SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How should backbonefast be configured?
On all switches in network to enable RLQ request and reply
Multicasts to 224.0.0.18 (VRRP)
From the DHCP snooping database or from static entries
That they aren't using the same frequencies.
2. CAM table entries are purged when....
One that can be detected on a switch interface (ie. Up/down)
A MAC is seen on a different port
Manages addition - deletion and renaming VLANs across the network
On by default
3. What is the default network diameter?
If any BDUP is received on a port - it puts the port into the errdisable state
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
Promiscuous and host
7 switches from root bridge
4. What format does the GLBP MAC use?
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
By using a trunk link
On all switches in network to enable RLQ request and reply
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
5. What is errdisable pagp-flap?
Automatically using DTP and CDP
Etherchannel ports have inconsistent config
Src-dst-ip
Only a single host connects . If one BDPU is received - it is no longer an edge port
6. What are the characteristics of the access layer?
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
Automatically using DTP and CDP
It's a router that maintains routes (static or dynamic) - and populates the FIB
1 per segment
7. What are the 3 trunk encap modes?
Distribution layer
Isl - dot1q - negotiate (default)
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
An ac adaptor that plugs into a wall outlet.
8. What is the STP blocking state?
Port that connects to another switch and becomes a designated port
Can hear only BDPUs
As a VLAN access map
On ports where you never expect to find a root bridge for a VLAN
9. Can two switches in the auto(PAgP) or passive (LACP) mode create a channel? Why?
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
Silent
No because they only participate if asked
63 kbps
10. What do you need to determine to use MSTP?
The TOS field in the header is used. 2 methods 3 bits or 6 bits
As a VLAN access map
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
11. What is the default VTP state?
2 seconds
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
Packets are discarded due to an ACL or policy action
VTP server for domain null with no password or secure mode
12. What is the STP forward delay timer?
The time that a port spends in both listening and learning states . Default 15 seconds
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
802.1x with EAP over LAN (EAPOL)
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
13. Where are security and QoS ACLs stored?
TCAM
A group of wireless devices that share a common SSID
On the left as you face the connector
The port is forced to always authorize any connected client with no authentication necessary (default)
14. What is Per VLAN STP (PVST)?
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
A single broadcast domain
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
Interim solution - uses same hardware as WEP - but uses TKIP encryption
15. What is a PVLAN?
Roughly 50%
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
A private VLAN can be logically associated with a special secondary vlan
Two distribution switches that aggregate one or more access switches
16. What are spoofed addresses?
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
They disguise the origin of an attack
Manually
By short-circuiting the max age timer
17. can root guard and udld be used together?
Yes
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
Value - mask - and result (VMR) combinations
The standby becomes active and stays active by default. Preemption can be configured
18. How does Root Guard work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. What is unique about HSRP group numbers?
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
20. What does port-security restrict do?
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
Isolated and community
21. What are the 2 UDLD modes?
Each frame transmits its expected duration time
A point to point port type but the neighboring device runs traditional 802.1D STP
One that can be detected on a switch interface (ie. Up/down)
Normal and aggressive
22. What are the steps to configure a LACP port channel?
Once the CCM gives them the parameters - they use RTP
Using a single WAP to centralize access and control over a group of wireless devices.
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
23. One vlan should =
When each AP stands alone within the larger network.
Via an 802.1Q trunk or a single VLAN access port
1 IP subnet
Either desirable or auto mode
24. What categories can ports be in with dhcp snooping enabled?
Yes to both
Trusted or untrusted
Admin down
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
25. How does adding option-82 to DHCP snooping affect things?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
26. What is an MST instance?
Change in trunk encap
All user ports that have portfast enabled
Only the standby monitors the hello messages from the active router
The MST instance (MSTI) runs alongside the IST and represents an STP instance
27. How does HSRP gateway addressing work
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
The ASIC
Access
28. What is a direct topology change?
One that can be detected on a switch interface (ie. Up/down)
Yes
LACP port priority
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
29. What is topology-basec caching?
Yes
Globally or per-port
The station can transmit immediately and wait for an ack
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
30. How many potential links can LACP define?
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
Another router must have a higher HSRP priority and have preemt set up
Trunk
16 - of which up to 8 are active. The others are in standby
31. How many designated ports are there?
1500B
1 per segment
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Dynamic WEP keys that change periodically
32. What are the restrictions for bundling into an Etherchannel?
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
Switch(config-if)# standby xx where x= group number
Group (0-1023) priority (1-255 higher better def 100)
It's a router that maintains routes (static or dynamic) - and populates the FIB
33. At what layer does EAPOL run?
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
L2
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
No because they only participate if asked
34. If a port is configured for errdisable auto recovery - how long does it stay down?
Each network device handles packets individually with no advance reservations
300 sec by default
A point to point port type but the neighboring device runs traditional 802.1D STP
Virtual Router Redundancy Protocol - pretty much the same as HSRP
35. What are 2 ways to configure VLAN and VTP information?
2 seconds (def)
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
A packet can't be switched in hardware with the FIB and must go to the L3 engine
36. What is the DIFS?
All L2 connectivity should be contained within the access layer.
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
900 MHz - 2.4Ghz - and 5-6GHz
The DCF interframe space- the random backoff time before a wireless set can transmit
37. How does a Cisco IP phone connect upstream?
Yes
No
Via an 802.1Q trunk or a single VLAN access port
1/2 and 3/6
38. RSTP uses which standard?
Per VLAN
802.1w
By sending a gratuitous ARP
Critical...used most often for IPT
39. What does DTP do?
2 seconds (def)
Automatically negotiates a common trunk mode between switches
FE - GE - and aggregated FE/GE Etherchannels
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
40. How much overlap should WAPs have?
CEF is distributed completely among multiple L3 forwarding engines.
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
10-15%
41. RSTP point to point port
Roughly 2000
Round robin - weighted - or host-dependent
Port that connects to another switch and becomes a designated port
Switching Database Manager - configures and prunes TCAM partitions
42. What are the gotchas for uplinkfast?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. RSTP alternate port
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
Port with alternative path to root less desirable than root
All ports where root isn't expected
The wireless clients communicate directly with no other means of connectivity such as a WAP
44. Where does layer switching occur?
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
L2
Between any type of interface as long as the interface can have an L3 address assigned
On the left as you face the connector
45. What is PVST plus (PVST+)?
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
All nondesignated ports - but ok for all ports
The port is forced to always authorize any connected client with no authentication necessary (default)
Using a single WAP to centralize access and control over a group of wireless devices.
46. What data does DHCP snooping track?
From the DHCP snooping database or from static entries
Completed dhcp bindings - mac addresses - IP addresses - etc.
80% of the user traffic should stay in the VLAN
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
47. How does GLBP work?
By using a trunk link
Because each frame is checked
Routers are assigned to common GLBP group. All routers can be active and can load balance
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
48. Which ports should you consider trusted for DAI?
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
A client can roam to any WLC as long as it stays in a mobility group
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
Those that connect to other switches
49. What are the characteristics of the distribution layer?
By using an Ether-IP tunnel
Differentiated services
Trunk
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
50. What is a CEF glean?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183