SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How can you tell if a switch block is too large?
Flash (class 3)
PAgP (Cisco proprietary) and LACP (standards-based)
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
Trusted or untrusted
2. Which ports should you consider trusted for DAI?
From the DHCP snooping database or from static entries
Those that connect to other switches
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
3. What is an indirect topology change?
The link status stays up - but something between them has failed or is filtering traffic
Configuration and TCN
1-65535 (def 32768) lower priority - higher probability
That they aren't using the same frequencies.
4. What is NSF?
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
An L2 switch can only forward frames best effort unless going across a trunk
FE - GE - and aggregated FE/GE Etherchannels
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
5. What are 2 ways to configure VLAN and VTP information?
Routers are assigned to common GLBP group. All routers can be active and can load balance
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
All L2 connectivity should be contained within the access layer.
Distributed coordinion function - the use of timers to prevent wireless collisions
6. If the WLC connects to an Etherchannel - how should the channel be configured and why?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. What 2 conditions does IP source guard check for?
On the left as you face the connector
0000.5e00.01xx
Used to switch packets destined for the null interface
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
8. How does a DHCP server send WLC addresses?
Show standby
Discarding - learning - forwarding
Option 43
224.0.0.2 (all routers)
9. What are the 3 trunk switchport modes?
Another router must have a higher HSRP priority and have preemt set up
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
Trunk - dynamic auto - dynamic desireable (default)
10. what if a secondary VLAN?
Priority (class 1)
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
Yes
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
11. How does packet forwarding work
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
Arp for local subnet - if on different subnet - will arp for dgw
By an ARP access list that defines the permitted bindings
By configuring every switch port to have an expected and controlled behavior
12. What is layer 3 roaming?
MAC of the end device
By default weight is 100. Can be made dynamic per interface
Limits the number if dhcp requests on a port
When a client roams between Aps in different subnets
13. What is the cost of a 100Mbps link?
Access or trunk
19
Configuration and TCN
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
14. How does the CEF L3 engine operate?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. What are the port channel load balancing methods?
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
Connects with SONET or SDH
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
When the size of a cell is intentionally reduced
16. What are the characteristics of the distribution layer?
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
Admin down
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
17. What can the Etherchannel hash use?
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
The wireless clients communicate directly with no other means of connectivity such as a WAP
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
18. What are TCAM entries composed of?
Sends a voltage across the receive pairs to detect a 25k ohm resistance
Configure non-silent submode
Value - mask - and result (VMR) combinations
Edge - root - and point to point
19. How far chould a VLAN extend?
A MAC is seen on a different port
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
Distribution layer
20. What is layer 2 roaming?
With portfast
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
Collision domain
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
21. What is the default FE duplex?
Can send and receive BDPUs
Using a single WAP to centralize access and control over a group of wireless devices.
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
Full duplex
22. What are the characteristics of the core layer
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
Controls where candidate root bridges can be connected and found on a network
Can hear only BDPUs
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
23. What is dhcp snooping rate limiting?
Limits the number if dhcp requests on a port
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
24. What are the characteristics of the access layer?
By configuring every switch port to have an expected and controlled behavior
The ASIC
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
25. What happens if both 802.1D and RSTP BDPUs are received?
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
Root
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
26. What is the default mode of load balancing?
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Src-dst-ip
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
Access
27. What is the traditional MLS view of switching?
When the size of a cell is intentionally reduced
Yes
Route once - switch many
Multicast to 01-80-c2-00-00-00
28. What is the STP blocking state?
The active router. All other routers are in backup state
Can hear only BDPUs
Used to switch packets destined for the null interface
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
29. For QoS - switch uplinks should always be considered as ____ _____?
TCAM
802.11
Trusted ports
0-255
30. What is UDLD aggressive mode?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
31. What are the gotchas for uplinkfast?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. What is DAI?
Data and voice over native vlan no QOS and no 802.1p trunk
Globally
Dynamic arp inspection
Only when a nonedge port transitions to forwarding
33. By default - what submode does PAgP operate in with the desirable and auto modes?
Arp for local subnet - if on different subnet - will arp for dgw
Checks the source MAC in the header against the sender MAC in the ARP reply
Silent
Half-duplex
34. What is DSCP codepoint AF21(18)?
VTP server for domain null with no password or secure mode
The wireless clients communicate directly with no other means of connectivity such as a WAP
Immediate (class 2)
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
35. What is the PVLAN promiscuous mode?
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
Configuration and TCN
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
36. Can loop guard and udld be used together?
When the AP uplinks to an Ethernet network.
Yes
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
37. RSTP uses which standard?
Every switch and router in a network must be configured with appropriate QoS features and policies
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
802.1w
38. What cabling do GBICs use?
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
Between interfaces that are assigned to L2 VLANs or L2 trunks
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
SC fiber or RJ-45
39. What are LOU register pairs?
Switchpotrt nonegotiate
Used when ACLs specify port ranges...used by TCAM
By an ARP access list that defines the permitted bindings
The total delay from start to finish
40. What is jitter?
Variation in delay
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
Routers are assigned to common GLBP group. All routers can be active and can load balance
L2
41. How is a WLC handoff handled when the WLCs are in different subnets?
By brining up a tunnel between them to carry 802.11 related messages and client data.
Bridge priority and MAC
By using an Ether-IP tunnel
5 (0-4 with 4 being the highest)
42. What are the caveats for HSRP port tracking?
The standby becomes active and stays active by default. Preemption can be configured
Another router must have a higher HSRP priority and have preemt set up
Configure and enable DHCP snooping
Flash (class 3)
43. What is 802.1x auto?
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Turn on port security
All L2 connectivity should be contained within the access layer.
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
44. What is topology-basec caching?
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
RADIUS
45. Where are security and QoS ACLs stored?
The distribution layer should have only L3 links
By short-circuiting the max age timer
The total delay from start to finish
TCAM
46. How many tunnels exist between the LAP and WLC?
Completed dhcp bindings - mac addresses - IP addresses - etc.
Differentiated services
After forwarding delay - port can learn new MAC addresses
2 - one for control messages and one for data
47. How often are VRRP advertisements sent?
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
Root
The standby becomes active and stays active by default. Preemption can be configured
1 second. Backup routers can learn the interval from the master
48. How can you load-balance with HSRP?
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
Group (0-1023) priority (1-255 higher better def 100)
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
49. what must be done on an SVI before it is activated?
No shut
Automatically using DTP and CDP
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
Collision domain
50. How does an LAP bind with a WLC?
On ports where you never expect to find a root bridge for a VLAN
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
By brining up a tunnel between them to carry 802.11 related messages and client data.