SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What must be in common for a BSS to form?
Matching SSID - compatible data rate - authentication credentials
80% of the user traffic should stay in the VLAN
Switchpotrt nonegotiate
By using a hash of a key string
2. What is the default MTU?
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
On ports where you never expect to find a root bridge for a VLAN
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
1500B
3. What does port-security protect do?
Port stays up - packets from violating MACs dropped - no logging
Every switch and router in a network must be configured with appropriate QoS features and policies
802.1x with EAP over LAN (EAPOL)
The standby becomes active and stays active by default. Preemption can be configured
4. What does MSTP consist of?
VTP server for domain null with no password or secure mode
Regions and instances
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
5. What are dynamic VLANs based on?
Determines when the AVG will stop using the old VMAC in ARP replies
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
MAC of the end device
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
6. How does IPT behave when the voice VLAN is in dot1p mode?
Only the standby monitors the hello messages from the active router
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
Access
A client can roam to any WLC as long as it stays in a mobility group
7. How can you tell if a switch block is too large?
A single broadcast domain
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
Can hear only BDPUs
12 kbps with headers and compression
8. What is UDLD aggressive mode?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
9. unknown unicast flooding
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
Using a single WAP to centralize access and control over a group of wireless devices.
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
10. What is DSCP codepoint AF21(18)?
Immediate (class 2)
Reboots and searches for a new WLC
Checks the source MAC in the header against the sender MAC in the ARP reply
A point to point port type but the neighboring device runs traditional 802.1D STP
11. How do you prevent switch spoofing?
802.1x with EAP over LAN (EAPOL)
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
By configuring every switch port to have an expected and controlled behavior
Yes
12. How is an instance defined?
By name - config revision - and instance to vlan mapping table
They disguise the origin of an attack
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
0-255 (lower is better)
13. How do you configure LACP standby links?
LACP port priority
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
It is enabled by default on all CEF capable switches
A point to point port type but the neighboring device runs traditional 802.1D STP
14. What is the cost of a 10Gbps link?
L2
From the DHCP snooping database or from static entries
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
2
15. Where is loop guard enabled?
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
All nondesignated ports - but ok for all ports
Needs hardware upgrade over WEP - uses AES encryption
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
16. Where shoul dmultilayer switches be implemented?
Distributed coordinion function - the use of timers to prevent wireless collisions
PAgP (Cisco proprietary) and LACP (standards-based)
2 strand MMF with MT-RJ or SC connectors
Distribution layer
17. What is DSCP?
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
Between any type of interface as long as the interface can have an L3 address assigned
The standby becomes active and stays active by default. Preemption can be configured
Differentiated services code point
18. How are GLBP timers used?
On by default
802.1D
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
By sending a gratuitous ARP
19. How should backbonefast be configured?
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
From the DHCP snooping database or from static entries
Cisco recommends only on the root bridge
On all switches in network to enable RLQ request and reply
20. When DHCP snooping is turned on - by default - it considers all ports ______
Untrusted
19
Receives the first packet of a traffic flow and routes it
By short-circuiting the max age timer
21. What is backbonefast?
Port with best root path cost on segment
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
The same as a standby group in HSRP
Between any type of interface as long as the interface can have an L3 address assigned
22. What does the epoch number indicate when looking at cef entries?
Port is forced to never authorize any connected client
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
The number of times the CEF table has bee flushed and regenerated as a whole
Silent
23. What is errdisable dtp-flap?
Change in trunk encap
Manages addition - deletion and renaming VLANs across the network
All L2 connectivity should be contained within the access layer.
By short-circuiting the max age timer
24. What is a discard adjacency?
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
Cisco recommends only on the root bridge
Packets are discarded due to an ACL or policy action
1/2 and 3/6
25. What are the characteristics of the distribution layer?
Switch(config-if)# vrrp xx where xx= group number
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
Can send and receive BDPUs
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
26. What method of QOS does voice traffic use most frequently?
Differentiated services
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Both ends should be on because on modes doesn't send PAgP or LACP packets
Enables portfast - sets the port to access and disables PAgP
27. What are the 3 unlicensed frequencies?
900 MHz - 2.4Ghz - and 5-6GHz
When the size of a cell is intentionally reduced
Lowest cumulative cost to root
Configuration and TCN
28. How does Root Guard work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. What is the adjacency table?
Each frame transmits its expected duration time
Can hear only BDPUs
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
The MST instance (MSTI) runs alongside the IST and represents an STP instance
30. RSTP BPDU structure
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
Because each frame is checked
Flash (class 3)
31. What is the switch block?
Two distribution switches that aggregate one or more access switches
Port is forced to never authorize any connected client
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
Routers are assigned to common GLBP group. All routers can be active and can load balance
32. How does DSCP handle IP precedence?
A client can roam to any WLC as long as it stays in a mobility group
Manually
Effectively stops STP on filtered ports
5 classes with 3 drop precedences
33. What does Root Guard do?
Another router must have a higher HSRP priority and have preemt set up
When the AP uplinks to an Ethernet network.
Controls where candidate root bridges can be connected and found on a network
Admin down
34. WPA encryption
Interim solution - uses same hardware as WEP - but uses TKIP encryption
Best effort delivery - integrated services model - and differentiated services model
Value - mask - and result (VMR) combinations
Each frame transmits its expected duration time
35. What is DSCP codepoint AF41(34)?
Flash override (class 4)
Enables portfast - sets the port to access and disables PAgP
They disguise the origin of an attack
The port asks the other end to trunk
36. What is a VRRP group?
Dynamic arp inspection
The same as a standby group in HSRP
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
63 kbps
37. How does HSRP election work?
1 IP subnet
Based on priority (0-255). Default is 100. Highest IP is tie breaker
Virtual Router Redundancy Protocol - pretty much the same as HSRP
Root
38. How do Cisco IP phones communicate with the CCM?
With the skinny protocol
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
Packets must be sent to the L3 engine for further processing
39. What is a null adjacency?
Used to switch packets destined for the null interface
Checks the source MAC in the header against the sender MAC in the ARP reply
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
40. If you want IP source guard to detect spoofed MAC addresses - what must you do?
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
To a VLAN and not to a VLAN interface (SVI)
Turn on port security
41. What is an IST instance?
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
Roughly 50%
The TOS field in the header is used. 2 methods 3 bits or 6 bits
224.0.0.2 (all routers)
42. What happens if both 802.1D and RSTP BDPUs are received?
1 IP subnet
Packets must be sent to the L3 engine for further processing
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
43. What is an SVI?
2 - one for control messages and one for data
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
44. What happens when switches receive a configuration BDPU?
Etherchannel ports have inconsistent config
Auto mode
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
45. What contains the next-hop entries?
Group (0-255) - priority (1-254 254 is highest - 100 default)
Every switch and router in a network must be configured with appropriate QoS features and policies
Based on priority (0-255). Default is 100. Highest IP is tie breaker
FIB
46. How are RSTP point to point ports determined?
5 (0-4 with 4 being the highest)
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
Full duplex
Used when ACLs specify port ranges...used by TCAM
47. How long are TCAM masks?
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
19
134 bits
48. What is PVST plus (PVST+)?
224.0.0.2 (all routers)
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
0-255
49. How does ILP do power discovery?
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
When a client roams between Aps in different subnets
Virtual Router Redundancy Protocol - pretty much the same as HSRP
Yes
50. What is DSCP codepoint AF11(10)?
Priority (class 1)
Packets are discarded due to an ACL or policy action
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
By configuring every switch port to have an expected and controlled behavior