SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. One vlan should =
Configuration and TCN
By encapsulating each frame in a header and trailer
Either desirable or auto mode
1 IP subnet
2. What are the RSTP port states?
Discarding - learning - forwarding
Plain text or md5
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
3. How does UDLD work?
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Globally
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
Every switch and router in a network must be configured with appropriate QoS features and policies
4. Does VTP pass private VLAN configuration?
When a port moves into forwarding or from fowarding or learning to blocking.
FIB
No because they only participate if asked
No
5. What format does the GLBP MAC use?
By using a trunk link
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
6. How does 802.1q handle COS?
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
Prevents the dhcp binding DB from being checked.
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
Limits the number if dhcp requests on a port
7. How does GLBP work?
Routers are assigned to common GLBP group. All routers can be active and can load balance
By using a trunk link
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
When a client roams between Aps in different subnets
8. How should the switch port to which a WLC be configured?
2
Trunk
63 kbps
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
9. What is a baby giant frame?
Frames that barely exceed 1518B or 1622B due to headers
Group (0-1023) priority (1-255 higher better def 100)
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Priority (class 1)
10. What are dynamic VLANs based on?
MAC of the end device
Root - designated - blocking - alternate - forwarding (host)
A key string of up to 8 characters is sent. Default is cisco.
Cisco recommends only on the root bridge
11. How can BDPU Guard be configured?
Globally or per-port
2 strand MMF with MT-RJ or SC connectors
On ports where you never expect to find a root bridge for a VLAN
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
12. How does DSCP handle IP precedence?
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
SC fiber or RJ-45
Port is forced to never authorize any connected client
5 classes with 3 drop precedences
13. What does Root Guard do?
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
Controls where candidate root bridges can be connected and found on a network
Local only
Checks the source MAC in the header against the sender MAC in the ARP reply
14. What functions does a WLC perform?
Control functions
An AP's coverage area
A VLAN that spans the entire fabric
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
15. Where is root guard enabled?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
16. What is the acceptible range of VLANS?
On ports where you never expect to find a root bridge for a VLAN
1-1005 (1 and 1002-1005 are reserved)
Port stays up - packets from violating MACs dropped - no logging
SC fiber or RJ-45
17. RSTP designated port
Cisco recommends only on the root bridge
Port with best root path cost on segment
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
Globally
18. How does HSRP port tracking work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. What is RPR+?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. What must you be sure of if AP cells overlap?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
21. What is the default MTU?
Switching Database Manager - configures and prunes TCAM partitions
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
Distribution layer
1500B
22. How can you load-balance with HSRP?
No because they only participate if asked
Isolated and community
Hashing algorithm
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
23. What is the default 802.3af power class and its use?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
24. EAP encryption
L2
Dynamic WEP keys that change periodically
2 strand MMF with MT-RJ or SC connectors
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
25. What happens when an ARP reply is received on an untrusted port?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
26. What does the switchport host macro do?
Switch(config-if)# vrrp xx where xx= group number
900 MHz - 2.4Ghz - and 5-6GHz
Hashing algorithm
Enables portfast - sets the port to access and disables PAgP
27. What functions does a LAP perform?
By using a hash of a key string
An L2 switch can only forward frames best effort unless going across a trunk
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
RADIUS
28. How does DAI work?
All ARP packets that arrive on untrusted ports are inspected.
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
Disabled - blocking - listening - learning - forwarding
LACP port priority
29. What is the STP listening state?
Disabled - init - listen - speak - standby - active
Can send and receive BDPUs
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
30. What 2 tunnelling mechanisms do the LAP and WLC use to communicate?
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
The total delay from start to finish
On ports where you never expect to find a root bridge for a VLAN
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
31. What is a PVLAN?
A private VLAN can be logically associated with a special secondary vlan
80% of the user traffic should stay in the VLAN
By sending a gratuitous ARP
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
32. What is Per VLAN STP (PVST)?
12 kbps with headers and compression
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
Globally or per-port
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
33. What does IP source guard do?
Group (0-1023) priority (1-255 higher better def 100)
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
Trusted ports
34. How does every VRRP command begin?
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Switch(config-if)# vrrp xx where xx= group number
The standby becomes active and stays active by default. Preemption can be configured
Multicasts to 224.0.0.18 (VRRP)
35. RSTP uses which standard?
Automatically using DTP and CDP
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
802.1w
36. What does the reload keyword do in HSRP?
0-255 (lower is better)
On all switches in network to enable RLQ request and reply
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
37. What is the traditional MLS view of switching?
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
Packets must be sent to the L3 engine for further processing
Half because transmitting and receiving stations use the same frequency
Route once - switch many
38. What is the STP hello timer?
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
LACP port priority
When each AP stands alone within the larger network.
Time between BDPUs sent by root bridge. Default of 2 seconds
39. How are RSTP point to point ports determined?
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
Roughly 50%
Globally or per-port
Forces the router to wait for a period of time before attempting overthrow
40. what must be done on an SVI before it is activated?
Isl - dot1q - negotiate (default)
No shut
The configureable UDLD interval must be less than max age plus two intervals of forward delay
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
41. What are the steps to configuring HSRP MD5 authentication?
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
Switch(config-if)# glbp xx where xx = group number
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
42. What is a drop adjacency?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. How should backbonefast be configured?
Sends a voltage across the receive pairs to detect a 25k ohm resistance
On all switches in network to enable RLQ request and reply
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
When a port moves into forwarding or from fowarding or learning to blocking.
44. What does the standby HSRP router do?
By name - config revision - and instance to vlan mapping table
Only the standby monitors the hello messages from the active router
It is enabled by default on all CEF capable switches
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
45. How does every GLBP command begin
Control functions
The DCF interframe space- the random backoff time before a wireless set can transmit
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Switch(config-if)# glbp xx where xx = group number
46. How can you tell if a switch block is too large?
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
By using a trunk link
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
47. can root guard and udld be used together?
Yes
1 to 64
Packets must be sent to the L3 engine for further processing
Switchpotrt nonegotiate
48. How does every HSRP config command begin?
Switch(config-if)# standby xx where x= group number
Distribution layer
Full duplex
A single broadcast domain
49. What is an autonomous mode AP?
The ASIC
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
When each AP stands alone within the larger network.
50. What is PVST plus (PVST+)?
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
Between any type of interface as long as the interface can have an L3 address assigned
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts