SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does RSTP converge?
Lowest cumulative cost to root
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
Completed dhcp bindings - mac addresses - IP addresses - etc.
2. How does ILP do power discovery?
When a client roams between Aps in different subnets
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
All L2 connectivity should be contained within the access layer.
1 to 64
3. Where should you change the network diameter value?
Those that connect to other switches
Cisco recommends only on the root bridge
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
When a wireless station transmits a frame - the receiving one must send an ack
4. What must you be sure of if AP cells overlap?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. How are frames forwarded across a specific link?
802.11
Hashing algorithm
Root - designated - alternate - and backup
SC fiber or RJ-45
6. What are the 3 trunk encap modes?
Isl - dot1q - negotiate (default)
The redundant SUP is booted and sup and route engine is init'd. No L2 or L3 functions are started. Allows switchports to retain state
Globally
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
7. RSTP discarding state
Based on priority (0-255). Default is 100. Highest IP is tie breaker
Incoming frames are dropped (combination of disabled - blocking - and listening)
1 second. Backup routers can learn the interval from the master
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
8. What does the RP do?
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
Time between BDPUs sent by root bridge. Default of 2 seconds
Receives the first packet of a traffic flow and routes it
When the AP uplinks to an Ethernet network.
9. the static port to vlan membership is handled in _____
The ASIC
Controls where candidate root bridges can be connected and found on a network
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
Transmits keystrokes from phone and commands from CCM
10. What does the ip option do when checking ARP replies
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
11. What does the epoch number indicate when looking at cef entries?
All L2 connectivity should be contained within the access layer.
Isl - dot1q - negotiate (default)
Distribution layer
The number of times the CEF table has bee flushed and regenerated as a whole
12. How should the switch port to which a LAP be configured?
Automatically negotiates a common trunk mode between switches
1 IP subnet
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
Access
13. What pins does FE use?
By using a trunk link
1/2 and 3/6
2-8 FE - GE - or 10GE are bundled.
Used to switch packets destined for the null interface
14. What is errdisable dtp-flap?
Src-dst-ip
Change in trunk encap
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
1 IP subnet
15. How does IPT behave when the voce VLAN is in the default none mode?
Because each frame is checked
Incoming frames are dropped (combination of disabled - blocking - and listening)
FE - GE - and aggregated FE/GE Etherchannels
Data and voice over native vlan no QOS and no 802.1p trunk
16. What does DTP do?
Switching Database Manager - configures and prunes TCAM partitions
Automatically negotiates a common trunk mode between switches
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
FE and GE
17. What is topology-basec caching?
When a client roams between Aps in different subnets
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
Globally
The station can transmit immediately and wait for an ack
18. What are the characteristics of the core layer
Will trunk if asked
19
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
19. 802.11g
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
The standby becomes active and stays active by default. Preemption can be configured
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
The time that a port spends in both listening and learning states . Default 15 seconds
20. What is the access layer best practice?
900 MHz - 2.4Ghz - and 5-6GHz
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Packets must be sent to the L3 engine for further processing
All L2 connectivity should be contained within the access layer.
21. At what layer does EAPOL run?
1/2 and 3/6
Every switch and router in a network must be configured with appropriate QoS features and policies
1 second. Backup routers can learn the interval from the master
L2
22. What categories can ports be in with dhcp snooping enabled?
Port stays up - packets from violating MACs dropped - no logging
12 kbps with headers and compression
Trusted or untrusted
A point to point port type but the neighboring device runs traditional 802.1D STP
23. Where is UDLD enabled?
Used when there are 1 or more VLANs mapped to a single STP instance
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
All fiber-optic links between switches (must be enabled on both ends)
24. How does RSTP identify a topology change?
Only when a nonedge port transitions to forwarding
L2
300 sec by default
Used when ACLs specify port ranges...used by TCAM
25. How does HSRP do MD5 authentication?
Effectively stops STP on filtered ports
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
Port that connects to another switch and becomes a designated port
By using a hash of a key string
26. can root guard and bdpu guard be used together?
