SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the portr ID?
16 bits (8b port priority - 8b port number)
The link status stays up - but something between them has failed or is filtering traffic
No because they only participate if asked
2 strand MMF with MT-RJ or SC connectors
2. What is a discard adjacency?
0-255 (lower is better)
Packets are discarded due to an ACL or policy action
Trunk - dynamic auto - dynamic desireable (default)
By using a hash of a key string
3. What is the cost of a 100Mbps link?
2 - one for control messages and one for data
RADIUS
19
Group (0-1023) priority (1-255 higher better def 100)
4. How do you implement MST?
5. What is an isolated secondary VLAN?
6. How does loop guard block ports?
Only for the offending VLAN on the port
A client can roam to any WLC as long as it stays in a mobility group
7 switches from root bridge
Isolated and community
7. How do you configure IP source guard for hosts that don't use DHCP?
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
By creating a static IP binding
By using a trunk link
By encapsulating each frame in a header and trailer
8. What does port-security restrict do?
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
Switchpotrt nonegotiate
Src-dst-ip
A packet can't be switched in hardware with the FIB and must go to the L3 engine
9. How much BW does a voip connection use?
12 kbps with headers and compression
By creating a static IP binding
Root
L2
10. What are the port channel load balancing methods?
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
Switch(config-if)# standby xx where x= group number
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
11. What are the restrictions for bundling into an Etherchannel?
Via an 802.1Q trunk or a single VLAN access port
By using an Ether-IP tunnel
1500B
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
12. RSTP edge port
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
Only a single host connects . If one BDPU is received - it is no longer an edge port
Almost eliminates listening and learning states for single hosts on an access link
On all switches in network to enable RLQ request and reply
13. What is RPR+?
14. What is the bridge priority range?
Globally
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
Use the spanning-tree root macro
0-65535 (def 32768) lower=better
15. What is the STP learning state?
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
Time between BDPUs sent by root bridge. Default of 2 seconds
After forwarding delay - port can learn new MAC addresses
LACP port priority
16. 802.11g
The ASIC
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
The time that a port spends in both listening and learning states . Default 15 seconds
Full duplex
17. How many potential links can LACP define?
Only for the offending VLAN on the port
802.1D
Once the CCM gives them the parameters - they use RTP
16 - of which up to 8 are active. The others are in standby
18. What is portfast?
Almost eliminates listening and learning states for single hosts on an access link
7 switches from root bridge
4
Only a single host connects . If one BDPU is received - it is no longer an edge port
19. What is the FM?
10-15%
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
No
20. RSTP BPDU structure
PAgP (Cisco proprietary) and LACP (standards-based)
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
Admin down
Globally
21. What is a PVLAN?
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
Dynamic arp inspection
Packets are discarded due to an ACL or policy action
A private VLAN can be logically associated with a special secondary vlan
22. What types of links can be trunked?
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
5 classes with 3 drop precedences
FE - GE - and aggregated FE/GE Etherchannels
Multicasts to 224.0.0.18 (VRRP)
23. What is DSCP codepoint EF(46)?
No
Critical...used most often for IPT
Trunk
Edge - root - and point to point
24. What are LOU register pairs?
Data and voice over native vlan no QOS and no 802.1p trunk
Used when ACLs specify port ranges...used by TCAM
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
The station can transmit immediately and wait for an ack
25. One vlan should =
To a VLAN and not to a VLAN interface (SVI)
1 IP subnet
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
1-65535 (def 32768) lower priority - higher probability
26. What is unique about HSRP group numbers?
Frames are forwarded
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Group (0-255) - priority (1-254 254 is highest - 100 default)
Admin down
27. What happens during HSRP failover?
The standby becomes active and stays active by default. Preemption can be configured
Only when a nonedge port transitions to forwarding
Usually QoS from VOIP but not PC dataa
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
28. How do IP phones communicate with each other?
Once the CCM gives them the parameters - they use RTP
Frames are forwarded
Change in trunk encap
1 to 64
29. What is the STP blocking state?
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
Can hear only BDPUs
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
Etherchannel ports have inconsistent config
30. What is the PVLAN promiscuous mode?
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
When a wireless station transmits a frame - the receiving one must send an ack
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
31. can root guard and bdpu guard be used together?
VTP server for domain null with no password or secure mode
Checks the destination MAC in the header against the target MAC in the ARP reply
No
Every switch and router in a network must be configured with appropriate QoS features and policies
32. How does DSCP handle IP precedence?
5 classes with 3 drop precedences
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
The active router. All other routers are in backup state
Trusted ports
33. What are the 5 STP port roles?
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
Root - designated - blocking - alternate - forwarding (host)
80% of the user traffic should stay in the VLAN
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
34. What is DSCP codepoint AF41(34)?
Reboots and searches for a new WLC
Flash override (class 4)
CEF is distributed completely among multiple L3 forwarding engines.
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
35. What is the format of the VRRP virtual MAC?
Data and voice over native vlan - no QOS but still uses 802.1p trunk
0000.5e00.01xx
Differentiated services code point
Configure and enable DHCP snooping
36. How do you prevent VLAN hopping?
224.0.0.2 (all routers)
Multicast to 01-80-c2-00-00-00
Port with alternative path to root less desirable than root
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
37. What types of ports autonegotiate?
Both ends should be on because on modes doesn't send PAgP or LACP packets
FE and GE
Disabled - blocking - listening - learning - forwarding
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
38. WPA encryption
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
By name - config revision - and instance to vlan mapping table
Interim solution - uses same hardware as WEP - but uses TKIP encryption
RPR - RPR+ - and SSO
39. What are the 6 steps to configure 802.1x for port security?
L2
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
0-255 (lower is better)
A key string of up to 8 characters is sent. Default is cisco.
40. How do you prevent switch spoofing?
Cisco recommends only on the root bridge
By configuring every switch port to have an expected and controlled behavior
Embeds the tag within the frame
Configure the timer on the AVG and let it propagate
41. What is an IBSS?
The wireless clients communicate directly with no other means of connectivity such as a WAP
Route once - switch many
5 classes with 3 drop precedences
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
42. How far chould a VLAN extend?
Switching Database Manager - configures and prunes TCAM partitions
Distribution layer
Used to switch packets destined for the null interface
Trusted or untrusted
43. What is the default 10mbps Enet duplex?
They disguise the origin of an attack
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
Differentiated services
Half-duplex
44. How does NSF work?
Differentiated services
Immediate (class 2)
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Src-dst-ip
45. How should UDLD be configured?
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
The TOS field in the header is used. 2 methods 3 bits or 6 bits
The configureable UDLD interval must be less than max age plus two intervals of forward delay
Transmits keystrokes from phone and commands from CCM
46. What is accelerated CEF (aCEF)?
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
Half-duplex
Critical...used most often for IPT
47. How does a DAI enabled switch gather trusted ARP info?
Incoming frames are dropped (combination of disabled - blocking - and listening)
From the DHCP snooping database or from static entries
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Only for trusted Cisco gear - especially phones
48. How does HSRP election work?
802.1w
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Using a mobility exchange message
Based on priority (0-255). Default is 100. Highest IP is tie breaker
49. How many users should be within a switch block?
12 kbps with headers and compression
Port with best root path cost
An L2 switch can only forward frames best effort unless going across a trunk
Roughly 2000
50. How does RSTP identify a topology change?
Only when a nonedge port transitions to forwarding
Incoming frames are dropped (combination of disabled - blocking - and listening)
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
Distribution layer