SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How do IP phones communicate with each other?
By name - config revision - and instance to vlan mapping table
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
2-8 FE - GE - or 10GE are bundled.
Once the CCM gives them the parameters - they use RTP
2. How does an LAP bind with a WLC?
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
The standby becomes active and stays active by default. Preemption can be configured
The port asks the other end to trunk
By brining up a tunnel between them to carry 802.11 related messages and client data.
3. What is layer 2 roaming?
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
The port asks the other end to trunk
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
Only a single host connects . If one BDPU is received - it is no longer an edge port
4. How does uplinkfast handle changes in topology?
Interim solution - uses same hardware as WEP - but uses TKIP encryption
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
5. How should the switch port to which a LAP be configured?
Half because transmitting and receiving stations use the same frequency
5 (0-4 with 4 being the highest)
Access
Configure and enable DHCP snooping
6. How does adding option-82 to DHCP snooping affect things?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. How does HSRP gateway addressing work
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
Only a single host connects . If one BDPU is received - it is no longer an edge port
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
FE and GE
8. How long are TCAM masks?
The TOS field in the header is used. 2 methods 3 bits or 6 bits
Gateway load balancing protocol - cisco proprietary
134 bits
LACP port priority
9. What is NSF?
FE and GE
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
10. What does the epoch number indicate when looking at cef entries?
4
Control functions
The number of times the CEF table has bee flushed and regenerated as a whole
Isl - dot1q - negotiate (default)
11. What is a drop adjacency?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. How is DHCP snooping enabled (scope)?
Each network device handles packets individually with no advance reservations
Connects with SONET or SDH
The active router. All other routers are in backup state
Globally
13. What must be in common for a BSS to form?
All ports where root isn't expected
12 kbps with headers and compression
Matching SSID - compatible data rate - authentication credentials
A VLAN that spans the entire fabric
14. What is DSCP codepoint AF31(26)?
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
Value - mask - and result (VMR) combinations
Flash (class 3)
Configuration and TCN
15. How does a Cisco IP phone connect upstream?
Via an 802.1Q trunk or a single VLAN access port
When the size of a cell is intentionally reduced
As a VLAN access map
No because they only participate if asked
16. How are multiple VLANs mapped to multiple SSIDs?
By using a trunk link
Show standby
No
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
17. What is the default VTP state?
Data and voice over native vlan - no QOS but still uses 802.1p trunk
VTP server for domain null with no password or secure mode
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
All nondesignated ports - but ok for all ports
18. When should CDP be enabled?
Roughly 2000
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
Only for trusted Cisco gear - especially phones
19. How does every HSRP config command begin?
Switch(config-if)# standby xx where x= group number
SC fiber or RJ-45
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
20. What criteria are used to size a switch block?
All ports where root isn't expected
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
21. What is route caching?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
22. How does L3 QOS classification happen?
A key string of up to 8 characters is sent. Default is cisco.
The TOS field in the header is used. 2 methods 3 bits or 6 bits
L2
The campus network's backbone
23. where does L2 switching occur?
Between interfaces that are assigned to L2 VLANs or L2 trunks
With portfast
On root - because the root bridge propagates timers with config BDPU
The standby becomes active and stays active by default. Preemption can be configured
24. What does the ip option do when checking ARP replies
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
25. Whan is a 10GE WAN PHY?
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
Connects with SONET or SDH
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
It is enabled by default on all CEF capable switches
26. What is a vlan?
300 sec by default
Distribution layer
A single broadcast domain
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
27. What is an untrusted port under dhcp snooping?
A private VLAN can be logically associated with a special secondary vlan
The total delay from start to finish
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
28. Define HSRP
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
L2
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
29. What is a discard adjacency?
Packets are discarded due to an ACL or policy action
Used to switch packets destined for the null interface
802.1w
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
30. Which ports should you consider trusted for DAI?
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
Those that connect to other switches
900 MHz - 2.4Ghz - and 5-6GHz
31. How does a WLC hand off a client's association to another WLC?
Configure the timer on the AVG and let it propagate
A host port goes up or down
Using a mobility exchange message
Use sh interface on the interface and look for error counts > 10
32. What is the size of ISL encapsulation?
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
26-byte header - 4-byte trailer with CRC
Only when a nonedge port transitions to forwarding
When each AP stands alone within the larger network.
33. What ILP mode are all ports in by default?
Incoming frames dropped - but MACs learned
Auto mode
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
34. RSTP BPDU structure
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
Option 43
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
With portfast
35. What are the 2 types of secondary VLAN?
On root - because the root bridge propagates timers with config BDPU
Value - mask - and result (VMR) combinations
Needs hardware upgrade over WEP - uses AES encryption
Isolated and community
36. what must be done on an SVI before it is activated?
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
A group of wireless devices that share a common SSID
No shut
900 MHz - 2.4Ghz - and 5-6GHz
37. what if a secondary VLAN?
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
Differentiated services code point
300 sec by default
38. What is a VRRP group?
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
The same as a standby group in HSRP
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
No
39. What is the GLBP redirect timer?
The number of times the entry has been updated since the table was generated
All L2 connectivity should be contained within the access layer.
By encapsulating each frame in a header and trailer
Determines when the AVG will stop using the old VMAC in ARP replies
40. RSTP point to point port
Port that connects to another switch and becomes a designated port
Frames that barely exceed 1518B or 1622B due to headers
Port is forced to never authorize any connected client
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
41. What does port-security protect do?
To a VLAN and not to a VLAN interface (SVI)
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
Port stays up - packets from violating MACs dropped - no logging
When the AP uplinks to an Ethernet network.
42. What does the version number indicate when looking at CEF entries?
Data and voice over native vlan no QOS and no 802.1p trunk
Src-dst-ip
The number of times the entry has been updated since the table was generated
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
43. What cabling do GBICs use?
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
Root - designated - alternate - and backup
SC fiber or RJ-45
44. What are the two etherchannel negotiation protocols?
The same as a standby group in HSRP
Trunk
PAgP (Cisco proprietary) and LACP (standards-based)
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
45. What is the default FE duplex?
Embeds the tag within the frame
Configure non-silent submode
Control functions
Full duplex
46. How does ILP do power discovery?
Yes to both
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
The number of times the entry has been updated since the table was generated
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
47. How does RSTP identify a topology change?
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
Per VLAN
Only when a nonedge port transitions to forwarding
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
48. How does the VRRP master router handle the VIP?
RADIUS
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
The master router can share the VIP
When each AP stands alone within the larger network.
49. How does HSRP do MD5 authentication?
Port that connects to another switch and becomes a designated port
By using a hash of a key string
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
PAgP (Cisco proprietary) and LACP (standards-based)
50. How does DSCP handle IP precedence?
Dynamic WEP keys that change periodically
5 classes with 3 drop precedences
Via an 802.1Q trunk or a single VLAN access port
Switch(config-if)# glbp xx where xx = group number