SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is a microcell?
Normal and aggressive
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
When the size of a cell is intentionally reduced
Lowest cumulative cost to root
2. What does the RP do?
Critical...used most often for IPT
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
Receives the first packet of a traffic flow and routes it
3. How is Root Guard used?
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
Promiscuous and host
That they aren't using the same frequencies.
On ports where you never expect to find a root bridge for a VLAN
4. What is the acceptible range of VLANS?
Connects with SONET or SDH
Automatically using DTP and CDP
1-1005 (1 and 1002-1005 are reserved)
With the skinny protocol
5. Does GLBP allow preemption?
Yes
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
2
6. How does a DAI enabled switch gather trusted ARP info?
They disguise the origin of an attack
On the left as you face the connector
FIB
From the DHCP snooping database or from static entries
7. How does ILP do power discovery?
Collision domain
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
Between interfaces that are assigned to L2 VLANs or L2 trunks
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
8. what should you do if you expect a PAgP capable switch at the other end vs. a server or host?
An L2 switch can only forward frames best effort unless going across a trunk
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
The link status stays up - but something between them has failed or is filtering traffic
Configure non-silent submode
9. How do you find duplex mismatches?
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
Real-time Transport Protocol
Use sh interface on the interface and look for error counts > 10
When a wireless station transmits a frame - the receiving one must send an ack
10. can root guard and bdpu guard be used together?
No
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
Src-dst-ip
From the DHCP snooping database or from static entries
11. Automatically configure STP timers
Use the spanning-tree root macro
Will trunk if asked
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
Data and voice over native vlan no QOS and no 802.1p trunk
12. What are the 6 HSRP states?
Round robin - weighted - or host-dependent
To the virtual port-channel interface
Disabled - init - listen - speak - standby - active
63 kbps
13. What is Per VLAN STP (PVST)?
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
Virtual Router Redundancy Protocol - pretty much the same as HSRP
Almost eliminates listening and learning states for single hosts on an access link
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
14. Where does layer switching occur?
Best effort delivery - integrated services model - and differentiated services model
Between interfaces that are assigned to L2 VLANs or L2 trunks
Between any type of interface as long as the interface can have an L3 address assigned
No because they only participate if asked
15. Where should you change the network diameter value?
Cisco recommends only on the root bridge
Only the standby monitors the hello messages from the active router
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
Src-dst-ip
16. How does adding option-82 to DHCP snooping affect things?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
17. What is the range of PAgP channel group numbers?
1 to 64
Yes
Automatically using DTP and CDP
When the size of a cell is intentionally reduced
18. What are the caveats for HSRP port tracking?
Turn on port security
Another router must have a higher HSRP priority and have preemt set up
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
19. For QoS - switch uplinks should always be considered as ____ _____?
224.0.0.2 (all routers)
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
26-byte header - 4-byte trailer with CRC
Trusted ports
20. How does PAgP form etherchannels?
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
80% of the user traffic should stay in the VLAN
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Trunk
21. RSTP root port
Plain text or md5
Almost eliminates listening and learning states for single hosts on an access link
Port with best root path cost
It can't
22. How do you show HSRP status
Show standby
Dynamic WEP keys that change periodically
Usually QoS from VOIP but not PC dataa
134 bits
23. What are the 5 STP states?
Promiscuous and host
Half because transmitting and receiving stations use the same frequency
Disabled - blocking - listening - learning - forwarding
A point to point port type but the neighboring device runs traditional 802.1D STP
24. What are the two etherchannel negotiation protocols?
PAgP (Cisco proprietary) and LACP (standards-based)
By configuring every switch port to have an expected and controlled behavior
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
25. What is the STP listening state?
Cisco recommends only on the root bridge
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
Can send and receive BDPUs
Based on priority (0-255). Default is 100. Highest IP is tie breaker
26. the static port to vlan membership is handled in _____
Manages addition - deletion and renaming VLANs across the network
Access or trunk
When each AP stands alone within the larger network.
The ASIC
27. What are the 3 ways GLBP load-balances?
Only for the offending VLAN on the port
Round robin - weighted - or host-dependent
Isl - dot1q - negotiate (default)
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
28. Define GLBP
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
Gateway load balancing protocol - cisco proprietary
Limits the number if dhcp requests on a port
Trunk
29. How do Cisco IP phones communicate with the CCM?
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
When a client roams between Aps in different subnets
With the skinny protocol
An ac adaptor that plugs into a wall outlet.
30. What are the 4 steps in DHCP negotiation?
Routers are assigned to common GLBP group. All routers can be active and can load balance
0000.0c07.acxx where xx is the group number as a 2-digit hex value
Yes to both
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
31. What is the portr ID?
16 bits (8b port priority - 8b port number)
Usually QoS from VOIP but not PC dataa
Untrusted
Matching SSID - compatible data rate - authentication credentials
32. What is a VRRP group?
Switch(config-if)# vrrp xx where xx= group number
On all switches in network to enable RLQ request and reply
Used to switch packets destined for the null interface
The same as a standby group in HSRP
33. What is a root link query (RLQ)?
If the switch or the powered device doesn't suport power class discovery
That they aren't using the same frequencies.
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
34. How does a LAP and a WLC authenticate between each other?
Using digital certificates
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
RADIUS
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
35. What are the restrictions for bundling into an Etherchannel?
All ARP packets that arrive on untrusted ports are inspected.
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
When a client roams between Aps in different subnets
36. What types of links can be trunked?
No
A private VLAN can be logically associated with a special secondary vlan
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
FE - GE - and aggregated FE/GE Etherchannels
37. Where is the QoS trust boundary usually configured on an IP phone?
SC fiber or RJ-45
By name - config revision - and instance to vlan mapping table
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
Usually QoS from VOIP but not PC dataa
38. How often are VRRP advertisements sent?
5 (0-4 with 4 being the highest)
1 second. Backup routers can learn the interval from the master
The number of times the CEF table has bee flushed and regenerated as a whole
FE - GE - and aggregated FE/GE Etherchannels
39. What does the rewrite engine do?
By using an Ether-IP tunnel
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
40. What are the 3 unlicensed frequencies?
900 MHz - 2.4Ghz - and 5-6GHz
1/2 and 3/6
With the skinny protocol
Multicasts to 224.0.0.18 (VRRP)
41. If you want IP source guard to detect spoofed MAC addresses - what must you do?
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
Reboots and searches for a new WLC
Turn on port security
Show standby
42. What types of authentication does HSRP allow?
Plain text or md5
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
Via an 802.1Q trunk or a single VLAN access port
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
43. What does the ip option do when checking ARP replies
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
44. How does IPT behave when the voice VLAN is in vlan-id mode?
An AP's coverage area
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
The MST instance (MSTI) runs alongside the IST and represents an STP instance
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
45. What is backbonefast?
Switches make an effort to move packets as quickly as possible
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
The number of times the entry has been updated since the table was generated
Admin down
46. What is DSCP codepoint AF41(34)?
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
Flash override (class 4)
Incoming frames are dropped (combination of disabled - blocking - and listening)
Isl - dot1q - negotiate (default)
47. What is the adjacency table?
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
Half-duplex
FIB
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
48. How does the standby handle ARP issues after it becomes active?
By sending a gratuitous ARP
80% of the user traffic should stay in the VLAN
Only the standby monitors the hello messages from the active router
No
49. 802.11g
The active router. All other routers are in backup state
The standby becomes active and stays active by default. Preemption can be configured
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
Globally
50. What does Root Guard do?
The wireless clients communicate directly with no other means of connectivity such as a WAP
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
Controls where candidate root bridges can be connected and found on a network