SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the traditional MLS view of switching?
Route once - switch many
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
Src-dst-ip
Show standby
2. What is NSF?
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Switch(config-if)# glbp xx where xx = group number
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
1-1005 (1 and 1002-1005 are reserved)
3. What is dynamic auto?
Will trunk if asked
A VLAN that spans the entire fabric
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
Embeds the tag within the frame
4. what should you do if you expect a PAgP capable switch at the other end vs. a server or host?
RADIUS
Configure non-silent submode
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
5. What is the cost of a 10Gbps link?
2
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
Option 43
Src-dst-ip
6. How does PAgP form etherchannels?
Plain text or md5
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
All ARP packets that arrive on untrusted ports are inspected.
7. How does ILP do power discovery?
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
By an ARP access list that defines the permitted bindings
2-8 FE - GE - or 10GE are bundled.
5 (0-4 with 4 being the highest)
8. What is a wall wart?
Globally
2 seconds (def)
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
An ac adaptor that plugs into a wall outlet.
9. What 2 conditions does IP source guard check for?
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
10. if the switchport is part of an etherchannel - Where is the network assigned
Port with best root path cost on segment
PAgP (Cisco proprietary) and LACP (standards-based)
Completed dhcp bindings - mac addresses - IP addresses - etc.
To the virtual port-channel interface
11. When are RSTP bdpus sent?
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
No
The ASIC
Yes
12. Whan is a 10GE WAN PHY?
Connects with SONET or SDH
No
L2
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
13. How should the switch port to which a LAP be configured?
Regions and instances
Yes
Access
Full duplex
14. How many virtual MACs can GLBP have?
Dynamic arp inspection
Matching SSID - compatible data rate - authentication credentials
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
15. What is DSCP codepoint AF11(10)?
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
Priority (class 1)
1 to 64
16. What method of QOS does voice traffic use most frequently?
Differentiated services
All user ports that have portfast enabled
Every switch and router in a network must be configured with appropriate QoS features and policies
Using a single WAP to centralize access and control over a group of wireless devices.
17. What is the STP disabled state?
80% of the user traffic should stay in the VLAN
Admin down
Real-time Transport Protocol
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
18. what if a secondary VLAN?
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
It is enabled by default on all CEF capable switches
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
19. RSTP edge port
To the virtual port-channel interface
Almost eliminates listening and learning states for single hosts on an access link
Only a single host connects . If one BDPU is received - it is no longer an edge port
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
20. What duplex setting does 802.11 use and why?
Used to switch packets destined for the null interface
Trusted or untrusted
Controls where candidate root bridges can be connected and found on a network
Half because transmitting and receiving stations use the same frequency
21. How do you configure a DHCP gateway?
When a port moves into forwarding or from fowarding or learning to blocking.
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
No
300 sec by default
22. How many potential links can LACP define?
16 - of which up to 8 are active. The others are in standby
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
The master router can share the VIP
0-65535 (def 32768) lower=better
23. What are the 5 steps a LAP uses to establish communication with a WLC?
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
4
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
The master router can share the VIP
24. How do you disable DTP when you configure both ends of the ISL manually?
Enables portfast - sets the port to access and disables PAgP
Both layer 2 switching and IVR
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
Switchpotrt nonegotiate
25. What is the access layer best practice?
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
All L2 connectivity should be contained within the access layer.
Reboots and searches for a new WLC
When each AP stands alone within the larger network.
26. What is accelerated CEF (aCEF)?
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
By name - config revision - and instance to vlan mapping table
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
27. Where shoul dmultilayer switches be implemented?
Receives the first packet of a traffic flow and routes it
Distribution layer
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
Isolated and community
28. What is a wireless mobility group?
Checks the source MAC in the header against the sender MAC in the ARP reply
1/2 and 3/6
Manually
A client can roam to any WLC as long as it stays in a mobility group
29. RSTP designated port
134 bits
Port with best root path cost on segment
The link status stays up - but something between them has failed or is filtering traffic
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
30. How often are VRRP advertisements sent?
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
1 second. Backup routers can learn the interval from the master
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
31. What is the cost of a 1Gbps link?
4
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Access
802.11
32. How should the switch port to which a WLC be configured?
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
Trunk
Access or trunk
33. What are the steps to configure a PAgP port channel?
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
19
Switch(config-if)# vrrp xx where xx= group number
Forces the router to wait for a period of time before attempting overthrow
34. If you want IP source guard to detect spoofed MAC addresses - what must you do?
Turn on port security
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
By brining up a tunnel between them to carry 802.11 related messages and client data.
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
35. What is integrated services model QOS?
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
A client can roam to any WLC as long as it stays in a mobility group
36. What are dynamic VLANs based on?
MAC of the end device
Switching Database Manager - configures and prunes TCAM partitions
By configuring every switch port to have an expected and controlled behavior
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
37. What is Per VLAN STP (PVST)?
Trunk - dynamic auto - dynamic desireable (default)
Trunk
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
Critical...used most often for IPT
38. What do you need to determine to use MSTP?
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
Promiscuous and host
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
39. What is the GLBP AVG?
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
Between interfaces that are assigned to L2 VLANs or L2 trunks
Used to switch packets destined for the null interface
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
40. Where does VRRP send advertisements?
To a VLAN and not to a VLAN interface (SVI)
Multicasts to 224.0.0.18 (VRRP)
Yes
No
41. What is the standard for WLANs?
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
A point to point port type
Can send and receive BDPUs
802.11
42. What are the characteristics of the core layer
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
26-byte header - 4-byte trailer with CRC
Checks the source MAC in the header against the sender MAC in the ARP reply
43. What happens when an ARP reply is received on an untrusted port?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
44. What does IP source guard do?
A VLAN that spans the entire fabric
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
2 seconds (def)
45. What does the version number indicate when looking at CEF entries?
The number of times the entry has been updated since the table was generated
FE - GE - and aggregated FE/GE Etherchannels
All ports where root isn't expected
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
46. How do you show HSRP status
Show standby
On the left as you face the connector
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
47. How many links can be used in an EtherChannel?
Effectively stops STP on filtered ports
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
2-8 FE - GE - or 10GE are bundled.
Promiscuous and host
48. How does IPT behave when the voice VLAN is in dot1p mode?
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
2
Another router must have a higher HSRP priority and have preemt set up
To the virtual port-channel interface
49. By default - what layer do catalyst switchports operate on?
L2
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
Trunk
CEF is distributed completely among multiple L3 forwarding engines.
50. What must be supported for port-based security to occur?
All fiber-optic links between switches (must be enabled on both ends)
Access
802.1x with EAP over LAN (EAPOL)
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information