SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are the 2 types of secondary VLAN?
Isolated and community
0-255
Turn on port security
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
2. What are the 5 steps to manualy configure STP?
Src-dst-ip
A single broadcast domain
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
3. How does dot1q do trunking?
Effectively stops STP on filtered ports
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
Embeds the tag within the frame
Variation in delay
4. How does RSTP converge?
Trunk
With portfast
802.1w
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
5. What does the skinny protocol do?
TCAM
0-65535 (def 32768) lower=better
Transmits keystrokes from phone and commands from CCM
A key string of up to 8 characters is sent. Default is cisco.
6. How does GLBP work?
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
Using a mobility exchange message
From the DHCP snooping database or from static entries
Routers are assigned to common GLBP group. All routers can be active and can load balance
7. How does packet forwarding work
Arp for local subnet - if on different subnet - will arp for dgw
An AP's coverage area
Half because transmitting and receiving stations use the same frequency
Option 43
8. RSTP BPDU structure
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
2
Effectively stops STP on filtered ports
By default weight is 100. Can be made dynamic per interface
9. What are the 2 power over ethernet methods?
Cisco ILP and 802.3af
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
By configuring every switch port to have an expected and controlled behavior
19
10. What contains the next-hop entries?
Full duplex
When each AP stands alone within the larger network.
FIB
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
11. How often are VRRP advertisements sent?
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
Prevents the dhcp binding DB from being checked.
Control functions
1 second. Backup routers can learn the interval from the master
12. What is the STP listening state?
Discarding - learning - forwarding
Can send and receive BDPUs
Access
Yes
13. What method of QOS does voice traffic use most frequently?
Distribution layer
Incoming frames are dropped (combination of disabled - blocking - and listening)
Differentiated services
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
14. What do you need to determine to use MSTP?
Trusted or untrusted
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
The MST instance (MSTI) runs alongside the IST and represents an STP instance
15. When looking at the sh spanning tree output - What does P2P peer(STP) denote?
A point to point port type but the neighboring device runs traditional 802.1D STP
Port stays up - packets from violating MACs dropped - no logging
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
Needs hardware upgrade over WEP - uses AES encryption
16. What is RTP?
Real-time Transport Protocol
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
26-byte header - 4-byte trailer with CRC
Route once - switch many
17. What are TCAM entries composed of?
Turn on port security
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
Switch(config-if)# vrrp xx where xx= group number
Value - mask - and result (VMR) combinations
18. Where should you change the network diameter value?
Checks the source MAC in the header against the sender MAC in the ARP reply
1/2 and 3/6
Cisco recommends only on the root bridge
LACP port priority
19. What are the characteristics of the core layer
Because each frame is checked
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
Trunk - dynamic auto - dynamic desireable (default)
The ASIC
20. How does HSRP do MD5 authentication?
The ASIC
802.1w
Use sh interface on the interface and look for error counts > 10
By using a hash of a key string
21. What is a wall wart?
An ac adaptor that plugs into a wall outlet.
0000.5e00.01xx
802.1x with EAP over LAN (EAPOL)
Trunk - dynamic auto - dynamic desireable (default)
22. where does L2 switching occur?
Used to switch packets destined for the null interface
Between interfaces that are assigned to L2 VLANs or L2 trunks
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
Globally
23. What functions does a WLC perform?
RPR - RPR+ - and SSO
Control functions
Switch(config-if)# standby xx where x= group number
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
24. What is a community secondary VLAN?
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
Yes
Multicasts to 224.0.0.18 (VRRP)
Immediate (class 2)
