPF - and IS-IS.
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
By brining up a tunnel between them to carry 802.11 related messages and client data.
15. What is RPR+?
16. How does ISL handle COS?
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Using digital certificates
Lowest cumulative cost to root
To a VLAN and not to a VLAN interface (SVI)
17. What are the steps of RSTP convergence?
802.1x with EAP over LAN (EAPOL)
Critical...used most often for IPT
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
When each AP stands alone within the larger network.
18. What is a vlan?
Trusted ports
Only the standby monitors the hello messages from the active router
A single broadcast domain
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
19. what should you do if you expect a PAgP capable switch at the other end vs. a server or host?
Configure non-silent submode
Switch(config-if)# vrrp xx where xx= group number
Yes
Immediate (class 2)
20. What happens if both 802.1D and RSTP BDPUs are received?
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
0000.5e00.01xx
Option 43
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
21. What is a microcell?
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
Change in trunk encap
When the size of a cell is intentionally reduced
To the virtual port-channel interface
22. How do you configure a DHCP gateway?
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
Access
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
23. How does HSRP do MD5 authentication?
Both ends should be on because on modes doesn't send PAgP or LACP packets
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
Forces the router to wait for a period of time before attempting overthrow
By using a hash of a key string
24. What is best effort delivery QOS?
From the DHCP snooping database or from static entries
FE - GE - and aggregated FE/GE Etherchannels
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
Switches make an effort to move packets as quickly as possible
25. At what layer does EAPOL run?
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
The DCF interframe space- the random backoff time before a wireless set can transmit
L2
No
26. How is 802.1x configured for port security?
Group (0-1023) priority (1-255 higher better def 100)
Port
From the DHCP snooping database or from static entries
RADIUS
27. What is NSF?
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
28. Which ports should you consider trusted for DAI?
Prevents the dhcp binding DB from being checked.
Those that connect to other switches
1/2 and 3/6
Either desirable or auto mode
29. What are the 3 trunk switchport modes?
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
Trunk - dynamic auto - dynamic desireable (default)
A single broadcast domain
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
30. What is the RSTP default hello interval?
Port that connects to another switch and becomes a designated port
No
The link status stays up - but something between them has failed or is filtering traffic
2 seconds
31. What does DTP do?
Packets must be sent to the L3 engine for further processing
Using digital certificates
Root - designated - blocking - alternate - forwarding (host)
Automatically negotiates a common trunk mode between switches
32. How does every VRRP command begin?
Switch(config-if)# vrrp xx where xx= group number
The port asks the other end to trunk
When the AP uplinks to an Ethernet network.
300 sec
33. What are the port channel load balancing methods?
Per VLAN
Disabled - init - listen - speak - standby - active
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
Admin down
34. WEP encryption
Group (0-255) - priority (1-254 254 is highest - 100 default)
Weak key rotation
Automatically using DTP and CDP
An L2 switch can only forward frames best effort unless going across a trunk
35. What criteria are used to size a switch block?
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
Sends a voltage across the receive pairs to detect a 25k ohm resistance
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
The standby becomes active and stays active by default. Preemption can be configured
36. What is a CEF glean?
37. What are the 3 redundant supervisor modes?
RPR - RPR+ - and SSO
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
Incoming frames are dropped (combination of disabled - blocking - and listening)
Best effort delivery - integrated services model - and differentiated services model
38. How is root port decided upon?
3 seconds. Holdtime =3 hellos + 1
FIB
By using a hash of a key string
Lowest cumulative cost to root
39. What is the port priority range?
Only the standby monitors the hello messages from the active router
0-255 (lower is better)
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
If the switch or the powered device doesn't suport power class discovery
40. How does HSRP election work?
3 seconds. Holdtime =3 hellos + 1
Either desirable or auto mode
A private VLAN can be logically associated with a special secondary vlan
Based on priority (0-255). Default is 100. Highest IP is tie breaker
41. What are the 3 RSTP port types?
Control functions
2-8 FE - GE - or 10GE are bundled.
By configuring every switch port to have an expected and controlled behavior
Edge - root - and point to point
42. How is an RSTP edge port configured
Yes
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
If the switch or the powered device doesn't suport power class discovery
With portfast
43. How many links can be used in an EtherChannel?
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
2-8 FE - GE - or 10GE are bundled.
Dynamic arp inspection
By sending a gratuitous ARP
44. What are the characteristics of the distribution layer?
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
45. How does DSCP handle IP precedence?
5 classes with 3 drop precedences
A single broadcast domain
26-byte header - 4-byte trailer with CRC
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
46. What is a drop adjacency?
47. How is the IPT 802.1 trunk negotiated?
Almost eliminates listening and learning states for single hosts on an access link
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
Automatically using DTP and CDP
Critical...used most often for IPT
48. How should UDLD be configured?
Routers are assigned to common GLBP group. All routers can be active and can load balance
Isolated and community
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
The configureable UDLD interval must be less than max age plus two intervals of forward delay
49. Which 4 things must be agreeable to trunk?
Admin down
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
2 strand MMF with MT-RJ or SC connectors
Only when a nonedge port transitions to forwarding
50. How far chould a VLAN extend?
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
Distribution layer
Route once - switch many
Yes