SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the PVLAN promiscuous mode?
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
Hashing algorithm
Full duplex
Reboots and searches for a new WLC
2. How do you enable CEF?
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
It is enabled by default on all CEF capable switches
3. RSTP point to point port
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
Trunk - dynamic auto - dynamic desireable (default)
Port that connects to another switch and becomes a designated port
4. What is a drop adjacency?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. What's the easiest way to configure GLBP timers?
A point to point port type but the neighboring device runs traditional 802.1D STP
By configuring every switch port to have an expected and controlled behavior
Configure the timer on the AVG and let it propagate
L2
6. if the switchport is part of an etherchannel - Where is the network assigned
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
To the virtual port-channel interface
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
No
7. How is a WLC handoff handled when the WLCs are in different subnets?
Enables portfast - sets the port to access and disables PAgP
By using an Ether-IP tunnel
Arp for local subnet - if on different subnet - will arp for dgw
Switches make an effort to move packets as quickly as possible
8. How does a Cisco IP phone connect upstream?
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
Incoming frames dropped - but MACs learned
Via an 802.1Q trunk or a single VLAN access port
9. What is portfast?
The station can transmit immediately and wait for an ack
Almost eliminates listening and learning states for single hosts on an access link
Configure non-silent submode
5 classes with 3 drop precedences
10. What is the STP learning state?
16 - of which up to 8 are active. The others are in standby
After forwarding delay - port can learn new MAC addresses
Incoming frames dropped - but MACs learned
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
11. What if RSTP BDPUs aren't received?
2 - one for control messages and one for data
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
802.1D
Silent
12. How do IP phones communicate with each other?
Switching Database Manager - configures and prunes TCAM partitions
Trunk
Once the CCM gives them the parameters - they use RTP
Forces the router to wait for a period of time before attempting overthrow
13. What is RPVST+?
Full duplex
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
Used when ACLs specify port ranges...used by TCAM
Plain text or md5
14. What is layer 3 roaming?
Distributed coordinion function - the use of timers to prevent wireless collisions
When a client roams between Aps in different subnets
Collision domain
FE and GE
15. How can you load-balance with HSRP?
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
It can't
Globally
16. unknown unicast flooding
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
Time between BDPUs sent by root bridge. Default of 2 seconds
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
1 second. Backup routers can learn the interval from the master
17. What does port-security protect do?
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
Port stays up - packets from violating MACs dropped - no logging
Those that connect to other switches
18. What is a cell?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. How can BDPU Guard be configured?
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
Round robin - weighted - or host-dependent
Globally or per-port
Per VLAN
20. What is the distribution layer best practice?
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
The distribution layer should have only L3 links
26-byte header - 4-byte trailer with CRC
21. Where does layer switching occur?
With the skinny protocol
Globally or per-port
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
Between any type of interface as long as the interface can have an L3 address assigned
22. What are the 3 ways GLBP load-balances?
Round robin - weighted - or host-dependent
Yes
When a client roams between Aps in different subnets
Src-dst-ip
23. How often are VRRP advertisements sent?
Automatically negotiates a common trunk mode between switches
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
1 second. Backup routers can learn the interval from the master
1-65535 (def 32768) lower priority - higher probability
24. What is an IST instance?
An ac adaptor that plugs into a wall outlet.
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
Checks the destination MAC in the header against the target MAC in the ARP reply
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
25. What does Loop Guard do?
Used when there are 1 or more VLANs mapped to a single STP instance
Plain text or md5
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
26. How do you implement MST?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
27. If you want IP source guard to detect spoofed MAC addresses - what must you do?
Both layer 2 switching and IVR
Yes to both
Port with best root path cost on segment
Turn on port security
28. On what scope is DAI enabled?
Routers are assigned to common GLBP group. All routers can be active and can load balance
The same as a standby group in HSRP
Globally
Per VLAN
29. Can ARP replies be checked
Switching Database Manager - configures and prunes TCAM partitions
Yes
CEF is distributed completely among multiple L3 forwarding engines.
When the size of a cell is intentionally reduced
30. What is the cost of a 1Gbps link?
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Route once - switch many
4
Differentiated services code point
31. How does an LAP bind with a WLC?
By brining up a tunnel between them to carry 802.11 related messages and client data.
An AP's coverage area
Globally
A key string of up to 8 characters is sent. Default is cisco.
32. How does HSRP do MD5 authentication?
Dynamic WEP keys that change periodically
Both ends should be on because on modes doesn't send PAgP or LACP packets
By using a hash of a key string
2-8 FE - GE - or 10GE are bundled.
33. What is an indirect topology change?
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
Root - designated - blocking - alternate - forwarding (host)
Trusted or untrusted
The link status stays up - but something between them has failed or is filtering traffic
34. What are the characteristics of the core layer
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
Prevents the dhcp binding DB from being checked.
Both ends should be on because on modes doesn't send PAgP or LACP packets
35. What is DSCP?
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
The wireless clients communicate directly with no other means of connectivity such as a WAP
Differentiated services code point
The same as a standby group in HSRP
36. If a port is configured for errdisable auto recovery - how long does it stay down?
300 sec by default
Discarding - learning - forwarding
0-255
Best effort delivery - integrated services model - and differentiated services model
37. What is a LACP priority?
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
The DCF interframe space- the random backoff time before a wireless set can transmit
Configure non-silent submode
Sends a voltage across the receive pairs to detect a 25k ohm resistance
38. What is an end to end vlan?
Needs hardware upgrade over WEP - uses AES encryption
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
A VLAN that spans the entire fabric
Incoming frames are dropped (combination of disabled - blocking - and listening)
39. Does VTP pass private VLAN configuration?
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
No
19
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
40. If there are 2 ports with same root cost - how is the tie broken for designated port?
Isl - dot1q - negotiate (default)
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
By creating a static IP binding
Admin down
41. How do you prevent switch spoofing?
By configuring every switch port to have an expected and controlled behavior
An AP's coverage area
Roughly 2000
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
42. One vlan should =
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
Access
The DCF interframe space- the random backoff time before a wireless set can transmit
1 IP subnet
43. What is dynamic desireable?
Each frame transmits its expected duration time
The port asks the other end to trunk
2-8 FE - GE - or 10GE are bundled.
By creating a static IP binding
44. What is jitter?
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
When the AP uplinks to an Ethernet network.
Variation in delay
Show standby
45. How do you prevent VLAN hopping?
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
Root
80% of the user traffic should stay in the VLAN
No
46. How are GLBP timers used?
Data and voice over native vlan - no QOS but still uses 802.1p trunk
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
Using digital certificates
Forces the router to wait for a period of time before attempting overthrow
47. How do you show HSRP status
Local only
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
Time between BDPUs sent by root bridge. Default of 2 seconds
Show standby
48. What ILP mode are all ports in by default?
Control functions
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Checks the source MAC in the header against the sender MAC in the ARP reply
Auto mode
49. At what layer does EAPOL run?
L2
Checks the source MAC in the header against the sender MAC in the ARP reply
Packets are discarded due to an ACL or policy action
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
50. What is DSCP codepoint AF41(34)?
By name - config revision - and instance to vlan mapping table
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
Flash override (class 4)
Half because transmitting and receiving stations use the same frequency