SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How do you find duplex mismatches?
Admin down
Use sh interface on the interface and look for error counts > 10
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
Port with alternative path to root less desirable than root
2. What does uplinkfast do?
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
FIB
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Change in trunk encap
3. What ILP mode are all ports in by default?
If any BDUP is received on a port - it puts the port into the errdisable state
Can send and receive BDPUs
Auto mode
Dynamic WEP keys that change periodically
4. What are the gotchas for uplinkfast?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. How should the switch port to which a WLC be configured?
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Trunk
6. What is the IEEE standard for STP?
16 - of which up to 8 are active. The others are in standby
802.1D
The wireless clients communicate directly with no other means of connectivity such as a WAP
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
7. How should backbonefast be configured?
On all switches in network to enable RLQ request and reply
The distribution layer should have only L3 links
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
Yes
8. What is UDLD aggressive mode?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
9. How are RSTP point to point ports determined?
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
The standby becomes active and stays active by default. Preemption can be configured
134 bits
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
10. How does uplinkfast handle changes in topology?
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
All nondesignated ports - but ok for all ports
Group (0-255) - priority (1-254 254 is highest - 100 default)
L2
11. How do you prevent VLAN hopping?
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
Every switch and router in a network must be configured with appropriate QoS features and policies
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
12. How does ILP do power discovery?
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
Multicast to 01-80-c2-00-00-00
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
Port with best root path cost
13. What are the two etherchannel negotiation protocols?
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
PAgP (Cisco proprietary) and LACP (standards-based)
14. What is integrated services model QOS?
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
The ASIC
To a VLAN and not to a VLAN interface (SVI)
A VLAN that spans the entire fabric
15. Define VRRP
Configure the timer on the AVG and let it propagate
Virtual Router Redundancy Protocol - pretty much the same as HSRP
Because each frame is checked
Access
16. what I s distributed CEF (dCEF)?
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
That they aren't using the same frequencies.
Variation in delay
CEF is distributed completely among multiple L3 forwarding engines.
17. Each switch port is a _____ ______
Collision domain
Distribution
The port asks the other end to trunk
Disabled - blocking - listening - learning - forwarding
18. If there are 2 ports with same root cost - how is the tie broken for designated port?
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
Manages addition - deletion and renaming VLANs across the network
FE - GE - and aggregated FE/GE Etherchannels
19. How does L3 QOS classification happen?
The TOS field in the header is used. 2 methods 3 bits or 6 bits
2-8 FE - GE - or 10GE are bundled.
A client can roam to any WLC as long as it stays in a mobility group
The active router. All other routers are in backup state
20. What is errdisable pagp-flap?
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
On the left as you face the connector
When a port moves into forwarding or from fowarding or learning to blocking.
Etherchannel ports have inconsistent config
21. How does an LAP bind with a WLC?
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
By brining up a tunnel between them to carry 802.11 related messages and client data.
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
22. How does DAI work?
The ASIC
All ARP packets that arrive on untrusted ports are inspected.
Collision domain
Used when ACLs specify port ranges...used by TCAM
23. What is the default MTU?
1500B
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
80% of the user traffic should stay in the VLAN
24. When looking at the sh spanning tree output - What does P2P peer(STP) denote?
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
A point to point port type but the neighboring device runs traditional 802.1D STP
All ARP packets that arrive on untrusted ports are inspected.
Yes
25. How do you configure DAI for statically configured IP addresses?
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Manages addition - deletion and renaming VLANs across the network
Prevents the dhcp binding DB from being checked.
By an ARP access list that defines the permitted bindings
26. What routing protocols support NSF?
L2
Trunk
BGP - EIGRP - OSPF - and IS-IS.
MAC of the end device
27. What types of ports autonegotiate?
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
FE and GE
Cisco ILP and 802.3af
28. What functions does a WLC perform?
Local only
Flash (class 3)
Control functions
Collision domain
29. What is an end to end vlan?
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
By sending a gratuitous ARP
A VLAN that spans the entire fabric
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
30. What is a wireless mobility group?
By encapsulating each frame in a header and trailer
A host port goes up or down
12 kbps with headers and compression
A client can roam to any WLC as long as it stays in a mobility group
31. Where is bdpu guard enabled?
All user ports that have portfast enabled
No
The port asks the other end to trunk
Matching SSID - compatible data rate - authentication credentials
32. What is a drop adjacency?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
33. Where shoul dmultilayer switches be implemented?
TCAM
19
Distribution layer
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
34. Does a WLC and a LAP need to be on the same subnet?
On by default
No
2 - one for control messages and one for data
Incoming frames dropped - but MACs learned
35. What is the VRRP skew time?
Trusted ports
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
A single broadcast domain
0-255
36. What is backbonefast?
Control functions
After forwarding delay - port can learn new MAC addresses
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
37. How does HSRP election work?
Based on priority (0-255). Default is 100. Highest IP is tie breaker
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
Can hear only BDPUs
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
38. What is a QoS trust boundary?
RPR - RPR+ - and SSO
Configure non-silent submode
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
Packets must be sent to the L3 engine for further processing
39. What are the 6 steps to configure 802.1x for port security?
2
Cisco recommends only on the root bridge
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
0000.5e00.01xx
40. What is the port number range?
0-255
Interim solution - uses same hardware as WEP - but uses TKIP encryption
Change in trunk encap
Control functions
41. How is the IPT 802.1 trunk negotiated?
Cisco ILP and 802.3af
Automatically using DTP and CDP
A host port goes up or down
On root - because the root bridge propagates timers with config BDPU
42. What are LOU register pairs?
Used when ACLs specify port ranges...used by TCAM
0-65535 (def 32768) lower=better
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
By an ARP access list that defines the permitted bindings
43. What does the rewrite engine do?
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
All L2 connectivity should be contained within the access layer.
MAC of the end device
44. How does IPT behave when the voice VLAN is in vlan-id mode?
By default weight is 100. Can be made dynamic per interface
Controls where candidate root bridges can be connected and found on a network
Via an 802.1Q trunk or a single VLAN access port
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
45. What data does DHCP snooping track?
Port is forced to never authorize any connected client
Completed dhcp bindings - mac addresses - IP addresses - etc.
Determines when the AVG will stop using the old VMAC in ARP replies
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
46. If a port is configured for errdisable auto recovery - how long does it stay down?
All nondesignated ports - but ok for all ports
300 sec by default
Yes
7 switches from root bridge
47. What is common spanning tree (CST)?
SC fiber or RJ-45
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
48. How is a WLC handoff handled when the WLCs are in different subnets?
By using an Ether-IP tunnel
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
2 seconds (def)
49. What is the cost of a 10Gbps link?
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
Sends a voltage across the receive pairs to detect a 25k ohm resistance
2
50. How does ISL handle COS?
Discarding - learning - forwarding
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Using a single WAP to centralize access and control over a group of wireless devices.