SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How do you prevent switch spoofing?
Multicasts to 224.0.0.18 (VRRP)
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
Forces the router to wait for a period of time before attempting overthrow
By configuring every switch port to have an expected and controlled behavior
2. Where is bdpu guard enabled?
L2
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
All user ports that have portfast enabled
63 kbps
3. EAP encryption
On ports where you never expect to find a root bridge for a VLAN
Dynamic WEP keys that change periodically
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
4. What 2 tunnelling mechanisms do the LAP and WLC use to communicate?
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
The port is forced to always authorize any connected client with no authentication necessary (default)
Roughly 50%
5. What is a microcell?
Best effort delivery - integrated services model - and differentiated services model
Real-time Transport Protocol
When the size of a cell is intentionally reduced
Root
6. When looking at the sh spanning tree output - What does P2P denote?
Value - mask - and result (VMR) combinations
Dynamic WEP keys that change periodically
A MAC is seen on a different port
A point to point port type
7. How far chould a VLAN extend?
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
Distribution layer
No
Incoming frames dropped - but MACs learned
8. How many potential links can LACP define?
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
16 - of which up to 8 are active. The others are in standby
0-65535 (def 32768) lower=better
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
9. How is an instance defined?
Either desirable or auto mode
Differentiated services code point
By name - config revision - and instance to vlan mapping table
2 strand MMF with MT-RJ or SC connectors
10. What is the standard for WLANs?
802.11
2 seconds
All L2 connectivity should be contained within the access layer.
Globally
11. WPA encryption
Another router must have a higher HSRP priority and have preemt set up
The port asks the other end to trunk
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
Interim solution - uses same hardware as WEP - but uses TKIP encryption
12. Where should you change the network diameter value?
With the skinny protocol
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Cisco recommends only on the root bridge
3 seconds. Holdtime =3 hellos + 1
13. How are multiple VLANs mapped to multiple SSIDs?
By using a trunk link
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
Only the standby monitors the hello messages from the active router
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
14. What ILP mode are all ports in by default?
Needs hardware upgrade over WEP - uses AES encryption
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Auto mode
15. What is a community secondary VLAN?
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
Show standby
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
16. What are the two private vlan association modes?
A group of wireless devices that share a common SSID
Promiscuous and host
The MST instance (MSTI) runs alongside the IST and represents an STP instance
Both ends should be on because on modes doesn't send PAgP or LACP packets
17. What feedback mechanism does wireless use?
2 strand MMF with MT-RJ or SC connectors
With portfast
When a wireless station transmits a frame - the receiving one must send an ack
Configure non-silent submode
18. Each switch port is a _____ ______
802.1w
Collision domain
Flash (class 3)
Receives the first packet of a traffic flow and routes it
19. What does port-security protect do?
134 bits
Port stays up - packets from violating MACs dropped - no logging
5 (0-4 with 4 being the highest)
Port with best root path cost on segment
20. What are the 3 redundant supervisor modes?
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
When each AP stands alone within the larger network.
On the left as you face the connector
RPR - RPR+ - and SSO
21. What is a CEF glean?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
22. What does UDLD do?
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Show standby
Reboots and searches for a new WLC
23. What is DCF?
Distributed coordinion function - the use of timers to prevent wireless collisions
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
A key string of up to 8 characters is sent. Default is cisco.
Multicasts to 224.0.0.18 (VRRP)
24. What is the distribution layer best practice?
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
The distribution layer should have only L3 links
The MST instance (MSTI) runs alongside the IST and represents an STP instance
Cisco ILP and 802.3af
25. When DHCP snooping is turned on - by default - it considers all ports ______
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
Untrusted
When a client roams between Aps in different subnets
26. What must the other end be set to if PAgP desirable or LACP active mode is selected?
Globally or per-port
Either desirable or auto mode
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
Switch(config-if)# standby xx where x= group number
27. What categories can ports be in with dhcp snooping enabled?
PAgP (Cisco proprietary) and LACP (standards-based)
Trusted or untrusted
The number of times the CEF table has bee flushed and regenerated as a whole
Dynamic arp inspection
28. Where is root guard enabled?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. What is unique about HSRP group numbers?
Admin down
Normal and aggressive
Switch(config-if)# glbp xx where xx = group number
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
30. What is common spanning tree (CST)?
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
Lowest cumulative cost to root
19
31. Where is the QoS trust boundary usually configured on an IP phone?
Usually QoS from VOIP but not PC dataa
Because each frame is checked
Root - designated - alternate - and backup
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
32. How does 802.1q handle COS?
The standby becomes active and stays active by default. Preemption can be configured
Multicast to 01-80-c2-00-00-00
All nondesignated ports - but ok for all ports
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
33. What is an insignificant topology change?
Enables portfast - sets the port to access and disables PAgP
A host port goes up or down
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
SC fiber or RJ-45
34. what must be done on an SVI before it is activated?
1/2 and 3/6
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
No shut
All nondesignated ports - but ok for all ports
35. How does IPT behave when the voice VLAN is in vlan-id mode?
The port is forced to always authorize any connected client with no authentication necessary (default)
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
A host port goes up or down
Auto mode
36. When looking at the sh spanning tree output - What does P2P peer(STP) denote?
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
A point to point port type but the neighboring device runs traditional 802.1D STP
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
Only when a nonedge port transitions to forwarding
37. How are BDPUs spread?
Port with best root path cost
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
1 second. Backup routers can learn the interval from the master
Multicast to 01-80-c2-00-00-00
38. What are the RSTP port states?
Discarding - learning - forwarding
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
Show standby
On by default
39. How do you disable DTP when you configure both ends of the ISL manually?
The time that a port spends in both listening and learning states . Default 15 seconds
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
Half-duplex
Switchpotrt nonegotiate
40. What is route caching?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
41. What are the port channel load balancing methods?
Sends a voltage across the receive pairs to detect a 25k ohm resistance
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
0-255 (lower is better)
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
42. What is an indirect topology change?
Because each frame is checked
The link status stays up - but something between them has failed or is filtering traffic
Embeds the tag within the frame
Roughly 50%
43. WPA2 encryption
Determines when the AVG will stop using the old VMAC in ARP replies
Real-time Transport Protocol
All ARP packets that arrive on untrusted ports are inspected.
Needs hardware upgrade over WEP - uses AES encryption
44. What is the port number range?
0-255
All fiber-optic links between switches (must be enabled on both ends)
On the left as you face the connector
10-15%
45. What 2 conditions does IP source guard check for?
Yes
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
When the AP uplinks to an Ethernet network.
Only when a nonedge port transitions to forwarding
46. What are the 5 steps a LAP uses to establish communication with a WLC?
224.0.0.2 (all routers)
Use sh interface on the interface and look for error counts > 10
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
802.11
47. How does RSTP converge?
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
Using digital certificates
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
48. How much BW does a PSTN connection use?
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
Weak key rotation
63 kbps
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
49. How does IPT behave when the voice VLAN is in dot1p mode?
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
26-byte header - 4-byte trailer with CRC
50. What does BDPU filtering do?
Edge - root - and point to point
By creating a static IP binding
Effectively stops STP on filtered ports
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another