SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are the characteristics of the distribution layer?
A private VLAN can be logically associated with a special secondary vlan
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
By using an Ether-IP tunnel
2. How does NSF work?
Using a single WAP to centralize access and control over a group of wireless devices.
Admin down
Packets are discarded due to an ACL or policy action
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
3. What is the portr ID?
16 bits (8b port priority - 8b port number)
Show standby
Dynamic arp inspection
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
4. Where are security and QoS ACLs stored?
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
Port that connects to another switch and becomes a designated port
TCAM
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
5. How does VRRP do tracking?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. What ILP mode are all ports in by default?
Auto mode
4
Enables portfast - sets the port to access and disables PAgP
Port is forced to never authorize any connected client
7. can root guard and bdpu guard be used together?
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
Admin down
Local only
No
8. Where is loop guard enabled?
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
All nondesignated ports - but ok for all ports
Can hear only BDPUs
9. What is the DIFS?
The DCF interframe space- the random backoff time before a wireless set can transmit
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
Root - designated - blocking - alternate - forwarding (host)
A single broadcast domain
10. How are VACLs configured?
By configuring every switch port to have an expected and controlled behavior
16 - of which up to 8 are active. The others are in standby
Using a single WAP to centralize access and control over a group of wireless devices.
As a VLAN access map
11. What is a discard adjacency?
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
A group of wireless devices that share a common SSID
Use sh interface on the interface and look for error counts > 10
Packets are discarded due to an ACL or policy action
12. What duplex setting does 802.11 use and why?
Half because transmitting and receiving stations use the same frequency
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
Configure non-silent submode
Effectively stops STP on filtered ports
13. One vlan should =
Show standby
Yes
On all switches in network to enable RLQ request and reply
1 IP subnet
14. What is DSCP codepoint AF21(18)?
Edge - root - and point to point
Immediate (class 2)
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
Use the spanning-tree root macro
15. What does IP source guard do?
Port with best root path cost on segment
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
Automatically negotiates a common trunk mode between switches
By short-circuiting the max age timer
16. How much BW does a voip connection use?
12 kbps with headers and compression
Effectively stops STP on filtered ports
Globally
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
17. How do VRRP routers handle preemption?
On by default
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
On ports where you never expect to find a root bridge for a VLAN
An AP's coverage area
18. What is the range of HSRP group numbers?
0-255
Port with best root path cost on segment
12 kbps with headers and compression
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
19. What is the 80/20 rule?
A MAC is seen on a different port
80% of the user traffic should stay in the VLAN
By configuring every switch port to have an expected and controlled behavior
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
20. Define VRRP
A host port goes up or down
The active router. All other routers are in backup state
Checks the destination MAC in the header against the target MAC in the ARP reply
Virtual Router Redundancy Protocol - pretty much the same as HSRP
21. What are the 5 STP port roles?
Immediate (class 2)
0000.5e00.01xx
1 per segment
Root - designated - blocking - alternate - forwarding (host)
22. How do you prevent VLAN hopping?
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
Yes
With the skinny protocol
Port with best root path cost on segment
23. How many tunnels exist between the LAP and WLC?
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
5 (0-4 with 4 being the highest)
By using a hash of a key string
2 - one for control messages and one for data
24. How does a Cisco IP phone connect upstream?
Via an 802.1Q trunk or a single VLAN access port
By brining up a tunnel between them to carry 802.11 related messages and client data.
802.1x with EAP over LAN (EAPOL)
Receives the first packet of a traffic flow and routes it
25. What is DSCP codepoint AF41(34)?
Flash override (class 4)
Port that connects to another switch and becomes a designated port
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
PAgP (Cisco proprietary) and LACP (standards-based)
26. What must be supported for port-based security to occur?
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
By an ARP access list that defines the permitted bindings
Receives the first packet of a traffic flow and routes it
802.1x with EAP over LAN (EAPOL)
27. How does the CEF L3 engine operate?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
28. What is layer 3 roaming?
When a client roams between Aps in different subnets
All ARP packets that arrive on untrusted ports are inspected.
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
That they aren't using the same frequencies.
29. What are the 2 power over ethernet methods?
One that can be detected on a switch interface (ie. Up/down)
Cisco ILP and 802.3af
Transmits keystrokes from phone and commands from CCM
All ports where root isn't expected
30. Whan is a 10GE WAN PHY?
All user ports that have portfast enabled
2 seconds
Connects with SONET or SDH
By creating a static IP binding
31. How far chould a VLAN extend?
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
Distribution layer
Yes to both
32. How does IPT behave when the voice VLAN is in vlan-id mode?
No
Trusted ports
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
Port
33. What is arp throttling?
Yes
Receives the first packet of a traffic flow and routes it
Only a single host connects . If one BDPU is received - it is no longer an edge port
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
34. How often are HSRP hellos sent?
3 seconds. Holdtime =3 hellos + 1
Arp for local subnet - if on different subnet - will arp for dgw
Differentiated services code point
Option 43
35. What is the core block?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. What is DSCP?
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
Differentiated services code point
37. What are the 2 types of secondary VLAN?
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
RADIUS
Isolated and community
Matching SSID - compatible data rate - authentication credentials
38. What are the 4 steps in DHCP negotiation?
Switch(config-if)# glbp xx where xx = group number
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
A VLAN that spans the entire fabric
39. What are the 3 ways GLBP load-balances?
Sends a voltage across the receive pairs to detect a 25k ohm resistance
Round robin - weighted - or host-dependent
Collision domain
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
40. What is the bridge priority range?
All ports where root isn't expected
0-65535 (def 32768) lower=better
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
41. How is an RSTP edge port configured
MAC of the end device
With portfast
By creating a static IP binding
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
42. What does the skinny protocol do?
To the virtual port-channel interface
Trusted ports
A single broadcast domain
Transmits keystrokes from phone and commands from CCM
43. What does the RP do?
Almost eliminates listening and learning states for single hosts on an access link
Receives the first packet of a traffic flow and routes it
By using a hash of a key string
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
44. How many MST instances can be in a region?
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
Incoming frames are dropped (combination of disabled - blocking - and listening)
By short-circuiting the max age timer
Access
45. What is an ESS?
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
When the AP uplinks to an Ethernet network.
46. What does DTP do?
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
That they aren't using the same frequencies.
Discarding - learning - forwarding
Automatically negotiates a common trunk mode between switches
47. Can loop guard and udld be used together?
By using an Ether-IP tunnel
Yes
Disabled - init - listen - speak - standby - active
Variation in delay
48. What are the 2 types of BDPU?
224.0.0.2 (all routers)
Configuration and TCN
No shut
Packets must be sent to the L3 engine for further processing
49. What is RPR?
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
Silent
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
50. What happens when the topology changes?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183