SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How much BW does a voip connection use?
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
Variation in delay
Data and voice over native vlan no QOS and no 802.1p trunk
12 kbps with headers and compression
2. What are the 3 redundant supervisor modes?
Plain text or md5
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
Value - mask - and result (VMR) combinations
RPR - RPR+ - and SSO
3. How does adding option-82 to DHCP snooping affect things?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
4. Which ports should you consider trusted for DAI?
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
Those that connect to other switches
Use sh interface on the interface and look for error counts > 10
900 MHz - 2.4Ghz - and 5-6GHz
5. What is PVST plus (PVST+)?
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
Turn on port security
Trusted ports
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
6. 802.11b
The port asks the other end to trunk
All fiber-optic links between switches (must be enabled on both ends)
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
7. How does the VRRP master router handle the VIP?
The master router can share the VIP
VTP server for domain null with no password or secure mode
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
Once the CCM gives them the parameters - they use RTP
8. How do IP phones communicate with each other?
Once the CCM gives them the parameters - they use RTP
Trunk - dynamic auto - dynamic desireable (default)
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
Checks the destination MAC in the header against the target MAC in the ARP reply
9. Define VRRP
Weak key rotation
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
Needs hardware upgrade over WEP - uses AES encryption
Virtual Router Redundancy Protocol - pretty much the same as HSRP
10. What are the two etherchannel negotiation protocols?
Disabled - blocking - listening - learning - forwarding
RPR - RPR+ - and SSO
PAgP (Cisco proprietary) and LACP (standards-based)
FIB
11. What does the src-mac option do when checking ARP replies
1 second. Backup routers can learn the interval from the master
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Checks the source MAC in the header against the sender MAC in the ARP reply
Packets must be sent to the L3 engine for further processing
12. What does the rewrite engine do?
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
L2
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
Prevents the dhcp binding DB from being checked.
13. What does MSTP consist of?
Will trunk if asked
Regions and instances
Arp for local subnet - if on different subnet - will arp for dgw
Frames are forwarded
14. By default - what submode does PAgP operate in with the desirable and auto modes?
Trusted or untrusted
Used when ACLs specify port ranges...used by TCAM
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
Silent
15. What is the FM?
Admin down
Used when ACLs specify port ranges...used by TCAM
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
Data and voice over native vlan - no QOS but still uses 802.1p trunk
16. what should you do if you expect a PAgP capable switch at the other end vs. a server or host?
Incoming frames dropped - but MACs learned
Configure non-silent submode
Via an 802.1Q trunk or a single VLAN access port
The distribution layer should have only L3 links
17. What is a topology change?
When a port moves into forwarding or from fowarding or learning to blocking.
Root - designated - blocking - alternate - forwarding (host)
By configuring every switch port to have an expected and controlled behavior
Distribution layer
18. What is errdisable dtp-flap?
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
Change in trunk encap
The redundant SUP is booted and sup and route engine is init'd. No L2 or L3 functions are started. Allows switchports to retain state
224.0.0.2 (all routers)
19. Which fiber is the receive?
On the left as you face the connector
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Multicasts to 224.0.0.18 (VRRP)
TCAM
20. What is the STP hello timer?
Prevents the dhcp binding DB from being checked.
Time between BDPUs sent by root bridge. Default of 2 seconds
Switching Database Manager - configures and prunes TCAM partitions
7 switches from root bridge
21. what must be done on an SVI before it is activated?
