SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is differentiated services model QOS?
When a wireless station transmits a frame - the receiving one must send an ack
Each network device handles packets individually with no advance reservations
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Yes
2. What are the VRRP group and priority numbers?
It is enabled by default on all CEF capable switches
Group (0-255) - priority (1-254 254 is highest - 100 default)
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
To a VLAN and not to a VLAN interface (SVI)
3. What is an end to end vlan?
Silent
Configure the timer on the AVG and let it propagate
A VLAN that spans the entire fabric
Embeds the tag within the frame
4. How many tunnels exist between the LAP and WLC?
All ARP packets that arrive on untrusted ports are inspected.
2 - one for control messages and one for data
Using a mobility exchange message
63 kbps
5. How is the IPT 802.1 trunk negotiated?
Port that connects to another switch and becomes a designated port
Isolated and community
Automatically using DTP and CDP
RPR - RPR+ - and SSO
6. When should CDP be enabled?
802.1D
Only for trusted Cisco gear - especially phones
After forwarding delay - port can learn new MAC addresses
1500B
7. What is GLBP weight?
By default weight is 100. Can be made dynamic per interface
A single broadcast domain
Weak key rotation
Using a single WAP to centralize access and control over a group of wireless devices.
8. What 2 tunnelling mechanisms do the LAP and WLC use to communicate?
The master router can share the VIP
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
9. How is Root Guard used?
All ARP packets that arrive on untrusted ports are inspected.
Receives the first packet of a traffic flow and routes it
Based on priority (0-255). Default is 100. Highest IP is tie breaker
On ports where you never expect to find a root bridge for a VLAN
10. What contains the next-hop entries?
FIB
PAgP (Cisco proprietary) and LACP (standards-based)
Packets are discarded due to an ACL or policy action
After forwarding delay - port can learn new MAC addresses
11. What data does DHCP snooping track?
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
802.1D
Completed dhcp bindings - mac addresses - IP addresses - etc.
When the size of a cell is intentionally reduced
12. What is the access layer best practice?
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
All L2 connectivity should be contained within the access layer.
Dynamic WEP keys that change periodically
FE - GE - and aggregated FE/GE Etherchannels
13. What are the 3 trunk encap modes?
Untrusted
Frames that barely exceed 1518B or 1622B due to headers
Isl - dot1q - negotiate (default)
No
14. What is the IEEE standard for STP?
2-8 FE - GE - or 10GE are bundled.
Switch(config-if)# vrrp xx where xx= group number
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
802.1D
15. What can the Etherchannel hash use?
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
The MST instance (MSTI) runs alongside the IST and represents an STP instance
Only the standby monitors the hello messages from the active router
16. What is unique about HSRP group numbers?
Lowest cumulative cost to root
0-65535 (def 32768) lower=better
By name - config revision - and instance to vlan mapping table
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
17. What is dynamic auto?
Will trunk if asked
Discarding - learning - forwarding
Lowest cumulative cost to root
Differentiated services code point
18. How is the HSRP MAC address configured?
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
0000.0c07.acxx where xx is the group number as a 2-digit hex value
Flash override (class 4)
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
19. What is a BSS?
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
Using a single WAP to centralize access and control over a group of wireless devices.
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
Dynamic WEP keys that change periodically
20. What is a vlan?
A single broadcast domain
Packets must be sent to the L3 engine for further processing
Data and voice over native vlan no QOS and no 802.1p trunk
From the DHCP snooping database or from static entries
21. What are the characteristics of the access layer?
The standby becomes active and stays active by default. Preemption can be configured
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
0000.0c07.acxx where xx is the group number as a 2-digit hex value
On ports where you never expect to find a root bridge for a VLAN
22. RSTP point to point port
Group (0-1023) priority (1-255 higher better def 100)
Port that connects to another switch and becomes a designated port
Automatically negotiates a common trunk mode between switches
When a wireless station transmits a frame - the receiving one must send an ack
23. What is an autonomous mode AP?
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
Only when a nonedge port transitions to forwarding
Only for the offending VLAN on the port
When each AP stands alone within the larger network.
