SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is a QoS trust boundary?
Data and voice over native vlan no QOS and no 802.1p trunk
No
Port with best root path cost
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
2. What does the ip option do when checking ARP replies
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
3. What is errdisable pagp-flap?
Etherchannel ports have inconsistent config
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
When a port moves into forwarding or from fowarding or learning to blocking.
4. What is the default network diameter?
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
7 switches from root bridge
Used to switch packets destined for the null interface
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
5. What must be supported for port-based security to occur?
802.1x with EAP over LAN (EAPOL)
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Packets must be sent to the L3 engine for further processing
With the skinny protocol
6. What is the LACP priority range?
Every switch and router in a network must be configured with appropriate QoS features and policies
By brining up a tunnel between them to carry 802.11 related messages and client data.
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
1-65535 (def 32768) lower priority - higher probability
7. What is the duration time in a wireless frame?
When a wireless station transmits a frame - the receiving one must send an ack
Access or trunk
Matching SSID - compatible data rate - authentication credentials
Each frame transmits its expected duration time
8. If you want IP source guard to detect spoofed MAC addresses - what must you do?
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
Isolated and community
Virtual Router Redundancy Protocol - pretty much the same as HSRP
Turn on port security
9. What does the minimum keyword do in HSRP?
Forces the router to wait for a period of time before attempting overthrow
Src-dst-ip
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
All user ports that have portfast enabled
10. What is the default MTU?
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Port
On the left as you face the connector
1500B
11. What is the size of a TCAM value?
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Routers are assigned to common GLBP group. All routers can be active and can load balance
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
12. What is the cost of a 1Gbps link?
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Gateway load balancing protocol - cisco proprietary
Distribution layer
4
13. Where should STP timers be configured and why?
Roughly 50%
On root - because the root bridge propagates timers with config BDPU
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
The number of times the entry has been updated since the table was generated
14. What does MSTP do?
Completed dhcp bindings - mac addresses - IP addresses - etc.
By short-circuiting the max age timer
Src-dst-ip
Used when there are 1 or more VLANs mapped to a single STP instance
15. What is DSCP codepoint AF21(18)?
A point to point port type
Sends a voltage across the receive pairs to detect a 25k ohm resistance
Immediate (class 2)
Determines when the AVG will stop using the old VMAC in ARP replies
16. What does IP source guard do?
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
The number of times the CEF table has bee flushed and regenerated as a whole
1 to 64
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
17. What are the caveats for HSRP port tracking?
Manages addition - deletion and renaming VLANs across the network
0-255
On the left as you face the connector
Another router must have a higher HSRP priority and have preemt set up
18. What is layer 3 roaming?
Silent
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
When a client roams between Aps in different subnets
A private VLAN can be logically associated with a special secondary vlan
19. What do you need to determine to use MSTP?
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
The DCF interframe space- the random backoff time before a wireless set can transmit
All ARP packets that arrive on untrusted ports are inspected.
2 strand MMF with MT-RJ or SC connectors
20. What are the 2 types of secondary VLAN?
That they aren't using the same frequencies.
Isolated and community
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
Hashing algorithm
21. How does HSRP do MD5 authentication?
By using a hash of a key string
Once the CCM gives them the parameters - they use RTP
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
VTP server for domain null with no password or secure mode
22. What functions does a WLC perform?
Control functions
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
VTP server for domain null with no password or secure mode
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
23. How does an LAP bind with a WLC?
RADIUS
By brining up a tunnel between them to carry 802.11 related messages and client data.
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Manages addition - deletion and renaming VLANs across the network
24. How does a Cisco IP phone connect upstream?
Via an 802.1Q trunk or a single VLAN access port
Yes
An AP's coverage area
Multicasts to 224.0.0.18 (VRRP)
25. How many potential links can LACP define?
16 - of which up to 8 are active. The others are in standby
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
26. How is Root Guard used?
Switches make an effort to move packets as quickly as possible
1-1005 (1 and 1002-1005 are reserved)
The port is forced to always authorize any connected client with no authentication necessary (default)
On ports where you never expect to find a root bridge for a VLAN
27. What are the RSTP port states?
By using a trunk link
Local only
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
Discarding - learning - forwarding
28. How do IP phones communicate with each other?
When a wireless station transmits a frame - the receiving one must send an ack
Once the CCM gives them the parameters - they use RTP
Those that connect to other switches
900 MHz - 2.4Ghz - and 5-6GHz
29. If one end of an Etherchannel (either type) is set to on and the channel doesn't form - what should you check?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
30. How does loop guard block ports?
80% of the user traffic should stay in the VLAN
Only for the offending VLAN on the port
Src-dst-ip
0-255 (lower is better)
31. How do you implement MST?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. How is a WLC handoff handled when the WLCs are in different subnets?
By using an Ether-IP tunnel
The DCF interframe space- the random backoff time before a wireless set can transmit
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
0-255 (lower is better)
33. How much BW does a voip connection use?
12 kbps with headers and compression
Real-time Transport Protocol
When the size of a cell is intentionally reduced
1/2 and 3/6
34. What are spoofed addresses?
Because each frame is checked
900 MHz - 2.4Ghz - and 5-6GHz
They disguise the origin of an attack
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
35. Which ports should you consider trusted for DAI?
To the virtual port-channel interface
The time that a port spends in both listening and learning states . Default 15 seconds
Based on priority (0-255). Default is 100. Highest IP is tie breaker
Those that connect to other switches
36. What functions does a LAP perform?
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
Cisco ILP and 802.3af
802.1w
802.11
37. EAP encryption
Configure and enable DHCP snooping
Root - designated - blocking - alternate - forwarding (host)
Dynamic WEP keys that change periodically
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
38. What is a drop adjacency?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
39. What must the other end be set to if PAgP desirable or LACP active mode is selected?
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
Incoming frames are dropped (combination of disabled - blocking - and listening)
Either desirable or auto mode
802.1x with EAP over LAN (EAPOL)
40. What types of link can an etherchannel be?
Cisco recommends only on the root bridge
Access or trunk
Connects with SONET or SDH
All ports where root isn't expected
41. What are the 3 unlicensed frequencies?
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
900 MHz - 2.4Ghz - and 5-6GHz
Option 43
A key string of up to 8 characters is sent. Default is cisco.
42. What is the traditional MLS view of switching?
Best effort delivery - integrated services model - and differentiated services model
Etherchannel ports have inconsistent config
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
Route once - switch many
43. How does HSRP plain text authentication work?
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
A key string of up to 8 characters is sent. Default is cisco.
Full duplex
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
44. What does the epoch number indicate when looking at cef entries?
The number of times the CEF table has bee flushed and regenerated as a whole
1-1005 (1 and 1002-1005 are reserved)
1/2 and 3/6
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
45. What pins does FE use?
1/2 and 3/6
Checks the source MAC in the header against the sender MAC in the ARP reply
Show standby
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
46. What is DSCP?
An AP's coverage area
Controls where candidate root bridges can be connected and found on a network
Differentiated services code point
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
47. What are the characteristics of the distribution layer?
The campus network's backbone
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
RADIUS
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
48. RSTP learning state
0-255
Configure non-silent submode
Incoming frames dropped - but MACs learned
The MST instance (MSTI) runs alongside the IST and represents an STP instance
49. What does Root Guard do?
Only for the offending VLAN on the port
Matching SSID - compatible data rate - authentication credentials
Controls where candidate root bridges can be connected and found on a network
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
50. What is dynamic desireable?
When each AP stands alone within the larger network.
The port asks the other end to trunk
When a port moves into forwarding or from fowarding or learning to blocking.
Configure non-silent submode
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests