SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does IPT behave when the voice VLAN is in vlan-id mode?
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
Yes
The TOS field in the header is used. 2 methods 3 bits or 6 bits
With the skinny protocol
2. What categories can ports be in with dhcp snooping enabled?
Trusted or untrusted
Incoming frames dropped - but MACs learned
The port is forced to always authorize any connected client with no authentication necessary (default)
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
3. where does L2 switching occur?
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
No shut
Between interfaces that are assigned to L2 VLANs or L2 trunks
MAC of the end device
4. How do you find duplex mismatches?
Use sh interface on the interface and look for error counts > 10
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
Trunk
Incoming frames are dropped (combination of disabled - blocking - and listening)
5. What does DTP do?
Using a single WAP to centralize access and control over a group of wireless devices.
Automatically negotiates a common trunk mode between switches
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
Edge - root - and point to point
6. What happens when the topology changes?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. How does backbonefast determine whether alternative paths exist?
Bridge priority and MAC
Disabled - init - listen - speak - standby - active
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
Flash override (class 4)
8. What is layer 3 roaming?
Group (0-1023) priority (1-255 higher better def 100)
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
When a client roams between Aps in different subnets
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
9. What 2 tunnelling mechanisms do the LAP and WLC use to communicate?
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
Embeds the tag within the frame
Collision domain
224.0.0.2 (all routers)
10. One vlan should =
By sending a gratuitous ARP
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
1 IP subnet
Another router must have a higher HSRP priority and have preemt set up
11. What is a wall wart?
A packet can't be switched in hardware with the FIB and must go to the L3 engine
Automatically negotiates a common trunk mode between switches
An ac adaptor that plugs into a wall outlet.
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
12. If a port is configured for errdisable auto recovery - how long does it stay down?
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
0-255
300 sec by default
By using a trunk link
13. If one end of an Etherchannel (either type) is set to on and the channel doesn't form - what should you check?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. How does ILP do power discovery?
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
If the switch or the powered device doesn't suport power class discovery
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
Root - designated - alternate - and backup
15. What's the easiest way to configure GLBP timers?
Configure the timer on the AVG and let it propagate
Trusted or untrusted
Between any type of interface as long as the interface can have an L3 address assigned
A packet can't be switched in hardware with the FIB and must go to the L3 engine
16. If a wireless station needs to transmit and another device is transmitting - what happens?
3 seconds. Holdtime =3 hellos + 1
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
17. What types of authentication does HSRP allow?
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
Plain text or md5
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
By configuring every switch port to have an expected and controlled behavior
18. How many MST instances can be in a region?
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
2 seconds
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
19. What is the traditional MLS view of switching?
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
Matching SSID - compatible data rate - authentication credentials
802.1x with EAP over LAN (EAPOL)
Route once - switch many
20. How is DHCP snooping enabled (scope)?
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
Globally
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
21. How do you renable an err-disable port by default?
A host port goes up or down
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
Manually
Round robin - weighted - or host-dependent
22. RSTP designated port
Port with best root path cost on segment
Cisco recommends only on the root bridge
Value - mask - and result (VMR) combinations
Turn on port security
23. What is dynamic auto?
802.1w
Will trunk if asked
RADIUS
Per VLAN
24. What is 802.1x force-unauthorized?
Switchpotrt nonegotiate
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
Port is forced to never authorize any connected client
From the DHCP snooping database or from static entries
25. What is the STP disabled state?
Yes
A VLAN that spans the entire fabric
63 kbps
Admin down
26. What is DSCP codepoint AF41(34)?
Flash override (class 4)
All fiber-optic links between switches (must be enabled on both ends)
1-1005 (1 and 1002-1005 are reserved)
134 bits
27. What is a LACP priority?
No
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
Determines when the AVG will stop using the old VMAC in ARP replies
28. EAP encryption
Dynamic WEP keys that change periodically
12 kbps with headers and compression
Via an 802.1Q trunk or a single VLAN access port
By default weight is 100. Can be made dynamic per interface
29. If you want IP source guard to detect spoofed MAC addresses - what must you do?
Turn on port security
It's a router that maintains routes (static or dynamic) - and populates the FIB
Immediate (class 2)
Access or trunk
30. What happens if both 802.1D and RSTP BDPUs are received?
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
Gateway load balancing protocol - cisco proprietary
3 seconds. Holdtime =3 hellos + 1
Two distribution switches that aggregate one or more access switches
31. What is the standard for WLANs?
The port is forced to always authorize any connected client with no authentication necessary (default)
802.11
Port with best root path cost on segment
Globally
32. Where shoul dmultilayer switches be implemented?
Distribution layer
Use the spanning-tree root macro
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
Switch(config-if)# vrrp xx where xx= group number
33. How is 802.1x configured for port security?
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
Configure the timer on the AVG and let it propagate
All nondesignated ports - but ok for all ports
RADIUS
34. What are the two etherchannel negotiation protocols?
Only when a nonedge port transitions to forwarding
PAgP (Cisco proprietary) and LACP (standards-based)
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
The TOS field in the header is used. 2 methods 3 bits or 6 bits
35. can root guard and bdpu guard be used together?
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
By encapsulating each frame in a header and trailer
Roughly 2000
No
36. How does HSRP port tracking work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
37. What does the SP do?
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
Forces the router to wait for a period of time before attempting overthrow
By brining up a tunnel between them to carry 802.11 related messages and client data.
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
38. What is a wireless mobility group?
Priority (class 1)
Based on priority (0-255). Default is 100. Highest IP is tie breaker
A client can roam to any WLC as long as it stays in a mobility group
1 second. Backup routers can learn the interval from the master
39. What is the duration time in a wireless frame?
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
Limits the number if dhcp requests on a port
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
Each frame transmits its expected duration time
40. What must the other end be set to if PAgP desirable or LACP active mode is selected?
Almost eliminates listening and learning states for single hosts on an access link
19
Either desirable or auto mode
80% of the user traffic should stay in the VLAN
41. How are frames forwarded across a specific link?
The station can transmit immediately and wait for an ack
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
Hashing algorithm
If any BDUP is received on a port - it puts the port into the errdisable state
42. What are spoofed addresses?
By default weight is 100. Can be made dynamic per interface
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
On by default
They disguise the origin of an attack
43. What are the steps to configure a PAgP port channel?
Limits the number if dhcp requests on a port
Switchpotrt nonegotiate
2 strand MMF with MT-RJ or SC connectors
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
44. What is unique about HSRP group numbers?
When a client roams between Aps in different subnets
Automatically using DTP and CDP
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
45. How does L3 QOS classification happen?
The TOS field in the header is used. 2 methods 3 bits or 6 bits
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
One that can be detected on a switch interface (ie. Up/down)
46. What is Per VLAN STP (PVST)?
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
47. How does every HSRP config command begin?
Access or trunk
Regions and instances
Switch(config-if)# standby xx where x= group number
Matching SSID - compatible data rate - authentication credentials
48. How does VRRP do tracking?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. What is dynamic desireable?
One that can be detected on a switch interface (ie. Up/down)
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
The port asks the other end to trunk
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
50. How many virtual MACs can GLBP have?
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
Packets must be sent to the L3 engine for further processing
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance