SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the acceptible range of VLANS?
Automatically negotiates a common trunk mode between switches
Distribution layer
1-1005 (1 and 1002-1005 are reserved)
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
2. Does a WLC and a LAP need to be on the same subnet?
L2
Manages addition - deletion and renaming VLANs across the network
No
Yes
3. What are LOU register pairs?
All user ports that have portfast enabled
The L3 forwarding engine can't forward the packet in hardware because there is no L2 next-hop address - so the packet is sent to the L3 engine to generate the ARP response
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
Used when ACLs specify port ranges...used by TCAM
4. How does a Cisco IP phone connect upstream?
Via an 802.1Q trunk or a single VLAN access port
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
Use the spanning-tree root macro
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
5. What is the STP hello timer?
A MAC is seen on a different port
Trusted or untrusted
Time between BDPUs sent by root bridge. Default of 2 seconds
Value - mask - and result (VMR) combinations
6. What is the STP learning state?
Another router must have a higher HSRP priority and have preemt set up
After forwarding delay - port can learn new MAC addresses
When a port moves into forwarding or from fowarding or learning to blocking.
1 to 64
7. What is route caching?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
8. What format does the GLBP MAC use?
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
Data and voice over native vlan - no QOS but still uses 802.1p trunk
Critical...used most often for IPT
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
9. How is Root Guard used?
FE - GE - and aggregated FE/GE Etherchannels
On ports where you never expect to find a root bridge for a VLAN
Port with best root path cost on segment
Yes to both
10. Where should STP timers be configured and why?
Lowest cumulative cost to root
If any BDUP is received on a port - it puts the port into the errdisable state
Completed dhcp bindings - mac addresses - IP addresses - etc.
On root - because the root bridge propagates timers with config BDPU
11. What is the bridge priority range?
The port is forced to always authorize any connected client with no authentication necessary (default)
The TOS field in the header is used. 2 methods 3 bits or 6 bits
0-65535 (def 32768) lower=better
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
12. What is the adjacency table?
Determines when the AVG will stop using the old VMAC in ARP replies
Bridge priority and MAC
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
The link status stays up - but something between them has failed or is filtering traffic
13. if the switchport is part of an etherchannel - Where is the network assigned
To the virtual port-channel interface
A key string of up to 8 characters is sent. Default is cisco.
Port
On by default
14. What does DTP do?
Value - mask - and result (VMR) combinations
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
Switch(config-if)# glbp xx where xx = group number
Automatically negotiates a common trunk mode between switches
15. What is the switch block?
Two distribution switches that aggregate one or more access switches
MAC of the end device
Only the standby monitors the hello messages from the active router
A VLAN that spans the entire fabric
16. Which fiber is the receive?
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
On the left as you face the connector
Normal and aggressive
Matching SSID - compatible data rate - authentication credentials
17. What does BDPU filtering do?
RPR - RPR+ - and SSO
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Route once - switch many
Effectively stops STP on filtered ports
18. If you want IP source guard to detect spoofed MAC addresses - what must you do?
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
Receives the first packet of a traffic flow and routes it
Yes
Turn on port security
19. Where does layer switching occur?
An ac adaptor that plugs into a wall outlet.
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
16 bits (8b port priority - 8b port number)
Between any type of interface as long as the interface can have an L3 address assigned
20. How are frames forwarded across a specific link?
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
Hashing algorithm
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
When a client roams between Aps in different subnets
21. What is a topology change?
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
When a port moves into forwarding or from fowarding or learning to blocking.
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
22. What is the format of the VRRP virtual MAC?
1500B
The number of times the CEF table has bee flushed and regenerated as a whole
0000.5e00.01xx
Only the standby monitors the hello messages from the active router
23. How does adding option-82 to DHCP snooping affect things?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
24. How much BW does a voip connection use?
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
12 kbps with headers and compression
1 IP subnet
PAgP (Cisco proprietary) and LACP (standards-based)
25. What are the 2 UDLD modes?
When each AP stands alone within the larger network.
