SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does HSRP election work?
On all switches in network to enable RLQ request and reply
Based on priority (0-255). Default is 100. Highest IP is tie breaker
It is enabled by default on all CEF capable switches
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
2. What is portfast?
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
Admin down
Almost eliminates listening and learning states for single hosts on an access link
3. What are the steps to configuring HSRP MD5 authentication?
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
2 - one for control messages and one for data
Via an 802.1Q trunk or a single VLAN access port
4. What types of link can an etherchannel be?
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
Access or trunk
Can send and receive BDPUs
Variation in delay
5. What is dynamic auto?
Can hear only BDPUs
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
2 seconds (def)
Will trunk if asked
6. What is an IST instance?
Disabled - blocking - listening - learning - forwarding
On the left as you face the connector
Incoming frames are dropped (combination of disabled - blocking - and listening)
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
7. How are RSTP point to point ports determined?
To the virtual port-channel interface
802.1x with EAP over LAN (EAPOL)
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
L2
8. What are the 3 ways GLBP load-balances?
After forwarding delay - port can learn new MAC addresses
Only for the offending VLAN on the port
Can hear only BDPUs
Round robin - weighted - or host-dependent
9. What is a CEF glean?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
10. What is a BSS?
Both ends should be on because on modes doesn't send PAgP or LACP packets
Using a single WAP to centralize access and control over a group of wireless devices.
Yes to both
When a client roams between Aps in different subnets
11. What is the STP hello timer?
Critical...used most often for IPT
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
Promiscuous and host
Time between BDPUs sent by root bridge. Default of 2 seconds
12. How can BDPU Guard be configured?
The campus network's backbone
Receives the first packet of a traffic flow and routes it
Globally or per-port
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
13. What is the size of a TCAM value?
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Time between BDPUs sent by root bridge. Default of 2 seconds
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
14. What does the RP do?
Receives the first packet of a traffic flow and routes it
Dynamic WEP keys that change periodically
The link status stays up - but something between them has failed or is filtering traffic
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
15. can root guard and udld be used together?
Roughly 2000
Switching Database Manager - configures and prunes TCAM partitions
Yes
The same as a standby group in HSRP
16. What is Per VLAN STP (PVST)?
Flash override (class 4)
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
802.11
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
17. What is the cost of a 1Gbps link?
Gateway load balancing protocol - cisco proprietary
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
4
Plain text or md5
18. How does UDLD work?
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
134 bits
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
Use sh interface on the interface and look for error counts > 10
19. What is a community secondary VLAN?
Frames are forwarded
Distribution layer
Used when ACLs specify port ranges...used by TCAM
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
20. What are the two etherchannel negotiation protocols?
If the switch or the powered device doesn't suport power class discovery
Distribution
PAgP (Cisco proprietary) and LACP (standards-based)
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
21. What are spoofed addresses?
Only for trusted Cisco gear - especially phones
Cisco ILP and 802.3af
Controls where candidate root bridges can be connected and found on a network
They disguise the origin of an attack
22. What is DSCP?
A group of wireless devices that share a common SSID
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
Admin down
Differentiated services code point
23. How many links can be used in an EtherChannel?
Trunk - dynamic auto - dynamic desireable (default)
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
2 strand MMF with MT-RJ or SC connectors
2-8 FE - GE - or 10GE are bundled.
24. What does the minimum keyword do in HSRP?
Forces the router to wait for a period of time before attempting overthrow
Untrusted
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
Silent
25. What contains the next-hop entries?
Round robin - weighted - or host-dependent
Enables portfast - sets the port to access and disables PAgP
Using digital certificates
FIB
26. Where should you change the network diameter value?
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
Cisco recommends only on the root bridge
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
Configure and enable DHCP snooping
27. What scope is 802.1x enabled?
Src-dst-ip
Switch(config-if)# standby xx where x= group number
Access or trunk
Globally
28. How do you prevent switch spoofing?
On by default
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
By configuring every switch port to have an expected and controlled behavior
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
29. For QoS - switch uplinks should always be considered as ____ _____?
Trusted ports
Roughly 50%
Trusted or untrusted
That they aren't using the same frequencies.
30. What is an indirect topology change?
On root - because the root bridge propagates timers with config BDPU
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
The link status stays up - but something between them has failed or is filtering traffic
31. What is the GLBP AVG?
19
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
Either desirable or auto mode
Trunk
32. What is RPVST+?
300 sec
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
Because each frame is checked
Trunk
33. What is the access layer best practice?
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
Real-time Transport Protocol
The TOS field in the header is used. 2 methods 3 bits or 6 bits
All L2 connectivity should be contained within the access layer.
34. What is a microcell?
Distribution layer
When the size of a cell is intentionally reduced
Trunk
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
35. What are the 4 steps to extend QoS trust?
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
Both ends should be on because on modes doesn't send PAgP or LACP packets
Switch(config-if)# vrrp xx where xx= group number
FE and GE
36. How many MST instances can be in a region?
After forwarding delay - port can learn new MAC addresses
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
The port is forced to always authorize any connected client with no authentication necessary (default)
Port with best root path cost on segment
37. How does a DAI enabled switch gather trusted ARP info?
From the DHCP snooping database or from static entries
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
Show standby
38. what do multilayer switches do?
Data and voice over native vlan - no QOS but still uses 802.1p trunk
No
L2
Both layer 2 switching and IVR
39. What is the STP forward delay timer?
The time that a port spends in both listening and learning states . Default 15 seconds
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
Frames are forwarded
Trunk - dynamic auto - dynamic desireable (default)
40. How much BW does a PSTN connection use?
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
All L2 connectivity should be contained within the access layer.
When a port moves into forwarding or from fowarding or learning to blocking.
63 kbps
41. Where shoul dmultilayer switches be implemented?
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
2-8 FE - GE - or 10GE are bundled.
Distribution layer
Yes
42. What must you be sure of if AP cells overlap?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. What is a wall wart?
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
Configuration and TCN
An ac adaptor that plugs into a wall outlet.
On by default
44. What does MSTP consist of?
Critical...used most often for IPT
Regions and instances
On root - because the root bridge propagates timers with config BDPU
After forwarding delay - port can learn new MAC addresses
45. How are BDPUs spread?
Frames are forwarded
19
Multicast to 01-80-c2-00-00-00
Can send and receive BDPUs
46. How does an LAP bind with a WLC?
Reboots and searches for a new WLC
By brining up a tunnel between them to carry 802.11 related messages and client data.
300 sec by default
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
47. What are the 5 STP port roles?
Root - designated - blocking - alternate - forwarding (host)
A client can roam to any WLC as long as it stays in a mobility group
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
By short-circuiting the max age timer
48. What are TCAM entries composed of?
Full duplex
Value - mask - and result (VMR) combinations
Will trunk if asked
Checks the destination MAC in the header against the target MAC in the ARP reply
49. How is the IPT 802.1 trunk negotiated?
Once the CCM gives them the parameters - they use RTP
Based on priority (0-255). Default is 100. Highest IP is tie breaker
On all switches in network to enable RLQ request and reply
Automatically using DTP and CDP
50. How does DSCP handle IP precedence?
On by default
5 classes with 3 drop precedences
The link status stays up - but something between them has failed or is filtering traffic
Critical...used most often for IPT