SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is a community secondary VLAN?
Used to switch packets destined for the null interface
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
Src-dst-ip
2. At what layer does EAPOL run?
Trusted or untrusted
2 seconds
0000.5e00.01xx
L2
3. What does MSTP consist of?
Regions and instances
0-255
All ARP packets that arrive on untrusted ports are inspected.
Cisco recommends only on the root bridge
4. what I s distributed CEF (dCEF)?
Disabled - blocking - listening - learning - forwarding
The redundant SUP is booted and sup and route engine is init'd. No L2 or L3 functions are started. Allows switchports to retain state
CEF is distributed completely among multiple L3 forwarding engines.
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
5. the static port to vlan membership is handled in _____
The ASIC
802.11
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
6. RSTP edge port
Only a single host connects . If one BDPU is received - it is no longer an edge port
Frames are forwarded
Etherchannel ports have inconsistent config
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
7. What does port-security restrict do?
No
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
8. How are VACLs applied
Time between BDPUs sent by root bridge. Default of 2 seconds
By creating a static IP binding
To a VLAN and not to a VLAN interface (SVI)
3 seconds. Holdtime =3 hellos + 1
9. How does UDLD work?
RADIUS
Time between BDPUs sent by root bridge. Default of 2 seconds
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
Full duplex
10. What is the cost of a 10Gbps link?
2
By short-circuiting the max age timer
Using digital certificates
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
11. What does UDLD do?
The redundant SUP is booted and sup and route engine is init'd. No L2 or L3 functions are started. Allows switchports to retain state
By brining up a tunnel between them to carry 802.11 related messages and client data.
A packet can't be switched in hardware with the FIB and must go to the L3 engine
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
12. What is the STP listening state?
On root - because the root bridge propagates timers with config BDPU
Can send and receive BDPUs
Only for trusted Cisco gear - especially phones
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
13. How does uplinkfast handle changes in topology?
Untrusted
Plain text or md5
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
That they aren't using the same frequencies.
14. What are the three basic types of QOS?
Isl - dot1q - negotiate (default)
Best effort delivery - integrated services model - and differentiated services model
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
Will trunk if asked
15. Where is UDLD enabled?
One that can be detected on a switch interface (ie. Up/down)
A group of wireless devices that share a common SSID
Yes
All fiber-optic links between switches (must be enabled on both ends)
16. What are the characteristics of the distribution layer?
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
Configure non-silent submode
The total delay from start to finish
Globally or per-port
17. How do you find duplex mismatches?
Cisco ILP and 802.3af
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
FIB
Use sh interface on the interface and look for error counts > 10
18. How should UDLD be configured?
The configureable UDLD interval must be less than max age plus two intervals of forward delay
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
Can hear only BDPUs
19. How does an LAP bind with a WLC?
Root
By brining up a tunnel between them to carry 802.11 related messages and client data.
SC fiber or RJ-45
Flash override (class 4)
20. How doed backbonefast work?
By short-circuiting the max age timer
Use the spanning-tree root macro
Almost eliminates listening and learning states for single hosts on an access link
Access
21. How is RSTP synchronization accomplished?
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
The master router can share the VIP
Manages addition - deletion and renaming VLANs across the network
Group (0-255) - priority (1-254 254 is highest - 100 default)
22. What is the range of HSRP group numbers?
By name - config revision - and instance to vlan mapping table
0-255
Differentiated services code point
Admin down
23. How are multiple VLANs mapped to multiple SSIDs?
By using a trunk link
Either desirable or auto mode
Yes
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
24. What is DCF?
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
Distributed coordinion function - the use of timers to prevent wireless collisions
By name - config revision - and instance to vlan mapping table
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
25. How does dot1q do trunking?
Embeds the tag within the frame
Untrusted
A group of wireless devices that share a common SSID
The configureable UDLD interval must be less than max age plus two intervals of forward delay
26. By default - what layer do catalyst switchports operate on?
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
L2
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
Sends a voltage across the receive pairs to detect a 25k ohm resistance
27. How does 802.3af do power discovery?
All ports where root isn't expected
1 second. Backup routers can learn the interval from the master
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Sends a voltage across the receive pairs to detect a 25k ohm resistance
28. What is RTP?
No shut
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
Real-time Transport Protocol
Cisco recommends only on the root bridge
29. What is the default VTP state?
VTP server for domain null with no password or secure mode
Trusted ports
Usually QoS from VOIP but not PC dataa
Auto mode
30. How do you show HSRP status
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
Etherchannel ports have inconsistent config
Show standby
Packets are discarded due to an ACL or policy action
31. How do you renable an err-disable port by default?
Only when a nonedge port transitions to forwarding
Manages addition - deletion and renaming VLANs across the network
Manually
Silent
32. If a wireless station needs to transmit and another device is transmitting - what happens?
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
1500B
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
33. What is layer 3 roaming?
When a client roams between Aps in different subnets
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
Frames are forwarded
34. What is the port number range?
Based on priority (0-255). Default is 100. Highest IP is tie breaker
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
0-255
Multicasts to 224.0.0.18 (VRRP)
35. static vlans offer ____ based membership
Port
As a VLAN access map
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
Configuration and TCN
36. How does HSRP election work?
5 classes with 3 drop precedences
RPR - RPR+ - and SSO
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
Based on priority (0-255). Default is 100. Highest IP is tie breaker
37. How is DHCP snooping enabled (scope)?
Globally
Used when ACLs specify port ranges...used by TCAM
Only when a nonedge port transitions to forwarding
Best effort delivery - integrated services model - and differentiated services model
38. How does IPT behave when the voce VLAN is in the default none mode?
When a port moves into forwarding or from fowarding or learning to blocking.
On root - because the root bridge propagates timers with config BDPU
Data and voice over native vlan no QOS and no 802.1p trunk
The distribution layer should have only L3 links
39. How does every HSRP config command begin?
Port is forced to never authorize any connected client
Switch(config-if)# standby xx where x= group number
By using a trunk link
Used to switch packets destined for the null interface
40. What is a microcell?
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
Disabled - blocking - listening - learning - forwarding
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
When the size of a cell is intentionally reduced
41. How should the switch port to which a WLC be configured?
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
Trunk
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
42. What does the dst-mac option do when checking ARP replies
No because they only participate if asked
Checks the destination MAC in the header against the target MAC in the ARP reply
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
A VLAN that spans the entire fabric
43. What types of ports autonegotiate?
FE and GE
Lowest cumulative cost to root
It's a router that maintains routes (static or dynamic) - and populates the FIB
4
44. What is the size of ISL encapsulation?
A single broadcast domain
26-byte header - 4-byte trailer with CRC
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
Edge - root - and point to point
45. How many tunnels exist between the LAP and WLC?
Port with best root path cost
The active router. All other routers are in backup state
2 - one for control messages and one for data
Show standby
46. How does RSTP identify a topology change?
Only when a nonedge port transitions to forwarding
Between interfaces that are assigned to L2 VLANs or L2 trunks
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
47. What is the SDM?
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
Switching Database Manager - configures and prunes TCAM partitions
FE - GE - and aggregated FE/GE Etherchannels
7 switches from root bridge
48. What does the rewrite engine do?
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
Only when a nonedge port transitions to forwarding
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
16 bits (8b port priority - 8b port number)
49. What are spoofed addresses?
A single broadcast domain
A group of wireless devices that share a common SSID
Switchpotrt nonegotiate
They disguise the origin of an attack
50. Automatically configure STP timers
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
Use the spanning-tree root macro
Embeds the tag within the frame