SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does HSRP do MD5 authentication?
Frames that barely exceed 1518B or 1622B due to headers
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
The port asks the other end to trunk
By using a hash of a key string
2. What does the skinny protocol do?
Effectively stops STP on filtered ports
Transmits keystrokes from phone and commands from CCM
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
1500B
3. How are BDPUs spread?
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
Lowest cumulative cost to root
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
Multicast to 01-80-c2-00-00-00
4. What do you need to determine to use MSTP?
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
Two distribution switches that aggregate one or more access switches
Packets are discarded due to an ACL or policy action
All fiber-optic links between switches (must be enabled on both ends)
5. How do you find duplex mismatches?
Only the standby monitors the hello messages from the active router
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
Use sh interface on the interface and look for error counts > 10
6. Where is bdpu guard enabled?
All user ports that have portfast enabled
Isolated and community
16 bits (8b port priority - 8b port number)
Switch(config-if)# vrrp xx where xx= group number
7. What types of authentication does HSRP allow?
When a wireless station transmits a frame - the receiving one must send an ack
By an ARP access list that defines the permitted bindings
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
Plain text or md5
8. RSTP BPDU structure
5 (0-4 with 4 being the highest)
Group (0-1023) priority (1-255 higher better def 100)
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
9. What duplex setting does 802.11 use and why?
Half because transmitting and receiving stations use the same frequency
Manually
The wireless clients communicate directly with no other means of connectivity such as a WAP
Round robin - weighted - or host-dependent
10. How do you disable DTP when you configure both ends of the ISL manually?
Switchpotrt nonegotiate
Trunk - dynamic auto - dynamic desireable (default)
Use sh interface on the interface and look for error counts > 10
By creating a static IP binding
11. Automatically configure STP timers
Roughly 50%
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
Use the spanning-tree root macro
No
12. How is Root Guard used?
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
On ports where you never expect to find a root bridge for a VLAN
13. How does 802.3af do power discovery?
Sends a voltage across the receive pairs to detect a 25k ohm resistance
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
Checks the destination MAC in the header against the target MAC in the ARP reply
Trunk
14. What is RPR?
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
A packet can't be switched in hardware with the FIB and must go to the L3 engine
12 kbps with headers and compression
Hashing algorithm
15. What method of QOS does voice traffic use most frequently?
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
Differentiated services
16. What is dhcp snooping rate limiting?
Limits the number if dhcp requests on a port
It's a router that maintains routes (static or dynamic) - and populates the FIB
Enables portfast - sets the port to access and disables PAgP
By encapsulating each frame in a header and trailer
17. How do you configure LACP standby links?
Reboots and searches for a new WLC
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Switch(config-if)# standby xx where x= group number
LACP port priority
18. How many MST instances can be in a region?
When each AP stands alone within the larger network.
An ac adaptor that plugs into a wall outlet.
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
Configure and enable DHCP snooping
19. How does HSRP gateway addressing work
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
Once the CCM gives them the parameters - they use RTP
Configure and enable DHCP snooping
All user ports that have portfast enabled
20. What is route caching?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
21. How does a DAI enabled switch gather trusted ARP info?
Used to switch packets destined for the null interface
From the DHCP snooping database or from static entries
Cisco ILP and 802.3af
Virtual Router Redundancy Protocol - pretty much the same as HSRP
22. What are the RSTP port roles?
They disguise the origin of an attack
Root - designated - alternate - and backup
Plain text or md5
2-8 FE - GE - or 10GE are bundled.
23. What are the 3 unlicensed frequencies?
900 MHz - 2.4Ghz - and 5-6GHz
The active router. All other routers are in backup state
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
The MST instance (MSTI) runs alongside the IST and represents an STP instance
24. unknown unicast flooding
Determines when the AVG will stop using the old VMAC in ARP replies
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
19
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
25. How does an LAP bind with a WLC?
Based on priority (0-255). Default is 100. Highest IP is tie breaker
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
Variation in delay
By brining up a tunnel between them to carry 802.11 related messages and client data.
26. What is a root link query (RLQ)?
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
An AP's coverage area
Root
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
27. How are VACLs applied
Needs hardware upgrade over WEP - uses AES encryption
Distribution
To a VLAN and not to a VLAN interface (SVI)
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
28. Where shoul dmultilayer switches be implemented?
Embeds the tag within the frame
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
Distribution layer
No because they only participate if asked
29. What is an SVI?
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
PAgP (Cisco proprietary) and LACP (standards-based)
Needs hardware upgrade over WEP - uses AES encryption
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
30. Does VTP pass private VLAN configuration?
No
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
1-1005 (1 and 1002-1005 are reserved)
A MAC is seen on a different port
31. How is the IPT 802.1 trunk negotiated?
Automatically using DTP and CDP
The configureable UDLD interval must be less than max age plus two intervals of forward delay
Yes
Untrusted
32. What routing protocols support NSF?
Root
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
The active router. All other routers are in backup state
BGP - EIGRP - OSPF - and IS-IS.
33. What are the characteristics of the access layer?
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
Because each frame is checked
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
Used when there are 1 or more VLANs mapped to a single STP instance
34. What is DSCP codepoint AF11(10)?
Packets are discarded due to an ACL or policy action
2-8 FE - GE - or 10GE are bundled.
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
Priority (class 1)
35. How does ILP do power discovery?
Each network device handles packets individually with no advance reservations
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
The link status stays up - but something between them has failed or is filtering traffic
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
36. How does DAI work?
All ARP packets that arrive on untrusted ports are inspected.
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
37. What is the access layer best practice?
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
All L2 connectivity should be contained within the access layer.
80% of the user traffic should stay in the VLAN
Cisco ILP and 802.3af
38. What is the STP Max Age timer?
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
By using a trunk link
Data and voice over native vlan no QOS and no 802.1p trunk
A key string of up to 8 characters is sent. Default is cisco.
39. What is layer 2 roaming?
Distribution layer
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
Yes
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
40. How is the HSRP MAC address configured?
Checks the destination MAC in the header against the target MAC in the ARP reply
0000.0c07.acxx where xx is the group number as a 2-digit hex value
A MAC is seen on a different port
By creating a static IP binding
41. What is the GLBP redirect timer?
Access or trunk
Limits the number if dhcp requests on a port
Only when a nonedge port transitions to forwarding
Determines when the AVG will stop using the old VMAC in ARP replies
42. What is the STP forward delay timer?
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
Auto mode
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
The time that a port spends in both listening and learning states . Default 15 seconds
43. What is the traditional MLS view of switching?
Configuration and TCN
Roughly 50%
Route once - switch many
Trusted ports
44. How many 802.3af power classes are there?
The campus network's backbone
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
5 (0-4 with 4 being the highest)
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
45. Can loop guard and udld be used together?
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
Yes
Change in trunk encap
2 strand MMF with MT-RJ or SC connectors
46. How does RSTP converge?
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Only when a nonedge port transitions to forwarding
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
Effectively stops STP on filtered ports
47. What is the default network diameter?
7 switches from root bridge
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
Root
Yes
48. What is a QoS trust boundary?
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
Access
3 seconds. Holdtime =3 hellos + 1
An AP's coverage area
49. How does a DHCP server send WLC addresses?
Configuration and TCN
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
Those that connect to other switches
Option 43
50. What are LOU register pairs?
CEF is distributed completely among multiple L3 forwarding engines.
2 seconds (def)
Differentiated services code point
Used when ACLs specify port ranges...used by TCAM