SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does HSRP gateway addressing work
Flash override (class 4)
Yes to both
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
2-8 FE - GE - or 10GE are bundled.
2. What happens during HSRP failover?
Another router must have a higher HSRP priority and have preemt set up
Normal and aggressive
The standby becomes active and stays active by default. Preemption can be configured
No
3. What is errdisable dtp-flap?
0-65535 (def 32768) lower=better
802.1D
Change in trunk encap
Use sh interface on the interface and look for error counts > 10
4. How should UDLD be configured?
L2
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
Checks the destination MAC in the header against the target MAC in the ARP reply
The configureable UDLD interval must be less than max age plus two intervals of forward delay
5. How is an instance defined?
Promiscuous and host
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
Only a single host connects . If one BDPU is received - it is no longer an edge port
By name - config revision - and instance to vlan mapping table
6. How do you prevent VLAN hopping?
Admin down
Differentiated services code point
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
By using an Ether-IP tunnel
7. What is RPVST+?
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
RADIUS
FIB
8. What is an ESS?
Between any type of interface as long as the interface can have an L3 address assigned
Root - designated - blocking - alternate - forwarding (host)
When the AP uplinks to an Ethernet network.
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
9. How does HSRP do MD5 authentication?
If any BDUP is received on a port - it puts the port into the errdisable state
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
By using a hash of a key string
Dynamic arp inspection
10. What are TCAM entries composed of?
Value - mask - and result (VMR) combinations
Used when there are 1 or more VLANs mapped to a single STP instance
Determines when the AVG will stop using the old VMAC in ARP replies
Effectively stops STP on filtered ports
11. Can ARP replies be checked
All nondesignated ports - but ok for all ports
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
Yes
Once the CCM gives them the parameters - they use RTP
12. What are the 2 power over ethernet methods?
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
Cisco ILP and 802.3af
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
Trusted or untrusted
13. Define HSRP
2
Configuration and TCN
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
The standby becomes active and stays active by default. Preemption can be configured
14. What is the STP Max Age timer?
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
Auto mode
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
Regions and instances
15. What are dynamic VLANs based on?
A point to point port type but the neighboring device runs traditional 802.1D STP
Enables portfast - sets the port to access and disables PAgP
MAC of the end device
Switching Database Manager - configures and prunes TCAM partitions
16. Where should STP timers be configured and why?
Checks the destination MAC in the header against the target MAC in the ARP reply
Trusted or untrusted
On root - because the root bridge propagates timers with config BDPU
The time that a port spends in both listening and learning states . Default 15 seconds
17. What is UDLD aggressive mode?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. What does MSTP do?
Used when there are 1 or more VLANs mapped to a single STP instance
A point to point port type
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
On all switches in network to enable RLQ request and reply
19. What are the 4 steps in DHCP negotiation?
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
Access
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
20. What is an insignificant topology change?
A host port goes up or down
134 bits
Port stays up - packets from violating MACs dropped - no logging
0000.5e00.01xx
21. What is 802.1x force-authorized?
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
The port is forced to always authorize any connected client with no authentication necessary (default)
Sends a voltage across the receive pairs to detect a 25k ohm resistance
22. What are the 5 steps to manualy configure STP?
Manually
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
The configureable UDLD interval must be less than max age plus two intervals of forward delay
The number of times the CEF table has bee flushed and regenerated as a whole
23. What is errdisable pagp-flap?
Port stays up - packets from violating MACs dropped - no logging
Access or trunk
Etherchannel ports have inconsistent config
Distribution layer
24. the static port to vlan membership is handled in _____
The configureable UDLD interval must be less than max age plus two intervals of forward delay
The ASIC
Reboots and searches for a new WLC
By creating a static IP binding
25. 802.11g
Controls where candidate root bridges can be connected and found on a network
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
Receives the first packet of a traffic flow and routes it
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
26. What is the distribution layer best practice?
Time between BDPUs sent by root bridge. Default of 2 seconds
When the size of a cell is intentionally reduced
The distribution layer should have only L3 links
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
27. Where is bdpu guard enabled?
Globally or per-port
Frames are forwarded
All user ports that have portfast enabled
Root - designated - blocking - alternate - forwarding (host)
28. What routing protocols support NSF?
A MAC is seen on a different port
L2
BGP - EIGRP - OSPF - and IS-IS.
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
29. How do you prevent switch spoofing?
By configuring every switch port to have an expected and controlled behavior
Root - designated - blocking - alternate - forwarding (host)
When the AP uplinks to an Ethernet network.
2 strand MMF with MT-RJ or SC connectors
30. What 2 tunnelling mechanisms do the LAP and WLC use to communicate?
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
Value - mask - and result (VMR) combinations
The redundant SUP is booted and sup and route engine is init'd. No L2 or L3 functions are started. Allows switchports to retain state
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
31. What happens when the topology changes?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. What does the switchport host macro do?
Promiscuous and host
Hashing algorithm
Enables portfast - sets the port to access and disables PAgP
Both ends should be on because on modes doesn't send PAgP or LACP packets
33. How does the standby handle ARP issues after it becomes active?
CEF is distributed completely among multiple L3 forwarding engines.
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
The MST instance (MSTI) runs alongside the IST and represents an STP instance
By sending a gratuitous ARP
34. How is RSTP synchronization accomplished?
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
Globally
Group (0-255) - priority (1-254 254 is highest - 100 default)
35. What does the SP do?
Access or trunk
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
Edge - root - and point to point
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
36. What is PVST plus (PVST+)?
Virtual Router Redundancy Protocol - pretty much the same as HSRP
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
With the skinny protocol
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
37. What are the 3 ways GLBP load-balances?
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
Round robin - weighted - or host-dependent
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
Port with alternative path to root less desirable than root
38. At what layer should the WLC be connected?
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
Regions and instances
Distribution
Immediate (class 2)
39. Where should you change the network diameter value?
Cisco recommends only on the root bridge
Root
On ports where you never expect to find a root bridge for a VLAN
Full duplex
40. How does IPT behave when the voce VLAN is in the default none mode?
When a wireless station transmits a frame - the receiving one must send an ack
Roughly 50%
Data and voice over native vlan no QOS and no 802.1p trunk
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
41. When are RSTP bdpus sent?
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
Yes
42. What is the LACP priority range?
On all switches in network to enable RLQ request and reply
1-65535 (def 32768) lower priority - higher probability
By using an Ether-IP tunnel
Using digital certificates
43. How are multiple VLANs mapped to multiple SSIDs?
After forwarding delay - port can learn new MAC addresses
By using a trunk link
5 (0-4 with 4 being the highest)
Switching Database Manager - configures and prunes TCAM partitions
44. What is NSF?
Immediate (class 2)
0-65535 (def 32768) lower=better
Frames that barely exceed 1518B or 1622B due to headers
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
45. What is the DIFS?
Untrusted
The DCF interframe space- the random backoff time before a wireless set can transmit
Roughly 50%
300 sec by default
46. What is the size of a TCAM value?
RPR - RPR+ - and SSO
A key string of up to 8 characters is sent. Default is cisco.
When a wireless station transmits a frame - the receiving one must send an ack
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
47. Where is loop guard enabled?
All nondesignated ports - but ok for all ports
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
Disabled - blocking - listening - learning - forwarding
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
48. How does adding option-82 to DHCP snooping affect things?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. What is layer 3 roaming?
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
When a client roams between Aps in different subnets
By using a trunk link
All ports where root isn't expected
50. How does GLBP work?
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
Routers are assigned to common GLBP group. All routers can be active and can load balance
Incoming frames are dropped (combination of disabled - blocking - and listening)
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.