SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does the skinny protocol do?
Distribution
By using an Ether-IP tunnel
TCAM
Transmits keystrokes from phone and commands from CCM
2. WPA encryption
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
Interim solution - uses same hardware as WEP - but uses TKIP encryption
CEF is distributed completely among multiple L3 forwarding engines.
3. When DHCP snooping is turned on - by default - it considers all ports ______
Auto mode
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
The time that a port spends in both listening and learning states . Default 15 seconds
Untrusted
4. How do you configure LACP standby links?
Can hear only BDPUs
Configuration and TCN
Manually
LACP port priority
5. What ILP mode are all ports in by default?
On root - because the root bridge propagates timers with config BDPU
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
Group (0-1023) priority (1-255 higher better def 100)
Auto mode
6. How is Root Guard used?
On ports where you never expect to find a root bridge for a VLAN
Between any type of interface as long as the interface can have an L3 address assigned
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
The number of times the entry has been updated since the table was generated
7. What is a vlan?
Admin down
CEF is distributed completely among multiple L3 forwarding engines.
A single broadcast domain
Trunk - dynamic auto - dynamic desireable (default)
8. What is step 1 of enabling IP source guard?
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
Configure and enable DHCP snooping
Untrusted
802.1w
9. if the switchport is part of an etherchannel - Where is the network assigned
BGP - EIGRP - OSPF - and IS-IS.
To the virtual port-channel interface
Admin down
Change in trunk encap
10. By default - what submode does PAgP operate in with the desirable and auto modes?
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
Per VLAN
Silent
The ASIC
11. What are the PAgP negotiation modes
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
FIB
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Switchpotrt nonegotiate
12. What does UDLD do?
0000.5e00.01xx
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Distribution
On ports where you never expect to find a root bridge for a VLAN
13. What is common spanning tree (CST)?
SC fiber or RJ-45
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
Use sh interface on the interface and look for error counts > 10
0-255
14. What is DSCP codepoint AF21(18)?
Distribution layer
Immediate (class 2)
SC fiber or RJ-45
When a wireless station transmits a frame - the receiving one must send an ack
15. How do you configure IP source guard for hosts that don't use DHCP?
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
By creating a static IP binding
16. What is the size of a TCAM value?
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Interim solution - uses same hardware as WEP - but uses TKIP encryption
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
The wireless clients communicate directly with no other means of connectivity such as a WAP
17. How doed backbonefast work?
Configure non-silent submode
By short-circuiting the max age timer
Incoming frames dropped - but MACs learned
A group of wireless devices that share a common SSID
18. What happens when an ARP reply is received on an untrusted port?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. On what scope is DAI enabled?
Root
Once the CCM gives them the parameters - they use RTP
Per VLAN
Based on priority (0-255). Default is 100. Highest IP is tie breaker
20. What are the 5 STP states?
0-65535 (def 32768) lower=better
Disabled - blocking - listening - learning - forwarding
The configureable UDLD interval must be less than max age plus two intervals of forward delay
Determines when the AVG will stop using the old VMAC in ARP replies
21. Can two switches in the auto(PAgP) or passive (LACP) mode create a channel? Why?
Promiscuous and host
Switch(config-if)# vrrp xx where xx= group number
No because they only participate if asked
Priority (class 1)
22. What categories can ports be in with dhcp snooping enabled?
The port is forced to always authorize any connected client with no authentication necessary (default)
Can hear only BDPUs
Trusted or untrusted
By encapsulating each frame in a header and trailer
23. Where is UDLD enabled?
Only for the offending VLAN on the port
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
10-15%
All fiber-optic links between switches (must be enabled on both ends)
24. How does HSRP plain text authentication work?
Packets must be sent to the L3 engine for further processing
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
A key string of up to 8 characters is sent. Default is cisco.
