SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is DAI?
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
Use sh interface on the interface and look for error counts > 10
Dynamic arp inspection
With the skinny protocol
2. What does the ip option do when checking ARP replies
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
3. Where should STP timers be configured and why?
On root - because the root bridge propagates timers with config BDPU
Port with alternative path to root less desirable than root
Dynamic arp inspection
10-15%
4. How does PAgP form etherchannels?
224.0.0.2 (all routers)
Using digital certificates
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
When the size of a cell is intentionally reduced
5. How does IPT behave when the voice VLAN is in vlan-id mode?
A single broadcast domain
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
Half because transmitting and receiving stations use the same frequency
6. What is the FM?
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
Access
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
Embeds the tag within the frame
7. How is RSTP synchronization accomplished?
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
Using digital certificates
A group of wireless devices that share a common SSID
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
8. What is the GLBP group and priority range
Group (0-1023) priority (1-255 higher better def 100)
Change in trunk encap
Trunk
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
9. What does the rewrite engine do?
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
Port with best root path cost on segment
1-1005 (1 and 1002-1005 are reserved)
To the virtual port-channel interface
10. What is an IST instance?
An L2 switch can only forward frames best effort unless going across a trunk
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
Promiscuous and host
Group (0-255) - priority (1-254 254 is highest - 100 default)
11. How does HSRP gateway addressing work
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
802.11
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
12. CAM table entries are purged when....
On all switches in network to enable RLQ request and reply
A MAC is seen on a different port
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
On ports where you never expect to find a root bridge for a VLAN
13. What is 802.1x force-authorized?
Distribution
The port is forced to always authorize any connected client with no authentication necessary (default)
Once the CCM gives them the parameters - they use RTP
Packets must be sent to the L3 engine for further processing
14. What is a wall wart?
An ac adaptor that plugs into a wall outlet.
When a wireless station transmits a frame - the receiving one must send an ack
Isolated and community
Flash override (class 4)
15. What is portfast?
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
Almost eliminates listening and learning states for single hosts on an access link
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
Real-time Transport Protocol
16. How does packet forwarding work
Arp for local subnet - if on different subnet - will arp for dgw
Used to switch packets destined for the null interface
Needs hardware upgrade over WEP - uses AES encryption
Differentiated services
17. What are the characteristics of the access layer?
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
Yes to both
Disabled - blocking - listening - learning - forwarding
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
18. How often are CAM table entries aged?
Distribution layer
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
300 sec
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
19. What is the PVLAN host mode?
A private VLAN can be logically associated with a special secondary vlan
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
26-byte header - 4-byte trailer with CRC
Promiscuous and host
20. What must be in common for a BSS to form?
Matching SSID - compatible data rate - authentication credentials
Disabled - init - listen - speak - standby - active
Switchpotrt nonegotiate
80% of the user traffic should stay in the VLAN
21. What is errdisable dtp-flap?
Configuration and TCN
If the switch or the powered device doesn't suport power class discovery
Limits the number if dhcp requests on a port
Change in trunk encap
22. How are errdisable triggers tuned?
When the AP uplinks to an Ethernet network.
Yes
The active router. All other routers are in backup state
Globally
23. Can two switches in the auto(PAgP) or passive (LACP) mode create a channel? Why?
Completed dhcp bindings - mac addresses - IP addresses - etc.
The link status stays up - but something between them has failed or is filtering traffic
Each frame transmits its expected duration time
No because they only participate if asked
24. Where are security and QoS ACLs stored?
Incoming frames are dropped (combination of disabled - blocking - and listening)
TCAM
Src-dst-ip
Used when there are 1 or more VLANs mapped to a single STP instance
25. How does Root Guard work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
26. What are the 2 types of secondary VLAN?
Multicasts to 224.0.0.18 (VRRP)
That they aren't using the same frequencies.
Isolated and community
4
27. what do multilayer switches do?
3 seconds. Holdtime =3 hellos + 1
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
Both layer 2 switching and IVR
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
28. What is latency?
Dynamic WEP keys that change periodically
The total delay from start to finish
The DCF interframe space- the random backoff time before a wireless set can transmit
Needs hardware upgrade over WEP - uses AES encryption
29. What can the Etherchannel hash use?
Connects with SONET or SDH
By creating a static IP binding
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Switchpotrt nonegotiate
30. What is the STP disabled state?
5 classes with 3 drop precedences
Dynamic WEP keys that change periodically
10-15%
Admin down
31. What does VTP do?
Manages addition - deletion and renaming VLANs across the network
Between any type of interface as long as the interface can have an L3 address assigned
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
Frames are forwarded
32. What is the acceptible range of VLANS?
Packets must be sent to the L3 engine for further processing
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
1-1005 (1 and 1002-1005 are reserved)
Configure non-silent submode
33. the static port to vlan membership is handled in _____
A host port goes up or down
The ASIC
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
As a VLAN access map
34. How are RSTP point to point ports determined?
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
A packet can't be switched in hardware with the FIB and must go to the L3 engine
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
0-255
35. What are the 6 steps to configure 802.1x for port security?
Data and voice over native vlan - no QOS but still uses 802.1p trunk
3 seconds. Holdtime =3 hellos + 1
An AP's coverage area
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
36. RSTP edge port
Only a single host connects . If one BDPU is received - it is no longer an edge port
By an ARP access list that defines the permitted bindings
Those that connect to other switches
All ports where root isn't expected
37. How should the switch port to which an autonomous AP be configured?
No
Port
Trunk
A point to point port type but the neighboring device runs traditional 802.1D STP
38. WPA2 encryption
When a wireless station transmits a frame - the receiving one must send an ack
Differentiated services code point
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
Needs hardware upgrade over WEP - uses AES encryption
39. Where shoul dmultilayer switches be implemented?
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
Can hear only BDPUs
Distribution layer
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
40. How much overlap should WAPs have?
Access
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Port that connects to another switch and becomes a designated port
10-15%
41. How do VRRP routers handle preemption?
On by default
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
Packets must be sent to the L3 engine for further processing
Globally
42. What is errdisable pagp-flap?
Src-dst-ip
Etherchannel ports have inconsistent config
As a VLAN access map
Between interfaces that are assigned to L2 VLANs or L2 trunks
43. Does a WLC and a LAP need to be on the same subnet?
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
Distributed coordinion function - the use of timers to prevent wireless collisions
No
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
44. What are the 4 steps to extend QoS trust?
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
To the virtual port-channel interface
The total delay from start to finish
45. What are the steps to configuring HSRP MD5 authentication?
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
On by default
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
When a wireless station transmits a frame - the receiving one must send an ack
46. What is an autonomous mode AP?
Switch(config-if)# vrrp xx where xx= group number
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
Half because transmitting and receiving stations use the same frequency
When each AP stands alone within the larger network.
47. What happens during HSRP failover?
2 - one for control messages and one for data
Connects with SONET or SDH
Priority (class 1)
The standby becomes active and stays active by default. Preemption can be configured
48. What criteria are used to size a switch block?
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
Trusted ports
By short-circuiting the max age timer
By name - config revision - and instance to vlan mapping table
49. What does port-security protect do?
Port stays up - packets from violating MACs dropped - no logging
Yes
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
Configure the timer on the AVG and let it propagate
50. 802.11b
Used when there are 1 or more VLANs mapped to a single STP instance
Trunk
Isl - dot1q - negotiate (default)
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz