SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does IPT behave when the voce VLAN is in the default none mode?
No
When the size of a cell is intentionally reduced
Data and voice over native vlan no QOS and no 802.1p trunk
300 sec
2. What is an IST instance?
BGP - EIGRP - OSPF - and IS-IS.
By brining up a tunnel between them to carry 802.11 related messages and client data.
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
224.0.0.2 (all routers)
3. How do you find duplex mismatches?
Use sh interface on the interface and look for error counts > 10
MAC of the end device
Configure non-silent submode
When a port moves into forwarding or from fowarding or learning to blocking.
4. Where is root guard enabled?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. What is a PVLAN?
Used when there are 1 or more VLANs mapped to a single STP instance
FE - GE - and aggregated FE/GE Etherchannels
63 kbps
A private VLAN can be logically associated with a special secondary vlan
6. How does HSRP do MD5 authentication?
A point to point port type but the neighboring device runs traditional 802.1D STP
By using a hash of a key string
Used when ACLs specify port ranges...used by TCAM
On root - because the root bridge propagates timers with config BDPU
7. How does DSCP handle IP precedence?
5 classes with 3 drop precedences
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
When the size of a cell is intentionally reduced
No shut
8. How is UDLD configured?
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
By using a hash of a key string
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
1 to 64
9. What are the steps to configure a PAgP port channel?
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
The ASIC
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
10. How can BDPU Guard be configured?
When a port moves into forwarding or from fowarding or learning to blocking.
Both ends should be on because on modes doesn't send PAgP or LACP packets
Globally or per-port
Use sh interface on the interface and look for error counts > 10
11. How does 802.3af do power discovery?
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
Sends a voltage across the receive pairs to detect a 25k ohm resistance
Isolated and community
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
12. Does VTP pass private VLAN configuration?
Both ends should be on because on modes doesn't send PAgP or LACP packets
Bridge priority and MAC
5 classes with 3 drop precedences
No
13. What is a drop adjacency?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. What is the portr ID?
Differentiated services code point
Receives the first packet of a traffic flow and routes it
Configure and enable DHCP snooping
16 bits (8b port priority - 8b port number)
15. What is an end to end vlan?
Data and voice over native vlan no QOS and no 802.1p trunk
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
A VLAN that spans the entire fabric
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
16. What is the cost of a 100Mbps link?
Lowest cumulative cost to root
It's a router that maintains routes (static or dynamic) - and populates the FIB
The campus network's backbone
19
17. What is the switch block?
Two distribution switches that aggregate one or more access switches
The same as a standby group in HSRP
Data and voice over native vlan - no QOS but still uses 802.1p trunk
By name - config revision - and instance to vlan mapping table
18. What is the core block?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. What does MSTP do?
Used when there are 1 or more VLANs mapped to a single STP instance
On the left as you face the connector
FE and GE
Priority (class 1)
20. How many 802.3af power classes are there?
5 (0-4 with 4 being the highest)
2 seconds (def)
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
Will trunk if asked
21. How does every VRRP command begin?
Switch(config-if)# vrrp xx where xx= group number
The link status stays up - but something between them has failed or is filtering traffic
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
22. What is DSCP codepoint AF31(26)?
802.11
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
The ASIC
Flash (class 3)
23. How many virtual MACs can GLBP have?
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
A private VLAN can be logically associated with a special secondary vlan
RADIUS
Will trunk if asked
24. How does RSTP converge?
Automatically using DTP and CDP
The port is forced to always authorize any connected client with no authentication necessary (default)
No because they only participate if asked
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
25. Where is UDLD enabled?
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
A private VLAN can be logically associated with a special secondary vlan
All fiber-optic links between switches (must be enabled on both ends)
26. What is layer 3 roaming?
2 seconds
The ASIC
When a client roams between Aps in different subnets
By brining up a tunnel between them to carry 802.11 related messages and client data.
27. What is the size of ISL encapsulation?
1 per segment
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
Only the standby monitors the hello messages from the active router
26-byte header - 4-byte trailer with CRC
28. Where is loop guard enabled?
No shut
Checks the source MAC in the header against the sender MAC in the ARP reply
All nondesignated ports - but ok for all ports
On the left as you face the connector
29. What is 802.1x auto?
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Local only
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
Using a single WAP to centralize access and control over a group of wireless devices.
30. How does PAgP form etherchannels?
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
1-1005 (1 and 1002-1005 are reserved)
The ASIC
0-255 (lower is better)
31. Where shoul dmultilayer switches be implemented?
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
Distribution layer
Only the standby monitors the hello messages from the active router
16 bits (8b port priority - 8b port number)
32. When should CDP be enabled?
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
1/2 and 3/6
Only for trusted Cisco gear - especially phones
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
33. Where should STP timers be configured and why?
Almost eliminates listening and learning states for single hosts on an access link
When each AP stands alone within the larger network.
On root - because the root bridge propagates timers with config BDPU
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
34. Can loop guard and udld be used together?
Yes
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
Turn on port security
Used to switch packets destined for the null interface
35. How does VRRP do tracking?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. What can the Etherchannel hash use?
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
0-255 (lower is better)
Promiscuous and host
80% of the user traffic should stay in the VLAN
37. What are the 2 types of secondary VLAN?
Determines when the AVG will stop using the old VMAC in ARP replies
Isolated and community
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
38. How are frames forwarded across a specific link?
The MST instance (MSTI) runs alongside the IST and represents an STP instance
Each network device handles packets individually with no advance reservations
Hashing algorithm
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
39. What is the GLBP AVG?
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
Discarding - learning - forwarding
Globally
Completed dhcp bindings - mac addresses - IP addresses - etc.
40. What are spoofed addresses?
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
They disguise the origin of an attack
The DCF interframe space- the random backoff time before a wireless set can transmit
41. How does an L2 switch do QOS?
Frames that barely exceed 1518B or 1622B due to headers
No
As a VLAN access map
An L2 switch can only forward frames best effort unless going across a trunk
42. static vlans offer ____ based membership
Two distribution switches that aggregate one or more access switches
4
Port
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
43. How do you prevent VLAN hopping?
Isolated and community
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
Root - designated - alternate - and backup
44. What is GLBP weight?
Between interfaces that are assigned to L2 VLANs or L2 trunks
Incoming frames are dropped (combination of disabled - blocking - and listening)
By default weight is 100. Can be made dynamic per interface
Src-dst-ip
45. How does HSRP plain text authentication work?
No shut
Normal and aggressive
A key string of up to 8 characters is sent. Default is cisco.
Needs hardware upgrade over WEP - uses AES encryption
46. What is the PVLAN promiscuous mode?
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
FE and GE
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
An AP's coverage area
47. 802.11b
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
Differentiated services code point
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
48. What happens when the topology changes?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. What is a discard adjacency?
Packets are discarded due to an ACL or policy action
Configure non-silent submode
On ports where you never expect to find a root bridge for a VLAN
Isolated and community
50. What is the distribution layer best practice?
The distribution layer should have only L3 links
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
Hashing algorithm
It's a router that maintains routes (static or dynamic) - and populates the FIB