Configure the timer on the AVG and let it propagate
Matching SSID - compatible data rate - authentication credentials
PAgP (Cisco proprietary) and LACP (standards-based)
No shut
22. What is a cell?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
23. What is a PVLAN?
It is enabled by default on all CEF capable switches
A private VLAN can be logically associated with a special secondary vlan
Sends a voltage across the receive pairs to detect a 25k ohm resistance
Roughly 2000
24. What does the epoch number indicate when looking at cef entries?
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
The number of times the CEF table has bee flushed and regenerated as a whole
Control functions
Full duplex
25. How does a Cisco IP phone connect upstream?
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
Via an 802.1Q trunk or a single VLAN access port
PAgP (Cisco proprietary) and LACP (standards-based)
Checks the destination MAC in the header against the target MAC in the ARP reply
26. How does the CEF L3 engine operate?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
27. What does the reload keyword do in HSRP?
Data and voice over native vlan no QOS and no 802.1p trunk
L2
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
Multicast to 01-80-c2-00-00-00
28. How long are TCAM masks?
134 bits
SC fiber or RJ-45
Port with alternative path to root less desirable than root
Needs hardware upgrade over WEP - uses AES encryption
29. One vlan should =
Port with alternative path to root less desirable than root
Prevents the dhcp binding DB from being checked.
1 IP subnet
Yes
30. How does ISL handle COS?
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
It can't
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Checks the source MAC in the header against the sender MAC in the ARP reply
31. What is an end to end vlan?
Port with alternative path to root less desirable than root
Used when ACLs specify port ranges...used by TCAM
A VLAN that spans the entire fabric
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
32. What is step 1 of enabling IP source guard?
Bridge priority and MAC
Configure and enable DHCP snooping
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
33. What is a bridge ID made up of?
On ports where you never expect to find a root bridge for a VLAN
Flash (class 3)
Bridge priority and MAC
Time between BDPUs sent by root bridge. Default of 2 seconds
34. Where shoul dmultilayer switches be implemented?
Distribution layer
Used to switch packets destined for the null interface
Incoming frames dropped - but MACs learned
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
35. What are the RSTP port roles?
The number of times the entry has been updated since the table was generated
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
Root - designated - alternate - and backup
Hashing algorithm
36. What are the characteristics of the distribution layer?
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
Yes
Discarding - learning - forwarding
37. What are the steps to configure a PAgP port channel?
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
A VLAN that spans the entire fabric
Root
With the skinny protocol
38. RSTP designated port
Port with best root path cost on segment
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
39. How are errdisable triggers tuned?
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
Globally
40. RSTP point to point port
Use sh interface on the interface and look for error counts > 10
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
Port that connects to another switch and becomes a designated port
1-1005 (1 and 1002-1005 are reserved)
41. What is backbonefast?
5 classes with 3 drop precedences
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
Dynamic arp inspection
1 IP subnet
42. Where is bdpu guard enabled?
That they aren't using the same frequencies.
Only a single host connects . If one BDPU is received - it is no longer an edge port
All user ports that have portfast enabled
Option 43
43. What is the format of the VRRP virtual MAC?
MAC of the end device
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Automatically using DTP and CDP
0000.5e00.01xx
44. What if RSTP BDPUs aren't received?
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
Used when ACLs specify port ranges...used by TCAM
The time that a port spends in both listening and learning states . Default 15 seconds
Checks the destination MAC in the header against the target MAC in the ARP reply
45. How are frames forwarded across a specific link?
Each frame transmits its expected duration time
All fiber-optic links between switches (must be enabled on both ends)
Hashing algorithm
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
46. What happens during HSRP failover?
If any BDUP is received on a port - it puts the port into the errdisable state
The standby becomes active and stays active by default. Preemption can be configured
The DCF interframe space- the random backoff time before a wireless set can transmit
Used when ACLs specify port ranges...used by TCAM
47. How does VRRP do tracking?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
48. What is the size of a TCAM value?
The number of times the entry has been updated since the table was generated
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
An AP's coverage area
49. How do you configure LACP standby links?
Globally
LACP port priority
A point to point port type but the neighboring device runs traditional 802.1D STP
The port asks the other end to trunk
50. What is the VRRP skew time?
By brining up a tunnel between them to carry 802.11 related messages and client data.
Variation in delay
Real-time Transport Protocol
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added