SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does RSTP converge?
Differentiated services code point
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Each network device handles packets individually with no advance reservations
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
2. What are the 2 power over ethernet methods?
A host port goes up or down
Data and voice over native vlan no QOS and no 802.1p trunk
An L2 switch can only forward frames best effort unless going across a trunk
Cisco ILP and 802.3af
3. Where should STP timers be configured and why?
63 kbps
On root - because the root bridge propagates timers with config BDPU
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
Immediate (class 2)
4. How do you configure LACP standby links?
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
The distribution layer should have only L3 links
LACP port priority
5. What are the restrictions for bundling into an Etherchannel?
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
A point to point port type
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
6. How does RSTP identify a topology change?
As a VLAN access map
Only when a nonedge port transitions to forwarding
Weak key rotation
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
7. What are the steps to configuring HSRP MD5 authentication?
5 (0-4 with 4 being the highest)
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
12 kbps with headers and compression
Switching Database Manager - configures and prunes TCAM partitions
8. In a converged fabric - which switch(es) send config BDPUs?
Root
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
Cisco recommends only on the root bridge
Each frame transmits its expected duration time
9. Where should you change the network diameter value?
Regions and instances
Variation in delay
Cisco recommends only on the root bridge
0-255
10. How does UDLD work?
The number of times the entry has been updated since the table was generated
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
Trunk - dynamic auto - dynamic desireable (default)
11. How do you configure a DHCP gateway?
No shut
The campus network's backbone
5 (0-4 with 4 being the highest)
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
12. What is UDLD aggressive mode?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
13. Does GLBP allow preemption?
LACP port priority
Yes
0000.0c07.acxx where xx is the group number as a 2-digit hex value
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
14. What are the characteristics of the core layer
Gateway load balancing protocol - cisco proprietary
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
Each frame transmits its expected duration time
Roughly 50%
15. What is Per VLAN STP (PVST)?
The number of times the entry has been updated since the table was generated
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
Using a single WAP to centralize access and control over a group of wireless devices.
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
16. What is a CEF punt?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
17. What are the characteristics of the access layer?
The DCF interframe space- the random backoff time before a wireless set can transmit
Multicast to 01-80-c2-00-00-00
Access or trunk
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
18. How often are BDPUs sent?
2 seconds (def)
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
19. What does the epoch number indicate when looking at cef entries?
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
The number of times the CEF table has bee flushed and regenerated as a whole
Disabled - init - listen - speak - standby - active
Sends a voltage across the receive pairs to detect a 25k ohm resistance
20. RSTP edge port
When the AP uplinks to an Ethernet network.
Only a single host connects . If one BDPU is received - it is no longer an edge port
Access or trunk
Control functions
21. What are the two etherchannel negotiation protocols?
With the skinny protocol
PAgP (Cisco proprietary) and LACP (standards-based)
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
Either desirable or auto mode
22. How does DAI work?
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
Cisco recommends only on the root bridge
All ARP packets that arrive on untrusted ports are inspected.
Enables portfast - sets the port to access and disables PAgP
23. What is BDPU Guard?
Between any type of interface as long as the interface can have an L3 address assigned
Forces the router to wait for a period of time before attempting overthrow
No
If any BDUP is received on a port - it puts the port into the errdisable state
24. How is an RSTP edge port configured
With portfast
Differentiated services
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
The active router. All other routers are in backup state
25. What types of link can an etherchannel be?
1-1005 (1 and 1002-1005 are reserved)
On all switches in network to enable RLQ request and reply
Access or trunk
Matching SSID - compatible data rate - authentication credentials
26. What is the default MTU?
Using a mobility exchange message
1500B
Normal and aggressive
Use sh interface on the interface and look for error counts > 10
27. what should you do if you expect a PAgP capable switch at the other end vs. a server or host?
Configure non-silent submode
Configure and enable DHCP snooping
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
Packets must be sent to the L3 engine for further processing
28. What must you be sure of if AP cells overlap?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. What is a QoS trust boundary?
Frames are forwarded
Show standby
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
30. What is DSCP codepoint AF41(34)?
Real-time Transport Protocol
A client can roam to any WLC as long as it stays in a mobility group
1-65535 (def 32768) lower priority - higher probability
Flash override (class 4)
31. What are TCAM entries composed of?
63 kbps
Those that connect to other switches
Value - mask - and result (VMR) combinations
Differentiated services
32. What can the Etherchannel hash use?
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Dynamic arp inspection
No
After forwarding delay - port can learn new MAC addresses
33. What does UDLD do?
19
7 switches from root bridge
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
34. How does dot1q do trunking?
Embeds the tag within the frame
Checks the destination MAC in the header against the target MAC in the ARP reply
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
35. What does Loop Guard do?
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
To a VLAN and not to a VLAN interface (SVI)
Discarding - learning - forwarding
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
36. What are the 6 steps to configure 802.1x for port security?
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
As a VLAN access map
Group (0-255) - priority (1-254 254 is highest - 100 default)
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
37. How does the CEF L3 engine operate?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
38. What does the version number indicate when looking at CEF entries?
Promiscuous and host
Group (0-1023) priority (1-255 higher better def 100)
4
The number of times the entry has been updated since the table was generated
39. Whan is a 10GE WAN PHY?
2
Connects with SONET or SDH
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
40. What must be in common for a BSS to form?
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
The total delay from start to finish
Matching SSID - compatible data rate - authentication credentials
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
41. What does port-security restrict do?
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
80% of the user traffic should stay in the VLAN
Roughly 2000
42. How does NSF work?
By sending a gratuitous ARP
By an ARP access list that defines the permitted bindings
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Can send and receive BDPUs
43. How does IPT behave when the voice VLAN is in untagged mode?
Only when a nonedge port transitions to forwarding
1/2 and 3/6
Data and voice over native vlan - no QOS but still uses 802.1p trunk
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
44. What is NSF?
It's a router that maintains routes (static or dynamic) - and populates the FIB
7 switches from root bridge
Cisco recommends only on the root bridge
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
45. Which 4 things must be agreeable to trunk?
Switching Database Manager - configures and prunes TCAM partitions
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
Gateway load balancing protocol - cisco proprietary
When a wireless station transmits a frame - the receiving one must send an ack
46. RSTP discarding state
Incoming frames are dropped (combination of disabled - blocking - and listening)
The configureable UDLD interval must be less than max age plus two intervals of forward delay
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
Untrusted
47. What does the skinny protocol do?
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
VTP server for domain null with no password or secure mode
Transmits keystrokes from phone and commands from CCM
Local only
48. if the switchport is part of an etherchannel - Where is the network assigned
Globally or per-port
To the virtual port-channel interface
Trusted ports
When the size of a cell is intentionally reduced
49. What are dynamic VLANs based on?
MAC of the end device
When a port moves into forwarding or from fowarding or learning to blocking.
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
50. What is accelerated CEF (aCEF)?
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
Isolated and community
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID