SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are the gotchas for uplinkfast?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. What is RPR?
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
7 switches from root bridge
The link status stays up - but something between them has failed or is filtering traffic
3. How does the VRRP master router handle the VIP?
Admin down
When a wireless station transmits a frame - the receiving one must send an ack
All fiber-optic links between switches (must be enabled on both ends)
The master router can share the VIP
4. Define HSRP
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
By configuring every switch port to have an expected and controlled behavior
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
5. On what scope is DAI enabled?
Gateway load balancing protocol - cisco proprietary
Used to switch packets destined for the null interface
16 bits (8b port priority - 8b port number)
Per VLAN
6. How many users should be within a switch block?
All ARP packets that arrive on untrusted ports are inspected.
A key string of up to 8 characters is sent. Default is cisco.
Roughly 2000
PAgP (Cisco proprietary) and LACP (standards-based)
7. How does RSTP identify a topology change?
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
Only when a nonedge port transitions to forwarding
Port with best root path cost on segment
BGP - EIGRP - OSPF - and IS-IS.
8. How does HSRP do MD5 authentication?
By using a hash of a key string
1/2 and 3/6
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
On the left as you face the connector
9. RSTP root port
1 to 64
Either desirable or auto mode
Yes to both
Port with best root path cost
10. What is the default 10mbps Enet duplex?
Root - designated - blocking - alternate - forwarding (host)
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
Half-duplex
By brining up a tunnel between them to carry 802.11 related messages and client data.
11. What are 2 ways to configure VLAN and VTP information?
Multicasts to 224.0.0.18 (VRRP)
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
The wireless clients communicate directly with no other means of connectivity such as a WAP
Via an 802.1Q trunk or a single VLAN access port
12. What is best effort delivery QOS?
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
Switches make an effort to move packets as quickly as possible
Between any type of interface as long as the interface can have an L3 address assigned
Silent
13. Can ARP replies be checked
Yes
Globally
Port stays up - packets from violating MACs dropped - no logging
Weak key rotation
14. What are the caveats for HSRP port tracking?
Checks the destination MAC in the header against the target MAC in the ARP reply
Another router must have a higher HSRP priority and have preemt set up
Isolated and community
Gateway load balancing protocol - cisco proprietary
15. What are the characteristics of the access layer?
With portfast
Checks the source MAC in the header against the sender MAC in the ARP reply
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
16. At what layer does EAPOL run?
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
It's a router that maintains routes (static or dynamic) - and populates the FIB
L2
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
17. What is latency?
Interim solution - uses same hardware as WEP - but uses TKIP encryption
The total delay from start to finish
By using a hash of a key string
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
18. How can you load-balance with HSRP?
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
0-255
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
19. What is an IST instance?
Usually QoS from VOIP but not PC dataa
Use the spanning-tree root macro
L2
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
20. How do you configure LACP standby links?
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
LACP port priority
Use sh interface on the interface and look for error counts > 10
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
21. What does the ip option do when checking ARP replies
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
22. What is the default 802.3af power class and its use?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
23. RSTP alternate port
Gateway load balancing protocol - cisco proprietary
Switchpotrt nonegotiate
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
Port with alternative path to root less desirable than root
24. How does a Cisco IP phone connect upstream?
Use sh interface on the interface and look for error counts > 10
No
Via an 802.1Q trunk or a single VLAN access port
No
25. How does Root Guard work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
26. What is the port priority range?
80% of the user traffic should stay in the VLAN
FIB
0-255 (lower is better)
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
27. What is the cost of a 10Gbps link?
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
2
1 to 64
Untrusted
28. What are the steps to configure MST?
Frames that barely exceed 1518B or 1622B due to headers
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
134 bits
29. If a wireless station needs to transmit and another device is transmitting - what happens?
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
A packet can't be switched in hardware with the FIB and must go to the L3 engine
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
An ac adaptor that plugs into a wall outlet.
30. How is the IPT 802.1 trunk negotiated?
Automatically using DTP and CDP
Trusted or untrusted
Only the standby monitors the hello messages from the active router
All user ports that have portfast enabled
31. can root guard and udld be used together?
Distribution layer
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
Yes
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
32. How do IP phones communicate with each other?
Once the CCM gives them the parameters - they use RTP
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
33. What happens if both 802.1D and RSTP BDPUs are received?
Use the spanning-tree root macro
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
Configure and enable DHCP snooping
Port stays up - packets from violating MACs dropped - no logging
34. What is errdisable dtp-flap?
Change in trunk encap
From the DHCP snooping database or from static entries
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
The L3 forwarding engine can't forward the packet in hardware because there is no L2 next-hop address - so the packet is sent to the L3 engine to generate the ARP response
35. What is topology-basec caching?
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
Globally
16 bits (8b port priority - 8b port number)
Port
36. unknown unicast flooding
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
The MST instance (MSTI) runs alongside the IST and represents an STP instance
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
37. Of what significance are private VLANs
The link status stays up - but something between them has failed or is filtering traffic
Used when there are 1 or more VLANs mapped to a single STP instance
Checks the destination MAC in the header against the target MAC in the ARP reply
Local only
38. What is the core block?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
39. How does uplinkfast handle changes in topology?
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
The port is forced to always authorize any connected client with no authentication necessary (default)
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
Untrusted
40. How does PAgP form etherchannels?
When a client roams between Aps in different subnets
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
Limits the number if dhcp requests on a port
41. What does a LAP do if it loses communication with it's WLC?
Switching Database Manager - configures and prunes TCAM partitions
Using a mobility exchange message
7 switches from root bridge
Reboots and searches for a new WLC
42. What does the epoch number indicate when looking at cef entries?
The number of times the CEF table has bee flushed and regenerated as a whole
Yes to both
The campus network's backbone
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
43. How does every HSRP config command begin?
Globally
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
Prevents the dhcp binding DB from being checked.
Switch(config-if)# standby xx where x= group number
44. What are the 2 types of BDPU?
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
Turn on port security
Configuration and TCN
45. How many 802.3af power classes are there?
Yes
Using a single WAP to centralize access and control over a group of wireless devices.
5 (0-4 with 4 being the highest)
All ARP packets that arrive on untrusted ports are inspected.
46. What is the distribution layer best practice?
The distribution layer should have only L3 links
The MST instance (MSTI) runs alongside the IST and represents an STP instance
Promiscuous and host
Switchpotrt nonegotiate
47. EAP encryption
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
Dynamic WEP keys that change periodically
0-255 (lower is better)
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
48. What are the steps to configuring HSRP MD5 authentication?
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
Yes to both
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
Packets must be sent to the L3 engine for further processing
49. How long are TCAM masks?
Trusted ports
134 bits
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
The distribution layer should have only L3 links
50. How do you renable an err-disable port by default?
Multicasts to 224.0.0.18 (VRRP)
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
Manually