SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are the 2 choices for VLANs with IPT?
Globally
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
Receives the first packet of a traffic flow and routes it
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
2. What does port-security protect do?
Access
2 seconds (def)
Port stays up - packets from violating MACs dropped - no logging
FIB
3. RSTP forwarding state
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
No
Multicast to 01-80-c2-00-00-00
Frames are forwarded
4. What is an IBSS?
The wireless clients communicate directly with no other means of connectivity such as a WAP
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
Each network device handles packets individually with no advance reservations
Untrusted
5. How do you enable CEF?
Yes to both
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
No
It is enabled by default on all CEF capable switches
6. How is root port decided upon?
7 switches from root bridge
Between any type of interface as long as the interface can have an L3 address assigned
Lowest cumulative cost to root
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
7. How are GLBP timers used?
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
Limits the number if dhcp requests on a port
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
Priority (class 1)
8. Which ports should you consider trusted for DAI?
Checks the destination MAC in the header against the target MAC in the ARP reply
RPR - RPR+ - and SSO
Admin down
Those that connect to other switches
9. What is a PVLAN?
No
It is enabled by default on all CEF capable switches
1500B
A private VLAN can be logically associated with a special secondary vlan
10. What's the easiest way to configure GLBP timers?
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
Configure the timer on the AVG and let it propagate
11. Define VRRP
Differentiated services
Usually QoS from VOIP but not PC dataa
RADIUS
Virtual Router Redundancy Protocol - pretty much the same as HSRP
12. How does DSCP handle IP precedence?
5 classes with 3 drop precedences
Yes
Limits the number if dhcp requests on a port
Dynamic WEP keys that change periodically
13. What 2 conditions does IP source guard check for?
Flash override (class 4)
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
Completed dhcp bindings - mac addresses - IP addresses - etc.
Another router must have a higher HSRP priority and have preemt set up
14. How does an LAP bind with a WLC?
By brining up a tunnel between them to carry 802.11 related messages and client data.
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
FE and GE
15. unknown unicast flooding
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
16 bits (8b port priority - 8b port number)
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
16. What are the 6 steps to configure 802.1x for port security?
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
On root - because the root bridge propagates timers with config BDPU
After forwarding delay - port can learn new MAC addresses
Used to switch packets destined for the null interface
17. What pins does FE use?
Switch(config-if)# vrrp xx where xx= group number
Option 43
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
1/2 and 3/6
18. When DHCP snooping is turned on - by default - it considers all ports ______
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
Access
Untrusted
The configureable UDLD interval must be less than max age plus two intervals of forward delay
19. How does NSF work?
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
The L3 forwarding engine can't forward the packet in hardware because there is no L2 next-hop address - so the packet is sent to the L3 engine to generate the ARP response
20. What is the core block?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
21. What are the two etherchannel negotiation protocols?
PAgP (Cisco proprietary) and LACP (standards-based)
Packets must be sent to the L3 engine for further processing
The campus network's backbone
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
22. How does a WLC hand off a client's association to another WLC?
Access or trunk
2 - one for control messages and one for data
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
Using a mobility exchange message
23. What is an insignificant topology change?
4
Dynamic WEP keys that change periodically
A host port goes up or down
The total delay from start to finish
24. What is the PVLAN promiscuous mode?
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
LACP port priority
Forces the router to wait for a period of time before attempting overthrow
25. what if a secondary VLAN?
Incoming frames are dropped (combination of disabled - blocking - and listening)
Switching Database Manager - configures and prunes TCAM partitions
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
Turn on port security
26. What does the skinny protocol do?
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
From the DHCP snooping database or from static entries
Globally
Transmits keystrokes from phone and commands from CCM
27. How do you renable an err-disable port by default?
Manually
All ports where root isn't expected
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
28. How often are HSRP hellos sent?
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
Each frame transmits its expected duration time
3 seconds. Holdtime =3 hellos + 1
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
29. How do you disable DTP when you configure both ends of the ISL manually?
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
63 kbps
1/2 and 3/6
Switchpotrt nonegotiate
30. How does the VRRP master router handle the VIP?
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
The master router can share the VIP
16 - of which up to 8 are active. The others are in standby
31. What is RPR?
Yes
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
32. What is a CEF glean?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
33. How does a LAP and a WLC authenticate between each other?
Using digital certificates
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
0-255
Receives the first packet of a traffic flow and routes it
34. What are the 2 power over ethernet methods?
Isolated and community
Port is forced to never authorize any connected client
Cisco ILP and 802.3af
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
35. When a host is connected to a switchport - why aren't frame errors propagated?
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
Because each frame is checked
0-65535 (def 32768) lower=better
36. What is the cost of a 10Gbps link?
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
2
All fiber-optic links between switches (must be enabled on both ends)
Only for the offending VLAN on the port
37. Which 4 things must be agreeable to trunk?
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
Used when ACLs specify port ranges...used by TCAM
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
BGP - EIGRP - OSPF - and IS-IS.
38. How can you load-balance with HSRP?
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
Multicast to 01-80-c2-00-00-00
39. How is the HSRP MAC address configured?
Port with best root path cost on segment
A host port goes up or down
0000.0c07.acxx where xx is the group number as a 2-digit hex value
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
40. What is best effort delivery QOS?
With portfast
Checks the source MAC in the header against the sender MAC in the ARP reply
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
Switches make an effort to move packets as quickly as possible
41. RSTP uses which standard?
A client can roam to any WLC as long as it stays in a mobility group
802.1w
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
Incoming frames are dropped (combination of disabled - blocking - and listening)
42. How are errdisable triggers tuned?
Packets are discarded due to an ACL or policy action
The time that a port spends in both listening and learning states . Default 15 seconds
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
Globally
43. How many virtual MACs can GLBP have?
Data and voice over native vlan no QOS and no 802.1p trunk
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
A group of wireless devices that share a common SSID
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
44. What categories can ports be in with dhcp snooping enabled?
Used when ACLs specify port ranges...used by TCAM
The standby becomes active and stays active by default. Preemption can be configured
Trusted or untrusted
Half-duplex
45. RSTP designated port
Port with best root path cost on segment
2
Matching SSID - compatible data rate - authentication credentials
Using a mobility exchange message
46. How is UDLD configured?
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
47. What is layer 3 roaming?
TCAM
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
When a client roams between Aps in different subnets
48. How does IPT behave when the voice VLAN is in untagged mode?
By short-circuiting the max age timer
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
Data and voice over native vlan - no QOS but still uses 802.1p trunk
63 kbps
49. Can loop guard and udld be used together?
When each AP stands alone within the larger network.
3 seconds. Holdtime =3 hellos + 1
Yes
When a port moves into forwarding or from fowarding or learning to blocking.
50. What format does the GLBP MAC use?
An AP's coverage area
PAgP (Cisco proprietary) and LACP (standards-based)
The standby becomes active and stays active by default. Preemption can be configured
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number