SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Does VTP pass private VLAN configuration?
Frames are forwarded
Reboots and searches for a new WLC
No
300 sec
2. What are the port channel load balancing methods?
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
Receives the first packet of a traffic flow and routes it
LACP port priority
Trunk - dynamic auto - dynamic desireable (default)
3. How does DAI work?
Between interfaces that are assigned to L2 VLANs or L2 trunks
All ARP packets that arrive on untrusted ports are inspected.
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
Critical...used most often for IPT
4. What does DTP do?
Switching Database Manager - configures and prunes TCAM partitions
Automatically negotiates a common trunk mode between switches
Packets must be sent to the L3 engine for further processing
The campus network's backbone
5. What types of links can be trunked?
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
FE - GE - and aggregated FE/GE Etherchannels
Control functions
Globally
6. If the WLC connects to an Etherchannel - how should the channel be configured and why?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. What is the traditional MLS view of switching?
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
Route once - switch many
Sends a voltage across the receive pairs to detect a 25k ohm resistance
Trunk
8. Define GLBP
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
From the DHCP snooping database or from static entries
Gateway load balancing protocol - cisco proprietary
9. What cabling do GBICs use?
Reboots and searches for a new WLC
SC fiber or RJ-45
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
Turn on port security
10. How do VRRP routers handle preemption?
The time that a port spends in both listening and learning states . Default 15 seconds
On by default
With portfast
PAgP (Cisco proprietary) and LACP (standards-based)
11. What are the caveats for HSRP port tracking?
Forces the router to wait for a period of time before attempting overthrow
Only when a nonedge port transitions to forwarding
Group (0-255) - priority (1-254 254 is highest - 100 default)
Another router must have a higher HSRP priority and have preemt set up
12. What are the 3 redundant supervisor modes?
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
RPR - RPR+ - and SSO
Multicast to 01-80-c2-00-00-00
Variation in delay
13. can root guard and bdpu guard be used together?
The wireless clients communicate directly with no other means of connectivity such as a WAP
No
Switching Database Manager - configures and prunes TCAM partitions
Discarding - learning - forwarding
14. WPA encryption
Interim solution - uses same hardware as WEP - but uses TKIP encryption
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
Configure non-silent submode
Yes to both
15. What is a cell?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
16. What types of authentication does HSRP allow?
Manages addition - deletion and renaming VLANs across the network
Plain text or md5
If any BDUP is received on a port - it puts the port into the errdisable state
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
17. What happens during HSRP failover?
Automatically negotiates a common trunk mode between switches
Dynamic arp inspection
The standby becomes active and stays active by default. Preemption can be configured
Flash override (class 4)
18. What is DSCP codepoint AF41(34)?
Used when ACLs specify port ranges...used by TCAM
Flash override (class 4)
1-1005 (1 and 1002-1005 are reserved)
Receives the first packet of a traffic flow and routes it
19. What is the acceptible range of VLANS?
Priority (class 1)
Each network device handles packets individually with no advance reservations
1-1005 (1 and 1002-1005 are reserved)
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
20. What routing protocols support NSF?
19
Those that connect to other switches
Manually
BGP - EIGRP - OSPF - and IS-IS.
21. How does HSRP port tracking work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
22. How does adding option-82 to DHCP snooping affect things?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
23. static vlans offer ____ based membership
Use the spanning-tree root macro
Port
Yes
A single broadcast domain
24. How does Root Guard work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
25. What are the 5 steps a LAP uses to establish communication with a WLC?
Port with alternative path to root less desirable than root
Variation in delay
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
Critical...used most often for IPT
26. What happens when the topology changes?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
27. What is the port number range?
0-255
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
Src-dst-ip
28. How is Root Guard used?
Multicast to 01-80-c2-00-00-00
On ports where you never expect to find a root bridge for a VLAN
Isolated and community
2 seconds
29. How much BW does a PSTN connection use?
Use sh interface on the interface and look for error counts > 10
63 kbps
7 switches from root bridge
Data and voice over native vlan no QOS and no 802.1p trunk
30. What is 802.1x force-unauthorized?
Packets are discarded due to an ACL or policy action
Port is forced to never authorize any connected client
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
31. What is backbonefast?
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
32. What are the two etherchannel negotiation protocols?
When a wireless station transmits a frame - the receiving one must send an ack
PAgP (Cisco proprietary) and LACP (standards-based)
The MST instance (MSTI) runs alongside the IST and represents an STP instance
Multicast to 01-80-c2-00-00-00
33. RSTP edge port
Forces the router to wait for a period of time before attempting overthrow
Only a single host connects . If one BDPU is received - it is no longer an edge port
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Group (0-1023) priority (1-255 higher better def 100)
34. What is RPR?
Turn on port security
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
Real-time Transport Protocol
The redundant SUP is booted and sup and route engine is init'd. No L2 or L3 functions are started. Allows switchports to retain state
35. What is a microcell?
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
Dynamic arp inspection
FIB
When the size of a cell is intentionally reduced
36. How does NSF work?
Root
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
Globally
37. What does UDLD do?
A client can roam to any WLC as long as it stays in a mobility group
An AP's coverage area
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
38. What is the RSTP default hello interval?
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
5 (0-4 with 4 being the highest)
2 seconds
Etherchannel ports have inconsistent config
39. Where is root guard enabled?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
40. What is the duration time in a wireless frame?
Port with best root path cost
Use sh interface on the interface and look for error counts > 10
Port
Each frame transmits its expected duration time
41. What does the skinny protocol do?
A point to point port type but the neighboring device runs traditional 802.1D STP
Transmits keystrokes from phone and commands from CCM
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
From the DHCP snooping database or from static entries
42. What is the 80/20 rule?
Cisco recommends only on the root bridge
80% of the user traffic should stay in the VLAN
134 bits
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
43. CAM table entries are purged when....
Hashing algorithm
A MAC is seen on a different port
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
1-1005 (1 and 1002-1005 are reserved)
44. How does VRRP do tracking?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
45. Where shoul dmultilayer switches be implemented?
Port is forced to never authorize any connected client
Distribution layer
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
When a port moves into forwarding or from fowarding or learning to blocking.
46. What is the access layer best practice?
Switches make an effort to move packets as quickly as possible
Group (0-1023) priority (1-255 higher better def 100)
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
All L2 connectivity should be contained within the access layer.
47. How does DSCP handle IP precedence?
Because each frame is checked
5 classes with 3 drop precedences
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
48. Of what significance are private VLANs
The link status stays up - but something between them has failed or is filtering traffic
Between any type of interface as long as the interface can have an L3 address assigned
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
Local only
49. What are the 2 types of secondary VLAN?
1-65535 (def 32768) lower priority - higher probability
Isolated and community
Trunk - dynamic auto - dynamic desireable (default)
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
50. What are the RSTP port roles?
From the DHCP snooping database or from static entries
With portfast
Cisco ILP and 802.3af
Root - designated - alternate - and backup