SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How are BDPUs spread?
Multicast to 01-80-c2-00-00-00
Access or trunk
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
Etherchannel ports have inconsistent config
2. How does every GLBP command begin
The total delay from start to finish
Switch(config-if)# glbp xx where xx = group number
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
3. What categories can ports be in with dhcp snooping enabled?
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
Half because transmitting and receiving stations use the same frequency
Used when ACLs specify port ranges...used by TCAM
Trusted or untrusted
4. What is a bridge ID made up of?
Dynamic WEP keys that change periodically
VTP server for domain null with no password or secure mode
Bridge priority and MAC
By configuring every switch port to have an expected and controlled behavior
5. How should backbonefast be configured?
The port is forced to always authorize any connected client with no authentication necessary (default)
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
Completed dhcp bindings - mac addresses - IP addresses - etc.
On all switches in network to enable RLQ request and reply
6. What is RPR+?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. What does a LAP do if it loses communication with it's WLC?
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
All ports where root isn't expected
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Reboots and searches for a new WLC
8. In a converged fabric - which switch(es) send config BDPUs?
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
Root
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
9. What is an untrusted port under dhcp snooping?
RPR - RPR+ - and SSO
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
Reboots and searches for a new WLC
Edge - root - and point to point
10. What is the STP forward delay timer?
Frames that barely exceed 1518B or 1622B due to headers
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
Embeds the tag within the frame
The time that a port spends in both listening and learning states . Default 15 seconds
11. Where does VRRP send advertisements?
Multicasts to 224.0.0.18 (VRRP)
Port with alternative path to root less desirable than root
L2
When the size of a cell is intentionally reduced
12. What do you need to determine to use MSTP?
Routers are assigned to common GLBP group. All routers can be active and can load balance
802.11
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
Frames are forwarded
13. How does an L2 switch do QOS?
When the size of a cell is intentionally reduced
By using a trunk link
The active router. All other routers are in backup state
An L2 switch can only forward frames best effort unless going across a trunk
14. How can you load-balance with HSRP?
Switchpotrt nonegotiate
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
Full duplex
15. What are the RSTP port states?
Discarding - learning - forwarding
Full duplex
Critical...used most often for IPT
Incoming frames dropped - but MACs learned
16. How many 802.3af power classes are there?
On the left as you face the connector
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
5 (0-4 with 4 being the highest)
Immediate (class 2)
17. How does every VRRP command begin?
Switch(config-if)# vrrp xx where xx= group number
Incoming frames dropped - but MACs learned
Root - designated - alternate - and backup
Roughly 2000
18. How is RSTP synchronization accomplished?
Regions and instances
Those that connect to other switches
5 (0-4 with 4 being the highest)
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
19. static vlans offer ____ based membership
Root - designated - blocking - alternate - forwarding (host)
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
By configuring every switch port to have an expected and controlled behavior
Port
20. Define VRRP
They disguise the origin of an attack
On all switches in network to enable RLQ request and reply
Virtual Router Redundancy Protocol - pretty much the same as HSRP
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
21. What is the 80/20 rule?
Isl - dot1q - negotiate (default)
L2
Disabled - init - listen - speak - standby - active
80% of the user traffic should stay in the VLAN
22. When a host is connected to a switchport - why aren't frame errors propagated?
Used when ACLs specify port ranges...used by TCAM
Because each frame is checked
Edge - root - and point to point
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
23. How far chould a VLAN extend?
Distribution layer
PAgP (Cisco proprietary) and LACP (standards-based)
With portfast
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
24. What is DSCP?
Distribution layer
Differentiated services code point
Root - designated - blocking - alternate - forwarding (host)
It's a router that maintains routes (static or dynamic) - and populates the FIB
25. What is the cost of a 1Gbps link?
4
Option 43
2
The station can transmit immediately and wait for an ack
26. What data does DHCP snooping track?
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
Completed dhcp bindings - mac addresses - IP addresses - etc.
134 bits
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
27. How does HSRP port tracking work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
28. WEP encryption
Weak key rotation
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
Hashing algorithm
0-255 (lower is better)
29. How does packet forwarding work
If any BDUP is received on a port - it puts the port into the errdisable state
Flash override (class 4)
Arp for local subnet - if on different subnet - will arp for dgw
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
30. What is the DIFS?
The DCF interframe space- the random backoff time before a wireless set can transmit
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
Determines when the AVG will stop using the old VMAC in ARP replies
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
31. Can two switches in the auto(PAgP) or passive (LACP) mode create a channel? Why?
The total delay from start to finish
Port that connects to another switch and becomes a designated port
No because they only participate if asked
Isl - dot1q - negotiate (default)
32. RSTP point to point port
Group (0-255) - priority (1-254 254 is highest - 100 default)
That they aren't using the same frequencies.
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
Port that connects to another switch and becomes a designated port
33. RSTP backup port
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
26-byte header - 4-byte trailer with CRC
16 - of which up to 8 are active. The others are in standby
34. FE connectors use...
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
2 strand MMF with MT-RJ or SC connectors
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
The link status stays up - but something between them has failed or is filtering traffic
35. What are the 5 STP states?
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
The configureable UDLD interval must be less than max age plus two intervals of forward delay
Disabled - blocking - listening - learning - forwarding
With the skinny protocol
36. How does NSF work?
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
900 MHz - 2.4Ghz - and 5-6GHz
134 bits
37. What does port-security protect do?
Globally
The campus network's backbone
Port stays up - packets from violating MACs dropped - no logging
No
38. What routing protocols support NSF?
16 - of which up to 8 are active. The others are in standby
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
BGP - EIGRP - OSPF - and IS-IS.
Best effort delivery - integrated services model - and differentiated services model
39. How should UDLD be configured?
Globally or per-port
Trusted or untrusted
The configureable UDLD interval must be less than max age plus two intervals of forward delay
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
40. What is a CEF glean?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
41. Where is UDLD enabled?
An L2 switch can only forward frames best effort unless going across a trunk
All fiber-optic links between switches (must be enabled on both ends)
Will trunk if asked
CEF is distributed completely among multiple L3 forwarding engines.
42. What is the default FE duplex?
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
300 sec by default
Full duplex
By an ARP access list that defines the permitted bindings
43. What are the characteristics of the access layer?
A packet can't be switched in hardware with the FIB and must go to the L3 engine
Src-dst-ip
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
44. What are the 4 steps to extend QoS trust?
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
Normal and aggressive
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
802.11
45. What is the GLBP AVG?
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
Every switch and router in a network must be configured with appropriate QoS features and policies
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
46. When DHCP snooping is turned on - by default - it considers all ports ______
Switch(config-if)# vrrp xx where xx= group number
Port that connects to another switch and becomes a designated port
The same as a standby group in HSRP
Untrusted
47. How do you implement MST?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
48. What is a punt adjacency?
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
Packets must be sent to the L3 engine for further processing
By using a trunk link
All ports where root isn't expected
49. How does ISL do trunking?
0-65535 (def 32768) lower=better
By using a trunk link
Round robin - weighted - or host-dependent
By encapsulating each frame in a header and trailer
50. What are the 4 steps in DHCP negotiation?
Group (0-1023) priority (1-255 higher better def 100)
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
Src-dst-ip
26-byte header - 4-byte trailer with CRC