Half because transmitting and receiving stations use the same frequency
25. What is UDLD aggressive mode?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
26. How does DSCP handle IP precedence?
5 classes with 3 drop precedences
Switchpotrt nonegotiate
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
27. What is best effort delivery QOS?
2 strand MMF with MT-RJ or SC connectors
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
Switches make an effort to move packets as quickly as possible
CEF is distributed completely among multiple L3 forwarding engines.
28. What are TCAM entries composed of?
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Value - mask - and result (VMR) combinations
224.0.0.2 (all routers)
Local only
29. Define GLBP
The station can transmit immediately and wait for an ack
By name - config revision - and instance to vlan mapping table
Gateway load balancing protocol - cisco proprietary
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
30. What is 802.1x force-authorized?
12 kbps with headers and compression
The DCF interframe space- the random backoff time before a wireless set can transmit
The port is forced to always authorize any connected client with no authentication necessary (default)
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
31. What are the 6 steps to configure 802.1x for port security?
Only for trusted Cisco gear - especially phones
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
Determines when the AVG will stop using the old VMAC in ARP replies
Distribution layer
32. What is the STP forwarding state?
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
With the skinny protocol
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
2 seconds (def)
33. What are the 2 power over ethernet methods?
Cisco ILP and 802.3af
To the virtual port-channel interface
Packets are discarded due to an ACL or policy action
The port is forced to always authorize any connected client with no authentication necessary (default)
34. What are the 2 types of secondary VLAN?
Differentiated services code point
Roughly 2000
It's a router that maintains routes (static or dynamic) - and populates the FIB
Isolated and community
35. can root guard and udld be used together?
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
An L2 switch can only forward frames best effort unless going across a trunk
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
Yes
36. What does the dst-mac option do when checking ARP replies
Checks the destination MAC in the header against the target MAC in the ARP reply
No shut
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
1 per segment
37. What does port-security protect do?
Port stays up - packets from violating MACs dropped - no logging
By short-circuiting the max age timer
Differentiated services
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
38. What is differentiated services model QOS?
Each network device handles packets individually with no advance reservations
Port with best root path cost
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
Forces the router to wait for a period of time before attempting overthrow
39. Whan is a 10GE WAN PHY?
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
Connects with SONET or SDH
Manually
40. What is an MST instance?
The MST instance (MSTI) runs alongside the IST and represents an STP instance
3 seconds. Holdtime =3 hellos + 1
Silent
Via an 802.1Q trunk or a single VLAN access port
41. How is 802.1x configured for port security?
Both ends should be on because on modes doesn't send PAgP or LACP packets
RADIUS
Isolated and community
The link status stays up - but something between them has failed or is filtering traffic
42. What are the gotchas for uplinkfast?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. What does the epoch number indicate when looking at cef entries?
The port asks the other end to trunk
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
SC fiber or RJ-45
The number of times the CEF table has bee flushed and regenerated as a whole
44. what must be done on an SVI before it is activated?
0-255 (lower is better)
No shut
Silent
By an ARP access list that defines the permitted bindings
45. RSTP alternate port
By short-circuiting the max age timer
The number of times the CEF table has bee flushed and regenerated as a whole
Port with alternative path to root less desirable than root
Weak key rotation
46. How many potential links can LACP define?
The TOS field in the header is used. 2 methods 3 bits or 6 bits
16 - of which up to 8 are active. The others are in standby
The number of times the entry has been updated since the table was generated
By creating a static IP binding
47. How does IPT behave when the voice VLAN is in untagged mode?
Data and voice over native vlan - no QOS but still uses 802.1p trunk
By configuring every switch port to have an expected and controlled behavior
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
An AP's coverage area
48. what do multilayer switches do?
Round robin - weighted - or host-dependent
An AP's coverage area
Only for the offending VLAN on the port
Both layer 2 switching and IVR
49. What does BDPU filtering do?
Effectively stops STP on filtered ports
A client can roam to any WLC as long as it stays in a mobility group
Forces the router to wait for a period of time before attempting overthrow
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
50. How are VACLs configured?
As a VLAN access map
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
Will trunk if asked
Collision domain