SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How many tunnels exist between the LAP and WLC?
2 - one for control messages and one for data
Edge - root - and point to point
The number of times the CEF table has bee flushed and regenerated as a whole
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
2. What is DSCP codepoint AF41(34)?
All ARP packets that arrive on untrusted ports are inspected.
Flash override (class 4)
The MST instance (MSTI) runs alongside the IST and represents an STP instance
If the switch or the powered device doesn't suport power class discovery
3. What is the cost of a 10Gbps link?
2
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
Connects with SONET or SDH
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
4. What does port-security protect do?
No
A point to point port type
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
Port stays up - packets from violating MACs dropped - no logging
5. What is the format of the VRRP virtual MAC?
Controls where candidate root bridges can be connected and found on a network
0000.5e00.01xx
Manages addition - deletion and renaming VLANs across the network
A single broadcast domain
6. In a converged fabric - which switch(es) send config BDPUs?
TCAM
Collision domain
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
Root
7. if the switchport is part of an etherchannel - Where is the network assigned
Cisco ILP and 802.3af
To the virtual port-channel interface
80% of the user traffic should stay in the VLAN
Using a single WAP to centralize access and control over a group of wireless devices.
8. What address does HSRP send hello packets to?
Change in trunk encap
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
2 seconds (def)
224.0.0.2 (all routers)
9. How does a DAI enabled switch gather trusted ARP info?
Determines when the AVG will stop using the old VMAC in ARP replies
Yes
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
From the DHCP snooping database or from static entries
10. Define HSRP
Will trunk if asked
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
The DCF interframe space- the random backoff time before a wireless set can transmit
802.11
11. How does every GLBP command begin
PAgP (Cisco proprietary) and LACP (standards-based)
RADIUS
Cisco ILP and 802.3af
Switch(config-if)# glbp xx where xx = group number
12. What are the port channel load balancing methods?
Because each frame is checked
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
Use sh interface on the interface and look for error counts > 10
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
13. What is the range of HSRP group numbers?
0-255
Cisco recommends only on the root bridge
5 (0-4 with 4 being the highest)
CEF is distributed completely among multiple L3 forwarding engines.
14. How does RSTP identify a topology change?
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
Only when a nonedge port transitions to forwarding
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
1 second. Backup routers can learn the interval from the master
15. What is the VRRP skew time?
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
Flash override (class 4)
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
Distributed coordinion function - the use of timers to prevent wireless collisions
16. RSTP alternate port
The master router can share the VIP
SC fiber or RJ-45
Determines when the AVG will stop using the old VMAC in ARP replies
Port with alternative path to root less desirable than root
17. What functions does a WLC perform?
When a wireless station transmits a frame - the receiving one must send an ack
26-byte header - 4-byte trailer with CRC
Control functions
Port with best root path cost on segment
18. How should the switch port to which an autonomous AP be configured?
Trunk
1 per segment
802.1x with EAP over LAN (EAPOL)
On ports where you never expect to find a root bridge for a VLAN
19. What is a community secondary VLAN?
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
By configuring every switch port to have an expected and controlled behavior
20. What is the portr ID?
It can't
Configuration and TCN
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
16 bits (8b port priority - 8b port number)
21. What is the STP forward delay timer?
2 seconds (def)
1-65535 (def 32768) lower priority - higher probability
The station can transmit immediately and wait for an ack
The time that a port spends in both listening and learning states . Default 15 seconds
