SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What 2 conditions does IP source guard check for?
All nondesignated ports - but ok for all ports
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
Variation in delay
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
2. What are the 4 steps in DHCP negotiation?
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
Two distribution switches that aggregate one or more access switches
Trunk
Limits the number if dhcp requests on a port
3. What does port-security restrict do?
RADIUS
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
Disabled - init - listen - speak - standby - active
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
4. What is RTP?
Using a single WAP to centralize access and control over a group of wireless devices.
Real-time Transport Protocol
An ac adaptor that plugs into a wall outlet.
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
5. What is the default network diameter?
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
Group (0-1023) priority (1-255 higher better def 100)
7 switches from root bridge
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
6. One vlan should =
80% of the user traffic should stay in the VLAN
1 IP subnet
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
With the skinny protocol
7. How do Cisco IP phones communicate with the CCM?
Configuration and TCN
With the skinny protocol
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
8. What are the 6 HSRP states?
Trunk - dynamic auto - dynamic desireable (default)
On all switches in network to enable RLQ request and reply
Disabled - init - listen - speak - standby - active
Those that connect to other switches
9. What are the 5 STP port roles?
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
Root - designated - blocking - alternate - forwarding (host)
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
10. Where is root guard enabled?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
11. What are the steps to configure a LACP port channel?
Untrusted
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
Globally
12. If a port is configured for errdisable auto recovery - how long does it stay down?
300 sec by default
1/2 and 3/6
Sends a voltage across the receive pairs to detect a 25k ohm resistance
Regions and instances
13. What types of authentication does HSRP allow?
Only when a nonedge port transitions to forwarding
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
802.1D
Plain text or md5
14. How much BW does a voip connection use?
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
Using a single WAP to centralize access and control over a group of wireless devices.
By encapsulating each frame in a header and trailer
12 kbps with headers and compression
15. What ILP mode are all ports in by default?
A host port goes up or down
80% of the user traffic should stay in the VLAN
Auto mode
Port
16. What are the 2 UDLD modes?
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
Normal and aggressive
Trusted or untrusted
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
17. What are the gotchas for uplinkfast?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. What are the steps to configuring HSRP MD5 authentication?
A packet can't be switched in hardware with the FIB and must go to the L3 engine
Configure non-silent submode
Lowest cumulative cost to root
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
19. What is a BSS?
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
Switchpotrt nonegotiate
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
Using a single WAP to centralize access and control over a group of wireless devices.
20. What is the STP listening state?
Effectively stops STP on filtered ports
Can send and receive BDPUs
Enables portfast - sets the port to access and disables PAgP
Weak key rotation
21. RSTP point to point port
With the skinny protocol
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
802.1x with EAP over LAN (EAPOL)
Port that connects to another switch and becomes a designated port
22. How does every VRRP command begin?
Switch(config-if)# vrrp xx where xx= group number
2 - one for control messages and one for data
Value - mask - and result (VMR) combinations
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
23. What is UDLD aggressive mode?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
24. What is a PVLAN?
Yes
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
A private VLAN can be logically associated with a special secondary vlan
Change in trunk encap
25. Can MSTP interoperate with 802.1q and/or PVST+?
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
Yes to both
A key string of up to 8 characters is sent. Default is cisco.
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
26. What does the reload keyword do in HSRP?
Via an 802.1Q trunk or a single VLAN access port
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
Root
27. What if RSTP BDPUs aren't received?
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
Disabled - blocking - listening - learning - forwarding
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
28. What pins does FE use?
A point to point port type
1/2 and 3/6
Lowest cumulative cost to root
Frames that barely exceed 1518B or 1622B due to headers
29. What does IP source guard do?
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
All L2 connectivity should be contained within the access layer.
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
30. How is Root Guard used?
Will trunk if asked
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
On ports where you never expect to find a root bridge for a VLAN
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
31. How does IPT behave when the voice VLAN is in untagged mode?
When the size of a cell is intentionally reduced
FE and GE
Data and voice over native vlan - no QOS but still uses 802.1p trunk
Using digital certificates
32. What are the characteristics of the access layer?
Based on priority (0-255). Default is 100. Highest IP is tie breaker
All fiber-optic links between switches (must be enabled on both ends)
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
33. If the WLC connects to an Etherchannel - how should the channel be configured and why?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. What does the minimum keyword do in HSRP?
Dynamic WEP keys that change periodically
Forces the router to wait for a period of time before attempting overthrow
900 MHz - 2.4Ghz - and 5-6GHz
No shut
35. What's the easiest way to configure GLBP timers?
Use the spanning-tree root macro
One that can be detected on a switch interface (ie. Up/down)
A group of wireless devices that share a common SSID
Configure the timer on the AVG and let it propagate
36. What are dynamic VLANs based on?
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Two distribution switches that aggregate one or more access switches
The active router. All other routers are in backup state
MAC of the end device
37. What is DAI?
A group of wireless devices that share a common SSID
To a VLAN and not to a VLAN interface (SVI)
When a client roams between Aps in different subnets
Dynamic arp inspection
38. How does a DAI enabled switch gather trusted ARP info?
Packets are discarded due to an ACL or policy action
0-255
From the DHCP snooping database or from static entries
Manually
39. How does a Cisco IP phone connect upstream?
Globally
Via an 802.1Q trunk or a single VLAN access port
All nondesignated ports - but ok for all ports
To the virtual port-channel interface
40. What is the bridge priority range?
0-65535 (def 32768) lower=better
Round robin - weighted - or host-dependent
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
41. How do you show HSRP status
Port stays up - packets from violating MACs dropped - no logging
Controls where candidate root bridges can be connected and found on a network
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
Show standby
42. What happens when an ARP reply is received on an untrusted port?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. When should CDP be enabled?
Port stays up - packets from violating MACs dropped - no logging
Collision domain
Only for trusted Cisco gear - especially phones
80% of the user traffic should stay in the VLAN
44. Does GLBP allow preemption?
Only for trusted Cisco gear - especially phones
1 IP subnet
Automatically using DTP and CDP
Yes
45. What is common spanning tree (CST)?
Checks the source MAC in the header against the sender MAC in the ARP reply
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
Critical...used most often for IPT
46. How do you configure LACP standby links?
LACP port priority
The number of times the entry has been updated since the table was generated
Lowest cumulative cost to root
16 - of which up to 8 are active. The others are in standby
47. What is the size of ISL encapsulation?
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Once the CCM gives them the parameters - they use RTP
Via an 802.1Q trunk or a single VLAN access port
26-byte header - 4-byte trailer with CRC
48. What method of QOS does voice traffic use most frequently?
Incoming frames are dropped (combination of disabled - blocking - and listening)
No
0-255
Differentiated services
49. How does packet forwarding work
Arp for local subnet - if on different subnet - will arp for dgw
Distributed coordinion function - the use of timers to prevent wireless collisions
Data and voice over native vlan - no QOS but still uses 802.1p trunk
Matching SSID - compatible data rate - authentication credentials
50. What is 802.1x force-unauthorized?
Port is forced to never authorize any connected client
By configuring every switch port to have an expected and controlled behavior
Effectively stops STP on filtered ports
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port