SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is a vlan?
All ports where root isn't expected
A single broadcast domain
Globally
Only for the offending VLAN on the port
2. What are the three basic types of QOS?
Will trunk if asked
Best effort delivery - integrated services model - and differentiated services model
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Globally or per-port
3. What is a CEF punt?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
4. What does BDPU filtering do?
Root
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
An L2 switch can only forward frames best effort unless going across a trunk
Effectively stops STP on filtered ports
5. What is 802.1x force-unauthorized?
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
Port is forced to never authorize any connected client
Weak key rotation
0-65535 (def 32768) lower=better
6. What is the duration time in a wireless frame?
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
Each frame transmits its expected duration time
With portfast
7. What must you be sure of if AP cells overlap?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
8. What is the cost of a 10Gbps link?
Control functions
2
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
9. How does IPT behave when the voice VLAN is in vlan-id mode?
On all switches in network to enable RLQ request and reply
16 - of which up to 8 are active. The others are in standby
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
10. How does UDLD work?
Used to switch packets destined for the null interface
Weak key rotation
2 strand MMF with MT-RJ or SC connectors
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
11. How do you configure DAI for statically configured IP addresses?
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
By an ARP access list that defines the permitted bindings
Configuration and TCN
12. What is an IST instance?
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
Promiscuous and host
No
13. What are the characteristics of the access layer?
It's a router that maintains routes (static or dynamic) - and populates the FIB
Both ends should be on because on modes doesn't send PAgP or LACP packets
Via an 802.1Q trunk or a single VLAN access port
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
14. What can the Etherchannel hash use?
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
FIB
Port
Show standby
15. What are the 3 trunk encap modes?
Frames are forwarded
Isl - dot1q - negotiate (default)
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
The number of times the CEF table has bee flushed and regenerated as a whole
16. What are the steps to configure MST?
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
The TOS field in the header is used. 2 methods 3 bits or 6 bits
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
All ports where root isn't expected
17. How does HSRP plain text authentication work?
A key string of up to 8 characters is sent. Default is cisco.
L2
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
Embeds the tag within the frame
18. What functions does a WLC perform?
VTP server for domain null with no password or secure mode
Control functions
Flash override (class 4)
Effectively stops STP on filtered ports
19. What are the RSTP port states?
When the AP uplinks to an Ethernet network.
Discarding - learning - forwarding
Distributed coordinion function - the use of timers to prevent wireless collisions
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
20. What is a topology change?
0-255
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
When a port moves into forwarding or from fowarding or learning to blocking.
L2
21. What is the PVLAN promiscuous mode?
Priority (class 1)
2 seconds (def)
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
All ports where root isn't expected
22. RSTP uses which standard?
Flash override (class 4)
Discarding - learning - forwarding
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
802.1w
23. When looking at the sh spanning tree output - What does P2P denote?
Time between BDPUs sent by root bridge. Default of 2 seconds
A point to point port type
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Globally or per-port
24. What is UDLD normal mode?
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
That they aren't using the same frequencies.
802.1x with EAP over LAN (EAPOL)
All ARP packets that arrive on untrusted ports are inspected.
25. How do you renable an err-disable port by default?
Manually
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
Configure the timer on the AVG and let it propagate
A host port goes up or down
26. What is an MST instance?
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
By configuring every switch port to have an expected and controlled behavior
Globally or per-port
The MST instance (MSTI) runs alongside the IST and represents an STP instance
27. What does port-security restrict do?
Admin down
The number of times the entry has been updated since the table was generated
Best effort delivery - integrated services model - and differentiated services model
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
28. What is RPR+?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. How do IP phones communicate with each other?
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
Once the CCM gives them the parameters - they use RTP
Using digital certificates
The port is forced to always authorize any connected client with no authentication necessary (default)
30. the static port to vlan membership is handled in _____
Between any type of interface as long as the interface can have an L3 address assigned
After forwarding delay - port can learn new MAC addresses
The ASIC
Data and voice over native vlan no QOS and no 802.1p trunk
31. How many potential links can LACP define?
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
Configuration and TCN
16 - of which up to 8 are active. The others are in standby
802.11
32. What types of authentication does HSRP allow?
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Both ends should be on because on modes doesn't send PAgP or LACP packets
Plain text or md5
Only when a nonedge port transitions to forwarding
33. How is RSTP synchronization accomplished?
Globally
Disabled - init - listen - speak - standby - active
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
By default weight is 100. Can be made dynamic per interface
34. What is the range of PAgP channel group numbers?
Isl - dot1q - negotiate (default)
19
1 to 64
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
35. What is a wireless mobility group?
Switching Database Manager - configures and prunes TCAM partitions
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
A client can roam to any WLC as long as it stays in a mobility group
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
36. Does GLBP allow preemption?
2 - one for control messages and one for data
Yes
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
37. One vlan should =
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
1 IP subnet
Determines when the AVG will stop using the old VMAC in ARP replies
Between interfaces that are assigned to L2 VLANs or L2 trunks
38. What are the steps of RSTP convergence?
With the skinny protocol
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
Show standby
39. How does GLBP work?
Routers are assigned to common GLBP group. All routers can be active and can load balance
Sends a voltage across the receive pairs to detect a 25k ohm resistance
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
Weak key rotation
40. What is the port number range?
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
0-255
LACP port priority
Connects with SONET or SDH
41. What is a PVLAN?
A private VLAN can be logically associated with a special secondary vlan
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
Connects with SONET or SDH
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
42. What does Loop Guard do?
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
Route once - switch many
43. What is the default 802.3af power class and its use?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
44. How long are TCAM masks?
Root
134 bits
RADIUS
Used to switch packets destined for the null interface
45. What is an SVI?
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
RADIUS
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
When a port moves into forwarding or from fowarding or learning to blocking.
46. What is DSCP codepoint AF31(26)?
Roughly 2000
Flash (class 3)
An ac adaptor that plugs into a wall outlet.
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
47. What does the reload keyword do in HSRP?
Configure and enable DHCP snooping
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
Configure non-silent submode
48. What is SSO?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. What is errdisable pagp-flap?
Only a single host connects . If one BDPU is received - it is no longer an edge port
Port that connects to another switch and becomes a designated port
As a VLAN access map
Etherchannel ports have inconsistent config
50. How does an LAP bind with a WLC?
Normal and aggressive
By brining up a tunnel between them to carry 802.11 related messages and client data.
Effectively stops STP on filtered ports
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server