22. What is a microcell?
Yes
Value - mask - and result (VMR) combinations
When the size of a cell is intentionally reduced
Checks the source MAC in the header against the sender MAC in the ARP reply
23. When a host is connected to a switchport - why aren't frame errors propagated?
Because each frame is checked
The total delay from start to finish
Value - mask - and result (VMR) combinations
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
24. How are BDPUs spread?
By using a trunk link
Multicast to 01-80-c2-00-00-00
No
Yes
25. What is a drop adjacency?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
26. What happens if both 802.1D and RSTP BDPUs are received?
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
Show standby
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
27. How do you configure LACP standby links?
2 seconds
Trusted ports
A point to point port type
LACP port priority
28. Where shoul dmultilayer switches be implemented?
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
By creating a static IP binding
Yes
Distribution layer
29. What are the restrictions for bundling into an Etherchannel?
No because they only participate if asked
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
Another router must have a higher HSRP priority and have preemt set up
30. What is DCF?
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
7 switches from root bridge
Distributed coordinion function - the use of timers to prevent wireless collisions
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
31. What does the src-mac option do when checking ARP replies
Another router must have a higher HSRP priority and have preemt set up
The port is forced to always authorize any connected client with no authentication necessary (default)
Checks the source MAC in the header against the sender MAC in the ARP reply
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
32. What is the port number range?
Configure the timer on the AVG and let it propagate
0-255
They disguise the origin of an attack
From the DHCP snooping database or from static entries
33. What are the 3 ways GLBP load-balances?
By brining up a tunnel between them to carry 802.11 related messages and client data.
Only for the offending VLAN on the port
As a VLAN access map
Round robin - weighted - or host-dependent
34. How does a DHCP server send WLC addresses?
Yes
Real-time Transport Protocol
Option 43
VTP server for domain null with no password or secure mode
35. Can ARP replies be checked
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
Based on priority (0-255). Default is 100. Highest IP is tie breaker
Yes
36. What must the other end be set to if PAgP desirable or LACP active mode is selected?
Normal and aggressive
Only when a nonedge port transitions to forwarding
No
Either desirable or auto mode
37. What is the DIFS?
Incoming frames are dropped (combination of disabled - blocking - and listening)
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
The active router. All other routers are in backup state
The DCF interframe space- the random backoff time before a wireless set can transmit
38. What does the dst-mac option do when checking ARP replies
Checks the destination MAC in the header against the target MAC in the ARP reply
A client can roam to any WLC as long as it stays in a mobility group
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
1500B
39. What does the epoch number indicate when looking at cef entries?
The number of times the CEF table has bee flushed and regenerated as a whole
Packets must be sent to the L3 engine for further processing
Variation in delay
Configure and enable DHCP snooping
40. What are the 3 unlicensed frequencies?
Isolated and community
Use the spanning-tree root macro
900 MHz - 2.4Ghz - and 5-6GHz
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
41. What are the steps to configure a LACP port channel?
Normal and aggressive
Discarding - learning - forwarding
Promiscuous and host
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
42. How does a LAP and a WLC authenticate between each other?
The port is forced to always authorize any connected client with no authentication necessary (default)
Port with alternative path to root less desirable than root
The master router can share the VIP
Using digital certificates
43. What is RTP?
Switching Database Manager - configures and prunes TCAM partitions
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
FE - GE - and aggregated FE/GE Etherchannels
Real-time Transport Protocol
44. What is unique about HSRP group numbers?
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Checks the source MAC in the header against the sender MAC in the ARP reply
RADIUS
Port is forced to never authorize any connected client
45. 802.11b
Each network device handles packets individually with no advance reservations
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
Effectively stops STP on filtered ports
46. How does RSTP converge?
From the DHCP snooping database or from static entries
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
47. What does VTP do?
Manages addition - deletion and renaming VLANs across the network
The TOS field in the header is used. 2 methods 3 bits or 6 bits
Receives the first packet of a traffic flow and routes it
A key string of up to 8 characters is sent. Default is cisco.
48. What types of links can be trunked?
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
Routers are assigned to common GLBP group. All routers can be active and can load balance
FE - GE - and aggregated FE/GE Etherchannels
The ASIC
49. What is layer 3 roaming?
A key string of up to 8 characters is sent. Default is cisco.
When a client roams between Aps in different subnets
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
50. How does every HSRP config command begin?
By configuring every switch port to have an expected and controlled behavior
VTP server for domain null with no password or secure mode
5 (0-4 with 4 being the highest)
Switch(config-if)# standby xx where x= group number