SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Can ARP replies be checked
Yes
Disabled - init - listen - speak - standby - active
Root - designated - alternate - and backup
Frames that barely exceed 1518B or 1622B due to headers
2. What are the two etherchannel negotiation protocols?
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
Bridge priority and MAC
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
PAgP (Cisco proprietary) and LACP (standards-based)
3. Where is UDLD enabled?
Every switch and router in a network must be configured with appropriate QoS features and policies
Port stays up - packets from violating MACs dropped - no logging
Isl - dot1q - negotiate (default)
All fiber-optic links between switches (must be enabled on both ends)
4. What is a wall wart?
An ac adaptor that plugs into a wall outlet.
It can't
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
10-15%
5. What is the IEEE standard for STP?
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
802.1D
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
By sending a gratuitous ARP
6. What is RPR?
Yes
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
Data and voice over native vlan - no QOS but still uses 802.1p trunk
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
7. What does the RP do?
Bridge priority and MAC
A host port goes up or down
Receives the first packet of a traffic flow and routes it
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
8. What are the 3 trunk encap modes?
Isl - dot1q - negotiate (default)
The DCF interframe space- the random backoff time before a wireless set can transmit
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
9. If there are 2 ports with same root cost - how is the tie broken for designated port?
Data and voice over native vlan - no QOS but still uses 802.1p trunk
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
Isolated and community
10. static vlans offer ____ based membership
By brining up a tunnel between them to carry 802.11 related messages and client data.
When a client roams between Aps in different subnets
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
Port
11. What is accelerated CEF (aCEF)?
Trusted or untrusted
1-1005 (1 and 1002-1005 are reserved)
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
12. What is the range of HSRP group numbers?
Based on priority (0-255). Default is 100. Highest IP is tie breaker
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
Cisco ILP and 802.3af
0-255
13. What is layer 2 roaming?
Switchpotrt nonegotiate
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
By an ARP access list that defines the permitted bindings
That they aren't using the same frequencies.
14. What are the VRRP group and priority numbers?
Group (0-255) - priority (1-254 254 is highest - 100 default)
With the skinny protocol
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
15. What does the minimum keyword do in HSRP?
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
RPR - RPR+ - and SSO
Forces the router to wait for a period of time before attempting overthrow
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
16. How should backbonefast be configured?
Change in trunk encap
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
On all switches in network to enable RLQ request and reply
Access
17. What is a discard adjacency?
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
When a client roams between Aps in different subnets
Packets are discarded due to an ACL or policy action
The time that a port spends in both listening and learning states . Default 15 seconds
18. What is the adjacency table?
Reboots and searches for a new WLC
No
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
Change in trunk encap
19. What does MSTP consist of?
Checks the source MAC in the header against the sender MAC in the ARP reply
Used to switch packets destined for the null interface
Regions and instances
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
20. How should the switch port to which a WLC be configured?
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
2 strand MMF with MT-RJ or SC connectors
Trunk
All user ports that have portfast enabled
21. What is NSF?
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Priority (class 1)
Real-time Transport Protocol
Completed dhcp bindings - mac addresses - IP addresses - etc.
22. How does a WLC hand off a client's association to another WLC?
Trusted or untrusted
Using a mobility exchange message
By name - config revision - and instance to vlan mapping table
To a VLAN and not to a VLAN interface (SVI)
23. How is the IPT 802.1 trunk negotiated?
Plain text or md5
The campus network's backbone
Needs hardware upgrade over WEP - uses AES encryption
Automatically using DTP and CDP
24. How does backbonefast determine whether alternative paths exist?
The total delay from start to finish
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
Each network device handles packets individually with no advance reservations
Checks the source MAC in the header against the sender MAC in the ARP reply
25. How are VACLs applied
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
Virtual Router Redundancy Protocol - pretty much the same as HSRP
To a VLAN and not to a VLAN interface (SVI)
802.1w
26. What is a proxy arp?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
27. if the switchport is part of an etherchannel - Where is the network assigned
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
A key string of up to 8 characters is sent. Default is cisco.
To the virtual port-channel interface
By brining up a tunnel between them to carry 802.11 related messages and client data.
28. What are LOU register pairs?
Used when ACLs specify port ranges...used by TCAM
Access or trunk
Src-dst-ip
Can send and receive BDPUs
29. How does HSRP port tracking work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
30. What data does DHCP snooping track?
Completed dhcp bindings - mac addresses - IP addresses - etc.
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
When a wireless station transmits a frame - the receiving one must send an ack
31. How does RSTP identify a topology change?
Globally
Only when a nonedge port transitions to forwarding
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
32. What are the 4 steps to extend QoS trust?
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
With the skinny protocol
Access or trunk
1500B
33. How do Cisco IP phones communicate with the CCM?
Root - designated - blocking - alternate - forwarding (host)
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
With the skinny protocol
The DCF interframe space- the random backoff time before a wireless set can transmit
34. What 2 conditions does IP source guard check for?
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
An ac adaptor that plugs into a wall outlet.
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
Change in trunk encap
35. What is a LACP priority?
Receives the first packet of a traffic flow and routes it
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
2-8 FE - GE - or 10GE are bundled.
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
36. What is a service set?
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
Port that connects to another switch and becomes a designated port
3 seconds. Holdtime =3 hellos + 1
A group of wireless devices that share a common SSID
37. RSTP designated port
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
Group (0-1023) priority (1-255 higher better def 100)
Port
Port with best root path cost on segment
38. What does MSTP do?
A client can roam to any WLC as long as it stays in a mobility group
By using a hash of a key string
The master router can share the VIP
Used when there are 1 or more VLANs mapped to a single STP instance
39. What can cause a wireless client to switch between Aps?
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
Only for trusted Cisco gear - especially phones
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
0-255
40. What are the three basic types of QOS?
Best effort delivery - integrated services model - and differentiated services model
Automatically negotiates a common trunk mode between switches
By using a hash of a key string
An AP's coverage area
41. How does L3 QOS classification happen?
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
The TOS field in the header is used. 2 methods 3 bits or 6 bits
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
7 switches from root bridge
42. RSTP alternate port
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Port with alternative path to root less desirable than root
When a wireless station transmits a frame - the receiving one must send an ack
Prevents the dhcp binding DB from being checked.
43. What does a LAP do if it loses communication with it's WLC?
A host port goes up or down
LACP port priority
Yes
Reboots and searches for a new WLC
44. What is an SVI?
Each frame transmits its expected duration time
Plain text or md5
Best effort delivery - integrated services model - and differentiated services model
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
45. What are the gotchas for uplinkfast?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
46. Does VTP pass private VLAN configuration?
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
A point to point port type
No
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
47. What is an ESS?
Switch(config-if)# vrrp xx where xx= group number
Critical...used most often for IPT
Trusted or untrusted
When the AP uplinks to an Ethernet network.
48. How many designated ports are there?
Roughly 2000
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
1 per segment
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
49. How do you enable CEF?
Switch(config-if)# vrrp xx where xx= group number
Trunk - dynamic auto - dynamic desireable (default)
It is enabled by default on all CEF capable switches
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
50. What are the 2 types of BDPU?
Configuration and TCN
Receives the first packet of a traffic flow and routes it
2 - one for control messages and one for data
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy