SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How are multiple VLANs mapped to multiple SSIDs?
The ASIC
MAC of the end device
Determines when the AVG will stop using the old VMAC in ARP replies
By using a trunk link
2. What does DTP do?
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
Port
Automatically negotiates a common trunk mode between switches
An ac adaptor that plugs into a wall outlet.
3. What is the range of PAgP channel group numbers?
1 to 64
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
Every switch and router in a network must be configured with appropriate QoS features and policies
Gateway load balancing protocol - cisco proprietary
4. What is the bridge priority range?
The link status stays up - but something between them has failed or is filtering traffic
RPR - RPR+ - and SSO
Port is forced to never authorize any connected client
0-65535 (def 32768) lower=better
5. What is 802.1x force-unauthorized?
Port is forced to never authorize any connected client
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
Access
6. What are the 3 unlicensed frequencies?
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
Yes
Distribution layer
900 MHz - 2.4Ghz - and 5-6GHz
7. What does the skinny protocol do?
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Transmits keystrokes from phone and commands from CCM
Disabled - blocking - listening - learning - forwarding
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
8. What is UDLD aggressive mode?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
9. How is a WLC handoff handled when the WLCs are in different subnets?
Yes
Only a single host connects . If one BDPU is received - it is no longer an edge port
SC fiber or RJ-45
By using an Ether-IP tunnel
10. What is a vlan?
Arp for local subnet - if on different subnet - will arp for dgw
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
A single broadcast domain
11. What are the 5 STP port roles?
Root - designated - blocking - alternate - forwarding (host)
Each network device handles packets individually with no advance reservations
The ASIC
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
12. What are the 3 redundant supervisor modes?
A packet can't be switched in hardware with the FIB and must go to the L3 engine
Round robin - weighted - or host-dependent
RPR - RPR+ - and SSO
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
13. How is a QoS trust bondary configured?
Every switch and router in a network must be configured with appropriate QoS features and policies
Port stays up - packets from violating MACs dropped - no logging
Between any type of interface as long as the interface can have an L3 address assigned
224.0.0.2 (all routers)
14. What happens when an ARP reply is received on an untrusted port?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. What is an SVI?
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
Best effort delivery - integrated services model - and differentiated services model
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
16. How does IPT behave when the voice VLAN is in untagged mode?
0000.5e00.01xx
Completed dhcp bindings - mac addresses - IP addresses - etc.
Data and voice over native vlan - no QOS but still uses 802.1p trunk
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
17. How does a WLC hand off a client's association to another WLC?
Distribution
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
Using a mobility exchange message
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
18. How are VACLs configured?
As a VLAN access map
The number of times the CEF table has bee flushed and regenerated as a whole
A packet can't be switched in hardware with the FIB and must go to the L3 engine
By creating a static IP binding
19. What is layer 3 roaming?
Group (0-255) - priority (1-254 254 is highest - 100 default)
300 sec by default
When a client roams between Aps in different subnets
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
20. RSTP learning state
RPR - RPR+ - and SSO
300 sec
Checks the destination MAC in the header against the target MAC in the ARP reply
Incoming frames dropped - but MACs learned
21. Define HSRP
Only a single host connects . If one BDPU is received - it is no longer an edge port
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
22. What duplex setting does 802.11 use and why?
2
Half because transmitting and receiving stations use the same frequency
Isl - dot1q - negotiate (default)
On root - because the root bridge propagates timers with config BDPU
23. Can loop guard and udld be used together?
No
Yes
The standby becomes active and stays active by default. Preemption can be configured
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
24. How is UDLD configured?
Weak key rotation
Route once - switch many
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
Isolated and community
25. What is jitter?
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
Variation in delay
Src-dst-ip
802.1x with EAP over LAN (EAPOL)
26. What must be in common for a BSS to form?
Matching SSID - compatible data rate - authentication credentials
Incoming frames dropped - but MACs learned
Two distribution switches that aggregate one or more access switches
The campus network's backbone
27. where does L2 switching occur?
The station can transmit immediately and wait for an ack
Between interfaces that are assigned to L2 VLANs or L2 trunks
Every switch and router in a network must be configured with appropriate QoS features and policies
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
28. RSTP designated port
Plain text or md5
63 kbps
Port with best root path cost on segment
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
29. What are the 2 types of secondary VLAN?
Two distribution switches that aggregate one or more access switches
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
The link status stays up - but something between them has failed or is filtering traffic
Isolated and community
30. What does Loop Guard do?
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
Full duplex
Trunk - dynamic auto - dynamic desireable (default)
31. What is dynamic desireable?
Port with best root path cost on segment
300 sec
The port asks the other end to trunk
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
32. How doed backbonefast work?
By short-circuiting the max age timer
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
Packets are discarded due to an ACL or policy action
Priority (class 1)
33. What is a CEF glean?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. How does HSRP do MD5 authentication?
By using a hash of a key string
2-8 FE - GE - or 10GE are bundled.
When a port moves into forwarding or from fowarding or learning to blocking.
From the DHCP snooping database or from static entries
35. Where should you change the network diameter value?
No
The L3 forwarding engine can't forward the packet in hardware because there is no L2 next-hop address - so the packet is sent to the L3 engine to generate the ARP response
Cisco recommends only on the root bridge
Root - designated - blocking - alternate - forwarding (host)
36. What is a baby giant frame?
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
Frames that barely exceed 1518B or 1622B due to headers
37. WPA2 encryption
No
Trunk - dynamic auto - dynamic desireable (default)
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
Needs hardware upgrade over WEP - uses AES encryption
38. How does the VRRP master router handle the VIP?
Switch(config-if)# vrrp xx where xx= group number
The master router can share the VIP
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
Reboots and searches for a new WLC
39. What does the rewrite engine do?
A single broadcast domain
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
40. RSTP uses which standard?
802.1w
To a VLAN and not to a VLAN interface (SVI)
They disguise the origin of an attack
The same as a standby group in HSRP
41. What is the 80/20 rule?
80% of the user traffic should stay in the VLAN
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
Distributed coordinion function - the use of timers to prevent wireless collisions
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
42. Can MSTP interoperate with 802.1q and/or PVST+?
They disguise the origin of an attack
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Yes to both
Each frame transmits its expected duration time
43. How is RSTP synchronization accomplished?
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
The link status stays up - but something between them has failed or is filtering traffic
A private VLAN can be logically associated with a special secondary vlan
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
44. How does 802.1q handle COS?
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
45. What routing protocols support NSF?
After forwarding delay - port can learn new MAC addresses
Using digital certificates
When a port moves into forwarding or from fowarding or learning to blocking.
BGP - EIGRP - OSPF - and IS-IS.
46. unknown unicast flooding
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
Distribution
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
On the left as you face the connector
47. What is the size of a TCAM value?
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
1 to 64
On the left as you face the connector
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
48. What is a punt adjacency?
When the size of a cell is intentionally reduced
The link status stays up - but something between them has failed or is filtering traffic
Switchpotrt nonegotiate
Packets must be sent to the L3 engine for further processing
49. What functions does a LAP perform?
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
Src-dst-ip
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
The DCF interframe space- the random backoff time before a wireless set can transmit
50. the static port to vlan membership is handled in _____
19
Only for trusted Cisco gear - especially phones
The ASIC
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz