SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is DSCP codepoint AF31(26)?
Flash (class 3)
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
An AP's coverage area
Virtual Router Redundancy Protocol - pretty much the same as HSRP
2. What is route caching?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
3. How is an instance defined?
5 (0-4 with 4 being the highest)
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
By name - config revision - and instance to vlan mapping table
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
4. What is the GLBP group and priority range
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
Control functions
Group (0-1023) priority (1-255 higher better def 100)
The MST instance (MSTI) runs alongside the IST and represents an STP instance
5. What is DAI?
19
Dynamic arp inspection
The number of times the CEF table has bee flushed and regenerated as a whole
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
6. What is DSCP codepoint AF11(10)?
The TOS field in the header is used. 2 methods 3 bits or 6 bits
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
Because each frame is checked
Priority (class 1)
7. What must be supported for port-based security to occur?
The same as a standby group in HSRP
By short-circuiting the max age timer
802.1x with EAP over LAN (EAPOL)
Port with alternative path to root less desirable than root
8. What do you need to determine to use MSTP?
It's a router that maintains routes (static or dynamic) - and populates the FIB
Globally
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
9. When DHCP snooping is turned on - by default - it considers all ports ______
Untrusted
Each network device handles packets individually with no advance reservations
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
10. What are the 6 HSRP states?
Disabled - init - listen - speak - standby - active
5 (0-4 with 4 being the highest)
Multicast to 01-80-c2-00-00-00
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
11. How does HSRP port tracking work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. How does ILP do power discovery?
Port stays up - packets from violating MACs dropped - no logging
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
L2
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
13. Where is UDLD enabled?
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
A host port goes up or down
All fiber-optic links between switches (must be enabled on both ends)
Dynamic arp inspection
14. static vlans offer ____ based membership
Port
Incoming frames are dropped (combination of disabled - blocking - and listening)
Gateway load balancing protocol - cisco proprietary
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
15. What pins does FE use?
Will trunk if asked
Differentiated services
Change in trunk encap
1/2 and 3/6
16. What does the epoch number indicate when looking at cef entries?
The number of times the CEF table has bee flushed and regenerated as a whole
7 switches from root bridge
Priority (class 1)
Multicast to 01-80-c2-00-00-00
17. What is the port number range?
Configure the timer on the AVG and let it propagate
0-255
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
134 bits
18. What are the 5 STP states?
Disabled - blocking - listening - learning - forwarding
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
Priority (class 1)
Port that connects to another switch and becomes a designated port
19. What is NSF?
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Discarding - learning - forwarding
Configure the timer on the AVG and let it propagate
19
20. What is 802.1x force-authorized?
The port is forced to always authorize any connected client with no authentication necessary (default)
By short-circuiting the max age timer
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
0-255 (lower is better)
21. 802.11b
Globally
Yes
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
Switching Database Manager - configures and prunes TCAM partitions
22. 802.11a
Port with alternative path to root less desirable than root
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
23. What is step 1 of enabling IP source guard?
Yes to both
The wireless clients communicate directly with no other means of connectivity such as a WAP
Configure and enable DHCP snooping
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
24. Whan is a 10GE WAN PHY?
Trusted or untrusted
Connects with SONET or SDH
Effectively stops STP on filtered ports
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
25. How does RSTP identify a topology change?
Only when a nonedge port transitions to forwarding
From the DHCP snooping database or from static entries
Only for the offending VLAN on the port
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
26. Where shoul dmultilayer switches be implemented?
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
If any BDUP is received on a port - it puts the port into the errdisable state
Distribution layer
27. What is the format of the VRRP virtual MAC?
By using a trunk link
0000.5e00.01xx
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
10-15%
28. What are the steps to configure MST?
The standby becomes active and stays active by default. Preemption can be configured
Silent
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
By sending a gratuitous ARP
29. If a wireless station needs to transmit and no other device is transmitting - what happens?
The station can transmit immediately and wait for an ack
Frames that barely exceed 1518B or 1622B due to headers
The wireless clients communicate directly with no other means of connectivity such as a WAP
Switching Database Manager - configures and prunes TCAM partitions
30. What is UDLD aggressive mode?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
31. RSTP uses which standard?
Port
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
Turn on port security
802.1w
32. How does packet forwarding work
Checks the source MAC in the header against the sender MAC in the ARP reply
Use sh interface on the interface and look for error counts > 10
Arp for local subnet - if on different subnet - will arp for dgw
L2
33. How does HSRP do MD5 authentication?
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
Virtual Router Redundancy Protocol - pretty much the same as HSRP
Turn on port security
By using a hash of a key string
34. Of what significance are private VLANs
To the virtual port-channel interface
Local only
2 strand MMF with MT-RJ or SC connectors
1 per segment
35. Where is root guard enabled?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. What types of links can be trunked?
By brining up a tunnel between them to carry 802.11 related messages and client data.
Switching Database Manager - configures and prunes TCAM partitions
FE - GE - and aggregated FE/GE Etherchannels
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
37. What is an ESS?
2 - one for control messages and one for data
When the AP uplinks to an Ethernet network.
0-255
Turn on port security
38. How many 802.3af power classes are there?
The wireless clients communicate directly with no other means of connectivity such as a WAP
26-byte header - 4-byte trailer with CRC
5 (0-4 with 4 being the highest)
Checks the destination MAC in the header against the target MAC in the ARP reply
39. What does BDPU filtering do?
Effectively stops STP on filtered ports
By creating a static IP binding
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
CEF is distributed completely among multiple L3 forwarding engines.
40. How is RSTP synchronization accomplished?
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
Collision domain
Either desirable or auto mode
Lowest cumulative cost to root
41. What if RSTP BDPUs aren't received?
On by default
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
1 second. Backup routers can learn the interval from the master
No shut
42. How does IPT behave when the voice VLAN is in dot1p mode?
The port is forced to always authorize any connected client with no authentication necessary (default)
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
43. Which 4 things must be agreeable to trunk?
No
Access or trunk
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
44. What does the dst-mac option do when checking ARP replies
300 sec
Switchpotrt nonegotiate
Enables portfast - sets the port to access and disables PAgP
Checks the destination MAC in the header against the target MAC in the ARP reply
45. How does backbonefast determine whether alternative paths exist?
From the DHCP snooping database or from static entries
Root - designated - alternate - and backup
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
80% of the user traffic should stay in the VLAN
46. What is the PVLAN promiscuous mode?
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
Use the spanning-tree root macro
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
Prevents the dhcp binding DB from being checked.
47. What are the three basic types of QOS?
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
Best effort delivery - integrated services model - and differentiated services model
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
48. What is a cell?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. How is DHCP snooping enabled (scope)?
Globally
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
Silent
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
50. What 2 conditions does IP source guard check for?
Each network device handles packets individually with no advance reservations
Can send and receive BDPUs
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
When a wireless station transmits a frame - the receiving one must send an ack