SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is DSCP codepoint AF31(26)?
Flash (class 3)
The port asks the other end to trunk
The configureable UDLD interval must be less than max age plus two intervals of forward delay
Control functions
2. What does IP source guard do?
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
Either desirable or auto mode
Silent
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
3. What is 802.1x force-unauthorized?
Immediate (class 2)
Port is forced to never authorize any connected client
A point to point port type
2 - one for control messages and one for data
4. What duplex setting does 802.11 use and why?
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
Globally
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
Half because transmitting and receiving stations use the same frequency
5. How is Root Guard used?
Will trunk if asked
A group of wireless devices that share a common SSID
On ports where you never expect to find a root bridge for a VLAN
A MAC is seen on a different port
6. What does the switchport host macro do?
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
They disguise the origin of an attack
Configure the timer on the AVG and let it propagate
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
7. What is a wall wart?
The number of times the CEF table has bee flushed and regenerated as a whole
An ac adaptor that plugs into a wall outlet.
No
Option 43
8. How do Cisco IP phones communicate with the CCM?
Based on priority (0-255). Default is 100. Highest IP is tie breaker
Switching Database Manager - configures and prunes TCAM partitions
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
With the skinny protocol
9. At what layer should the WLC be connected?
Distribution
A key string of up to 8 characters is sent. Default is cisco.
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
Use the spanning-tree root macro
10. How does GLBP work?
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
80% of the user traffic should stay in the VLAN
When a client roams between Aps in different subnets
Routers are assigned to common GLBP group. All routers can be active and can load balance
11. What does MSTP do?
Local only
Used when there are 1 or more VLANs mapped to a single STP instance
The port asks the other end to trunk
5 classes with 3 drop precedences
12. If you want IP source guard to detect spoofed MAC addresses - what must you do?
Globally or per-port
2
Value - mask - and result (VMR) combinations
Turn on port security
13. When DHCP snooping is turned on - by default - it considers all ports ______
Untrusted
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
On root - because the root bridge propagates timers with config BDPU
Distribution
14. What is portfast?
By encapsulating each frame in a header and trailer
Almost eliminates listening and learning states for single hosts on an access link
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
The configureable UDLD interval must be less than max age plus two intervals of forward delay
15. Where is root guard enabled?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
16. How do VRRP routers handle preemption?
The ASIC
On by default
Those that connect to other switches
0-65535 (def 32768) lower=better
17. What is a null adjacency?
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
224.0.0.2 (all routers)
Trunk
Used to switch packets destined for the null interface
18. How are GLBP timers used?
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
Flash (class 3)
A key string of up to 8 characters is sent. Default is cisco.
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
19. How is a QoS trust bondary configured?
Globally
Every switch and router in a network must be configured with appropriate QoS features and policies
Because each frame is checked
Frames are forwarded
20. How does ISL do trunking?
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
By encapsulating each frame in a header and trailer
Connects with SONET or SDH
Trusted or untrusted
21. RSTP discarding state
Port that connects to another switch and becomes a designated port
Incoming frames are dropped (combination of disabled - blocking - and listening)
Trunk - dynamic auto - dynamic desireable (default)
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
22. What if RSTP BDPUs aren't received?
Those that connect to other switches
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
By short-circuiting the max age timer
Trunk
23. What are 2 ways to configure VLAN and VTP information?
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
The time that a port spends in both listening and learning states . Default 15 seconds
When each AP stands alone within the larger network.
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
24. WEP encryption
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
The link status stays up - but something between them has failed or is filtering traffic
Weak key rotation
Etherchannel ports have inconsistent config
25. How do you show HSRP status
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
Show standby
1 second. Backup routers can learn the interval from the master
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
26. How do you prevent switch spoofing?
It is enabled by default on all CEF capable switches
By configuring every switch port to have an expected and controlled behavior
Value - mask - and result (VMR) combinations
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
27. EAP encryption
Dynamic WEP keys that change periodically
An ac adaptor that plugs into a wall outlet.
A packet can't be switched in hardware with the FIB and must go to the L3 engine
802.1w
28. What is a topology change?
Group (0-255) - priority (1-254 254 is highest - 100 default)
Src-dst-ip
Connects with SONET or SDH
When a port moves into forwarding or from fowarding or learning to blocking.
29. How do you configure LACP standby links?
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
LACP port priority
30. What is DCF?
Use sh interface on the interface and look for error counts > 10
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
Distributed coordinion function - the use of timers to prevent wireless collisions
Configure the timer on the AVG and let it propagate
31. How does VRRP do tracking?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. What is the GLBP redirect timer?
The configureable UDLD interval must be less than max age plus two intervals of forward delay
Determines when the AVG will stop using the old VMAC in ARP replies
The time that a port spends in both listening and learning states . Default 15 seconds
Frames that barely exceed 1518B or 1622B due to headers
33. What is the size of ISL encapsulation?
Virtual Router Redundancy Protocol - pretty much the same as HSRP
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
Connects with SONET or SDH
26-byte header - 4-byte trailer with CRC
34. 802.11a
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
1500B
Root - designated - alternate - and backup
Switching Database Manager - configures and prunes TCAM partitions
35. What does Loop Guard do?
Every switch and router in a network must be configured with appropriate QoS features and policies
Embeds the tag within the frame
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
By name - config revision - and instance to vlan mapping table
36. What ILP mode are all ports in by default?
Two distribution switches that aggregate one or more access switches
On by default
Auto mode
Switch(config-if)# vrrp xx where xx= group number
37. What does port-security restrict do?
3 seconds. Holdtime =3 hellos + 1
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
802.1D
Show standby
38. How many 802.3af power classes are there?
16 - of which up to 8 are active. The others are in standby
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
5 (0-4 with 4 being the highest)
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
39. What is the STP hello timer?
Cisco ILP and 802.3af
Time between BDPUs sent by root bridge. Default of 2 seconds
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
40. How does L3 QOS classification happen?
The TOS field in the header is used. 2 methods 3 bits or 6 bits
The active router. All other routers are in backup state
When a wireless station transmits a frame - the receiving one must send an ack
All ARP packets that arrive on untrusted ports are inspected.
41. What is a vlan?
A single broadcast domain
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
Because each frame is checked
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
42. How is an instance defined?
Yes to both
By name - config revision - and instance to vlan mapping table
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
43. if the switchport is part of an etherchannel - Where is the network assigned
Change in trunk encap
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
900 MHz - 2.4Ghz - and 5-6GHz
To the virtual port-channel interface
44. WPA encryption
Half-duplex
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
Interim solution - uses same hardware as WEP - but uses TKIP encryption
CEF is distributed completely among multiple L3 forwarding engines.
45. How do you renable an err-disable port by default?
802.1w
Port
Manually
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
46. RSTP root port
Incoming frames are dropped (combination of disabled - blocking - and listening)
Port with best root path cost
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
300 sec
47. What do you need to determine to use MSTP?
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
If the switch or the powered device doesn't suport power class discovery
48. What is an untrusted port under dhcp snooping?
No
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
Port that connects to another switch and becomes a designated port
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
49. What is the STP listening state?
Based on priority (0-255). Default is 100. Highest IP is tie breaker
Can send and receive BDPUs
Change in trunk encap
The port asks the other end to trunk
50. How much overlap should WAPs have?
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
10-15%