SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does IPT behave when the voice VLAN is in vlan-id mode?
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
VTP server for domain null with no password or secure mode
To a VLAN and not to a VLAN interface (SVI)
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
2. What is the port priority range?
Half because transmitting and receiving stations use the same frequency
No
0-255 (lower is better)
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
3. Where should STP timers be configured and why?
On root - because the root bridge propagates timers with config BDPU
The master router can share the VIP
Incoming frames dropped - but MACs learned
Each frame transmits its expected duration time
4. Automatically configure STP timers
Forces the router to wait for a period of time before attempting overthrow
BGP - EIGRP - OSPF - and IS-IS.
26-byte header - 4-byte trailer with CRC
Use the spanning-tree root macro
5. What is 802.1x auto?
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
When each AP stands alone within the larger network.
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Trunk
6. How does 802.3af do power discovery?
With the skinny protocol
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
Sends a voltage across the receive pairs to detect a 25k ohm resistance
All user ports that have portfast enabled
7. How do VRRP routers handle preemption?
No because they only participate if asked
On by default
Determines when the AVG will stop using the old VMAC in ARP replies
Switchpotrt nonegotiate
8. RSTP forwarding state
Frames are forwarded
7 switches from root bridge
If any BDUP is received on a port - it puts the port into the errdisable state
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
9. What are the two etherchannel negotiation protocols?
26-byte header - 4-byte trailer with CRC
Arp for local subnet - if on different subnet - will arp for dgw
PAgP (Cisco proprietary) and LACP (standards-based)
Auto mode
10. if the switchport is part of an etherchannel - Where is the network assigned
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
Roughly 2000
To the virtual port-channel interface
Distribution layer
11. can root guard and udld be used together?
Half because transmitting and receiving stations use the same frequency
Yes
Configure the timer on the AVG and let it propagate
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
12. How does HSRP do MD5 authentication?
Using a mobility exchange message
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
By using a hash of a key string
13. What are the characteristics of the distribution layer?
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
Port
Group (0-255) - priority (1-254 254 is highest - 100 default)
14. When looking at the sh spanning tree output - What does P2P peer(STP) denote?
A group of wireless devices that share a common SSID
A point to point port type but the neighboring device runs traditional 802.1D STP
Can hear only BDPUs
When the AP uplinks to an Ethernet network.
15. What is an insignificant topology change?
A host port goes up or down
0-255
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
Use the spanning-tree root macro
16. can root guard and loop guard be used together
Dynamic arp inspection
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
No
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
17. what should you do if you expect a PAgP capable switch at the other end vs. a server or host?
Configure non-silent submode
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
FIB
Round robin - weighted - or host-dependent
18. What is portfast?
Via an 802.1Q trunk or a single VLAN access port
No
Almost eliminates listening and learning states for single hosts on an access link
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
19. How do IP phones communicate with each other?
5 (0-4 with 4 being the highest)
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
A private VLAN can be logically associated with a special secondary vlan
Once the CCM gives them the parameters - they use RTP
20. How many potential links can LACP define?
By creating a static IP binding
Src-dst-ip
16 - of which up to 8 are active. The others are in standby
By configuring every switch port to have an expected and controlled behavior
21. what do multilayer switches do?
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
Both layer 2 switching and IVR
Per VLAN
Manages addition - deletion and renaming VLANs across the network
22. Does GLBP allow preemption?
Yes
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
Access
Globally or per-port
23. What is the size of a TCAM value?
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Weak key rotation
Access
24. What types of ports autonegotiate?
FE and GE
With the skinny protocol
That they aren't using the same frequencies.
12 kbps with headers and compression
25. What is the FM?
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
The link status stays up - but something between them has failed or is filtering traffic
By using an Ether-IP tunnel
That they aren't using the same frequencies.
26. Where should you change the network diameter value?
The number of times the entry has been updated since the table was generated
Half-duplex
Cisco recommends only on the root bridge
Dynamic arp inspection
27. How does 802.1q handle COS?
Yes
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
On all switches in network to enable RLQ request and reply
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
28. What are the 3 ways GLBP load-balances?
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
Round robin - weighted - or host-dependent
Group (0-1023) priority (1-255 higher better def 100)
Only for the offending VLAN on the port
29. How do you configure DAI for statically configured IP addresses?
If any BDUP is received on a port - it puts the port into the errdisable state
Configure the timer on the AVG and let it propagate
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
By an ARP access list that defines the permitted bindings
30. What is DSCP codepoint AF11(10)?
On by default
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
Priority (class 1)
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
31. What is the VRRP skew time?
RPR - RPR+ - and SSO
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
32. What is a baby giant frame?
Arp for local subnet - if on different subnet - will arp for dgw
Frames that barely exceed 1518B or 1622B due to headers
If the switch or the powered device doesn't suport power class discovery
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
33. How many links can be used in an EtherChannel?
A MAC is seen on a different port
2-8 FE - GE - or 10GE are bundled.
Once the CCM gives them the parameters - they use RTP
Trunk
34. What is a topology change?
When a port moves into forwarding or from fowarding or learning to blocking.
Used when there are 1 or more VLANs mapped to a single STP instance
Those that connect to other switches
802.1x with EAP over LAN (EAPOL)
35. What happens if both 802.1D and RSTP BDPUs are received?
When a wireless station transmits a frame - the receiving one must send an ack
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
With the skinny protocol
Priority (class 1)
36. What is the default FE duplex?
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Full duplex
Root
No
37. can root guard and bdpu guard be used together?
Forces the router to wait for a period of time before attempting overthrow
Plain text or md5
1-65535 (def 32768) lower priority - higher probability
No
38. How do you prevent switch spoofing?
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
1 per segment
Configure and enable DHCP snooping
By configuring every switch port to have an expected and controlled behavior
39. What is the GLBP group and priority range
No shut
Group (0-1023) priority (1-255 higher better def 100)
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
By using a trunk link
40. How often are CAM table entries aged?
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
300 sec
Globally
41. How much overlap should WAPs have?
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
Only for trusted Cisco gear - especially phones
10-15%
224.0.0.2 (all routers)
42. How are BDPUs spread?
A VLAN that spans the entire fabric
Multicast to 01-80-c2-00-00-00
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
Critical...used most often for IPT
43. What functions does a WLC perform?
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
Control functions
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
All user ports that have portfast enabled
44. What does MSTP consist of?
300 sec
Regions and instances
802.1w
The DCF interframe space- the random backoff time before a wireless set can transmit
45. What are LOU register pairs?
Used when ACLs specify port ranges...used by TCAM
Only when a nonedge port transitions to forwarding
Via an 802.1Q trunk or a single VLAN access port
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
46. How does every HSRP config command begin?
L2
63 kbps
Interim solution - uses same hardware as WEP - but uses TKIP encryption
Switch(config-if)# standby xx where x= group number
47. How does HSRP port tracking work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
48. What does a LAP do if it loses communication with it's WLC?
Reboots and searches for a new WLC
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
49. On what scope is DAI enabled?
Per VLAN
10-15%
Time between BDPUs sent by root bridge. Default of 2 seconds
When a port moves into forwarding or from fowarding or learning to blocking.
50. What does the switchport host macro do?
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
It's a router that maintains routes (static or dynamic) - and populates the FIB
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk