SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is RPVST+?
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
Root - designated - blocking - alternate - forwarding (host)
2. What is the default 10mbps Enet duplex?
Half-duplex
Trusted ports
Silent
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
3. What is 802.1x force-unauthorized?
Will trunk if asked
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
Port is forced to never authorize any connected client
Incoming frames are dropped (combination of disabled - blocking - and listening)
4. RSTP forwarding state
Frames are forwarded
PAgP (Cisco proprietary) and LACP (standards-based)
No
One that can be detected on a switch interface (ie. Up/down)
5. How does IPT behave when the voice VLAN is in dot1p mode?
Switches make an effort to move packets as quickly as possible
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
Show standby
Promiscuous and host
6. What is the STP blocking state?
1-65535 (def 32768) lower priority - higher probability
3 seconds. Holdtime =3 hellos + 1
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Can hear only BDPUs
7. what do multilayer switches do?
The standby becomes active and stays active by default. Preemption can be configured
Value - mask - and result (VMR) combinations
Both layer 2 switching and IVR
Controls where candidate root bridges can be connected and found on a network
8. How does RSTP identify a topology change?
When a port moves into forwarding or from fowarding or learning to blocking.
Dynamic arp inspection
Configure the timer on the AVG and let it propagate
Only when a nonedge port transitions to forwarding
9. What is the adjacency table?
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
A VLAN that spans the entire fabric
10. What is DCF?
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
Distributed coordinion function - the use of timers to prevent wireless collisions
Those that connect to other switches
802.1w
11. What is the STP hello timer?
Auto mode
4
Port with best root path cost
Time between BDPUs sent by root bridge. Default of 2 seconds
12. RSTP edge port
Completed dhcp bindings - mac addresses - IP addresses - etc.
A packet can't be switched in hardware with the FIB and must go to the L3 engine
Only a single host connects . If one BDPU is received - it is no longer an edge port
Value - mask - and result (VMR) combinations
13. What is RPR?
Full duplex
Automatically negotiates a common trunk mode between switches
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
14. How often are BDPUs sent?
Untrusted
A point to point port type but the neighboring device runs traditional 802.1D STP
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
2 seconds (def)
15. What is DSCP codepoint AF41(34)?
Two distribution switches that aggregate one or more access switches
Flash override (class 4)
Using digital certificates
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
16. How are multiple VLANs mapped to multiple SSIDs?
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
By using a trunk link
Data and voice over native vlan - no QOS but still uses 802.1p trunk
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
17. RSTP root port
Port with best root path cost
The DCF interframe space- the random backoff time before a wireless set can transmit
12 kbps with headers and compression
Usually QoS from VOIP but not PC dataa
18. How is root port decided upon?
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
Lowest cumulative cost to root
Controls where candidate root bridges can be connected and found on a network
19. What does VTP do?
Discarding - learning - forwarding
Manages addition - deletion and renaming VLANs across the network
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
Change in trunk encap
20. What is dhcp snooping rate limiting?
A packet can't be switched in hardware with the FIB and must go to the L3 engine
Limits the number if dhcp requests on a port
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
21. For QoS - switch uplinks should always be considered as ____ _____?
A group of wireless devices that share a common SSID
Discarding - learning - forwarding
Trusted ports
19
22. What are the two etherchannel negotiation protocols?
Turn on port security
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
PAgP (Cisco proprietary) and LACP (standards-based)
23. What does UDLD do?
Data and voice over native vlan - no QOS but still uses 802.1p trunk
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Per VLAN
Transmits keystrokes from phone and commands from CCM
24. How does GLBP work?
Routers are assigned to common GLBP group. All routers can be active and can load balance
Port is forced to never authorize any connected client
16 - of which up to 8 are active. The others are in standby
Determines when the AVG will stop using the old VMAC in ARP replies
25. What pins does FE use?
Promiscuous and host
CEF is distributed completely among multiple L3 forwarding engines.
1/2 and 3/6
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
26. Does GLBP allow preemption?
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Best effort delivery - integrated services model - and differentiated services model
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
Yes
27. What can cause a wireless client to switch between Aps?
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
Yes
A MAC is seen on a different port
TCAM
28. What must be in common for a BSS to form?
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
Checks the destination MAC in the header against the target MAC in the ARP reply
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
Matching SSID - compatible data rate - authentication credentials
29. What duplex setting does 802.11 use and why?
Configure the timer on the AVG and let it propagate
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
Half because transmitting and receiving stations use the same frequency
Regions and instances
30. Whan is a 10GE WAN PHY?
Connects with SONET or SDH
Switch(config-if)# glbp xx where xx = group number
As a VLAN access map
No
31. How is 802.1x configured for port security?
RADIUS
Reboots and searches for a new WLC
By name - config revision - and instance to vlan mapping table
An L2 switch can only forward frames best effort unless going across a trunk
32. How should the switch port to which a LAP be configured?
Access
A MAC is seen on a different port
Effectively stops STP on filtered ports
5 classes with 3 drop precedences
33. What are the 3 redundant supervisor modes?
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
Trusted or untrusted
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
RPR - RPR+ - and SSO
34. Where should STP timers be configured and why?
On root - because the root bridge propagates timers with config BDPU
Group (0-1023) priority (1-255 higher better def 100)
The master router can share the VIP
Promiscuous and host
35. How many MST instances can be in a region?
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
63 kbps
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
36. What must you be sure of if AP cells overlap?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
37. What is BDPU Guard?
Silent
802.1D
Used to switch packets destined for the null interface
If any BDUP is received on a port - it puts the port into the errdisable state
38. What is the port priority range?
Globally or per-port
Per VLAN
0-255 (lower is better)
Connects with SONET or SDH
39. What does the epoch number indicate when looking at cef entries?
The MST instance (MSTI) runs alongside the IST and represents an STP instance
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
The number of times the CEF table has bee flushed and regenerated as a whole
Forces the router to wait for a period of time before attempting overthrow
40. What do you need to determine to use MSTP?
1 IP subnet
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
Variation in delay
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
41. How can you load-balance with HSRP?
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
Matching SSID - compatible data rate - authentication credentials
To the virtual port-channel interface
42. What does the version number indicate when looking at CEF entries?
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
The number of times the entry has been updated since the table was generated
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
43. What is the 80/20 rule?
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
80% of the user traffic should stay in the VLAN
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
Completed dhcp bindings - mac addresses - IP addresses - etc.
44. What is a topology change?
Distribution layer
FIB
On by default
When a port moves into forwarding or from fowarding or learning to blocking.
45. How do Cisco IP phones communicate with the CCM?
With the skinny protocol
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
Untrusted
The L3 forwarding engine can't forward the packet in hardware because there is no L2 next-hop address - so the packet is sent to the L3 engine to generate the ARP response
46. What is the RSTP default hello interval?
The DCF interframe space- the random backoff time before a wireless set can transmit
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
2 seconds
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
47. What categories can ports be in with dhcp snooping enabled?
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
Trusted or untrusted
Transmits keystrokes from phone and commands from CCM
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
48. How do you show HSRP status
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
Show standby
Enables portfast - sets the port to access and disables PAgP
49. What is a wireless mobility group?
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
Almost eliminates listening and learning states for single hosts on an access link
16 - of which up to 8 are active. The others are in standby
A client can roam to any WLC as long as it stays in a mobility group
50. What is the LACP priority range?
Value - mask - and result (VMR) combinations
2-8 FE - GE - or 10GE are bundled.
Trusted ports
1-65535 (def 32768) lower priority - higher probability