SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does NSF work?
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Connects with SONET or SDH
The TOS field in the header is used. 2 methods 3 bits or 6 bits
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
2. How should the switch port to which a WLC be configured?
A MAC is seen on a different port
2
Trunk
All ports where root isn't expected
3. What is RPR+?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
4. What are the steps to configure a LACP port channel?
2 seconds (def)
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
The number of times the CEF table has bee flushed and regenerated as a whole
Change in trunk encap
5. Of what significance are private VLANs
Differentiated services code point
An AP's coverage area
Local only
Port is forced to never authorize any connected client
6. What is the STP listening state?
Disabled - init - listen - speak - standby - active
By short-circuiting the max age timer
Can send and receive BDPUs
Used to switch packets destined for the null interface
7. At what layer should the WLC be connected?
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
Distribution
Round robin - weighted - or host-dependent
8. How does the CEF L3 engine operate?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
9. How should the switch port to which a LAP be configured?
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
Yes
Globally
Access
10. What is DSCP codepoint AF41(34)?
Distributed coordinion function - the use of timers to prevent wireless collisions
Distribution layer
An L2 switch can only forward frames best effort unless going across a trunk
Flash override (class 4)
11. can root guard and udld be used together?
Switches make an effort to move packets as quickly as possible
Round robin - weighted - or host-dependent
Yes
Isolated and community
12. What must the other end be set to if PAgP desirable or LACP active mode is selected?
Multicast to 01-80-c2-00-00-00
Either desirable or auto mode
When each AP stands alone within the larger network.
Embeds the tag within the frame
13. Does a WLC and a LAP need to be on the same subnet?
TCAM
Distribution layer
No
By an ARP access list that defines the permitted bindings
14. How should the switch port to which an autonomous AP be configured?
As a VLAN access map
Trunk
Distributed coordinion function - the use of timers to prevent wireless collisions
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
15. What is the VRRP master router?
CEF is distributed completely among multiple L3 forwarding engines.
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
Bridge priority and MAC
The active router. All other routers are in backup state
16. What is a wireless mobility group?
By sending a gratuitous ARP
Trunk - dynamic auto - dynamic desireable (default)
A client can roam to any WLC as long as it stays in a mobility group
Local only
17. What is a CEF glean?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. What is 802.1x auto?
The master router can share the VIP
With portfast
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
19. What pins does FE use?
Distribution
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
1/2 and 3/6
When a wireless station transmits a frame - the receiving one must send an ack
20. What is a cell?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
21. What is the size of ISL encapsulation?
The L3 forwarding engine can't forward the packet in hardware because there is no L2 next-hop address - so the packet is sent to the L3 engine to generate the ARP response
Configure and enable DHCP snooping
900 MHz - 2.4Ghz - and 5-6GHz
26-byte header - 4-byte trailer with CRC
22. How is a WLC handoff handled when the WLCs are in different subnets?
0-255
A point to point port type but the neighboring device runs traditional 802.1D STP
By using an Ether-IP tunnel
Needs hardware upgrade over WEP - uses AES encryption
23. How does a DAI enabled switch gather trusted ARP info?
Real-time Transport Protocol
Only for trusted Cisco gear - especially phones
From the DHCP snooping database or from static entries
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
24. What is a vlan?
A single broadcast domain
Controls where candidate root bridges can be connected and found on a network
Distribution layer
The MST instance (MSTI) runs alongside the IST and represents an STP instance
25. What types of authentication does HSRP allow?
If any BDUP is received on a port - it puts the port into the errdisable state
A VLAN that spans the entire fabric
Plain text or md5
An L2 switch can only forward frames best effort unless going across a trunk
26. What is the default network diameter?
7 switches from root bridge
19
Sends a voltage across the receive pairs to detect a 25k ohm resistance
Turn on port security
27. Where is bdpu guard enabled?
When a port moves into forwarding or from fowarding or learning to blocking.
Src-dst-ip
All user ports that have portfast enabled
On the left as you face the connector
28. What is DSCP?
2 seconds (def)
0-255 (lower is better)
10-15%
Differentiated services code point
29. How do Cisco IP phones communicate with the CCM?
With the skinny protocol
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
No shut
30. What are the 3 ways GLBP load-balances?
Change in trunk encap
Round robin - weighted - or host-dependent
RPR - RPR+ - and SSO
1-65535 (def 32768) lower priority - higher probability
31. What is SSO?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. Which ports should you consider trusted for DAI?
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
Data and voice over native vlan no QOS and no 802.1p trunk
A single broadcast domain
Those that connect to other switches
33. What are spoofed addresses?
No
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
They disguise the origin of an attack
Isl - dot1q - negotiate (default)
34. What is a LACP priority?
When a client roams between Aps in different subnets
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
Only the standby monitors the hello messages from the active router
35. What is the 80/20 rule?
80% of the user traffic should stay in the VLAN
900 MHz - 2.4Ghz - and 5-6GHz
CEF is distributed completely among multiple L3 forwarding engines.
Incoming frames are dropped (combination of disabled - blocking - and listening)
36. What types of link can an etherchannel be?
Access or trunk
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
Yes
37. How does IPT behave when the voice VLAN is in untagged mode?
Data and voice over native vlan - no QOS but still uses 802.1p trunk
Group (0-1023) priority (1-255 higher better def 100)
Switch(config-if)# glbp xx where xx = group number
Automatically using DTP and CDP
38. What is latency?
A packet can't be switched in hardware with the FIB and must go to the L3 engine
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
Only for the offending VLAN on the port
The total delay from start to finish
39. How does HSRP do MD5 authentication?
By using a hash of a key string
Each frame transmits its expected duration time
0-255
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
40. How doed backbonefast work?
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Another router must have a higher HSRP priority and have preemt set up
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
By short-circuiting the max age timer
41. What is a QoS trust boundary?
When a client roams between Aps in different subnets
2
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
That they aren't using the same frequencies.
42. What are the characteristics of the access layer?
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
Incoming frames dropped - but MACs learned
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
43. If a port is configured for errdisable auto recovery - how long does it stay down?
300 sec by default
By configuring every switch port to have an expected and controlled behavior
If any BDUP is received on a port - it puts the port into the errdisable state
26-byte header - 4-byte trailer with CRC
44. What is the duration time in a wireless frame?
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
Port
A host port goes up or down
Each frame transmits its expected duration time
45. What is an SVI?
MAC of the end device
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
Port stays up - packets from violating MACs dropped - no logging
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
46. What does the switchport host macro do?
Enables portfast - sets the port to access and disables PAgP
Distribution
All user ports that have portfast enabled
Critical...used most often for IPT
47. What's the easiest way to configure GLBP timers?
A key string of up to 8 characters is sent. Default is cisco.
By default weight is 100. Can be made dynamic per interface
Configure the timer on the AVG and let it propagate
Normal and aggressive
48. What must be supported for port-based security to occur?
0000.0c07.acxx where xx is the group number as a 2-digit hex value
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
63 kbps
802.1x with EAP over LAN (EAPOL)
49. What does the rewrite engine do?
Transmits keystrokes from phone and commands from CCM
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
Yes
Half because transmitting and receiving stations use the same frequency
50. What are the 6 HSRP states?
Isolated and community
Disabled - init - listen - speak - standby - active
Every switch and router in a network must be configured with appropriate QoS features and policies
All ports where root isn't expected