25. Where is bdpu guard enabled?
Promiscuous and host
Data and voice over native vlan - no QOS but still uses 802.1p trunk
All user ports that have portfast enabled
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
26. What are the 3 unlicensed frequencies?
Receives the first packet of a traffic flow and routes it
All user ports that have portfast enabled
Edge - root - and point to point
900 MHz - 2.4Ghz - and 5-6GHz
27. What does IP source guard do?
Configure the timer on the AVG and let it propagate
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
FE - GE - and aggregated FE/GE Etherchannels
28. How does ILP do power discovery?
A private VLAN can be logically associated with a special secondary vlan
By creating a static IP binding
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
Every switch and router in a network must be configured with appropriate QoS features and policies
29. EAP encryption
Dynamic WEP keys that change periodically
Regions and instances
26-byte header - 4-byte trailer with CRC
19
30. What is a LACP priority?
Src-dst-ip
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
0000.0c07.acxx where xx is the group number as a 2-digit hex value
Prevents the dhcp binding DB from being checked.
31. If you want IP source guard to detect spoofed MAC addresses - what must you do?
Routers are assigned to common GLBP group. All routers can be active and can load balance
Port with best root path cost
By brining up a tunnel between them to carry 802.11 related messages and client data.
Turn on port security
32. How does HSRP plain text authentication work?
BGP - EIGRP - OSPF - and IS-IS.
On ports where you never expect to find a root bridge for a VLAN
900 MHz - 2.4Ghz - and 5-6GHz
A key string of up to 8 characters is sent. Default is cisco.
33. What are the 3 RSTP port types?
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
Edge - root - and point to point
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
By sending a gratuitous ARP
34. How should UDLD be configured?
The configureable UDLD interval must be less than max age plus two intervals of forward delay
134 bits
A point to point port type but the neighboring device runs traditional 802.1D STP
Per VLAN
35. When are RSTP bdpus sent?
CEF is distributed completely among multiple L3 forwarding engines.
The campus network's backbone
MAC of the end device
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
36. What happens during HSRP failover?
Via an 802.1Q trunk or a single VLAN access port
1 second. Backup routers can learn the interval from the master
The standby becomes active and stays active by default. Preemption can be configured
Time between BDPUs sent by root bridge. Default of 2 seconds
37. What is a topology change?
By name - config revision - and instance to vlan mapping table
16 - of which up to 8 are active. The others are in standby
When a port moves into forwarding or from fowarding or learning to blocking.
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
38. What is a microcell?
By an ARP access list that defines the permitted bindings
When the size of a cell is intentionally reduced
Yes
1 second. Backup routers can learn the interval from the master
39. How much BW does a PSTN connection use?
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
63 kbps
40. What is the distribution layer best practice?
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
0000.0c07.acxx where xx is the group number as a 2-digit hex value
The distribution layer should have only L3 links
Completed dhcp bindings - mac addresses - IP addresses - etc.
41. What types of authentication does HSRP allow?
Will trunk if asked
Limits the number if dhcp requests on a port
Plain text or md5
Regions and instances
42. What is the cost of a 1Gbps link?
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
Dynamic arp inspection
As a VLAN access map
4
43. How does IPT behave when the voice VLAN is in untagged mode?
Normal and aggressive
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
On by default
Data and voice over native vlan - no QOS but still uses 802.1p trunk
44. What are the 6 HSRP states?
No
Disabled - init - listen - speak - standby - active
Trunk - dynamic auto - dynamic desireable (default)
Between any type of interface as long as the interface can have an L3 address assigned
45. What must be in common for a BSS to form?
By using a trunk link
The wireless clients communicate directly with no other means of connectivity such as a WAP
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
Matching SSID - compatible data rate - authentication credentials
46. What are the 2 types of BDPU?
Real-time Transport Protocol
Automatically negotiates a common trunk mode between switches
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
Configuration and TCN
47. Where are security and QoS ACLs stored?
Distribution
The campus network's backbone
TCAM
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
48. RSTP alternate port
Virtual Router Redundancy Protocol - pretty much the same as HSRP
Port with alternative path to root less desirable than root
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
49. What is the GLBP AVG?
1 per segment
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
BGP - EIGRP - OSPF - and IS-IS.
L2
50. How much overlap should a wireless repeater have?
From the DHCP snooping database or from static entries
Automatically using DTP and CDP
Roughly 50%
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs