SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does MSTP consist of?
Connects with SONET or SDH
Regions and instances
Yes
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
2. Where should STP timers be configured and why?
Port with alternative path to root less desirable than root
Every switch and router in a network must be configured with appropriate QoS features and policies
On root - because the root bridge propagates timers with config BDPU
With portfast
3. What is the SDM?
Switching Database Manager - configures and prunes TCAM partitions
Transmits keystrokes from phone and commands from CCM
To a VLAN and not to a VLAN interface (SVI)
Dynamic WEP keys that change periodically
4. How does the VRRP master router handle the VIP?
1 second. Backup routers can learn the interval from the master
The master router can share the VIP
Almost eliminates listening and learning states for single hosts on an access link
Interim solution - uses same hardware as WEP - but uses TKIP encryption
5. How many MST instances can be in a region?
Port with best root path cost on segment
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
Connects with SONET or SDH
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
6. How often are BDPUs sent?
Auto mode
0-255
2 seconds (def)
Switch(config-if)# standby xx where x= group number
7. How does a WLC hand off a client's association to another WLC?
Only the standby monitors the hello messages from the active router
Priority (class 1)
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
Using a mobility exchange message
8. What are the 3 unlicensed frequencies?
900 MHz - 2.4Ghz - and 5-6GHz
Turn on port security
Receives the first packet of a traffic flow and routes it
Configure the timer on the AVG and let it propagate
9. If a wireless station needs to transmit and another device is transmitting - what happens?
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
Half because transmitting and receiving stations use the same frequency
10. How often are HSRP hellos sent?
Admin down
No
3 seconds. Holdtime =3 hellos + 1
Between interfaces that are assigned to L2 VLANs or L2 trunks
11. How is Root Guard used?
Switchpotrt nonegotiate
Used when ACLs specify port ranges...used by TCAM
On ports where you never expect to find a root bridge for a VLAN
Flash (class 3)
12. What is the size of a TCAM value?
Immediate (class 2)
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
13. What does Loop Guard do?
Port
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
2 seconds
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
14. What is the STP listening state?
Both layer 2 switching and IVR
2 - one for control messages and one for data
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
Can send and receive BDPUs
15. How can you load-balance with HSRP?
The port is forced to always authorize any connected client with no authentication necessary (default)
Silent
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
16. How is 802.1x configured for port security?
RADIUS
63 kbps
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
17. How do VRRP routers handle preemption?
With portfast
The wireless clients communicate directly with no other means of connectivity such as a WAP
On by default
Cisco recommends only on the root bridge
18. What does the SP do?
Globally
The total delay from start to finish
300 sec
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
19. What must be supported for port-based security to occur?
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
Weak key rotation
802.1x with EAP over LAN (EAPOL)
Both layer 2 switching and IVR
20. One vlan should =
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
1 IP subnet
Gateway load balancing protocol - cisco proprietary
The station can transmit immediately and wait for an ack
21. What does the rewrite engine do?
Multicasts to 224.0.0.18 (VRRP)
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
By creating a static IP binding
22. How many links can be used in an EtherChannel?
Access
2-8 FE - GE - or 10GE are bundled.
Half because transmitting and receiving stations use the same frequency
16 - of which up to 8 are active. The others are in standby
23. What is DSCP?
No because they only participate if asked
A client can roam to any WLC as long as it stays in a mobility group
If the switch or the powered device doesn't suport power class discovery
Differentiated services code point
24. What are the two etherchannel negotiation protocols?
Change in trunk encap
19
The TOS field in the header is used. 2 methods 3 bits or 6 bits
PAgP (Cisco proprietary) and LACP (standards-based)
25. What is SSO?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
26. What happens when the topology changes?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
27. What does UDLD do?
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
5 (0-4 with 4 being the highest)
4
1500B
28. WEP encryption
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
The same as a standby group in HSRP
Weak key rotation
29. What is the acceptible range of VLANS?
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
1-1005 (1 and 1002-1005 are reserved)
16 - of which up to 8 are active. The others are in standby
30. What is the default mode of load balancing?
Data and voice over native vlan no QOS and no 802.1p trunk
FE - GE - and aggregated FE/GE Etherchannels
Src-dst-ip
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
31. What is dhcp snooping rate limiting?
Each frame transmits its expected duration time
A VLAN that spans the entire fabric
Limits the number if dhcp requests on a port
802.1D
32. What is best effort delivery QOS?
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
Real-time Transport Protocol
Switches make an effort to move packets as quickly as possible
Using digital certificates
33. What is an untrusted port under dhcp snooping?
Yes
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
The time that a port spends in both listening and learning states . Default 15 seconds
34. What is the bridge priority range?
The distribution layer should have only L3 links
Matching SSID - compatible data rate - authentication credentials
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
0-65535 (def 32768) lower=better
35. How does Root Guard work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. How is the IPT 802.1 trunk negotiated?
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Show standby
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
Automatically using DTP and CDP
37. What are the 3 trunk switchport modes?
Matching SSID - compatible data rate - authentication credentials
802.1w
A point to point port type
Trunk - dynamic auto - dynamic desireable (default)
38. RSTP root port
Lowest cumulative cost to root
Port with best root path cost
2
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
39. What does port-security restrict do?
Using a single WAP to centralize access and control over a group of wireless devices.
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
40. What is DAI?
Dynamic arp inspection
Frames that barely exceed 1518B or 1622B due to headers
Embeds the tag within the frame
Distribution layer
41. What are the PAgP negotiation modes
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Those that connect to other switches
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
Differentiated services
42. How can BDPU Guard be configured?
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
Globally or per-port
Local only
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
43. What does uplinkfast do?
By short-circuiting the max age timer
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Frames that barely exceed 1518B or 1622B due to headers
44. How do Cisco IP phones communicate with the CCM?
The port asks the other end to trunk
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
With the skinny protocol
45. How are GLBP timers used?
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
Isl - dot1q - negotiate (default)
Switchpotrt nonegotiate
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
46. What types of links can be trunked?
FE - GE - and aggregated FE/GE Etherchannels
By using a trunk link
Roughly 2000
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
47. How do you configure DAI for statically configured IP addresses?
1-1005 (1 and 1002-1005 are reserved)
By an ARP access list that defines the permitted bindings
It's a router that maintains routes (static or dynamic) - and populates the FIB
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
48. What is RTP?
2 seconds
Admin down
Real-time Transport Protocol
Variation in delay
49. What is the STP blocking state?
Can hear only BDPUs
Globally or per-port
RADIUS
Route once - switch many
50. How are frames forwarded across a specific link?
Packets must be sent to the L3 engine for further processing
Interim solution - uses same hardware as WEP - but uses TKIP encryption
Incoming frames are dropped (combination of disabled - blocking - and listening)
Hashing algorithm