SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is common spanning tree (CST)?
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
5 classes with 3 drop precedences
If any BDUP is received on a port - it puts the port into the errdisable state
2. what should you do if you expect a PAgP capable switch at the other end vs. a server or host?
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
Configure non-silent submode
134 bits
3. RSTP point to point port
RADIUS
Port that connects to another switch and becomes a designated port
Distribution
Cisco recommends only on the root bridge
4. What is an isolated secondary VLAN?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. How does HSRP port tracking work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. If a wireless station needs to transmit and another device is transmitting - what happens?
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
No
Cisco recommends only on the root bridge
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
7. How do you prevent switch spoofing?
Access or trunk
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
By configuring every switch port to have an expected and controlled behavior
Arp for local subnet - if on different subnet - will arp for dgw
8. WPA2 encryption
The wireless clients communicate directly with no other means of connectivity such as a WAP
Needs hardware upgrade over WEP - uses AES encryption
Switching Database Manager - configures and prunes TCAM partitions
4
9. If you want IP source guard to detect spoofed MAC addresses - what must you do?
No
Transmits keystrokes from phone and commands from CCM
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Turn on port security
10. What is the acceptible range of VLANS?
Either desirable or auto mode
Group (0-255) - priority (1-254 254 is highest - 100 default)
By short-circuiting the max age timer
1-1005 (1 and 1002-1005 are reserved)
11. What are the 2 types of secondary VLAN?
63 kbps
SC fiber or RJ-45
2
Isolated and community
12. What is an ESS?
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
When the AP uplinks to an Ethernet network.
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
That they aren't using the same frequencies.
13. How many users should be within a switch block?
Yes
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
Cisco recommends only on the root bridge
Roughly 2000
14. How does a LAP and a WLC authenticate between each other?
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Silent
Using digital certificates
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
15. What is an IST instance?
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Show standby
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
Configure the timer on the AVG and let it propagate
16. How long are TCAM masks?
134 bits
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
17. What is RPR+?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. What is RPVST+?
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
Half because transmitting and receiving stations use the same frequency
19. When looking at the sh spanning tree output - What does P2P denote?
The link status stays up - but something between them has failed or is filtering traffic
A point to point port type
Value - mask - and result (VMR) combinations
Isl - dot1q - negotiate (default)
20. For QoS - switch uplinks should always be considered as ____ _____?
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
63 kbps
Trusted ports
Configure and enable DHCP snooping
21. Define VRRP
3 seconds. Holdtime =3 hellos + 1
When the size of a cell is intentionally reduced
Virtual Router Redundancy Protocol - pretty much the same as HSRP
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
22. How does IPT behave when the voice VLAN is in vlan-id mode?
From the DHCP snooping database or from static entries
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
On root - because the root bridge propagates timers with config BDPU
23. What are dynamic VLANs based on?
Checks the destination MAC in the header against the target MAC in the ARP reply
MAC of the end device
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
By name - config revision - and instance to vlan mapping table
24. RSTP learning state
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Incoming frames dropped - but MACs learned
Yes
The same as a standby group in HSRP
25. How do VRRP routers handle preemption?
When a port moves into forwarding or from fowarding or learning to blocking.
Each network device handles packets individually with no advance reservations
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
On by default
26. What is topology-basec caching?
Hashing algorithm
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
Variation in delay
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
27. How does HSRP plain text authentication work?
Switch(config-if)# glbp xx where xx = group number
Distribution layer
Change in trunk encap
A key string of up to 8 characters is sent. Default is cisco.
28. What is the 80/20 rule?
Checks the destination MAC in the header against the target MAC in the ARP reply
On ports where you never expect to find a root bridge for a VLAN
80% of the user traffic should stay in the VLAN
Isolated and community
29. How does the CEF L3 engine operate?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
30. How do you disable DTP when you configure both ends of the ISL manually?
Configure and enable DHCP snooping
Switchpotrt nonegotiate
The configureable UDLD interval must be less than max age plus two intervals of forward delay
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
31. What is the portr ID?
Regions and instances
16 bits (8b port priority - 8b port number)
Two distribution switches that aggregate one or more access switches
With portfast
32. What are the 2 types of BDPU?
FE and GE
To the virtual port-channel interface
Configuration and TCN
No
33. How should the switch port to which a WLC be configured?
The time that a port spends in both listening and learning states . Default 15 seconds
Trunk
With the skinny protocol
0000.0c07.acxx where xx is the group number as a 2-digit hex value
34. What are the 2 power over ethernet methods?
Trusted or untrusted
Group (0-255) - priority (1-254 254 is highest - 100 default)
Differentiated services code point
Cisco ILP and 802.3af
35. What is GLBP weight?
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
63 kbps
By default weight is 100. Can be made dynamic per interface
36. What are the characteristics of the access layer?
Needs hardware upgrade over WEP - uses AES encryption
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
0-255 (lower is better)
37. What are the 4 steps to extend QoS trust?
1/2 and 3/6
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
38. How should the switch port to which an autonomous AP be configured?
By name - config revision - and instance to vlan mapping table
Group (0-255) - priority (1-254 254 is highest - 100 default)
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
Trunk
39. What is the LACP priority range?
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
By name - config revision - and instance to vlan mapping table
1-65535 (def 32768) lower priority - higher probability
40. Define GLBP
Gateway load balancing protocol - cisco proprietary
Determines when the AVG will stop using the old VMAC in ARP replies
Switching Database Manager - configures and prunes TCAM partitions
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
41. At what layer does EAPOL run?
Untrusted
L2
Automatically negotiates a common trunk mode between switches
The station can transmit immediately and wait for an ack
42. what do multilayer switches do?
By brining up a tunnel between them to carry 802.11 related messages and client data.
Port with best root path cost
Both layer 2 switching and IVR
Variation in delay
43. When looking at the sh spanning tree output - What does P2P peer(STP) denote?
Use the spanning-tree root macro
Only the standby monitors the hello messages from the active router
A point to point port type but the neighboring device runs traditional 802.1D STP
Switch(config-if)# glbp xx where xx = group number
44. How does VRRP do tracking?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
45. What does Loop Guard do?
63 kbps
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
Differentiated services
46. How much overlap should a wireless repeater have?
Packets must be sent to the L3 engine for further processing
PAgP (Cisco proprietary) and LACP (standards-based)
Roughly 50%
No shut
47. How is the HSRP MAC address configured?
By name - config revision - and instance to vlan mapping table
VTP server for domain null with no password or secure mode
Distributed coordinion function - the use of timers to prevent wireless collisions
0000.0c07.acxx where xx is the group number as a 2-digit hex value
48. What is a drop adjacency?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. What are the 3 ways GLBP load-balances?
Differentiated services
Weak key rotation
Round robin - weighted - or host-dependent
Configure and enable DHCP snooping
50. How does backbonefast determine whether alternative paths exist?
Configure the timer on the AVG and let it propagate
VTP server for domain null with no password or secure mode
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests