SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does HSRP do MD5 authentication?
Access or trunk
0000.0c07.acxx where xx is the group number as a 2-digit hex value
Routers are assigned to common GLBP group. All routers can be active and can load balance
By using a hash of a key string
2. What are the steps to configure MST?
Port is forced to never authorize any connected client
MAC of the end device
With the skinny protocol
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
3. What are the 2 UDLD modes?
Normal and aggressive
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
Dynamic WEP keys that change periodically
VTP server for domain null with no password or secure mode
4. How often are VRRP advertisements sent?
Using digital certificates
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
When a port moves into forwarding or from fowarding or learning to blocking.
1 second. Backup routers can learn the interval from the master
5. What can cause a wireless client to switch between Aps?
The total delay from start to finish
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Silent
6. How do IP phones communicate with each other?
Once the CCM gives them the parameters - they use RTP
Admin down
Frames are forwarded
300 sec by default
7. What is layer 2 roaming?
Each frame transmits its expected duration time
By short-circuiting the max age timer
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
By using a trunk link
8. How does NSF work?
L2
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
With portfast
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
9. What criteria are used to size a switch block?
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
With portfast
Dynamic arp inspection
10. What is the FM?
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
On root - because the root bridge propagates timers with config BDPU
Effectively stops STP on filtered ports
Half-duplex
11. FE connectors use...
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
2 strand MMF with MT-RJ or SC connectors
All ARP packets that arrive on untrusted ports are inspected.
Auto mode
12. RSTP uses which standard?
PAgP (Cisco proprietary) and LACP (standards-based)
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
802.1w
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
13. RSTP edge port
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
Turn on port security
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
Only a single host connects . If one BDPU is received - it is no longer an edge port
14. What must you be sure of if AP cells overlap?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. What is jitter?
Port
802.1x with EAP over LAN (EAPOL)
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
Variation in delay
16. What is a null adjacency?
Flash override (class 4)
Used to switch packets destined for the null interface
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
TCAM
17. can root guard and udld be used together?
Yes
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
Group (0-255) - priority (1-254 254 is highest - 100 default)
Using a mobility exchange message
18. What must the other end be set to if PAgP desirable or LACP active mode is selected?
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
Either desirable or auto mode
Trusted or untrusted
Using a single WAP to centralize access and control over a group of wireless devices.
19. How far chould a VLAN extend?
Distribution layer
Usually QoS from VOIP but not PC dataa
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
20. How does a LAP and a WLC authenticate between each other?
By brining up a tunnel between them to carry 802.11 related messages and client data.
Yes to both
Using digital certificates
Transmits keystrokes from phone and commands from CCM
21. How are RSTP point to point ports determined?
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
When each AP stands alone within the larger network.
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
A key string of up to 8 characters is sent. Default is cisco.
22. if the switchport is part of an etherchannel - Where is the network assigned
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
To the virtual port-channel interface
1 per segment
0-65535 (def 32768) lower=better
23. If a port is configured for errdisable auto recovery - how long does it stay down?
Change in trunk encap
300 sec by default
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Reboots and searches for a new WLC
24. What pins does FE use?
1/2 and 3/6
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Group (0-255) - priority (1-254 254 is highest - 100 default)
Local only
25. What is the VRRP skew time?
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
The redundant SUP is booted and sup and route engine is init'd. No L2 or L3 functions are started. Allows switchports to retain state
Port that connects to another switch and becomes a designated port
By using a hash of a key string
26. What are the two etherchannel negotiation protocols?
63 kbps
A key string of up to 8 characters is sent. Default is cisco.
PAgP (Cisco proprietary) and LACP (standards-based)
Cisco recommends only on the root bridge
27. What is a cell?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
28. How do you implement MST?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. How does IPT behave when the voice VLAN is in untagged mode?
A VLAN that spans the entire fabric
Data and voice over native vlan - no QOS but still uses 802.1p trunk
Access
Lowest cumulative cost to root
30. Define GLBP
Value - mask - and result (VMR) combinations
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
Full duplex
Gateway load balancing protocol - cisco proprietary
31. How many designated ports are there?
1 per segment
Via an 802.1Q trunk or a single VLAN access port
Option 43
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
32. What is a PVLAN?
The standby becomes active and stays active by default. Preemption can be configured
Src-dst-ip
Another router must have a higher HSRP priority and have preemt set up
A private VLAN can be logically associated with a special secondary vlan
33. what should you do if you expect a PAgP capable switch at the other end vs. a server or host?
Disabled - blocking - listening - learning - forwarding
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
Configure non-silent submode
Used when there are 1 or more VLANs mapped to a single STP instance
34. How are multiple VLANs mapped to multiple SSIDs?
By using a trunk link
Isolated and community
L2
Transmits keystrokes from phone and commands from CCM
35. What are the 2 power over ethernet methods?
Cisco ILP and 802.3af
Only for trusted Cisco gear - especially phones
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
An ac adaptor that plugs into a wall outlet.
36. When DHCP snooping is turned on - by default - it considers all ports ______
Untrusted
A point to point port type but the neighboring device runs traditional 802.1D STP
A client can roam to any WLC as long as it stays in a mobility group
By short-circuiting the max age timer
37. What is DSCP?
Two distribution switches that aggregate one or more access switches
5 classes with 3 drop precedences
Differentiated services code point
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
38. what if a secondary VLAN?
Change in trunk encap
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
Disabled - blocking - listening - learning - forwarding
39. What data does DHCP snooping track?
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
Completed dhcp bindings - mac addresses - IP addresses - etc.
Embeds the tag within the frame
On the left as you face the connector
40. What does a LAP do if it loses communication with it's WLC?
Reboots and searches for a new WLC
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
Full duplex
Configure the timer on the AVG and let it propagate
41. What does MSTP do?
0000.5e00.01xx
The port is forced to always authorize any connected client with no authentication necessary (default)
Configure the timer on the AVG and let it propagate
Used when there are 1 or more VLANs mapped to a single STP instance
42. How is Root Guard used?
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
With portfast
A group of wireless devices that share a common SSID
On ports where you never expect to find a root bridge for a VLAN
43. Where is root guard enabled?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
44. How are VACLs applied
To a VLAN and not to a VLAN interface (SVI)
Those that connect to other switches
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
RADIUS
45. What does VTP do?
7 switches from root bridge
Manages addition - deletion and renaming VLANs across the network
802.1x with EAP over LAN (EAPOL)
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
46. What is a wireless mobility group?
Configuration and TCN
By an ARP access list that defines the permitted bindings
Forces the router to wait for a period of time before attempting overthrow
A client can roam to any WLC as long as it stays in a mobility group
47. What is UDLD normal mode?
As a VLAN access map
Show standby
Only a single host connects . If one BDPU is received - it is no longer an edge port
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
48. What is an ESS?
A private VLAN can be logically associated with a special secondary vlan
When the AP uplinks to an Ethernet network.
Variation in delay
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
49. How does a WLC hand off a client's association to another WLC?
Using a mobility exchange message
The ASIC
Data and voice over native vlan no QOS and no 802.1p trunk
Both layer 2 switching and IVR
50. How do you configure IP source guard for hosts that don't use DHCP?
No
By creating a static IP binding
Used when ACLs specify port ranges...used by TCAM
1 second. Backup routers can learn the interval from the master