SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Does a WLC and a LAP need to be on the same subnet?
No
When a wireless station transmits a frame - the receiving one must send an ack
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
2 - one for control messages and one for data
2. How does an L2 switch do QOS?
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
RPR - RPR+ - and SSO
An L2 switch can only forward frames best effort unless going across a trunk
3 seconds. Holdtime =3 hellos + 1
3. How does a LAP and a WLC authenticate between each other?
Used when there are 1 or more VLANs mapped to a single STP instance
Using digital certificates
Port with best root path cost on segment
Etherchannel ports have inconsistent config
4. When DHCP snooping is turned on - by default - it considers all ports ______
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
Those that connect to other switches
Untrusted
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
5. WPA encryption
Option 43
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
Interim solution - uses same hardware as WEP - but uses TKIP encryption
6. How does IPT behave when the voce VLAN is in the default none mode?
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
Regions and instances
Data and voice over native vlan no QOS and no 802.1p trunk
7. What are TCAM entries composed of?
Best effort delivery - integrated services model - and differentiated services model
Cisco ILP and 802.3af
Another router must have a higher HSRP priority and have preemt set up
Value - mask - and result (VMR) combinations
8. Automatically configure STP timers
Switch(config-if)# vrrp xx where xx= group number
Use the spanning-tree root macro
Globally or per-port
Can hear only BDPUs
9. What is PVST plus (PVST+)?
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
10. What is the default MTU?
1500B
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
All L2 connectivity should be contained within the access layer.
Admin down
11. How are BDPUs spread?
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
The number of times the entry has been updated since the table was generated
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
Multicast to 01-80-c2-00-00-00
12. How do you configure DAI for statically configured IP addresses?
1 to 64
Half-duplex
By an ARP access list that defines the permitted bindings
Globally
13. What is a null adjacency?
Used to switch packets destined for the null interface
Configure the timer on the AVG and let it propagate
The total delay from start to finish
Configuration and TCN
14. What is 802.1x force-authorized?
Access or trunk
The port is forced to always authorize any connected client with no authentication necessary (default)
No
Switch(config-if)# standby xx where x= group number
15. What is the default 802.3af power class and its use?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
16. What scope is 802.1x enabled?
Globally
Reboots and searches for a new WLC
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
Group (0-1023) priority (1-255 higher better def 100)
17. What is the core block?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. How does a WLC hand off a client's association to another WLC?
On all switches in network to enable RLQ request and reply
Using a mobility exchange message
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
Transmits keystrokes from phone and commands from CCM
19. What is an insignificant topology change?
Change in trunk encap
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
The DCF interframe space- the random backoff time before a wireless set can transmit
A host port goes up or down
20. RSTP alternate port
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
When the AP uplinks to an Ethernet network.
Port with alternative path to root less desirable than root
A point to point port type
21. How is a QoS trust bondary configured?
When the AP uplinks to an Ethernet network.
Every switch and router in a network must be configured with appropriate QoS features and policies
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
All ports where root isn't expected
22. How does 802.1q handle COS?
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
When a client roams between Aps in different subnets
1 per segment
23. If a port is configured for errdisable auto recovery - how long does it stay down?
300 sec by default
Root - designated - alternate - and backup
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
2 - one for control messages and one for data
24. 802.11b
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
From the DHCP snooping database or from static entries
The DCF interframe space- the random backoff time before a wireless set can transmit
25. RSTP point to point port
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
BGP - EIGRP - OSPF - and IS-IS.
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
Port that connects to another switch and becomes a designated port
26. How does every GLBP command begin
Sends a voltage across the receive pairs to detect a 25k ohm resistance
Switch(config-if)# glbp xx where xx = group number
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
The DCF interframe space- the random backoff time before a wireless set can transmit
27. How does NSF work?
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Trusted or untrusted
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
28. What is unique about HSRP group numbers?
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
Port with best root path cost on segment
As a VLAN access map
29. What does the SP do?
Value - mask - and result (VMR) combinations
Yes
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
Normal and aggressive
30. At what layer should the WLC be connected?
The same as a standby group in HSRP
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
Distribution
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
31. RSTP discarding state
2 strand MMF with MT-RJ or SC connectors
Incoming frames are dropped (combination of disabled - blocking - and listening)
Isl - dot1q - negotiate (default)
Promiscuous and host
32. What is the acceptible range of VLANS?
Silent
By using a hash of a key string
1-1005 (1 and 1002-1005 are reserved)
10-15%
33. What types of links can be trunked?
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
1-1005 (1 and 1002-1005 are reserved)
FE - GE - and aggregated FE/GE Etherchannels
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
34. How does HSRP port tracking work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. What are the 2 UDLD modes?
Normal and aggressive
Manually
0-255
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
36. RSTP root port
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
Port with best root path cost
A host port goes up or down
Between interfaces that are assigned to L2 VLANs or L2 trunks
37. WPA2 encryption
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
Needs hardware upgrade over WEP - uses AES encryption
A client can roam to any WLC as long as it stays in a mobility group
Normal and aggressive
38. How are VACLs applied
The port is forced to always authorize any connected client with no authentication necessary (default)
Every switch and router in a network must be configured with appropriate QoS features and policies
To a VLAN and not to a VLAN interface (SVI)
16 bits (8b port priority - 8b port number)
39. How does adding option-82 to DHCP snooping affect things?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
40. What can cause a wireless client to switch between Aps?
Switching Database Manager - configures and prunes TCAM partitions
The standby becomes active and stays active by default. Preemption can be configured
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
1-65535 (def 32768) lower priority - higher probability
41. What does the version number indicate when looking at CEF entries?
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
Configure and enable DHCP snooping
The number of times the entry has been updated since the table was generated
Flash override (class 4)
42. What is integrated services model QOS?
Transmits keystrokes from phone and commands from CCM
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
Each frame transmits its expected duration time
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
43. How does IPT behave when the voice VLAN is in dot1p mode?
By brining up a tunnel between them to carry 802.11 related messages and client data.
Effectively stops STP on filtered ports
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
44. What is a LACP priority?
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
The campus network's backbone
Forces the router to wait for a period of time before attempting overthrow
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
45. How far chould a VLAN extend?
The configureable UDLD interval must be less than max age plus two intervals of forward delay
Distribution layer
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
1 to 64
46. static vlans offer ____ based membership
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
Connects with SONET or SDH
Port
Port stays up - packets from violating MACs dropped - no logging
47. For QoS - switch uplinks should always be considered as ____ _____?
Gateway load balancing protocol - cisco proprietary
Trusted ports
If any BDUP is received on a port - it puts the port into the errdisable state
Hashing algorithm
48. What is 802.1x force-unauthorized?
Port is forced to never authorize any connected client
L2
One that can be detected on a switch interface (ie. Up/down)
Each frame transmits its expected duration time
49. How many designated ports are there?
Checks the destination MAC in the header against the target MAC in the ARP reply
1 per segment
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
Group (0-1023) priority (1-255 higher better def 100)
50. What are the 2 power over ethernet methods?
Time between BDPUs sent by root bridge. Default of 2 seconds
On all switches in network to enable RLQ request and reply
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
Cisco ILP and 802.3af