Interim solution - uses same hardware as WEP - but uses TKIP encryption
No
All nondesignated ports - but ok for all ports
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
27. EAP encryption
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
The total delay from start to finish
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
Dynamic WEP keys that change periodically
28. What does UDLD do?
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
The master router can share the VIP
Interim solution - uses same hardware as WEP - but uses TKIP encryption
Using a mobility exchange message
29. How does backbonefast determine whether alternative paths exist?
1 to 64
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
30. How many designated ports are there?
Root - designated - blocking - alternate - forwarding (host)
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
1 per segment
31. What are the characteristics of the distribution layer?
Edge - root - and point to point
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Lowest cumulative cost to root
32. What are the 3 redundant supervisor modes?
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
RPR - RPR+ - and SSO
Data and voice over native vlan - no QOS but still uses 802.1p trunk
33. How many tunnels exist between the LAP and WLC?
All ARP packets that arrive on untrusted ports are inspected.
Both ends should be on because on modes doesn't send PAgP or LACP packets
2 - one for control messages and one for data
Isolated and community
34. 802.11a
Cisco recommends only on the root bridge
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
If any BDUP is received on a port - it puts the port into the errdisable state
Admin down
35. RSTP designated port
Port with best root path cost on segment
The wireless clients communicate directly with no other means of connectivity such as a WAP
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
1500B
36. What are the port channel load balancing methods?
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
CEF is distributed completely among multiple L3 forwarding engines.
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
Automatically negotiates a common trunk mode between switches
37. How is an instance defined?
The L3 forwarding engine can't forward the packet in hardware because there is no L2 next-hop address - so the packet is sent to the L3 engine to generate the ARP response
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
By name - config revision - and instance to vlan mapping table
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
38. Whan is a 10GE WAN PHY?
Each frame transmits its expected duration time
Connects with SONET or SDH
0000.5e00.01xx
No
39. RSTP learning state
Every switch and router in a network must be configured with appropriate QoS features and policies
Incoming frames dropped - but MACs learned
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
If the switch or the powered device doesn't suport power class discovery
40. What are the 6 steps to configure 802.1x for port security?
The redundant SUP is booted and sup and route engine is init'd. No L2 or L3 functions are started. Allows switchports to retain state
Port is forced to never authorize any connected client
FE and GE
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
41. What is the VRRP skew time?
Used when there are 1 or more VLANs mapped to a single STP instance
Immediate (class 2)
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
The configureable UDLD interval must be less than max age plus two intervals of forward delay
42. What is a BSS?
Using a single WAP to centralize access and control over a group of wireless devices.
Weak key rotation
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
After forwarding delay - port can learn new MAC addresses
43. How does IPT behave when the voice VLAN is in untagged mode?
Determines when the AVG will stop using the old VMAC in ARP replies
That they aren't using the same frequencies.
Data and voice over native vlan - no QOS but still uses 802.1p trunk
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
44. What are the characteristics of the access layer?
The number of times the entry has been updated since the table was generated
Every switch and router in a network must be configured with appropriate QoS features and policies
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
Packets are discarded due to an ACL or policy action
45. Does VTP pass private VLAN configuration?
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
No
Cisco recommends only on the root bridge
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
46. What is the STP forward delay timer?
The time that a port spends in both listening and learning states . Default 15 seconds
Yes to both
On all switches in network to enable RLQ request and reply
Gateway load balancing protocol - cisco proprietary
47. What does MSTP do?
Use sh interface on the interface and look for error counts > 10
The distribution layer should have only L3 links
Every switch and router in a network must be configured with appropriate QoS features and policies
Used when there are 1 or more VLANs mapped to a single STP instance
48. static vlans offer ____ based membership
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
The number of times the CEF table has bee flushed and regenerated as a whole
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
Port
49. what do multilayer switches do?
Both layer 2 switching and IVR
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
L2
When a client roams between Aps in different subnets
50. What is 802.1x auto?
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
5 classes with 3 drop precedences
L2