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
Normal and aggressive
A group of wireless devices that share a common SSID
26. How are GLBP timers used?
1-65535 (def 32768) lower priority - higher probability
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
2-8 FE - GE - or 10GE are bundled.
Best effort delivery - integrated services model - and differentiated services model
27. How do you show HSRP status
Via an 802.1Q trunk or a single VLAN access port
All ports where root isn't expected
Show standby
Distribution layer
28. RSTP designated port
Via an 802.1Q trunk or a single VLAN access port
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Port with best root path cost on segment
29. By default - what layer do catalyst switchports operate on?
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
L2
Only when a nonedge port transitions to forwarding
Yes
30. What is the RSTP default hello interval?
Distributed coordinion function - the use of timers to prevent wireless collisions
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
2 seconds
An AP's coverage area
31. Of what significance are private VLANs
Local only
Configure non-silent submode
All user ports that have portfast enabled
By using a trunk link
32. What are the characteristics of the core layer
Both layer 2 switching and IVR
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
Access
33. WPA encryption
Interim solution - uses same hardware as WEP - but uses TKIP encryption
Src-dst-ip
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
Edge - root - and point to point
34. What is jitter?
Data and voice over native vlan no QOS and no 802.1p trunk
RADIUS
Half because transmitting and receiving stations use the same frequency
Variation in delay
35. Can loop guard and udld be used together?
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
Receives the first packet of a traffic flow and routes it
Yes
Port with best root path cost on segment
36. How does backbonefast determine whether alternative paths exist?
Hashing algorithm
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
BGP - EIGRP - OSPF - and IS-IS.
37. static vlans offer ____ based membership
An L2 switch can only forward frames best effort unless going across a trunk
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Port
To a VLAN and not to a VLAN interface (SVI)
38. What are the 6 HSRP states?
Disabled - init - listen - speak - standby - active
The master router can share the VIP
Promiscuous and host
300 sec
39. How does NSF work?
Admin down
Switch(config-if)# standby xx where x= group number
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
40. What does Root Guard do?
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
Weak key rotation
Controls where candidate root bridges can be connected and found on a network
Used when ACLs specify port ranges...used by TCAM
41. What is the STP forwarding state?
Usually QoS from VOIP but not PC dataa
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
Controls where candidate root bridges can be connected and found on a network
Manually
42. How is 802.1x configured for port security?
Group (0-255) - priority (1-254 254 is highest - 100 default)
RADIUS
Sends a voltage across the receive pairs to detect a 25k ohm resistance
1 second. Backup routers can learn the interval from the master
43. What types of links can be trunked?
All ports where root isn't expected
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
FE - GE - and aggregated FE/GE Etherchannels
SC fiber or RJ-45
44. How much overlap should a wireless repeater have?
A host port goes up or down
Roughly 50%
Critical...used most often for IPT
10-15%
45. RSTP point to point port
On all switches in network to enable RLQ request and reply
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
300 sec by default
Port that connects to another switch and becomes a designated port
46. Each switch port is a _____ ______
To a VLAN and not to a VLAN interface (SVI)
The port is forced to always authorize any connected client with no authentication necessary (default)
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
Collision domain
47. How do you configure DAI for statically configured IP addresses?
Reboots and searches for a new WLC
By an ARP access list that defines the permitted bindings
802.1D
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
48. What is the FM?
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
Receives the first packet of a traffic flow and routes it
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
By short-circuiting the max age timer
49. What is the default mode of load balancing?
Src-dst-ip
Each network device handles packets individually with no advance reservations
Almost eliminates listening and learning states for single hosts on an access link
All user ports that have portfast enabled
50. What is the size of a TCAM value?
Isl - dot1q - negotiate (default)
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
The number of times the entry has been updated since the table was generated
The DCF interframe space- the random backoff time before a wireless set can transmit