SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does the dst-mac option do when checking ARP replies
Checks the destination MAC in the header against the target MAC in the ARP reply
80% of the user traffic should stay in the VLAN
Differentiated services
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
2. What is dynamic auto?
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
Cisco ILP and 802.3af
Will trunk if asked
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
3. What is the GLBP group and priority range
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
Distribution layer
Group (0-1023) priority (1-255 higher better def 100)
4. EAP encryption
2 seconds
Discarding - learning - forwarding
Dynamic WEP keys that change periodically
The distribution layer should have only L3 links
5. What criteria are used to size a switch block?
Isolated and community
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
When a port moves into forwarding or from fowarding or learning to blocking.
2-8 FE - GE - or 10GE are bundled.
6. What can the Etherchannel hash use?
A host port goes up or down
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Each network device handles packets individually with no advance reservations
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
7. What is the format of the VRRP virtual MAC?
Variation in delay
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
0000.5e00.01xx
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
8. RSTP designated port
Dynamic WEP keys that change periodically
Port with best root path cost on segment
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
When the AP uplinks to an Ethernet network.
9. What does port-security protect do?
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
Those that connect to other switches
802.1w
Port stays up - packets from violating MACs dropped - no logging
10. What is the distribution layer best practice?
Group (0-255) - priority (1-254 254 is highest - 100 default)
The distribution layer should have only L3 links
An ac adaptor that plugs into a wall outlet.
Best effort delivery - integrated services model - and differentiated services model
11. When looking at the sh spanning tree output - What does P2P denote?
Used when there are 1 or more VLANs mapped to a single STP instance
Data and voice over native vlan - no QOS but still uses 802.1p trunk
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
A point to point port type
12. What is DSCP codepoint AF31(26)?
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
L2
Configure the timer on the AVG and let it propagate
Flash (class 3)
13. How does IPT behave when the voice VLAN is in vlan-id mode?
Best effort delivery - integrated services model - and differentiated services model
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
14. Does GLBP allow preemption?
4
After forwarding delay - port can learn new MAC addresses
Yes
Each network device handles packets individually with no advance reservations
15. What is topology-basec caching?
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
Critical...used most often for IPT
900 MHz - 2.4Ghz - and 5-6GHz
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
16. What are the VRRP group and priority numbers?
Group (0-255) - priority (1-254 254 is highest - 100 default)
Port with alternative path to root less desirable than root
300 sec by default
Packets must be sent to the L3 engine for further processing
17. How is a WLC handoff handled when the WLCs are in different subnets?
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
Silent
The configureable UDLD interval must be less than max age plus two intervals of forward delay
By using an Ether-IP tunnel
18. How should UDLD be configured?
The configureable UDLD interval must be less than max age plus two intervals of forward delay
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
1 to 64
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
19. How is RSTP synchronization accomplished?
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
Only the standby monitors the hello messages from the active router
An L2 switch can only forward frames best effort unless going across a trunk
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
20. How does L3 QOS classification happen?
A client can roam to any WLC as long as it stays in a mobility group
The TOS field in the header is used. 2 methods 3 bits or 6 bits
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
A key string of up to 8 characters is sent. Default is cisco.
21. By default - what layer do catalyst switchports operate on?
L2
By using a hash of a key string
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
63 kbps
22. What does the minimum keyword do in HSRP?
Regions and instances
By default weight is 100. Can be made dynamic per interface
Globally or per-port
Forces the router to wait for a period of time before attempting overthrow
23. What must be in common for a BSS to form?
134 bits
Use the spanning-tree root macro
19
Matching SSID - compatible data rate - authentication credentials
24. What does MSTP do?
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
Used when there are 1 or more VLANs mapped to a single STP instance
25. How does 802.1q handle COS?
VTP server for domain null with no password or secure mode
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
Local only
26. What is the adjacency table?
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
802.11
Trusted or untrusted
27. By default - what submode does PAgP operate in with the desirable and auto modes?
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
Every switch and router in a network must be configured with appropriate QoS features and policies
Silent
Incoming frames are dropped (combination of disabled - blocking - and listening)
28. What does the static keyword do when applying an arp ACL?
Prevents the dhcp binding DB from being checked.
Distribution layer
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
1 to 64
29. If one end of an Etherchannel (either type) is set to on and the channel doesn't form - what should you check?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
30. How is UDLD configured?
Option 43
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
On root - because the root bridge propagates timers with config BDPU
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
31. How many MST instances can be in a region?
Untrusted
The standby becomes active and stays active by default. Preemption can be configured
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
32. RSTP edge port
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
Only a single host connects . If one BDPU is received - it is no longer an edge port
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
33. What is UDLD normal mode?
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
Trunk
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
Plain text or md5
34. How is the IPT 802.1 trunk negotiated?
Automatically using DTP and CDP
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
Trunk
35. What are the three basic types of QOS?
Yes
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
Best effort delivery - integrated services model - and differentiated services model
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
36. What is the STP forwarding state?
Auto mode
FIB
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
Full duplex
37. How does IPT behave when the voce VLAN is in the default none mode?
Data and voice over native vlan no QOS and no 802.1p trunk
Switch(config-if)# glbp xx where xx = group number
Used to switch packets destined for the null interface
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
38. Can ARP replies be checked
Yes
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Each network device handles packets individually with no advance reservations
Multicasts to 224.0.0.18 (VRRP)
39. What is the cost of a 1Gbps link?
4
L2
Transmits keystrokes from phone and commands from CCM
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
40. How should the switch port to which a LAP be configured?
Only the standby monitors the hello messages from the active router
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Access
Globally
41. Where is the QoS trust boundary usually configured on an IP phone?
Discarding - learning - forwarding
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
Can send and receive BDPUs
Usually QoS from VOIP but not PC dataa
42. What is a community secondary VLAN?
Trunk
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
Use the spanning-tree root macro
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
43. RSTP backup port
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
Port that connects to another switch and becomes a designated port
By configuring every switch port to have an expected and controlled behavior
44. How many links can be used in an EtherChannel?
SC fiber or RJ-45
Etherchannel ports have inconsistent config
2-8 FE - GE - or 10GE are bundled.
Per VLAN
45. Does a WLC and a LAP need to be on the same subnet?
Use the spanning-tree root macro
The time that a port spends in both listening and learning states . Default 15 seconds
No
Frames are forwarded
46. WPA encryption
No
Interim solution - uses same hardware as WEP - but uses TKIP encryption
Based on priority (0-255). Default is 100. Highest IP is tie breaker
Lowest cumulative cost to root
47. What is the cost of a 100Mbps link?
It can't
Cisco recommends only on the root bridge
19
Packets must be sent to the L3 engine for further processing
48. What are the 2 choices for VLANs with IPT?
On by default
0-255
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
Dynamic WEP keys that change periodically
49. How are VACLs applied
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
To a VLAN and not to a VLAN interface (SVI)
Hashing algorithm
1 to 64
50. If the WLC connects to an Etherchannel - how should the channel be configured and why?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183