SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does IP source guard do?
Isl - dot1q - negotiate (default)
Port with alternative path to root less desirable than root
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
Checks the source MAC in the header against the sender MAC in the ARP reply
2. If one end of an Etherchannel (either type) is set to on and the channel doesn't form - what should you check?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
3. What does the minimum keyword do in HSRP?
Another router must have a higher HSRP priority and have preemt set up
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
The same as a standby group in HSRP
Forces the router to wait for a period of time before attempting overthrow
4. What's the easiest way to configure GLBP timers?
Trunk
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
Configure the timer on the AVG and let it propagate
802.1x with EAP over LAN (EAPOL)
5. How is UDLD configured?
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
A key string of up to 8 characters is sent. Default is cisco.
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
Edge - root - and point to point
6. What happens when the topology changes?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. What are the 3 unlicensed frequencies?
63 kbps
2 strand MMF with MT-RJ or SC connectors
802.1D
900 MHz - 2.4Ghz - and 5-6GHz
8. What does Loop Guard do?
Full duplex
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
They disguise the origin of an attack
9. What does the SP do?
2 seconds
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
Transmits keystrokes from phone and commands from CCM
Per VLAN
10. What does the standby HSRP router do?
Automatically using DTP and CDP
Only the standby monitors the hello messages from the active router
Virtual Router Redundancy Protocol - pretty much the same as HSRP
The master router can share the VIP
11. What is the adjacency table?
By using a hash of a key string
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
Port stays up - packets from violating MACs dropped - no logging
12. What is layer 2 roaming?
Using a mobility exchange message
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
Manually
0-255 (lower is better)
13. What are dynamic VLANs based on?
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
MAC of the end device
One that can be detected on a switch interface (ie. Up/down)
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
14. Each switch port is a _____ ______
Group (0-1023) priority (1-255 higher better def 100)
Collision domain
Control functions
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
15. What is the STP forwarding state?
Only the standby monitors the hello messages from the active router
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Because each frame is checked
16. Where are security and QoS ACLs stored?
Used when ACLs specify port ranges...used by TCAM
Almost eliminates listening and learning states for single hosts on an access link
Both ends should be on because on modes doesn't send PAgP or LACP packets
TCAM
17. What is errdisable pagp-flap?
The link status stays up - but something between them has failed or is filtering traffic
Etherchannel ports have inconsistent config
No
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
18. What address does HSRP send hello packets to?
Configuration and TCN
By using a trunk link
224.0.0.2 (all routers)
Routers are assigned to common GLBP group. All routers can be active and can load balance
19. What is BDPU Guard?
By using a trunk link
If any BDUP is received on a port - it puts the port into the errdisable state
7 switches from root bridge
Edge - root - and point to point
20. What is an ESS?
Switches make an effort to move packets as quickly as possible
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
When the AP uplinks to an Ethernet network.
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
21. can root guard and bdpu guard be used together?
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
No
Critical...used most often for IPT
Per VLAN
22. What does the rewrite engine do?
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
Either desirable or auto mode
4
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
23. What is accelerated CEF (aCEF)?
1 second. Backup routers can learn the interval from the master
All nondesignated ports - but ok for all ports
Per VLAN
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
24. What does the skinny protocol do?
Used to switch packets destined for the null interface
Both layer 2 switching and IVR
An L2 switch can only forward frames best effort unless going across a trunk
Transmits keystrokes from phone and commands from CCM
25. Which ports should you consider trusted for DAI?
Regions and instances
Those that connect to other switches
All nondesignated ports - but ok for all ports
2-8 FE - GE - or 10GE are bundled.
26. RSTP forwarding state
Multicast to 01-80-c2-00-00-00
Frames are forwarded
Control functions
802.1x with EAP over LAN (EAPOL)
27. How does a WLC hand off a client's association to another WLC?
By using a hash of a key string
An AP's coverage area
Using a mobility exchange message
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
28. What is a microcell?
The port asks the other end to trunk
When the size of a cell is intentionally reduced
Discarding - learning - forwarding
5 (0-4 with 4 being the highest)
29. What are the steps to configure MST?
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
Manually
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
Variation in delay
30. What are LOU register pairs?
Configure and enable DHCP snooping
Port with alternative path to root less desirable than root
Used when ACLs specify port ranges...used by TCAM
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
31. Which fiber is the receive?
By sending a gratuitous ARP
One that can be detected on a switch interface (ie. Up/down)
On the left as you face the connector
Only a single host connects . If one BDPU is received - it is no longer an edge port
32. How does uplinkfast handle changes in topology?
Discarding - learning - forwarding
0-255
The configureable UDLD interval must be less than max age plus two intervals of forward delay
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
33. How does the VRRP master router handle the VIP?
The master router can share the VIP
Only for trusted Cisco gear - especially phones
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
34. How do you implement MST?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. How does DAI work?
By using an Ether-IP tunnel
By sending a gratuitous ARP
Group (0-1023) priority (1-255 higher better def 100)
All ARP packets that arrive on untrusted ports are inspected.
36. What does port-security restrict do?
Will trunk if asked
Distribution
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
The time that a port spends in both listening and learning states . Default 15 seconds
37. What is RPR+?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
38. What is a discard adjacency?
One that can be detected on a switch interface (ie. Up/down)
The port asks the other end to trunk
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
Packets are discarded due to an ACL or policy action
39. RSTP discarding state
Incoming frames are dropped (combination of disabled - blocking - and listening)
Normal and aggressive
Virtual Router Redundancy Protocol - pretty much the same as HSRP
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
40. How doed backbonefast work?
Switch(config-if)# glbp xx where xx = group number
A VLAN that spans the entire fabric
By short-circuiting the max age timer
That they aren't using the same frequencies.
41. What does the switchport host macro do?
Each frame transmits its expected duration time
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
42. How is an instance defined?
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
Only the standby monitors the hello messages from the active router
By name - config revision - and instance to vlan mapping table
Change in trunk encap
43. How do Cisco IP phones communicate with the CCM?
RADIUS
No
With the skinny protocol
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
44. RSTP backup port
Configure and enable DHCP snooping
VTP server for domain null with no password or secure mode
The MST instance (MSTI) runs alongside the IST and represents an STP instance
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
45. Where is loop guard enabled?
By using a trunk link
Can hear only BDPUs
All nondesignated ports - but ok for all ports
1 second. Backup routers can learn the interval from the master
46. 802.11b
The port is forced to always authorize any connected client with no authentication necessary (default)
No shut
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
Half-duplex
47. Does a WLC and a LAP need to be on the same subnet?
No
2 seconds
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
300 sec by default
48. What are the characteristics of the core layer
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
From the DHCP snooping database or from static entries
Value - mask - and result (VMR) combinations
49. What is an autonomous mode AP?
When each AP stands alone within the larger network.
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
The number of times the entry has been updated since the table was generated
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
50. How does Root Guard work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183