SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the traditional MLS view of switching?
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
Route once - switch many
Port with best root path cost
Group (0-255) - priority (1-254 254 is highest - 100 default)
2. What is the STP listening state?
Can send and receive BDPUs
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
Used when there are 1 or more VLANs mapped to a single STP instance
Configure and enable DHCP snooping
3. Can loop guard and udld be used together?
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
802.1w
Switch(config-if)# glbp xx where xx = group number
Yes
4. Where is loop guard enabled?
Cisco ILP and 802.3af
Per VLAN
All nondesignated ports - but ok for all ports
1-65535 (def 32768) lower priority - higher probability
5. unknown unicast flooding
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
Normal and aggressive
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
6. How does HSRP do MD5 authentication?
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
By using a hash of a key string
1 to 64
Etherchannel ports have inconsistent config
7. How does RSTP identify a topology change?
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
Globally
By brining up a tunnel between them to carry 802.11 related messages and client data.
Only when a nonedge port transitions to forwarding
8. How does DAI work?
Bridge priority and MAC
CEF is distributed completely among multiple L3 forwarding engines.
All ARP packets that arrive on untrusted ports are inspected.
Real-time Transport Protocol
9. Which fiber is the receive?
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
Used when ACLs specify port ranges...used by TCAM
When the AP uplinks to an Ethernet network.
On the left as you face the connector
10. What is an indirect topology change?
Admin down
Normal and aggressive
900 MHz - 2.4Ghz - and 5-6GHz
The link status stays up - but something between them has failed or is filtering traffic
11. What is an end to end vlan?
Embeds the tag within the frame
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
Effectively stops STP on filtered ports
A VLAN that spans the entire fabric
12. What are the 2 choices for VLANs with IPT?
A point to point port type
On root - because the root bridge propagates timers with config BDPU
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
13. What are the gotchas for uplinkfast?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. How does every GLBP command begin
Best effort delivery - integrated services model - and differentiated services model
4
Switch(config-if)# glbp xx where xx = group number
Show standby
15. What is the size of ISL encapsulation?
2 - one for control messages and one for data
Transmits keystrokes from phone and commands from CCM
Src-dst-ip
26-byte header - 4-byte trailer with CRC
16. When a host is connected to a switchport - why aren't frame errors propagated?
A VLAN that spans the entire fabric
Because each frame is checked
From the DHCP snooping database or from static entries
Can hear only BDPUs
17. What is a CEF punt?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. How does every HSRP config command begin?
RPR - RPR+ - and SSO
Switch(config-if)# standby xx where x= group number
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
TCAM
19. What is an MST instance?
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
The MST instance (MSTI) runs alongside the IST and represents an STP instance
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
Only for trusted Cisco gear - especially phones
20. What's the easiest way to configure GLBP timers?
Configure the timer on the AVG and let it propagate
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Two distribution switches that aggregate one or more access switches
Port with best root path cost
21. What are the VRRP group and priority numbers?
Group (0-255) - priority (1-254 254 is highest - 100 default)
224.0.0.2 (all routers)
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
Data and voice over native vlan - no QOS but still uses 802.1p trunk
22. What if RSTP BDPUs aren't received?
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
5 classes with 3 drop precedences
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
23. 802.11g
L2
Frames are forwarded
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
24. What 2 tunnelling mechanisms do the LAP and WLC use to communicate?
Access or trunk
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
A host port goes up or down
Root - designated - blocking - alternate - forwarding (host)
25. Does VTP pass private VLAN configuration?
The configureable UDLD interval must be less than max age plus two intervals of forward delay
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
No
On the left as you face the connector
26. What is the STP blocking state?
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
0000.5e00.01xx
Can hear only BDPUs
Collision domain
27. How are multiple VLANs mapped to multiple SSIDs?
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
The port is forced to always authorize any connected client with no authentication necessary (default)
By using a trunk link
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
28. What are the steps to configuring HSRP MD5 authentication?
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
Best effort delivery - integrated services model - and differentiated services model
With the skinny protocol
Via an 802.1Q trunk or a single VLAN access port
29. What is a PVLAN?
Via an 802.1Q trunk or a single VLAN access port
It can't
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
A private VLAN can be logically associated with a special secondary vlan
30. How does every VRRP command begin?
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
Switch(config-if)# vrrp xx where xx= group number
Isl - dot1q - negotiate (default)
900 MHz - 2.4Ghz - and 5-6GHz
31. What are the RSTP port states?
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
16 - of which up to 8 are active. The others are in standby
Discarding - learning - forwarding
By an ARP access list that defines the permitted bindings
32. What does the minimum keyword do in HSRP?
The port is forced to always authorize any connected client with no authentication necessary (default)
Differentiated services
Forces the router to wait for a period of time before attempting overthrow
Discarding - learning - forwarding
33. What is an ESS?
Show standby
1500B
When the AP uplinks to an Ethernet network.
Differentiated services code point
34. How are GLBP timers used?
0-255
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
Disabled - init - listen - speak - standby - active
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
35. can root guard and loop guard be used together
5 classes with 3 drop precedences
Src-dst-ip
Only for trusted Cisco gear - especially phones
No
36. What is the distribution layer best practice?
Hashing algorithm
1500B
Port with best root path cost on segment
The distribution layer should have only L3 links
37. What does a LAP do if it loses communication with it's WLC?
Reboots and searches for a new WLC
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
All nondesignated ports - but ok for all ports
It can't
38. What is a vlan?
The redundant SUP is booted and sup and route engine is init'd. No L2 or L3 functions are started. Allows switchports to retain state
4
A single broadcast domain
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
39. What does the RP do?
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
Receives the first packet of a traffic flow and routes it
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
To the virtual port-channel interface
40. How does a LAP and a WLC authenticate between each other?
Using digital certificates
No
Almost eliminates listening and learning states for single hosts on an access link
An AP's coverage area
41. What is a cell?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
42. What is the FM?
They disguise the origin of an attack
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
Used to switch packets destined for the null interface
Distributed coordinion function - the use of timers to prevent wireless collisions
43. WPA2 encryption
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Completed dhcp bindings - mac addresses - IP addresses - etc.
That they aren't using the same frequencies.
Needs hardware upgrade over WEP - uses AES encryption
44. What is a root link query (RLQ)?
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
Trunk
1 IP subnet
A private VLAN can be logically associated with a special secondary vlan
45. What is dhcp snooping rate limiting?
Packets are discarded due to an ACL or policy action
Use sh interface on the interface and look for error counts > 10
Limits the number if dhcp requests on a port
Silent
46. How often are BDPUs sent?
No
Automatically negotiates a common trunk mode between switches
2 seconds (def)
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
47. Whan is a 10GE WAN PHY?
The TOS field in the header is used. 2 methods 3 bits or 6 bits
Matching SSID - compatible data rate - authentication credentials
Trusted ports
Connects with SONET or SDH
48. What must be in common for a BSS to form?
Forces the router to wait for a period of time before attempting overthrow
Matching SSID - compatible data rate - authentication credentials
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Each frame transmits its expected duration time
49. What happens when an ARP reply is received on an untrusted port?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
50. What types of ports autonegotiate?
FE and GE
A single broadcast domain
Connects with SONET or SDH
Half-duplex