24. How can BDPU Guard be configured?
Globally or per-port
Change in trunk encap
Matching SSID - compatible data rate - authentication credentials
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
25. How often are VRRP advertisements sent?
Will trunk if asked
1 second. Backup routers can learn the interval from the master
The wireless clients communicate directly with no other means of connectivity such as a WAP
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
26. WPA encryption
Configure non-silent submode
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
Only when a nonedge port transitions to forwarding
Interim solution - uses same hardware as WEP - but uses TKIP encryption
27. What is DSCP codepoint AF41(34)?
Flash override (class 4)
Matching SSID - compatible data rate - authentication credentials
Half-duplex
To the virtual port-channel interface
28. What is RTP?
300 sec
The same as a standby group in HSRP
SC fiber or RJ-45
Real-time Transport Protocol
29. What is dhcp snooping rate limiting?
Limits the number if dhcp requests on a port
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
SC fiber or RJ-45
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
30. How are RSTP point to point ports determined?
Reboots and searches for a new WLC
2 strand MMF with MT-RJ or SC connectors
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
31. How does ISL do trunking?
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
By encapsulating each frame in a header and trailer
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
Full duplex
32. What are the restrictions for bundling into an Etherchannel?
All fiber-optic links between switches (must be enabled on both ends)
A single broadcast domain
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
To the virtual port-channel interface
33. What types of authentication does HSRP allow?
Distribution layer
The DCF interframe space- the random backoff time before a wireless set can transmit
Flash (class 3)
Plain text or md5
34. Where does layer switching occur?
Between any type of interface as long as the interface can have an L3 address assigned
The time that a port spends in both listening and learning states . Default 15 seconds
Checks the destination MAC in the header against the target MAC in the ARP reply
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
35. What functions does a WLC perform?
Control functions
Trusted ports
0-255
Yes to both
36. What is a proxy arp?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
37. What are dynamic VLANs based on?
All user ports that have portfast enabled
The link status stays up - but something between them has failed or is filtering traffic
MAC of the end device
Configure the timer on the AVG and let it propagate
38. What does the src-mac option do when checking ARP replies
Manually
Control functions
4
Checks the source MAC in the header against the sender MAC in the ARP reply
39. How does VRRP do tracking?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
40. How does RSTP converge?
By configuring every switch port to have an expected and controlled behavior
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Data and voice over native vlan - no QOS but still uses 802.1p trunk
Can hear only BDPUs
41. How are multiple VLANs mapped to multiple SSIDs?
By using a trunk link
Multicast to 01-80-c2-00-00-00
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
By brining up a tunnel between them to carry 802.11 related messages and client data.
42. What is a wall wart?
An ac adaptor that plugs into a wall outlet.
FE - GE - and aggregated FE/GE Etherchannels
Can send and receive BDPUs
Transmits keystrokes from phone and commands from CCM
43. What does port-security protect do?
Because each frame is checked
Each frame transmits its expected duration time
Port stays up - packets from violating MACs dropped - no logging
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
44. What is backbonefast?
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
With the skinny protocol
45. What is route caching?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
46. What are the caveats for HSRP port tracking?
Show standby
All nondesignated ports - but ok for all ports
Another router must have a higher HSRP priority and have preemt set up
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
47. What are the 3 unlicensed frequencies?
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
Used to switch packets destined for the null interface
900 MHz - 2.4Ghz - and 5-6GHz
48. Where is loop guard enabled?
Using a single WAP to centralize access and control over a group of wireless devices.
Trusted ports
All nondesignated ports - but ok for all ports
900 MHz - 2.4Ghz - and 5-6GHz
49. What is the range of HSRP group numbers?
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
10-15%
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
0-255
50. What is an ESS?
Only for trusted Cisco gear - especially phones
Critical...used most often for IPT
When the AP uplinks to an Ethernet network.
When a wireless station transmits a frame - the receiving one must send an ack