SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is a LACP priority?
PAgP (Cisco proprietary) and LACP (standards-based)
The ASIC
19
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
2. static vlans offer ____ based membership
Etherchannel ports have inconsistent config
10-15%
Port
No
3. What is a cell?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
4. How is the HSRP MAC address configured?
To a VLAN and not to a VLAN interface (SVI)
Reboots and searches for a new WLC
Trusted or untrusted
0000.0c07.acxx where xx is the group number as a 2-digit hex value
5. What does MSTP do?
Using a single WAP to centralize access and control over a group of wireless devices.
Used when there are 1 or more VLANs mapped to a single STP instance
By configuring every switch port to have an expected and controlled behavior
Frames are forwarded
6. What are the 5 steps to manualy configure STP?
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
Per VLAN
Globally
Src-dst-ip
7. What is DSCP codepoint AF21(18)?
Immediate (class 2)
If the switch or the powered device doesn't suport power class discovery
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
By sending a gratuitous ARP
8. What are the steps of RSTP convergence?
All fiber-optic links between switches (must be enabled on both ends)
Two distribution switches that aggregate one or more access switches
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
Root - designated - alternate - and backup
9. How do Cisco IP phones communicate with the CCM?
4
With the skinny protocol
It can't
Root - designated - alternate - and backup
10. What are TCAM entries composed of?
Half because transmitting and receiving stations use the same frequency
On ports where you never expect to find a root bridge for a VLAN
Value - mask - and result (VMR) combinations
Port with best root path cost
11. What is the GLBP redirect timer?
Determines when the AVG will stop using the old VMAC in ARP replies
Differentiated services
Cisco ILP and 802.3af
Virtual Router Redundancy Protocol - pretty much the same as HSRP
12. When looking at the sh spanning tree output - What does P2P denote?
Yes to both
Data and voice over native vlan - no QOS but still uses 802.1p trunk
An ac adaptor that plugs into a wall outlet.
A point to point port type
13. If the WLC connects to an Etherchannel - how should the channel be configured and why?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. What are the steps to configure MST?
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
Interim solution - uses same hardware as WEP - but uses TKIP encryption
5 (0-4 with 4 being the highest)
L2
15. What if RSTP BDPUs aren't received?
Gateway load balancing protocol - cisco proprietary
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
16. What does the switchport host macro do?
On ports where you never expect to find a root bridge for a VLAN
16 - of which up to 8 are active. The others are in standby
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
The total delay from start to finish
17. unknown unicast flooding
By sending a gratuitous ARP
1-65535 (def 32768) lower priority - higher probability
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
Flash (class 3)
18. What is the default VTP state?
Value - mask - and result (VMR) combinations
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
VTP server for domain null with no password or secure mode
By default weight is 100. Can be made dynamic per interface
19. What are LOU register pairs?
Used when ACLs specify port ranges...used by TCAM
Use the spanning-tree root macro
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
Immediate (class 2)
20. What is the LACP priority range?
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
MAC of the end device
Yes to both
1-65535 (def 32768) lower priority - higher probability
21. What is the FM?
Two distribution switches that aggregate one or more access switches
All user ports that have portfast enabled
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
22. What are the 2 UDLD modes?
134 bits
Normal and aggressive
Group (0-255) - priority (1-254 254 is highest - 100 default)
0-255 (lower is better)
23. What are the two etherchannel negotiation protocols?
An L2 switch can only forward frames best effort unless going across a trunk
All fiber-optic links between switches (must be enabled on both ends)
PAgP (Cisco proprietary) and LACP (standards-based)
Cisco recommends only on the root bridge
24. Where is root guard enabled?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
25. One vlan should =
Switch(config-if)# standby xx where x= group number
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
1 IP subnet
By brining up a tunnel between them to carry 802.11 related messages and client data.
26. what I s distributed CEF (dCEF)?
Group (0-255) - priority (1-254 254 is highest - 100 default)
CEF is distributed completely among multiple L3 forwarding engines.
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
Collision domain
27. What is NSF?
Globally
Switch(config-if)# vrrp xx where xx= group number
Manages addition - deletion and renaming VLANs across the network
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
28. Of what significance are private VLANs
Local only
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
By using a trunk link
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
29. What is the distribution layer best practice?
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
All ports where root isn't expected
The distribution layer should have only L3 links
No
30. RSTP point to point port
If any BDUP is received on a port - it puts the port into the errdisable state
No
Port that connects to another switch and becomes a designated port
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
31. What is step 1 of enabling IP source guard?
By default weight is 100. Can be made dynamic per interface
2-8 FE - GE - or 10GE are bundled.
Switches make an effort to move packets as quickly as possible
Configure and enable DHCP snooping
32. How should the switch port to which an autonomous AP be configured?
Trunk
1/2 and 3/6
Auto mode
Half-duplex
33. what must be done on an SVI before it is activated?
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
No shut
80% of the user traffic should stay in the VLAN
By default weight is 100. Can be made dynamic per interface
34. Define HSRP
Critical...used most often for IPT
LACP port priority
An L2 switch can only forward frames best effort unless going across a trunk
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
35. What is a bridge ID made up of?
Port is forced to never authorize any connected client
Bridge priority and MAC
Embeds the tag within the frame
A packet can't be switched in hardware with the FIB and must go to the L3 engine
36. What is dynamic auto?
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
Will trunk if asked
37. How does a Cisco IP phone connect upstream?
802.11
Root
Via an 802.1Q trunk or a single VLAN access port
Two distribution switches that aggregate one or more access switches
38. What cabling do GBICs use?
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
The MST instance (MSTI) runs alongside the IST and represents an STP instance
SC fiber or RJ-45
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
39. How does HSRP gateway addressing work
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
Port is forced to never authorize any connected client
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
No
40. What are the 5 STP states?
Disabled - blocking - listening - learning - forwarding
The wireless clients communicate directly with no other means of connectivity such as a WAP
Isl - dot1q - negotiate (default)
An AP's coverage area
41. Where should you change the network diameter value?
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
SC fiber or RJ-45
Cisco recommends only on the root bridge
300 sec
42. What is an IST instance?
Frames that barely exceed 1518B or 1622B due to headers
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
It's a router that maintains routes (static or dynamic) - and populates the FIB
The station can transmit immediately and wait for an ack
43. What is best effort delivery QOS?
Switches make an effort to move packets as quickly as possible
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
134 bits
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
44. If one end of an Etherchannel (either type) is set to on and the channel doesn't form - what should you check?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
45. Can two switches in the auto(PAgP) or passive (LACP) mode create a channel? Why?
No because they only participate if asked
Differentiated services code point
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
46. How does backbonefast determine whether alternative paths exist?
That they aren't using the same frequencies.
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
The time that a port spends in both listening and learning states . Default 15 seconds
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
47. How does IPT behave when the voice VLAN is in dot1p mode?
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
That they aren't using the same frequencies.
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
Flash override (class 4)
48. Define GLBP
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
Flash (class 3)
Gateway load balancing protocol - cisco proprietary
Prevents the dhcp binding DB from being checked.
49. If a wireless station needs to transmit and no other device is transmitting - what happens?
Use the spanning-tree root macro
Prevents the dhcp binding DB from being checked.
The station can transmit immediately and wait for an ack
Based on priority (0-255). Default is 100. Highest IP is tie breaker
50. What is the 80/20 rule?
Group (0-255) - priority (1-254 254 is highest - 100 default)
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
80% of the user traffic should stay in the VLAN
Untrusted