SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How are multiple VLANs mapped to multiple SSIDs?
Distribution layer
By using a trunk link
The number of times the CEF table has bee flushed and regenerated as a whole
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
2. What are the 5 steps a LAP uses to establish communication with a WLC?
1/2 and 3/6
Port that connects to another switch and becomes a designated port
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
1-1005 (1 and 1002-1005 are reserved)
3. How should backbonefast be configured?
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
Only a single host connects . If one BDPU is received - it is no longer an edge port
On all switches in network to enable RLQ request and reply
MAC of the end device
4. How does IPT behave when the voce VLAN is in the default none mode?
Usually QoS from VOIP but not PC dataa
Data and voice over native vlan no QOS and no 802.1p trunk
Distribution layer
Globally
5. How does GLBP work?
When a wireless station transmits a frame - the receiving one must send an ack
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
Routers are assigned to common GLBP group. All routers can be active and can load balance
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
6. How is a QoS trust bondary configured?
A key string of up to 8 characters is sent. Default is cisco.
The campus network's backbone
Every switch and router in a network must be configured with appropriate QoS features and policies
A host port goes up or down
7. what I s distributed CEF (dCEF)?
Both layer 2 switching and IVR
CEF is distributed completely among multiple L3 forwarding engines.
Priority (class 1)
PAgP (Cisco proprietary) and LACP (standards-based)
8. What does Root Guard do?
RADIUS
Dynamic arp inspection
Controls where candidate root bridges can be connected and found on a network
Trunk - dynamic auto - dynamic desireable (default)
9. How does RSTP identify a topology change?
Trusted or untrusted
80% of the user traffic should stay in the VLAN
802.1D
Only when a nonedge port transitions to forwarding
10. What does the SP do?
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
Full duplex
No
Using a single WAP to centralize access and control over a group of wireless devices.
11. If a wireless station needs to transmit and no other device is transmitting - what happens?
Best effort delivery - integrated services model - and differentiated services model
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
The station can transmit immediately and wait for an ack
Using a mobility exchange message
12. Can loop guard and udld be used together?
PAgP (Cisco proprietary) and LACP (standards-based)
On ports where you never expect to find a root bridge for a VLAN
The same as a standby group in HSRP
Yes
13. What format does the GLBP MAC use?
Trunk
Group (0-1023) priority (1-255 higher better def 100)
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
After forwarding delay - port can learn new MAC addresses
14. How are frames forwarded across a specific link?
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
63 kbps
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
Hashing algorithm
15. What categories can ports be in with dhcp snooping enabled?
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Trusted or untrusted
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
16. Where is UDLD enabled?
All fiber-optic links between switches (must be enabled on both ends)
Normal and aggressive
RADIUS
FIB
17. What is the default FE duplex?
Full duplex
Yes
Both ends should be on because on modes doesn't send PAgP or LACP packets
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
18. Does a WLC and a LAP need to be on the same subnet?
Per VLAN
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
No
19. What are the steps to configuring HSRP MD5 authentication?
Embeds the tag within the frame
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
All L2 connectivity should be contained within the access layer.
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
20. How do you configure a DHCP gateway?
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
Multicast to 01-80-c2-00-00-00
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
21. can root guard and udld be used together?
PAgP (Cisco proprietary) and LACP (standards-based)
Yes
0000.5e00.01xx
No
22. How does HSRP port tracking work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
23. What does the reload keyword do in HSRP?
By brining up a tunnel between them to carry 802.11 related messages and client data.
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
Full duplex
24. What if RSTP BDPUs aren't received?
Admin down
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
Enables portfast - sets the port to access and disables PAgP
25. Where is loop guard enabled?
Multicast to 01-80-c2-00-00-00
Usually QoS from VOIP but not PC dataa
All nondesignated ports - but ok for all ports
No because they only participate if asked
26. What is a drop adjacency?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
27. What is the STP Max Age timer?
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
All user ports that have portfast enabled
28. How does HSRP do MD5 authentication?
Root - designated - blocking - alternate - forwarding (host)
By using a hash of a key string
Switching Database Manager - configures and prunes TCAM partitions
Route once - switch many
29. What is route caching?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
30. What are the RSTP port roles?
Globally or per-port
On root - because the root bridge propagates timers with config BDPU
Root - designated - alternate - and backup
Configure the timer on the AVG and let it propagate
31. What criteria are used to size a switch block?
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Routers are assigned to common GLBP group. All routers can be active and can load balance
2 seconds
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
32. What is layer 3 roaming?
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Another router must have a higher HSRP priority and have preemt set up
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
When a client roams between Aps in different subnets
33. What is a BSS?
It can't
Using a single WAP to centralize access and control over a group of wireless devices.
CEF is distributed completely among multiple L3 forwarding engines.
An AP's coverage area
34. By default - what layer do catalyst switchports operate on?
Round robin - weighted - or host-dependent
No
L2
The campus network's backbone
35. RSTP alternate port
Port with alternative path to root less desirable than root
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
Yes to both
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
36. How is root port decided upon?
Lowest cumulative cost to root
When the AP uplinks to an Ethernet network.
Between any type of interface as long as the interface can have an L3 address assigned
Those that connect to other switches
37. What is the 80/20 rule?
0000.5e00.01xx
80% of the user traffic should stay in the VLAN
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
CEF is distributed completely among multiple L3 forwarding engines.
38. What is integrated services model QOS?
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
The DCF interframe space- the random backoff time before a wireless set can transmit
Usually QoS from VOIP but not PC dataa
Connects with SONET or SDH
39. How does DAI work?
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
All ARP packets that arrive on untrusted ports are inspected.
Roughly 2000
SC fiber or RJ-45
40. How do IP phones communicate with each other?
Once the CCM gives them the parameters - they use RTP
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
2
41. What does the standby HSRP router do?
300 sec
Only the standby monitors the hello messages from the active router
Critical...used most often for IPT
1-1005 (1 and 1002-1005 are reserved)
42. What are the 3 trunk switchport modes?
The L3 forwarding engine can't forward the packet in hardware because there is no L2 next-hop address - so the packet is sent to the L3 engine to generate the ARP response
Etherchannel ports have inconsistent config
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
Trunk - dynamic auto - dynamic desireable (default)
43. What is topology-basec caching?
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
16 - of which up to 8 are active. The others are in standby
It is enabled by default on all CEF capable switches
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
44. How many users should be within a switch block?
A MAC is seen on a different port
Roughly 2000
Use the spanning-tree root macro
Between any type of interface as long as the interface can have an L3 address assigned
45. How often are HSRP hellos sent?
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
3 seconds. Holdtime =3 hellos + 1
One that can be detected on a switch interface (ie. Up/down)
0000.5e00.01xx
46. What is errdisable pagp-flap?
Etherchannel ports have inconsistent config
The ASIC
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
Control functions
47. What is the GLBP redirect timer?
Isl - dot1q - negotiate (default)
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Either desirable or auto mode
Determines when the AVG will stop using the old VMAC in ARP replies
48. What is NSF?
Only a single host connects . If one BDPU is received - it is no longer an edge port
Via an 802.1Q trunk or a single VLAN access port
Disabled - blocking - listening - learning - forwarding
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
49. How does PAgP form etherchannels?
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
VTP server for domain null with no password or secure mode
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
No
50. How does an LAP bind with a WLC?
By brining up a tunnel between them to carry 802.11 related messages and client data.
Lowest cumulative cost to root
The port is forced to always authorize any connected client with no authentication necessary (default)
80% of the user traffic should stay in the VLAN