SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 802.11b
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
Control functions
Port
2. What is a wall wart?
An ac adaptor that plugs into a wall outlet.
With portfast
The number of times the CEF table has bee flushed and regenerated as a whole
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
3. What is the switch block?
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
Two distribution switches that aggregate one or more access switches
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
1 to 64
4. What is DSCP codepoint AF21(18)?
16 - of which up to 8 are active. The others are in standby
Between interfaces that are assigned to L2 VLANs or L2 trunks
On root - because the root bridge propagates timers with config BDPU
Immediate (class 2)
5. the static port to vlan membership is handled in _____
1 IP subnet
The ASIC
Disabled - init - listen - speak - standby - active
Two distribution switches that aggregate one or more access switches
6. What is a vlan?
A single broadcast domain
Will trunk if asked
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
Flash override (class 4)
7. What does the ip option do when checking ARP replies
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
8. can root guard and udld be used together?
Yes
A point to point port type
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
It can't
9. What is a drop adjacency?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
10. What are the 2 types of BDPU?
Hashing algorithm
Configuration and TCN
Checks the destination MAC in the header against the target MAC in the ARP reply
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
11. What is the SDM?
Switching Database Manager - configures and prunes TCAM partitions
Switches make an effort to move packets as quickly as possible
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
The MST instance (MSTI) runs alongside the IST and represents an STP instance
12. Where does VRRP send advertisements?
When each AP stands alone within the larger network.
On ports where you never expect to find a root bridge for a VLAN
Multicasts to 224.0.0.18 (VRRP)
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
13. How do Cisco IP phones communicate with the CCM?
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
With the skinny protocol
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
14. What happens during HSRP failover?
2-8 FE - GE - or 10GE are bundled.
The port is forced to always authorize any connected client with no authentication necessary (default)
The standby becomes active and stays active by default. Preemption can be configured
Using a single WAP to centralize access and control over a group of wireless devices.
15. What is the acceptible range of VLANS?
1-1005 (1 and 1002-1005 are reserved)
When the size of a cell is intentionally reduced
LACP port priority
Both ends should be on because on modes doesn't send PAgP or LACP packets
16. What are the 4 steps in DHCP negotiation?
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
It can't
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
PAgP (Cisco proprietary) and LACP (standards-based)
17. What can cause a wireless client to switch between Aps?
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
An ac adaptor that plugs into a wall outlet.
Frames are forwarded
18. How do you show HSRP status
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
Checks the source MAC in the header against the sender MAC in the ARP reply
Show standby
19. What are the 5 steps a LAP uses to establish communication with a WLC?
Configure non-silent submode
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
802.11
Port stays up - packets from violating MACs dropped - no logging
20. Where is the QoS trust boundary usually configured on an IP phone?
Usually QoS from VOIP but not PC dataa
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
134 bits
Matching SSID - compatible data rate - authentication credentials
21. What are the steps to configure a PAgP port channel?
Hashing algorithm
When each AP stands alone within the larger network.
CEF is distributed completely among multiple L3 forwarding engines.
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
22. What are the 5 STP port roles?
Completed dhcp bindings - mac addresses - IP addresses - etc.
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Root - designated - blocking - alternate - forwarding (host)
1-65535 (def 32768) lower priority - higher probability
23. What is the STP learning state?
Connects with SONET or SDH
224.0.0.2 (all routers)
Checks the source MAC in the header against the sender MAC in the ARP reply
After forwarding delay - port can learn new MAC addresses
24. How does ISL handle COS?
The port asks the other end to trunk
Based on priority (0-255). Default is 100. Highest IP is tie breaker
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
25. What does the minimum keyword do in HSRP?
Forces the router to wait for a period of time before attempting overthrow
It can't
Globally or per-port
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
26. What are the steps to configuring HSRP MD5 authentication?
Can hear only BDPUs
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
27. What is a topology change?
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
When a port moves into forwarding or from fowarding or learning to blocking.
Only the standby monitors the hello messages from the active router
Yes to both
28. What is a PVLAN?
A private VLAN can be logically associated with a special secondary vlan
Gateway load balancing protocol - cisco proprietary
By default weight is 100. Can be made dynamic per interface
Each frame transmits its expected duration time
29. What is the PVLAN host mode?
Promiscuous and host
0000.5e00.01xx
They disguise the origin of an attack
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
30. CAM table entries are purged when....
A MAC is seen on a different port
2
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
31. What types of links can be trunked?
Checks the destination MAC in the header against the target MAC in the ARP reply
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
FE - GE - and aggregated FE/GE Etherchannels
All ports where root isn't expected
32. What is 802.1x auto?
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
Via an 802.1Q trunk or a single VLAN access port
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
33. What are the 2 UDLD modes?
A packet can't be switched in hardware with the FIB and must go to the L3 engine
Normal and aggressive
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
Embeds the tag within the frame
34. What happens when the topology changes?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. What are the PAgP negotiation modes
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
Yes
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
Switches make an effort to move packets as quickly as possible
36. What contains the next-hop entries?
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
FIB
Port with alternative path to root less desirable than root
Control functions
37. What is the RSTP default hello interval?
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
10-15%
On all switches in network to enable RLQ request and reply
2 seconds
38. What is an IBSS?
Weak key rotation
Distributed coordinion function - the use of timers to prevent wireless collisions
The wireless clients communicate directly with no other means of connectivity such as a WAP
The station can transmit immediately and wait for an ack
39. What are spoofed addresses?
They disguise the origin of an attack
1 second. Backup routers can learn the interval from the master
Switch(config-if)# glbp xx where xx = group number
Every switch and router in a network must be configured with appropriate QoS features and policies
40. What does a LAP do if it loses communication with it's WLC?
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
224.0.0.2 (all routers)
On the left as you face the connector
Reboots and searches for a new WLC
41. When looking at the sh spanning tree output - What does P2P denote?
A point to point port type
Edge - root - and point to point
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
The ASIC
42. What are the RSTP port states?
Yes
Discarding - learning - forwarding
The same as a standby group in HSRP
By brining up a tunnel between them to carry 802.11 related messages and client data.
43. How does VRRP do tracking?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
44. What is a root link query (RLQ)?
To a VLAN and not to a VLAN interface (SVI)
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
Route once - switch many
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
45. What is layer 2 roaming?
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
Change in trunk encap
63 kbps
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
46. WPA encryption
Based on priority (0-255). Default is 100. Highest IP is tie breaker
Matching SSID - compatible data rate - authentication credentials
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
Interim solution - uses same hardware as WEP - but uses TKIP encryption
47. What is the cost of a 10Gbps link?
2
By configuring every switch port to have an expected and controlled behavior
Automatically negotiates a common trunk mode between switches
Access or trunk
48. What is the GLBP redirect timer?
80% of the user traffic should stay in the VLAN
That they aren't using the same frequencies.
The link status stays up - but something between them has failed or is filtering traffic
Determines when the AVG will stop using the old VMAC in ARP replies
49. can root guard and loop guard be used together
The link status stays up - but something between them has failed or is filtering traffic
FIB
By using a hash of a key string
No
50. What does VTP do?
Manages addition - deletion and renaming VLANs across the network
Bridge priority and MAC
No
L2