SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is UDLD aggressive mode?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. How can you load-balance with HSRP?
Frames that barely exceed 1518B or 1622B due to headers
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
3. What does the version number indicate when looking at CEF entries?
Root - designated - alternate - and backup
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
The MST instance (MSTI) runs alongside the IST and represents an STP instance
The number of times the entry has been updated since the table was generated
4. What is the DIFS?
Hashing algorithm
The DCF interframe space- the random backoff time before a wireless set can transmit
Used when ACLs specify port ranges...used by TCAM
Bridge priority and MAC
5. RSTP backup port
Checks the source MAC in the header against the sender MAC in the ARP reply
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
By an ARP access list that defines the permitted bindings
6. What is layer 2 roaming?
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
Src-dst-ip
Roughly 50%
7. WPA2 encryption
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
On root - because the root bridge propagates timers with config BDPU
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
Needs hardware upgrade over WEP - uses AES encryption
8. How does an L2 switch do QOS?
Root
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
An L2 switch can only forward frames best effort unless going across a trunk
5 (0-4 with 4 being the highest)
9. What is unique about HSRP group numbers?
The master router can share the VIP
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
The number of times the CEF table has bee flushed and regenerated as a whole
10. unknown unicast flooding
Best effort delivery - integrated services model - and differentiated services model
Critical...used most often for IPT
A point to point port type but the neighboring device runs traditional 802.1D STP
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
11. What types of authentication does HSRP allow?
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
Plain text or md5
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
Root - designated - alternate - and backup
12. What is the VRRP master router?
Will trunk if asked
Lowest cumulative cost to root
The active router. All other routers are in backup state
Flash (class 3)
13. What is RTP?
Only when a nonedge port transitions to forwarding
Real-time Transport Protocol
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
All ports where root isn't expected
14. Automatically configure STP timers
Via an 802.1Q trunk or a single VLAN access port
By configuring every switch port to have an expected and controlled behavior
Use the spanning-tree root macro
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
15. What is the PVLAN promiscuous mode?
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
On all switches in network to enable RLQ request and reply
Switch(config-if)# glbp xx where xx = group number
Port with best root path cost
16. What is the default MTU?
1500B
Manually
By encapsulating each frame in a header and trailer
L2
17. What are the three basic types of QOS?
Best effort delivery - integrated services model - and differentiated services model
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
802.1x with EAP over LAN (EAPOL)
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
18. What is DSCP codepoint AF11(10)?
All user ports that have portfast enabled
The same as a standby group in HSRP
Priority (class 1)
One that can be detected on a switch interface (ie. Up/down)
19. What is an untrusted port under dhcp snooping?
Silent
1 second. Backup routers can learn the interval from the master
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
20. What does MSTP do?
Used when there are 1 or more VLANs mapped to a single STP instance
Round robin - weighted - or host-dependent
The same as a standby group in HSRP
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
21. WPA encryption
Interim solution - uses same hardware as WEP - but uses TKIP encryption
134 bits
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
Connects with SONET or SDH
22. What is the GLBP group and priority range
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
Group (0-1023) priority (1-255 higher better def 100)
Flash (class 3)
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
23. How do you show HSRP status
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
Show standby
By using a hash of a key string
Weak key rotation
24. How is UDLD configured?
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
Differentiated services code point
Switches make an effort to move packets as quickly as possible
Globally
25. What is a community secondary VLAN?
Flash override (class 4)
By using a hash of a key string
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
Will trunk if asked
26. What are the 3 ways GLBP load-balances?
Differentiated services
LACP port priority
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
Round robin - weighted - or host-dependent
27. How does NSF work?
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
The MST instance (MSTI) runs alongside the IST and represents an STP instance
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
28. RSTP alternate port
802.11
With portfast
Port with alternative path to root less desirable than root
Control functions
29. How do VRRP routers handle preemption?
By using a hash of a key string
Trunk
On by default
1-1005 (1 and 1002-1005 are reserved)
30. What types of ports autonegotiate?
FE and GE
Best effort delivery - integrated services model - and differentiated services model
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
31. What contains the next-hop entries?
That they aren't using the same frequencies.
FIB
Switch(config-if)# glbp xx where xx = group number
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
32. What are the 2 UDLD modes?
Differentiated services code point
When each AP stands alone within the larger network.
Forces the router to wait for a period of time before attempting overthrow
Normal and aggressive
33. What does the minimum keyword do in HSRP?
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
On the left as you face the connector
1-1005 (1 and 1002-1005 are reserved)
Forces the router to wait for a period of time before attempting overthrow
34. What is the STP listening state?
Can send and receive BDPUs
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Only a single host connects . If one BDPU is received - it is no longer an edge port
35. What is a null adjacency?
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
Using digital certificates
Used to switch packets destined for the null interface
The distribution layer should have only L3 links
36. How many 802.3af power classes are there?
5 (0-4 with 4 being the highest)
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
1 second. Backup routers can learn the interval from the master
Configuration and TCN
37. For QoS - switch uplinks should always be considered as ____ _____?
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
Round robin - weighted - or host-dependent
Trusted ports
0-255 (lower is better)
38. What is the default 10mbps Enet duplex?
Half-duplex
802.11
On all switches in network to enable RLQ request and reply
All ARP packets that arrive on untrusted ports are inspected.
39. What is DSCP codepoint EF(46)?
Critical...used most often for IPT
Completed dhcp bindings - mac addresses - IP addresses - etc.
Port is forced to never authorize any connected client
0000.0c07.acxx where xx is the group number as a 2-digit hex value
40. What are the RSTP port roles?
Root - designated - alternate - and backup
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Discarding - learning - forwarding
41. How does Root Guard work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
42. What 2 tunnelling mechanisms do the LAP and WLC use to communicate?
Switches make an effort to move packets as quickly as possible
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
Globally
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
43. How can you tell if a switch block is too large?
Globally
2 strand MMF with MT-RJ or SC connectors
1-1005 (1 and 1002-1005 are reserved)
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
44. What is differentiated services model QOS?
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
Disabled - init - listen - speak - standby - active
Per VLAN
Each network device handles packets individually with no advance reservations
45. What must the other end be set to if PAgP desirable or LACP active mode is selected?
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
Either desirable or auto mode
Port that connects to another switch and becomes a designated port
Dynamic WEP keys that change periodically
46. EAP encryption
Globally
Half-duplex
Weak key rotation
Dynamic WEP keys that change periodically
47. What is the size of a TCAM value?
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
12 kbps with headers and compression
Disabled - blocking - listening - learning - forwarding
48. How does every GLBP command begin
When a wireless station transmits a frame - the receiving one must send an ack
Switch(config-if)# glbp xx where xx = group number
4
On all switches in network to enable RLQ request and reply
49. What is the GLBP redirect timer?
Using a single WAP to centralize access and control over a group of wireless devices.
Using digital certificates
Determines when the AVG will stop using the old VMAC in ARP replies
No
50. How does a Cisco IP phone connect upstream?
Via an 802.1Q trunk or a single VLAN access port
Only when a nonedge port transitions to forwarding
Configure non-silent submode
3 seconds. Holdtime =3 hellos + 1