SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. If a wireless station needs to transmit and another device is transmitting - what happens?
Switch(config-if)# standby xx where x= group number
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
1500B
2. can root guard and bdpu guard be used together?
Plain text or md5
They disguise the origin of an attack
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
No
3. What are the restrictions for bundling into an Etherchannel?
Via an 802.1Q trunk or a single VLAN access port
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
802.1w
Isolated and community
4. What is route caching?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. What routing protocols support NSF?
A VLAN that spans the entire fabric
BGP - EIGRP - OSPF - and IS-IS.
Arp for local subnet - if on different subnet - will arp for dgw
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
6. When looking at the sh spanning tree output - What does P2P peer(STP) denote?
Forces the router to wait for a period of time before attempting overthrow
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
A point to point port type but the neighboring device runs traditional 802.1D STP
A MAC is seen on a different port
7. How is root port decided upon?
Lowest cumulative cost to root
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
Normal and aggressive
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
8. What is a baby giant frame?
Frames that barely exceed 1518B or 1622B due to headers
Determines when the AVG will stop using the old VMAC in ARP replies
1 IP subnet
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
9. What does UDLD do?
Automatically using DTP and CDP
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
Via an 802.1Q trunk or a single VLAN access port
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
10. What is the cost of a 1Gbps link?
Completed dhcp bindings - mac addresses - IP addresses - etc.
No because they only participate if asked
All L2 connectivity should be contained within the access layer.
4
11. What are the caveats for HSRP port tracking?
Another router must have a higher HSRP priority and have preemt set up
Can hear only BDPUs
Immediate (class 2)
Isl - dot1q - negotiate (default)
12. What does the src-mac option do when checking ARP replies
Checks the source MAC in the header against the sender MAC in the ARP reply
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
63 kbps
13. What are the 5 STP port roles?
Root - designated - blocking - alternate - forwarding (host)
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
802.11
Turn on port security
14. How is a QoS trust bondary configured?
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
Every switch and router in a network must be configured with appropriate QoS features and policies
Will trunk if asked
1-1005 (1 and 1002-1005 are reserved)
15. What are the two etherchannel negotiation protocols?
Priority (class 1)
0000.0c07.acxx where xx is the group number as a 2-digit hex value
PAgP (Cisco proprietary) and LACP (standards-based)
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
16. What are the 2 UDLD modes?
When the size of a cell is intentionally reduced
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
Normal and aggressive
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
17. What is an MST instance?
The MST instance (MSTI) runs alongside the IST and represents an STP instance
Globally
By using a trunk link
Packets must be sent to the L3 engine for further processing
18. What is unique about HSRP group numbers?
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
By configuring every switch port to have an expected and controlled behavior
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Used when ACLs specify port ranges...used by TCAM
19. What is the LACP priority range?
Isl - dot1q - negotiate (default)
1-65535 (def 32768) lower priority - higher probability
Two distribution switches that aggregate one or more access switches
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
20. What categories can ports be in with dhcp snooping enabled?
Trusted or untrusted
Discarding - learning - forwarding
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
A VLAN that spans the entire fabric
21. What is the adjacency table?
Configure and enable DHCP snooping
Etherchannel ports have inconsistent config
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
22. RSTP root port
On root - because the root bridge propagates timers with config BDPU
80% of the user traffic should stay in the VLAN
Port with best root path cost
By name - config revision - and instance to vlan mapping table
23. What is arp throttling?
Collision domain
Configure the timer on the AVG and let it propagate
Real-time Transport Protocol
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
24. How does packet forwarding work
Arp for local subnet - if on different subnet - will arp for dgw
The DCF interframe space- the random backoff time before a wireless set can transmit
L2
Either desirable or auto mode
25. What contains the next-hop entries?
Configuration and TCN
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
FIB
Option 43
26. What is 802.1x force-unauthorized?
Per VLAN
Can send and receive BDPUs
Switch(config-if)# standby xx where x= group number
Port is forced to never authorize any connected client
27. What is the traditional MLS view of switching?
Port with alternative path to root less desirable than root
Route once - switch many
Yes
No
28. How many virtual MACs can GLBP have?
The campus network's backbone
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
29. How does uplinkfast handle changes in topology?
Completed dhcp bindings - mac addresses - IP addresses - etc.
Silent
Weak key rotation
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
30. What is DSCP codepoint AF31(26)?
Will trunk if asked
A MAC is seen on a different port
Flash (class 3)
FE and GE
31. What is NSF?
1500B
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Only for the offending VLAN on the port
The configureable UDLD interval must be less than max age plus two intervals of forward delay
32. What functions does a WLC perform?
RADIUS
By brining up a tunnel between them to carry 802.11 related messages and client data.
Can send and receive BDPUs
Control functions
33. One vlan should =
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
1 IP subnet
Yes
34. What does the reload keyword do in HSRP?
On all switches in network to enable RLQ request and reply
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
L2
Access
35. How does L3 QOS classification happen?
By default weight is 100. Can be made dynamic per interface
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
The TOS field in the header is used. 2 methods 3 bits or 6 bits
36. How many tunnels exist between the LAP and WLC?
2 - one for control messages and one for data
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
Routers are assigned to common GLBP group. All routers can be active and can load balance
37. What are the RSTP port roles?
Regions and instances
Root - designated - alternate - and backup
The configureable UDLD interval must be less than max age plus two intervals of forward delay
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
38. What does the switchport host macro do?
Best effort delivery - integrated services model - and differentiated services model
2 seconds (def)
Distribution layer
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
39. What is topology-basec caching?
Checks the source MAC in the header against the sender MAC in the ARP reply
Configuration and TCN
Promiscuous and host
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
40. What is the STP Max Age timer?
Port is forced to never authorize any connected client
Port
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
41. How do VRRP routers handle preemption?
On by default
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
802.1w
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
42. How is an RSTP edge port configured
300 sec by default
Regions and instances
With portfast
Will trunk if asked
43. How does HSRP plain text authentication work?
Silent
Distribution layer
A key string of up to 8 characters is sent. Default is cisco.
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
44. Where should you change the network diameter value?
The MST instance (MSTI) runs alongside the IST and represents an STP instance
Port with alternative path to root less desirable than root
Cisco recommends only on the root bridge
Enables portfast - sets the port to access and disables PAgP
45. What is the RSTP default hello interval?
2 seconds
Matching SSID - compatible data rate - authentication credentials
Silent
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
46. What is a topology change?
Controls where candidate root bridges can be connected and found on a network
The campus network's backbone
When a port moves into forwarding or from fowarding or learning to blocking.
Trunk - dynamic auto - dynamic desireable (default)
47. What does the rewrite engine do?
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
The master router can share the VIP
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
48. How does HSRP do MD5 authentication?
By using a hash of a key string
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
49. What is the STP disabled state?
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
Admin down
To a VLAN and not to a VLAN interface (SVI)
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
50. How is the HSRP MAC address configured?
0000.0c07.acxx where xx is the group number as a 2-digit hex value
Flash override (class 4)
When a wireless station transmits a frame - the receiving one must send an ack
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another