SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the bridge priority range?
Silent
1 per segment
0-65535 (def 32768) lower=better
Can send and receive BDPUs
2. How does HSRP plain text authentication work?
The port is forced to always authorize any connected client with no authentication necessary (default)
L2
A key string of up to 8 characters is sent. Default is cisco.
Trunk
3. What criteria are used to size a switch block?
802.1D
Dynamic WEP keys that change periodically
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
4. What is a discard adjacency?
Critical...used most often for IPT
Packets are discarded due to an ACL or policy action
Regions and instances
Completed dhcp bindings - mac addresses - IP addresses - etc.
5. What is a CEF punt?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. What is the cost of a 100Mbps link?
Time between BDPUs sent by root bridge. Default of 2 seconds
The station can transmit immediately and wait for an ack
19
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
7. what I s distributed CEF (dCEF)?
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
Between any type of interface as long as the interface can have an L3 address assigned
CEF is distributed completely among multiple L3 forwarding engines.
When a port moves into forwarding or from fowarding or learning to blocking.
8. What is the format of the VRRP virtual MAC?
By configuring every switch port to have an expected and controlled behavior
0000.5e00.01xx
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
9. How are RSTP point to point ports determined?
Completed dhcp bindings - mac addresses - IP addresses - etc.
3 seconds. Holdtime =3 hellos + 1
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
10. If a wireless station needs to transmit and no other device is transmitting - what happens?
Value - mask - and result (VMR) combinations
Configure and enable DHCP snooping
The station can transmit immediately and wait for an ack
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
11. If you want IP source guard to detect spoofed MAC addresses - what must you do?
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
The standby becomes active and stays active by default. Preemption can be configured
By creating a static IP binding
Turn on port security
12. What does port-security restrict do?
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
Disabled - blocking - listening - learning - forwarding
13. What is 802.1x force-unauthorized?
Frames that barely exceed 1518B or 1622B due to headers
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
Port is forced to never authorize any connected client
FE and GE
14. What are LOU register pairs?
Used when ACLs specify port ranges...used by TCAM
Between interfaces that are assigned to L2 VLANs or L2 trunks
224.0.0.2 (all routers)
Promiscuous and host
15. What data does DHCP snooping track?
1500B
Yes to both
Completed dhcp bindings - mac addresses - IP addresses - etc.
0-255
16. How does ILP do power discovery?
1/2 and 3/6
On root - because the root bridge propagates timers with config BDPU
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
By default weight is 100. Can be made dynamic per interface
17. What is 802.1x force-authorized?
Port stays up - packets from violating MACs dropped - no logging
FIB
Manually
The port is forced to always authorize any connected client with no authentication necessary (default)
18. What is the standard for WLANs?
Turn on port security
802.11
Discarding - learning - forwarding
L2
19. What are the steps of RSTP convergence?
On all switches in network to enable RLQ request and reply
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
When each AP stands alone within the larger network.
By short-circuiting the max age timer
20. What are the RSTP port roles?
The DCF interframe space- the random backoff time before a wireless set can transmit
The time that a port spends in both listening and learning states . Default 15 seconds
Root - designated - alternate - and backup
Forces the router to wait for a period of time before attempting overthrow
21. What is a LACP priority?
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
When the AP uplinks to an Ethernet network.
Silent
Data and voice over native vlan - no QOS but still uses 802.1p trunk
22. How does a DHCP server send WLC addresses?
The port asks the other end to trunk
Option 43
63 kbps
Configuration and TCN
23. If the WLC connects to an Etherchannel - how should the channel be configured and why?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
24. What can cause a wireless client to switch between Aps?
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
Both layer 2 switching and IVR
Discarding - learning - forwarding
Lowest cumulative cost to root
25. How does a LAP and a WLC authenticate between each other?
Using digital certificates
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
Multicasts to 224.0.0.18 (VRRP)
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
26. What are the 5 STP port roles?
Root - designated - blocking - alternate - forwarding (host)
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
2 strand MMF with MT-RJ or SC connectors
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
27. What is an insignificant topology change?
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
A host port goes up or down
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
On the left as you face the connector
28. How does an L2 switch do QOS?
An L2 switch can only forward frames best effort unless going across a trunk
Yes
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
Src-dst-ip
29. What is UDLD normal mode?
Every switch and router in a network must be configured with appropriate QoS features and policies
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
Root - designated - alternate - and backup
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
30. If a wireless station needs to transmit and another device is transmitting - what happens?
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
Discarding - learning - forwarding
Root - designated - blocking - alternate - forwarding (host)
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
31. What is the GLBP redirect timer?
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
Configure and enable DHCP snooping
Determines when the AVG will stop using the old VMAC in ARP replies
32. What is dynamic auto?
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
Will trunk if asked
33. What is a drop adjacency?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. What is the STP forward delay timer?
Each frame transmits its expected duration time
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
Yes to both
The time that a port spends in both listening and learning states . Default 15 seconds
35. How does every HSRP config command begin?
2 strand MMF with MT-RJ or SC connectors
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
Switch(config-if)# standby xx where x= group number
Almost eliminates listening and learning states for single hosts on an access link
36. What are the two etherchannel negotiation protocols?
PAgP (Cisco proprietary) and LACP (standards-based)
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
Globally
Local only
37. What types of links can be trunked?
FE - GE - and aggregated FE/GE Etherchannels
Embeds the tag within the frame
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Virtual Router Redundancy Protocol - pretty much the same as HSRP
38. What does uplinkfast do?
26-byte header - 4-byte trailer with CRC
A point to point port type
The same as a standby group in HSRP
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
39. What are the steps to configuring HSRP MD5 authentication?
1 to 64
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
1/2 and 3/6
Checks the destination MAC in the header against the target MAC in the ARP reply
40. How does DAI work?
Time between BDPUs sent by root bridge. Default of 2 seconds
All ARP packets that arrive on untrusted ports are inspected.
Value - mask - and result (VMR) combinations
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
41. Where shoul dmultilayer switches be implemented?
Distribution layer
They disguise the origin of an attack
From the DHCP snooping database or from static entries
Change in trunk encap
42. How does every VRRP command begin?
From the DHCP snooping database or from static entries
Switch(config-if)# vrrp xx where xx= group number
Collision domain
Yes
43. How does HSRP election work?
Trunk - dynamic auto - dynamic desireable (default)
That they aren't using the same frequencies.
Based on priority (0-255). Default is 100. Highest IP is tie breaker
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
44. What are the 4 steps to extend QoS trust?
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
Regions and instances
The redundant SUP is booted and sup and route engine is init'd. No L2 or L3 functions are started. Allows switchports to retain state
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
45. What is RTP?
Switches make an effort to move packets as quickly as possible
Real-time Transport Protocol
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
16 bits (8b port priority - 8b port number)
46. How does the CEF L3 engine operate?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
47. How should the switch port to which a WLC be configured?
Trunk
Incoming frames dropped - but MACs learned
Lowest cumulative cost to root
The master router can share the VIP
48. What are the 3 redundant supervisor modes?
Port
RPR - RPR+ - and SSO
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
49. What happens if both 802.1D and RSTP BDPUs are received?
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
On by default
The number of times the entry has been updated since the table was generated
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
50. What is DCF?
Distributed coordinion function - the use of timers to prevent wireless collisions
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
When a port moves into forwarding or from fowarding or learning to blocking.
Full duplex