SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does MSTP consist of?
Configure and enable DHCP snooping
224.0.0.2 (all routers)
After forwarding delay - port can learn new MAC addresses
Regions and instances
2. What is DSCP codepoint AF31(26)?
Flash (class 3)
Access
No shut
1 IP subnet
3. How much BW does a voip connection use?
12 kbps with headers and compression
With the skinny protocol
The wireless clients communicate directly with no other means of connectivity such as a WAP
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
4. How does every VRRP command begin?
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
1 IP subnet
Switch(config-if)# vrrp xx where xx= group number
Every switch and router in a network must be configured with appropriate QoS features and policies
5. Define VRRP
Configure the timer on the AVG and let it propagate
1/2 and 3/6
The wireless clients communicate directly with no other means of connectivity such as a WAP
Virtual Router Redundancy Protocol - pretty much the same as HSRP
6. What is the bridge priority range?
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
0-65535 (def 32768) lower=better
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
7. What is jitter?
Variation in delay
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
63 kbps
The same as a standby group in HSRP
8. When are RSTP bdpus sent?
Incoming frames dropped - but MACs learned
Admin down
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
9. What are the 2 types of secondary VLAN?
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
The number of times the CEF table has bee flushed and regenerated as a whole
Frames are forwarded
Isolated and community
10. What is the port number range?
0-255
The number of times the CEF table has bee flushed and regenerated as a whole
Dynamic WEP keys that change periodically
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
11. How do you configure IP source guard for hosts that don't use DHCP?
By creating a static IP binding
3 seconds. Holdtime =3 hellos + 1
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
Round robin - weighted - or host-dependent
12. What is a punt adjacency?
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
Packets must be sent to the L3 engine for further processing
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
Control functions
13. What are the 2 types of BDPU?
The DCF interframe space- the random backoff time before a wireless set can transmit
Manually
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Configuration and TCN
14. How is UDLD configured?
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
63 kbps
15. What cabling do GBICs use?
Full duplex
SC fiber or RJ-45
1-1005 (1 and 1002-1005 are reserved)
Switching Database Manager - configures and prunes TCAM partitions
16. What are the PAgP negotiation modes
Prevents the dhcp binding DB from being checked.
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
Time between BDPUs sent by root bridge. Default of 2 seconds
17. What can the Etherchannel hash use?
134 bits
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Port is forced to never authorize any connected client
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
18. What is the STP forward delay timer?
802.1D
An L2 switch can only forward frames best effort unless going across a trunk
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
The time that a port spends in both listening and learning states . Default 15 seconds
19. What is an SVI?
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
No
Those that connect to other switches
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
20. How is an instance defined?
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
1/2 and 3/6
The distribution layer should have only L3 links
By name - config revision - and instance to vlan mapping table
21. What is the default 10mbps Enet duplex?
Half-duplex
802.1w
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
The number of times the entry has been updated since the table was generated
22. How does the CEF L3 engine operate?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
23. What's the easiest way to configure GLBP timers?
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
SC fiber or RJ-45
Configure the timer on the AVG and let it propagate
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
24. How does a WLC hand off a client's association to another WLC?
Port
Etherchannel ports have inconsistent config
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Using a mobility exchange message
25. What is a null adjacency?
The number of times the entry has been updated since the table was generated
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
Used to switch packets destined for the null interface
Embeds the tag within the frame
26. What is the DIFS?
The DCF interframe space- the random backoff time before a wireless set can transmit
Sends a voltage across the receive pairs to detect a 25k ohm resistance
Arp for local subnet - if on different subnet - will arp for dgw
On all switches in network to enable RLQ request and reply
27. When DHCP snooping is turned on - by default - it considers all ports ______
Untrusted
Checks the destination MAC in the header against the target MAC in the ARP reply
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
Data and voice over native vlan - no QOS but still uses 802.1p trunk
28. What is an end to end vlan?
A VLAN that spans the entire fabric
Flash override (class 4)
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Packets must be sent to the L3 engine for further processing
29. What are the VRRP group and priority numbers?
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
Group (0-255) - priority (1-254 254 is highest - 100 default)
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
Regions and instances
30. What is a discard adjacency?
Packets are discarded due to an ACL or policy action
0-255
5 (0-4 with 4 being the highest)
On ports where you never expect to find a root bridge for a VLAN
31. What happens when the topology changes?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. What 2 conditions does IP source guard check for?
An ac adaptor that plugs into a wall outlet.
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
Untrusted
Matching SSID - compatible data rate - authentication credentials
33. How does HSRP port tracking work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. Each switch port is a _____ ______
Collision domain
Edge - root - and point to point
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
With the skinny protocol
35. How does HSRP election work?
A key string of up to 8 characters is sent. Default is cisco.
By using an Ether-IP tunnel
Based on priority (0-255). Default is 100. Highest IP is tie breaker
Immediate (class 2)
36. How does RSTP converge?
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Connects with SONET or SDH
FE - GE - and aggregated FE/GE Etherchannels
Control functions
37. On what scope is DAI enabled?
Per VLAN
Yes
Globally
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
38. How do Cisco IP phones communicate with the CCM?
A point to point port type but the neighboring device runs traditional 802.1D STP
With the skinny protocol
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
39. How many virtual MACs can GLBP have?
Root
Admin down
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
Needs hardware upgrade over WEP - uses AES encryption
40. What do you need to determine to use MSTP?
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
Collision domain
By using an Ether-IP tunnel
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
41. How does loop guard block ports?
Only for the offending VLAN on the port
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
2 seconds
When each AP stands alone within the larger network.
42. What is DSCP codepoint AF11(10)?
Half-duplex
Priority (class 1)
Packets must be sent to the L3 engine for further processing
No
43. What does the switchport host macro do?
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
Flash override (class 4)
44. EAP encryption
Dynamic WEP keys that change periodically
The same as a standby group in HSRP
802.1w
No shut
45. How many potential links can LACP define?
Can send and receive BDPUs
A client can roam to any WLC as long as it stays in a mobility group
1 per segment
16 - of which up to 8 are active. The others are in standby
46. How does ILP do power discovery?
Switch(config-if)# glbp xx where xx = group number
Almost eliminates listening and learning states for single hosts on an access link
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
By using a trunk link
47. What is RPR?
0000.5e00.01xx
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
A key string of up to 8 characters is sent. Default is cisco.
By using a hash of a key string
48. What does VTP do?
Data and voice over native vlan - no QOS but still uses 802.1p trunk
It is enabled by default on all CEF capable switches
Manages addition - deletion and renaming VLANs across the network
The number of times the CEF table has bee flushed and regenerated as a whole
49. Of what significance are private VLANs
Local only
Switching Database Manager - configures and prunes TCAM partitions
Receives the first packet of a traffic flow and routes it
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
50. What is a wall wart?
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
An ac adaptor that plugs into a wall outlet.
802.1x with EAP over LAN (EAPOL)
Usually QoS from VOIP but not PC dataa