SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What if RSTP BDPUs aren't received?
Used when ACLs specify port ranges...used by TCAM
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
900 MHz - 2.4Ghz - and 5-6GHz
2. What routing protocols support NSF?
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
BGP - EIGRP - OSPF - and IS-IS.
Automatically negotiates a common trunk mode between switches
When a port moves into forwarding or from fowarding or learning to blocking.
3. What is the VRRP skew time?
By name - config revision - and instance to vlan mapping table
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
All ports where root isn't expected
Port is forced to never authorize any connected client
4. What is PVST plus (PVST+)?
Each network device handles packets individually with no advance reservations
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
Only when a nonedge port transitions to forwarding
On all switches in network to enable RLQ request and reply
5. What method of QOS does voice traffic use most frequently?
Discarding - learning - forwarding
900 MHz - 2.4Ghz - and 5-6GHz
802.1w
Differentiated services
6. What is a drop adjacency?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. What are the two etherchannel negotiation protocols?
PAgP (Cisco proprietary) and LACP (standards-based)
Almost eliminates listening and learning states for single hosts on an access link
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
8. can root guard and bdpu guard be used together?
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
No
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
Value - mask - and result (VMR) combinations
9. What types of links can be trunked?
Cisco ILP and 802.3af
By encapsulating each frame in a header and trailer
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
FE - GE - and aggregated FE/GE Etherchannels
10. How is an instance defined?
Controls where candidate root bridges can be connected and found on a network
By using a trunk link
Trusted ports
By name - config revision - and instance to vlan mapping table
11. What is the duration time in a wireless frame?
Best effort delivery - integrated services model - and differentiated services model
Each frame transmits its expected duration time
The number of times the entry has been updated since the table was generated
Globally
12. How does GLBP work?
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
Routers are assigned to common GLBP group. All routers can be active and can load balance
13. How do you enable CEF?
On ports where you never expect to find a root bridge for a VLAN
Switch(config-if)# vrrp xx where xx= group number
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
It is enabled by default on all CEF capable switches
14. What is a CEF glean?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. What does the version number indicate when looking at CEF entries?
Promiscuous and host
Can hear only BDPUs
Route once - switch many
The number of times the entry has been updated since the table was generated
16. What is RTP?
It can't
Real-time Transport Protocol
The ASIC
All nondesignated ports - but ok for all ports
17. EAP encryption
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
Dynamic WEP keys that change periodically
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
On the left as you face the connector
18. If a wireless station needs to transmit and no other device is transmitting - what happens?
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
The station can transmit immediately and wait for an ack
Limits the number if dhcp requests on a port
19. What are the 2 choices for VLANs with IPT?
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
By an ARP access list that defines the permitted bindings
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
Using a mobility exchange message
20. What is the GLBP group and priority range
Needs hardware upgrade over WEP - uses AES encryption
RADIUS
CEF is distributed completely among multiple L3 forwarding engines.
Group (0-1023) priority (1-255 higher better def 100)
21. Does GLBP allow preemption?
2-8 FE - GE - or 10GE are bundled.
Yes
By using an Ether-IP tunnel
With portfast
22. What address does HSRP send hello packets to?
224.0.0.2 (all routers)
Controls where candidate root bridges can be connected and found on a network
Trusted ports
By using an Ether-IP tunnel
23. What does the dst-mac option do when checking ARP replies
Checks the destination MAC in the header against the target MAC in the ARP reply
Src-dst-ip
The ASIC
All fiber-optic links between switches (must be enabled on both ends)
24. What is DSCP codepoint AF31(26)?
Cisco recommends only on the root bridge
Flash (class 3)
On ports where you never expect to find a root bridge for a VLAN
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
25. What are the 5 steps to manualy configure STP?
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
Trusted or untrusted
26. What does the standby HSRP router do?
Prevents the dhcp binding DB from being checked.
Only the standby monitors the hello messages from the active router
When a client roams between Aps in different subnets
Virtual Router Redundancy Protocol - pretty much the same as HSRP
27. How is DHCP snooping enabled (scope)?
Switchpotrt nonegotiate
Globally
0000.5e00.01xx
Between interfaces that are assigned to L2 VLANs or L2 trunks
28. What is the STP listening state?
Isl - dot1q - negotiate (default)
Can send and receive BDPUs
The configureable UDLD interval must be less than max age plus two intervals of forward delay
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
29. What ILP mode are all ports in by default?
A VLAN that spans the entire fabric
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
Auto mode
Group (0-255) - priority (1-254 254 is highest - 100 default)
30. How does ISL do trunking?
By encapsulating each frame in a header and trailer
Port with alternative path to root less desirable than root
Flash override (class 4)
MAC of the end device
31. What 2 conditions does IP source guard check for?
Variation in delay
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
Flash (class 3)
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
32. What is the default VTP state?
Port with best root path cost on segment
2-8 FE - GE - or 10GE are bundled.
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
VTP server for domain null with no password or secure mode
33. What is dynamic desireable?
The port asks the other end to trunk
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
Arp for local subnet - if on different subnet - will arp for dgw
No
34. How is Root Guard used?
On ports where you never expect to find a root bridge for a VLAN
A single broadcast domain
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
35. What happens when an ARP reply is received on an untrusted port?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. How do you prevent VLAN hopping?
When the AP uplinks to an Ethernet network.
Configure non-silent submode
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
37. How does an LAP bind with a WLC?
Immediate (class 2)
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
By brining up a tunnel between them to carry 802.11 related messages and client data.
Both layer 2 switching and IVR
38. How should the switch port to which an autonomous AP be configured?
Transmits keystrokes from phone and commands from CCM
The link status stays up - but something between them has failed or is filtering traffic
Trunk
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
39. What is an IST instance?
Distribution
Lowest cumulative cost to root
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
When the AP uplinks to an Ethernet network.
40. Where does layer switching occur?
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
A VLAN that spans the entire fabric
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
Between any type of interface as long as the interface can have an L3 address assigned
41. What feedback mechanism does wireless use?
When a wireless station transmits a frame - the receiving one must send an ack
CEF is distributed completely among multiple L3 forwarding engines.
Bridge priority and MAC
Weak key rotation
42. What is dynamic auto?
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
Data and voice over native vlan no QOS and no 802.1p trunk
Will trunk if asked
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
43. How often are CAM table entries aged?
A point to point port type but the neighboring device runs traditional 802.1D STP
300 sec
Yes to both
Effectively stops STP on filtered ports
44. How should the switch port to which a WLC be configured?
Trunk
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
Isolated and community
45. How are GLBP timers used?
No
Forces the router to wait for a period of time before attempting overthrow
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
The number of times the entry has been updated since the table was generated
46. How does DAI work?
Dynamic arp inspection
From the DHCP snooping database or from static entries
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
All ARP packets that arrive on untrusted ports are inspected.
47. How are VACLs configured?
As a VLAN access map
The DCF interframe space- the random backoff time before a wireless set can transmit
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
Between any type of interface as long as the interface can have an L3 address assigned
48. What is a service set?
Src-dst-ip
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
A group of wireless devices that share a common SSID
49. Where does VRRP send advertisements?
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
Multicasts to 224.0.0.18 (VRRP)
L2
Configuration and TCN
50. if the switchport is part of an etherchannel - Where is the network assigned
To the virtual port-channel interface
4
Configuration and TCN
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.