SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How can you load-balance with HSRP?
Port is forced to never authorize any connected client
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
A key string of up to 8 characters is sent. Default is cisco.
Yes
2. What are the 6 steps to configure 802.1x for port security?
4
Distribution layer
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
3. What is a punt adjacency?
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
Completed dhcp bindings - mac addresses - IP addresses - etc.
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Packets must be sent to the L3 engine for further processing
4. What is the 80/20 rule?
63 kbps
900 MHz - 2.4Ghz - and 5-6GHz
80% of the user traffic should stay in the VLAN
When a client roams between Aps in different subnets
5. How does IPT behave when the voice VLAN is in vlan-id mode?
10-15%
Only when a nonedge port transitions to forwarding
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
Connects with SONET or SDH
6. How do Cisco IP phones communicate with the CCM?
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
SC fiber or RJ-45
With the skinny protocol
The time that a port spends in both listening and learning states . Default 15 seconds
7. What are the 6 HSRP states?
Disabled - init - listen - speak - standby - active
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
Usually QoS from VOIP but not PC dataa
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
8. What is a QoS trust boundary?
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
9. 802.11a
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
FIB
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
Both ends should be on because on modes doesn't send PAgP or LACP packets
10. How do you find duplex mismatches?
The L3 forwarding engine can't forward the packet in hardware because there is no L2 next-hop address - so the packet is sent to the L3 engine to generate the ARP response
A group of wireless devices that share a common SSID
Use sh interface on the interface and look for error counts > 10
Trunk
11. What is 802.1x force-authorized?
Trusted or untrusted
Port with best root path cost
19
The port is forced to always authorize any connected client with no authentication necessary (default)
12. RSTP designated port
Port with best root path cost on segment
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
MAC of the end device
13. How many users should be within a switch block?
Roughly 2000
Show standby
Either desirable or auto mode
300 sec by default
14. What data does DHCP snooping track?
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
Trusted ports
Completed dhcp bindings - mac addresses - IP addresses - etc.
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
15. How does IPT behave when the voce VLAN is in the default none mode?
By configuring every switch port to have an expected and controlled behavior
All nondesignated ports - but ok for all ports
By using a hash of a key string
Data and voice over native vlan no QOS and no 802.1p trunk
16. What is a discard adjacency?
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
Only the standby monitors the hello messages from the active router
Packets are discarded due to an ACL or policy action
1-1005 (1 and 1002-1005 are reserved)
17. What is the STP learning state?
After forwarding delay - port can learn new MAC addresses
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Yes
18. What is a cell?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. If a wireless station needs to transmit and another device is transmitting - what happens?
On ports where you never expect to find a root bridge for a VLAN
2-8 FE - GE - or 10GE are bundled.
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
Promiscuous and host
20. How does dot1q do trunking?
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
Embeds the tag within the frame
The link status stays up - but something between them has failed or is filtering traffic
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
21. What is portfast?
On the left as you face the connector
Priority (class 1)
Almost eliminates listening and learning states for single hosts on an access link
Completed dhcp bindings - mac addresses - IP addresses - etc.
22. How do you configure IP source guard for hosts that don't use DHCP?
Group (0-255) - priority (1-254 254 is highest - 100 default)
Cisco recommends only on the root bridge
By creating a static IP binding
Can send and receive BDPUs
23. What are the VRRP group and priority numbers?
No
Group (0-255) - priority (1-254 254 is highest - 100 default)
No
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
24. What format does the GLBP MAC use?
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
L2
Hashing algorithm
25. What is integrated services model QOS?
Both ends should be on because on modes doesn't send PAgP or LACP packets
By sending a gratuitous ARP
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
26. How does DAI work?
Between any type of interface as long as the interface can have an L3 address assigned
The station can transmit immediately and wait for an ack
Because each frame is checked
All ARP packets that arrive on untrusted ports are inspected.
27. What is the default network diameter?
The MST instance (MSTI) runs alongside the IST and represents an STP instance
Interim solution - uses same hardware as WEP - but uses TKIP encryption
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
7 switches from root bridge
28. What is topology-basec caching?
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
The station can transmit immediately and wait for an ack
By using a hash of a key string
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
29. How does a Cisco IP phone connect upstream?
Hashing algorithm
PAgP (Cisco proprietary) and LACP (standards-based)
0-255 (lower is better)
Via an 802.1Q trunk or a single VLAN access port
30. How should backbonefast be configured?
The standby becomes active and stays active by default. Preemption can be configured
Checks the source MAC in the header against the sender MAC in the ARP reply
On root - because the root bridge propagates timers with config BDPU
On all switches in network to enable RLQ request and reply
31. How do you renable an err-disable port by default?
Manually
Root
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
32. What types of ports autonegotiate?
By an ARP access list that defines the permitted bindings
FE and GE
Because each frame is checked
Hashing algorithm
33. How are multiple VLANs mapped to multiple SSIDs?
An AP's coverage area
By using a trunk link
26-byte header - 4-byte trailer with CRC
63 kbps
34. Where should STP timers be configured and why?
Access
On root - because the root bridge propagates timers with config BDPU
0000.5e00.01xx
Multicast to 01-80-c2-00-00-00
35. What is the STP disabled state?
Another router must have a higher HSRP priority and have preemt set up
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Best effort delivery - integrated services model - and differentiated services model
Admin down
36. In a converged fabric - which switch(es) send config BDPUs?
Root
19
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
Based on priority (0-255). Default is 100. Highest IP is tie breaker
37. What is BDPU Guard?
If any BDUP is received on a port - it puts the port into the errdisable state
2-8 FE - GE - or 10GE are bundled.
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
SC fiber or RJ-45
38. Can loop guard and udld be used together?
Incoming frames are dropped (combination of disabled - blocking - and listening)
Yes
A key string of up to 8 characters is sent. Default is cisco.
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
39. What is 802.1x force-unauthorized?
Port is forced to never authorize any connected client
4
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
With the skinny protocol
40. What are dynamic VLANs based on?
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
When the AP uplinks to an Ethernet network.
Using a single WAP to centralize access and control over a group of wireless devices.
MAC of the end device
41. What is a root link query (RLQ)?
Hashing algorithm
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
An ac adaptor that plugs into a wall outlet.
42. What is the GLBP group and priority range
Group (0-1023) priority (1-255 higher better def 100)
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
Auto mode
Both layer 2 switching and IVR
43. How does the CEF L3 engine operate?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
44. What is dynamic desireable?
Round robin - weighted - or host-dependent
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
Real-time Transport Protocol
The port asks the other end to trunk
45. What are the 4 steps in DHCP negotiation?
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
Option 43
To a VLAN and not to a VLAN interface (SVI)
46. What ILP mode are all ports in by default?
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
Switch(config-if)# vrrp xx where xx= group number
The master router can share the VIP
Auto mode
47. What is a VRRP group?
Can send and receive BDPUs
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
Trunk
The same as a standby group in HSRP
48. What can the Etherchannel hash use?
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
They disguise the origin of an attack
224.0.0.2 (all routers)
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
49. How should the switch port to which a WLC be configured?
By encapsulating each frame in a header and trailer
Trunk
Only a single host connects . If one BDPU is received - it is no longer an edge port
MAC of the end device
50. By default - what submode does PAgP operate in with the desirable and auto modes?
All L2 connectivity should be contained within the access layer.
Once the CCM gives them the parameters - they use RTP
1 IP subnet
Silent