SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are the 3 ways GLBP load-balances?
Round robin - weighted - or host-dependent
A single broadcast domain
Two distribution switches that aggregate one or more access switches
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
2. 802.11a
A packet can't be switched in hardware with the FIB and must go to the L3 engine
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
134 bits
3. What data does DHCP snooping track?
Globally
Completed dhcp bindings - mac addresses - IP addresses - etc.
Yes
An ac adaptor that plugs into a wall outlet.
4. Where does layer switching occur?
Configure non-silent submode
Between any type of interface as long as the interface can have an L3 address assigned
A group of wireless devices that share a common SSID
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
5. What criteria are used to size a switch block?
When each AP stands alone within the larger network.
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
Silent
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
6. What does the SP do?
BGP - EIGRP - OSPF - and IS-IS.
By configuring every switch port to have an expected and controlled behavior
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
7. CAM table entries are purged when....
Between interfaces that are assigned to L2 VLANs or L2 trunks
A MAC is seen on a different port
Yes
Switchpotrt nonegotiate
8. How is an RSTP edge port configured
Manages addition - deletion and renaming VLANs across the network
Matching SSID - compatible data rate - authentication credentials
With portfast
224.0.0.2 (all routers)
9. What is a wall wart?
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
An L2 switch can only forward frames best effort unless going across a trunk
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
An ac adaptor that plugs into a wall outlet.
10. Where is root guard enabled?
11. RSTP forwarding state
Frames are forwarded
802.11
By configuring every switch port to have an expected and controlled behavior
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
12. What is the STP forward delay timer?
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
The time that a port spends in both listening and learning states . Default 15 seconds
Plain text or md5
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
13. what if a secondary VLAN?
By using an Ether-IP tunnel
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
Prevents the dhcp binding DB from being checked.
The link status stays up - but something between them has failed or is filtering traffic
14. What is a microcell?
Disabled - init - listen - speak - standby - active
When the size of a cell is intentionally reduced
All ARP packets that arrive on untrusted ports are inspected.
Use sh interface on the interface and look for error counts > 10
15. What is an isolated secondary VLAN?
16. What are the characteristics of the distribution layer?
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
10-15%
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
17. How many MST instances can be in a region?
Trunk
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
18. How is a QoS trust bondary configured?
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
Use the spanning-tree root macro
Every switch and router in a network must be configured with appropriate QoS features and policies
19. What does the dst-mac option do when checking ARP replies
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
Based on priority (0-255). Default is 100. Highest IP is tie breaker
LACP port priority
Checks the destination MAC in the header against the target MAC in the ARP reply
20. What is the format of the VRRP virtual MAC?
0000.5e00.01xx
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
Between interfaces that are assigned to L2 VLANs or L2 trunks
21. static vlans offer ____ based membership
Configure and enable DHCP snooping
Yes
1-1005 (1 and 1002-1005 are reserved)
Port
22. What are LOU register pairs?
Used when ACLs specify port ranges...used by TCAM
Untrusted
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
Configure non-silent submode
23. How is 802.1x configured for port security?
A private VLAN can be logically associated with a special secondary vlan
RADIUS
On root - because the root bridge propagates timers with config BDPU
Used when there are 1 or more VLANs mapped to a single STP instance
24. What are spoofed addresses?
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
10-15%
They disguise the origin of an attack
Priority (class 1)
25. What are the 4 steps in DHCP negotiation?
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
1-1005 (1 and 1002-1005 are reserved)
Each network device handles packets individually with no advance reservations
26. What is RPR+?
27. What is latency?
The total delay from start to finish
It's a router that maintains routes (static or dynamic) - and populates the FIB
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
The configureable UDLD interval must be less than max age plus two intervals of forward delay
28. How does Root Guard work?
29. What types of authentication does HSRP allow?
SC fiber or RJ-45
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
Plain text or md5
By an ARP access list that defines the permitted bindings
30. 802.11b
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
31. What does BDPU filtering do?
Effectively stops STP on filtered ports
By name - config revision - and instance to vlan mapping table
Configure non-silent submode
Disabled - init - listen - speak - standby - active
32. What are 2 ways to configure VLAN and VTP information?
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
Discarding - learning - forwarding
Yes
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
33. RSTP edge port
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
Only a single host connects . If one BDPU is received - it is no longer an edge port
A point to point port type
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
34. What are the characteristics of the access layer?
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
2 seconds (def)
A VLAN that spans the entire fabric
Transmits keystrokes from phone and commands from CCM
35. Define VRRP
Virtual Router Redundancy Protocol - pretty much the same as HSRP
Yes
Configuration and TCN
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
36. How do VRRP routers handle preemption?
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
On by default
Data and voice over native vlan - no QOS but still uses 802.1p trunk
Controls where candidate root bridges can be connected and found on a network
37. RSTP discarding state
Collision domain
From the DHCP snooping database or from static entries
Incoming frames are dropped (combination of disabled - blocking - and listening)
The total delay from start to finish
38. What is SSO?
39. What is the STP hello timer?
All fiber-optic links between switches (must be enabled on both ends)
Automatically negotiates a common trunk mode between switches
Time between BDPUs sent by root bridge. Default of 2 seconds
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
40. What must be supported for port-based security to occur?
Best effort delivery - integrated services model - and differentiated services model
Flash (class 3)
802.1x with EAP over LAN (EAPOL)
Use sh interface on the interface and look for error counts > 10
41. What is an MST instance?
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
If any BDUP is received on a port - it puts the port into the errdisable state
The MST instance (MSTI) runs alongside the IST and represents an STP instance
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
42. What functions does a LAP perform?
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
On the left as you face the connector
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
Trunk
43. What does uplinkfast do?
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
An ac adaptor that plugs into a wall outlet.
Yes to both
44. On what scope is DAI enabled?
Automatically negotiates a common trunk mode between switches
802.11
L2
Per VLAN
45. What is BDPU Guard?
The link status stays up - but something between them has failed or is filtering traffic
If any BDUP is received on a port - it puts the port into the errdisable state
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
46. When looking at the sh spanning tree output - What does P2P peer(STP) denote?
A point to point port type but the neighboring device runs traditional 802.1D STP
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
By configuring every switch port to have an expected and controlled behavior
Between any type of interface as long as the interface can have an L3 address assigned
47. What is the VRRP master router?
The active router. All other routers are in backup state
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
134 bits
Determines when the AVG will stop using the old VMAC in ARP replies
48. How can BDPU Guard be configured?
Globally or per-port
Another router must have a higher HSRP priority and have preemt set up
Those that connect to other switches
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
49. How should the switch port to which a WLC be configured?
Trunk
Almost eliminates listening and learning states for single hosts on an access link
The port asks the other end to trunk
26-byte header - 4-byte trailer with CRC
50. Automatically configure STP timers
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
Use the spanning-tree root macro