SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Where is the QoS trust boundary usually configured on an IP phone?
Usually QoS from VOIP but not PC dataa
802.11
By sending a gratuitous ARP
The DCF interframe space- the random backoff time before a wireless set can transmit
2. How is the HSRP MAC address configured?
The configureable UDLD interval must be less than max age plus two intervals of forward delay
0000.0c07.acxx where xx is the group number as a 2-digit hex value
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
2 seconds (def)
3. What cabling do GBICs use?
All L2 connectivity should be contained within the access layer.
SC fiber or RJ-45
1 second. Backup routers can learn the interval from the master
On by default
4. What does the standby HSRP router do?
Switches make an effort to move packets as quickly as possible
Only the standby monitors the hello messages from the active router
Used when there are 1 or more VLANs mapped to a single STP instance
Root - designated - alternate - and backup
5. what I s distributed CEF (dCEF)?
Differentiated services
Between interfaces that are assigned to L2 VLANs or L2 trunks
By sending a gratuitous ARP
CEF is distributed completely among multiple L3 forwarding engines.
6. How many links can be used in an EtherChannel?
Src-dst-ip
1 per segment
2-8 FE - GE - or 10GE are bundled.
Half because transmitting and receiving stations use the same frequency
7. What does the ip option do when checking ARP replies
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
8. What is the PVLAN promiscuous mode?
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
Regions and instances
Almost eliminates listening and learning states for single hosts on an access link
9. What are the restrictions for bundling into an Etherchannel?
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
An L2 switch can only forward frames best effort unless going across a trunk
Turn on port security
10. What are the port channel load balancing methods?
By using a hash of a key string
Packets must be sent to the L3 engine for further processing
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
11. How is a QoS trust bondary configured?
Data and voice over native vlan no QOS and no 802.1p trunk
Switching Database Manager - configures and prunes TCAM partitions
Every switch and router in a network must be configured with appropriate QoS features and policies
Multicast to 01-80-c2-00-00-00
12. How long are TCAM masks?
134 bits
7 switches from root bridge
The same as a standby group in HSRP
A point to point port type but the neighboring device runs traditional 802.1D STP
13. Which ports should you consider trusted for DAI?
Those that connect to other switches
An AP's coverage area
Access
Silent
14. What 2 tunnelling mechanisms do the LAP and WLC use to communicate?
The number of times the CEF table has bee flushed and regenerated as a whole
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
Roughly 2000
15. What is the format of the VRRP virtual MAC?
Roughly 50%
0000.5e00.01xx
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
16 - of which up to 8 are active. The others are in standby
16. what if a secondary VLAN?
1/2 and 3/6
Data and voice over native vlan no QOS and no 802.1p trunk
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
17. What is the LACP priority range?
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
Automatically using DTP and CDP
Local only
1-65535 (def 32768) lower priority - higher probability
18. If a port is configured for errdisable auto recovery - how long does it stay down?
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
300 sec by default
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
Will trunk if asked
19. What pins does FE use?
4
134 bits
1/2 and 3/6
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
20. How does PAgP form etherchannels?
The total delay from start to finish
FE - GE - and aggregated FE/GE Etherchannels
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
21. On what scope is DAI enabled?
Differentiated services code point
The number of times the entry has been updated since the table was generated
Per VLAN
Data and voice over native vlan no QOS and no 802.1p trunk
22. How do Cisco IP phones communicate with the CCM?
Critical...used most often for IPT
With the skinny protocol
Yes
BGP - EIGRP - OSPF - and IS-IS.
23. What is a service set?
Automatically using DTP and CDP
A group of wireless devices that share a common SSID
Manages addition - deletion and renaming VLANs across the network
Globally
24. What must be in common for a BSS to form?
Matching SSID - compatible data rate - authentication credentials
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
Per VLAN
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
25. How do you disable DTP when you configure both ends of the ISL manually?
Change in trunk encap
It is enabled by default on all CEF capable switches
Switchpotrt nonegotiate
Used to switch packets destined for the null interface
26. At what layer does EAPOL run?
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
By default weight is 100. Can be made dynamic per interface
L2
27. What does UDLD do?
Data and voice over native vlan - no QOS but still uses 802.1p trunk
Reboots and searches for a new WLC
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Value - mask - and result (VMR) combinations
28. How does UDLD work?
Lowest cumulative cost to root
Change in trunk encap
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
29. RSTP alternate port
L2
Using a single WAP to centralize access and control over a group of wireless devices.
The campus network's backbone
Port with alternative path to root less desirable than root
30. How does the standby handle ARP issues after it becomes active?
Yes
2 seconds (def)
Port is forced to never authorize any connected client
By sending a gratuitous ARP
31. What is the traditional MLS view of switching?
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Route once - switch many
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
32. What must the other end be set to if PAgP desirable or LACP active mode is selected?
After forwarding delay - port can learn new MAC addresses
Access
2 - one for control messages and one for data
Either desirable or auto mode
33. How do you prevent VLAN hopping?
The number of times the entry has been updated since the table was generated
Weak key rotation
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
Matching SSID - compatible data rate - authentication credentials
34. How is DHCP snooping enabled (scope)?
Sends a voltage across the receive pairs to detect a 25k ohm resistance
Globally
Weak key rotation
Lowest cumulative cost to root
35. What if RSTP BDPUs aren't received?
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
Using a mobility exchange message
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
36. FE connectors use...
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
VTP server for domain null with no password or secure mode
2 strand MMF with MT-RJ or SC connectors
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
37. What is PVST plus (PVST+)?
Either desirable or auto mode
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
The campus network's backbone
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
38. What are the characteristics of the access layer?
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
Two distribution switches that aggregate one or more access switches
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
FE - GE - and aggregated FE/GE Etherchannels
39. What types of authentication does HSRP allow?
Used when ACLs specify port ranges...used by TCAM
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
Plain text or md5
No
40. How do you renable an err-disable port by default?
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
Manually
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
The ASIC
41. What are the steps to configure MST?
The DCF interframe space- the random backoff time before a wireless set can transmit
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Enables portfast - sets the port to access and disables PAgP
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
42. What does the rewrite engine do?
A point to point port type but the neighboring device runs traditional 802.1D STP
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
43. What is the IEEE standard for STP?
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
802.1D
2 - one for control messages and one for data
The configureable UDLD interval must be less than max age plus two intervals of forward delay
44. How do you configure IP source guard for hosts that don't use DHCP?
Globally
Root - designated - alternate - and backup
By creating a static IP binding
FIB
45. What is the range of HSRP group numbers?
Normal and aggressive
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
Turn on port security
0-255
46. What is a wall wart?
Yes
An ac adaptor that plugs into a wall outlet.
Reboots and searches for a new WLC
Root - designated - alternate - and backup
47. How does IPT behave when the voice VLAN is in vlan-id mode?
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
The active router. All other routers are in backup state
48. What is the port priority range?
The number of times the CEF table has bee flushed and regenerated as a whole
No
Auto mode
0-255 (lower is better)
49. What routing protocols support NSF?
Controls where candidate root bridges can be connected and found on a network
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
802.1x with EAP over LAN (EAPOL)
BGP - EIGRP - OSPF - and IS-IS.
50. How is the IPT 802.1 trunk negotiated?
Automatically using DTP and CDP
After forwarding delay - port can learn new MAC addresses
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
1-1005 (1 and 1002-1005 are reserved)