SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are the RSTP port roles?
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
Root - designated - alternate - and backup
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Discarding - learning - forwarding
2. What is the distribution layer best practice?
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
The distribution layer should have only L3 links
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
3. What are the 4 steps to extend QoS trust?
Completed dhcp bindings - mac addresses - IP addresses - etc.
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
4. What must be supported for port-based security to occur?
Used when there are 1 or more VLANs mapped to a single STP instance
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
802.1x with EAP over LAN (EAPOL)
5. What ILP mode are all ports in by default?
PAgP (Cisco proprietary) and LACP (standards-based)
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
Auto mode
6. RSTP forwarding state
Best effort delivery - integrated services model - and differentiated services model
Frames are forwarded
An ac adaptor that plugs into a wall outlet.
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
7. How does DAI work?
Port with alternative path to root less desirable than root
16 - of which up to 8 are active. The others are in standby
Dynamic arp inspection
All ARP packets that arrive on untrusted ports are inspected.
8. How is a WLC handoff handled when the WLCs are in different subnets?
Checks the source MAC in the header against the sender MAC in the ARP reply
Port is forced to never authorize any connected client
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
By using an Ether-IP tunnel
9. How is UDLD configured?
All L2 connectivity should be contained within the access layer.
It can't
A packet can't be switched in hardware with the FIB and must go to the L3 engine
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
10. What address does HSRP send hello packets to?
The distribution layer should have only L3 links
224.0.0.2 (all routers)
1 IP subnet
802.11
11. What can the Etherchannel hash use?
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Dynamic arp inspection
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
12. What are the 5 steps a LAP uses to establish communication with a WLC?
26-byte header - 4-byte trailer with CRC
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
By using an Ether-IP tunnel
13. What is a LACP priority?
Multicast to 01-80-c2-00-00-00
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
The number of times the entry has been updated since the table was generated
14. How is an instance defined?
2
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
By name - config revision - and instance to vlan mapping table
15. Define GLBP
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
Gateway load balancing protocol - cisco proprietary
Configure and enable DHCP snooping
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
16. Can loop guard and udld be used together?
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Yes
Cisco ILP and 802.3af
Normal and aggressive
17. How do you enable CEF?
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
It is enabled by default on all CEF capable switches
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
18. What types of ports autonegotiate?
FE and GE
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
Port
19. How does an LAP bind with a WLC?
The port is forced to always authorize any connected client with no authentication necessary (default)
Normal and aggressive
Needs hardware upgrade over WEP - uses AES encryption
By brining up a tunnel between them to carry 802.11 related messages and client data.
20. What does port-security restrict do?
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
Round robin - weighted - or host-dependent
802.11
21. What is DAI?
Dynamic arp inspection
Critical...used most often for IPT
Configure and enable DHCP snooping
By using an Ether-IP tunnel
22. Where shoul dmultilayer switches be implemented?
Critical...used most often for IPT
A key string of up to 8 characters is sent. Default is cisco.
By short-circuiting the max age timer
Distribution layer
23. What is the STP forward delay timer?
The time that a port spends in both listening and learning states . Default 15 seconds
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
With the skinny protocol
From the DHCP snooping database or from static entries
24. How does IPT behave when the voice VLAN is in vlan-id mode?
Hashing algorithm
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
Manages addition - deletion and renaming VLANs across the network
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
25. Which 4 things must be agreeable to trunk?
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
Manually
It's a router that maintains routes (static or dynamic) - and populates the FIB
Switchpotrt nonegotiate
26. What is the access layer best practice?
Multicast to 01-80-c2-00-00-00
When a port moves into forwarding or from fowarding or learning to blocking.
To a VLAN and not to a VLAN interface (SVI)
All L2 connectivity should be contained within the access layer.
27. How do you configure LACP standby links?
19
Every switch and router in a network must be configured with appropriate QoS features and policies
The distribution layer should have only L3 links
LACP port priority
28. 802.11a
MAC of the end device
TCAM
Port that connects to another switch and becomes a designated port
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
29. What are the 4 steps in DHCP negotiation?
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
Manages addition - deletion and renaming VLANs across the network
Incoming frames dropped - but MACs learned
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
30. How much BW does a PSTN connection use?
Lowest cumulative cost to root
Distribution layer
Best effort delivery - integrated services model - and differentiated services model
63 kbps
31. What are the restrictions for bundling into an Etherchannel?
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
Prevents the dhcp binding DB from being checked.
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
32. When looking at the sh spanning tree output - What does P2P peer(STP) denote?
Both layer 2 switching and IVR
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
A point to point port type but the neighboring device runs traditional 802.1D STP
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
33. Where does VRRP send advertisements?
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
Multicasts to 224.0.0.18 (VRRP)
34. What happens when the topology changes?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. What scope is 802.1x enabled?
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
Globally
Automatically using DTP and CDP
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
36. What does the dst-mac option do when checking ARP replies
Best effort delivery - integrated services model - and differentiated services model
The DCF interframe space- the random backoff time before a wireless set can transmit
Checks the destination MAC in the header against the target MAC in the ARP reply
Globally
37. What is an insignificant topology change?
Both ends should be on because on modes doesn't send PAgP or LACP packets
No
BGP - EIGRP - OSPF - and IS-IS.
A host port goes up or down
38. What is UDLD normal mode?
1-65535 (def 32768) lower priority - higher probability
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Data and voice over native vlan no QOS and no 802.1p trunk
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
39. How are BDPUs spread?
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
Control functions
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Multicast to 01-80-c2-00-00-00
40. How is RSTP synchronization accomplished?
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
Roughly 50%
Interim solution - uses same hardware as WEP - but uses TKIP encryption
41. What are the characteristics of the access layer?
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
Yes
42. What is DSCP codepoint AF31(26)?
Flash (class 3)
Globally
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
43. How does UDLD work?
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
Group (0-1023) priority (1-255 higher better def 100)
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
Switchpotrt nonegotiate
44. RSTP point to point port
PAgP (Cisco proprietary) and LACP (standards-based)
A host port goes up or down
Port that connects to another switch and becomes a designated port
BGP - EIGRP - OSPF - and IS-IS.
45. What is a null adjacency?
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
12 kbps with headers and compression
Used to switch packets destined for the null interface
A private VLAN can be logically associated with a special secondary vlan
46. What does the standby HSRP router do?
Critical...used most often for IPT
Only the standby monitors the hello messages from the active router
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
A VLAN that spans the entire fabric
47. What are the 6 steps to configure 802.1x for port security?
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
80% of the user traffic should stay in the VLAN
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
By short-circuiting the max age timer
48. How does every GLBP command begin
Switch(config-if)# glbp xx where xx = group number
A group of wireless devices that share a common SSID
A packet can't be switched in hardware with the FIB and must go to the L3 engine
Multicasts to 224.0.0.18 (VRRP)
49. What is the STP forwarding state?
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
By creating a static IP binding
19
All ports where root isn't expected
50. How is the IPT 802.1 trunk negotiated?
The distribution layer should have only L3 links
Almost eliminates listening and learning states for single hosts on an access link
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
Automatically using DTP and CDP