SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. If one end of an Etherchannel (either type) is set to on and the channel doesn't form - what should you check?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. How is root port decided upon?
On by default
The MST instance (MSTI) runs alongside the IST and represents an STP instance
By name - config revision - and instance to vlan mapping table
Lowest cumulative cost to root
3. At what layer does EAPOL run?
L2
Connects with SONET or SDH
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
Round robin - weighted - or host-dependent
4. How does HSRP do MD5 authentication?
By using a hash of a key string
By creating a static IP binding
It is enabled by default on all CEF capable switches
PAgP (Cisco proprietary) and LACP (standards-based)
5. How do you prevent switch spoofing?
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
Discarding - learning - forwarding
Use sh interface on the interface and look for error counts > 10
By configuring every switch port to have an expected and controlled behavior
6. What is an untrusted port under dhcp snooping?
LACP port priority
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
Disabled - blocking - listening - learning - forwarding
7. How does UDLD work?
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
All ARP packets that arrive on untrusted ports are inspected.
7 switches from root bridge
8. What functions does a LAP perform?
When a client roams between Aps in different subnets
By encapsulating each frame in a header and trailer
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
9. What is the cost of a 10Gbps link?
All nondesignated ports - but ok for all ports
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
Silent
2
10. What are the steps to configure a PAgP port channel?
The ASIC
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
Reboots and searches for a new WLC
To a VLAN and not to a VLAN interface (SVI)
11. What is the default VTP state?
3 seconds. Holdtime =3 hellos + 1
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
When a port moves into forwarding or from fowarding or learning to blocking.
VTP server for domain null with no password or secure mode
12. How do VRRP routers handle preemption?
Trunk
By an ARP access list that defines the permitted bindings
If any BDUP is received on a port - it puts the port into the errdisable state
On by default
13. How does loop guard block ports?
Only for the offending VLAN on the port
The number of times the CEF table has bee flushed and regenerated as a whole
Controls where candidate root bridges can be connected and found on a network
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
14. What is the portr ID?
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
16 bits (8b port priority - 8b port number)
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
Switching Database Manager - configures and prunes TCAM partitions
15. How far chould a VLAN extend?
Distribution layer
By sending a gratuitous ARP
Immediate (class 2)
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
16. What does Root Guard do?
Access or trunk
16 - of which up to 8 are active. The others are in standby
Controls where candidate root bridges can be connected and found on a network
Regions and instances
17. How does 802.3af do power discovery?
Manually
FE and GE
Between any type of interface as long as the interface can have an L3 address assigned
Sends a voltage across the receive pairs to detect a 25k ohm resistance
18. How are VACLs applied
To a VLAN and not to a VLAN interface (SVI)
Distributed coordinion function - the use of timers to prevent wireless collisions
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
Change in trunk encap
19. How often are BDPUs sent?
PAgP (Cisco proprietary) and LACP (standards-based)
2 seconds (def)
Globally or per-port
Once the CCM gives them the parameters - they use RTP
20. What are the steps to configure a LACP port channel?
Group (0-1023) priority (1-255 higher better def 100)
Configure non-silent submode
Between interfaces that are assigned to L2 VLANs or L2 trunks
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
21. What does BDPU filtering do?
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
The configureable UDLD interval must be less than max age plus two intervals of forward delay
Effectively stops STP on filtered ports
Needs hardware upgrade over WEP - uses AES encryption
22. What is integrated services model QOS?
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
23. How should the switch port to which an autonomous AP be configured?
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
16 bits (8b port priority - 8b port number)
With the skinny protocol
Trunk
24. What is a LACP priority?
FE and GE
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
Only a single host connects . If one BDPU is received - it is no longer an edge port
The port is forced to always authorize any connected client with no authentication necessary (default)
25. What is the 80/20 rule?
Globally
80% of the user traffic should stay in the VLAN
0-255
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
26. What does uplinkfast do?
Two distribution switches that aggregate one or more access switches
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
16 bits (8b port priority - 8b port number)
Only for trusted Cisco gear - especially phones
27. How does HSRP election work?
Via an 802.1Q trunk or a single VLAN access port
Based on priority (0-255). Default is 100. Highest IP is tie breaker
A client can roam to any WLC as long as it stays in a mobility group
A packet can't be switched in hardware with the FIB and must go to the L3 engine
28. How does IPT behave when the voce VLAN is in the default none mode?
Data and voice over native vlan no QOS and no 802.1p trunk
Using a mobility exchange message
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
They disguise the origin of an attack
29. What is topology-basec caching?
Multicasts to 224.0.0.18 (VRRP)
Cisco recommends only on the root bridge
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
Between any type of interface as long as the interface can have an L3 address assigned
30. When looking at the sh spanning tree output - What does P2P denote?
A point to point port type
That they aren't using the same frequencies.
The standby becomes active and stays active by default. Preemption can be configured
Best effort delivery - integrated services model - and differentiated services model
31. What is the GLBP AVG?
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
Configuration and TCN
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
32. What are the steps of RSTP convergence?
PAgP (Cisco proprietary) and LACP (standards-based)
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
33. What happens when the topology changes?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. 802.11b
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
By name - config revision - and instance to vlan mapping table
Option 43
35. What can the Etherchannel hash use?
Port with best root path cost on segment
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
If the switch or the powered device doesn't suport power class discovery
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
36. Can MSTP interoperate with 802.1q and/or PVST+?
Only for the offending VLAN on the port
Normal and aggressive
The ASIC
Yes to both
37. In a converged fabric - which switch(es) send config BDPUs?
Root
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
Lowest cumulative cost to root
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
38. Does GLBP allow preemption?
Port
Yes
Admin down
Lowest cumulative cost to root
39. What is the GLBP group and priority range
Group (0-1023) priority (1-255 higher better def 100)
Matching SSID - compatible data rate - authentication credentials
It's a router that maintains routes (static or dynamic) - and populates the FIB
Only the standby monitors the hello messages from the active router
40. What are the two private vlan association modes?
Promiscuous and host
All fiber-optic links between switches (must be enabled on both ends)
Yes to both
Can send and receive BDPUs
41. What is a root link query (RLQ)?
Plain text or md5
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
Reboots and searches for a new WLC
Using a single WAP to centralize access and control over a group of wireless devices.
42. What does the ip option do when checking ARP replies
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. RSTP forwarding state
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
Frames are forwarded
Local only
44. What feedback mechanism does wireless use?
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
Port
The same as a standby group in HSRP
When a wireless station transmits a frame - the receiving one must send an ack
45. What are the port channel load balancing methods?
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
Configure non-silent submode
Globally or per-port
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
46. What is the format of the VRRP virtual MAC?
Port with alternative path to root less desirable than root
0000.5e00.01xx
Trusted or untrusted
Port with best root path cost on segment
47. What is 802.1x auto?
By using a trunk link
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Trunk
Interim solution - uses same hardware as WEP - but uses TKIP encryption
48. How does HSRP gateway addressing work
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
Collision domain
Checks the source MAC in the header against the sender MAC in the ARP reply
49. can root guard and loop guard be used together
1 to 64
Incoming frames dropped - but MACs learned
No
Reboots and searches for a new WLC
50. What must be in common for a BSS to form?
802.1x with EAP over LAN (EAPOL)
Once the CCM gives them the parameters - they use RTP
Use the spanning-tree root macro
Matching SSID - compatible data rate - authentication credentials
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests