SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does a LAP and a WLC authenticate between each other?
Using digital certificates
Lowest cumulative cost to root
When a client roams between Aps in different subnets
Distributed coordinion function - the use of timers to prevent wireless collisions
2. What is the STP disabled state?
LACP port priority
Admin down
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
3. What is the STP Max Age timer?
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
Those that connect to other switches
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
4. What are the gotchas for uplinkfast?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. What does port-security protect do?
Switch(config-if)# vrrp xx where xx= group number
No
Port stays up - packets from violating MACs dropped - no logging
By an ARP access list that defines the permitted bindings
6. Where should you change the network diameter value?
Cisco recommends only on the root bridge
No because they only participate if asked
A point to point port type
No
7. Does GLBP allow preemption?
Yes
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
The configureable UDLD interval must be less than max age plus two intervals of forward delay
8. What is jitter?
Regions and instances
Yes to both
By short-circuiting the max age timer
Variation in delay
9. What is the acceptible range of VLANS?
Silent
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
1-1005 (1 and 1002-1005 are reserved)
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
10. What is the GLBP AVG?
2
Only a single host connects . If one BDPU is received - it is no longer an edge port
Another router must have a higher HSRP priority and have preemt set up
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
11. How is a WLC handoff handled when the WLCs are in different subnets?
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
FE and GE
By using an Ether-IP tunnel
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
12. What is differentiated services model QOS?
Each network device handles packets individually with no advance reservations
Used to switch packets destined for the null interface
Disabled - init - listen - speak - standby - active
Half-duplex
13. What does the ip option do when checking ARP replies
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. How many MST instances can be in a region?
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
Route once - switch many
Real-time Transport Protocol
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
15. What are the port channel load balancing methods?
A host port goes up or down
All ARP packets that arrive on untrusted ports are inspected.
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
Flash override (class 4)
16. What pins does FE use?
BGP - EIGRP - OSPF - and IS-IS.
With the skinny protocol
As a VLAN access map
1/2 and 3/6
17. What are the RSTP port states?
Almost eliminates listening and learning states for single hosts on an access link
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
Discarding - learning - forwarding
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
18. what should you do if you expect a PAgP capable switch at the other end vs. a server or host?
Src-dst-ip
Configure non-silent submode
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
Auto mode
19. Define HSRP
The DCF interframe space- the random backoff time before a wireless set can transmit
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
Yes
20. What is the port priority range?
0-255
1 to 64
0-255 (lower is better)
Yes
21. What is the RSTP default hello interval?
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
2 seconds
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
Needs hardware upgrade over WEP - uses AES encryption
22. How does a DHCP server send WLC addresses?
Matching SSID - compatible data rate - authentication credentials
Configuration and TCN
Option 43
16 bits (8b port priority - 8b port number)
23. What is step 1 of enabling IP source guard?
Normal and aggressive
Configure and enable DHCP snooping
Hashing algorithm
Only a single host connects . If one BDPU is received - it is no longer an edge port
24. How does L3 QOS classification happen?
Trusted ports
Option 43
The TOS field in the header is used. 2 methods 3 bits or 6 bits
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
25. What is dynamic auto?
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
Will trunk if asked
By short-circuiting the max age timer
Between interfaces that are assigned to L2 VLANs or L2 trunks
26. What ILP mode are all ports in by default?
1500B
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
Auto mode
By short-circuiting the max age timer
27. Where is bdpu guard enabled?
Automatically using DTP and CDP
All user ports that have portfast enabled
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
1 per segment
28. Where is the QoS trust boundary usually configured on an IP phone?
Between any type of interface as long as the interface can have an L3 address assigned
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
If the switch or the powered device doesn't suport power class discovery
Usually QoS from VOIP but not PC dataa
29. How doed backbonefast work?
Each network device handles packets individually with no advance reservations
Can send and receive BDPUs
By short-circuiting the max age timer
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
30. What is the standard for WLANs?
FE and GE
802.11
TCAM
Port that connects to another switch and becomes a designated port
31. What is the STP forwarding state?
26-byte header - 4-byte trailer with CRC
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
32. What are the characteristics of the distribution layer?
Using digital certificates
Using a mobility exchange message
Switching Database Manager - configures and prunes TCAM partitions
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
33. How does a WLC hand off a client's association to another WLC?
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
300 sec by default
Using a mobility exchange message
BGP - EIGRP - OSPF - and IS-IS.
34. How does Root Guard work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. What is the cost of a 10Gbps link?
LACP port priority
Matching SSID - compatible data rate - authentication credentials
2
One that can be detected on a switch interface (ie. Up/down)
36. What are the characteristics of the access layer?
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
Full duplex
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
37. How do you enable CEF?
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
It is enabled by default on all CEF capable switches
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
38. How much BW does a PSTN connection use?
224.0.0.2 (all routers)
63 kbps
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
To a VLAN and not to a VLAN interface (SVI)
39. What is unique about HSRP group numbers?
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
Distribution layer
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
40. How does an LAP bind with a WLC?
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
By brining up a tunnel between them to carry 802.11 related messages and client data.
1 to 64
Trusted or untrusted
41. What is the PVLAN host mode?
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
Using a single WAP to centralize access and control over a group of wireless devices.
Can hear only BDPUs
Turn on port security
42. Which ports should you consider trusted for DAI?
Bridge priority and MAC
Data and voice over native vlan no QOS and no 802.1p trunk
Those that connect to other switches
They disguise the origin of an attack
43. How is RSTP synchronization accomplished?
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
Virtual Router Redundancy Protocol - pretty much the same as HSRP
Use sh interface on the interface and look for error counts > 10
44. What is a QoS trust boundary?
On the left as you face the connector
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
Arp for local subnet - if on different subnet - will arp for dgw
45. What data does DHCP snooping track?
Checks the destination MAC in the header against the target MAC in the ARP reply
Yes to both
An ac adaptor that plugs into a wall outlet.
Completed dhcp bindings - mac addresses - IP addresses - etc.
46. What are the VRRP group and priority numbers?
Can hear only BDPUs
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Completed dhcp bindings - mac addresses - IP addresses - etc.
Group (0-255) - priority (1-254 254 is highest - 100 default)
47. What are the 3 trunk switchport modes?
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
Half because transmitting and receiving stations use the same frequency
Trunk - dynamic auto - dynamic desireable (default)
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
48. Can loop guard and udld be used together?
Using a single WAP to centralize access and control over a group of wireless devices.
Collision domain
Used when ACLs specify port ranges...used by TCAM
Yes
49. EAP encryption
Enables portfast - sets the port to access and disables PAgP
It is enabled by default on all CEF capable switches
The DCF interframe space- the random backoff time before a wireless set can transmit
Dynamic WEP keys that change periodically
50. FE connectors use...
2 strand MMF with MT-RJ or SC connectors
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
The same as a standby group in HSRP
Yes