SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How is UDLD configured?
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
0-255
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Automatically using DTP and CDP
2. How does IPT behave when the voice VLAN is in vlan-id mode?
Group (0-255) - priority (1-254 254 is highest - 100 default)
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
All user ports that have portfast enabled
802.1w
3. How often are HSRP hellos sent?
3 seconds. Holdtime =3 hellos + 1
Gateway load balancing protocol - cisco proprietary
Between any type of interface as long as the interface can have an L3 address assigned
The wireless clients communicate directly with no other means of connectivity such as a WAP
4. What is a BSS?
Admin down
Using a single WAP to centralize access and control over a group of wireless devices.
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
80% of the user traffic should stay in the VLAN
5. What is the STP hello timer?
2 seconds (def)
Trunk
Use sh interface on the interface and look for error counts > 10
Time between BDPUs sent by root bridge. Default of 2 seconds
6. Where is the QoS trust boundary usually configured on an IP phone?
Only for trusted Cisco gear - especially phones
Via an 802.1Q trunk or a single VLAN access port
Discarding - learning - forwarding
Usually QoS from VOIP but not PC dataa
7. What is the default FE duplex?
Only the standby monitors the hello messages from the active router
Full duplex
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
Dynamic arp inspection
8. How do VRRP routers handle preemption?
On by default
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
Promiscuous and host
9. What is a discard adjacency?
Packets are discarded due to an ACL or policy action
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
Using a mobility exchange message
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
10. How does adding option-82 to DHCP snooping affect things?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
11. How should the switch port to which a LAP be configured?
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
Access
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
Matching SSID - compatible data rate - authentication credentials
12. What feedback mechanism does wireless use?
Yes
When a wireless station transmits a frame - the receiving one must send an ack
Regions and instances
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
13. What is the distribution layer best practice?
Using a single WAP to centralize access and control over a group of wireless devices.
The distribution layer should have only L3 links
Those that connect to other switches
Untrusted
14. Where is root guard enabled?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. what must be done on an SVI before it is activated?
Incoming frames dropped - but MACs learned
The number of times the CEF table has bee flushed and regenerated as a whole
No shut
By encapsulating each frame in a header and trailer
16. On what scope is DAI enabled?
SC fiber or RJ-45
26-byte header - 4-byte trailer with CRC
Per VLAN
The DCF interframe space- the random backoff time before a wireless set can transmit
17. What can cause a wireless client to switch between Aps?
By brining up a tunnel between them to carry 802.11 related messages and client data.
When a wireless station transmits a frame - the receiving one must send an ack
The time that a port spends in both listening and learning states . Default 15 seconds
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
18. What is the default mode of load balancing?
Src-dst-ip
Data and voice over native vlan no QOS and no 802.1p trunk
Distribution
Distribution layer
19. How many potential links can LACP define?
16 - of which up to 8 are active. The others are in standby
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Switching Database Manager - configures and prunes TCAM partitions
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
20. What method of QOS does voice traffic use most frequently?
Limits the number if dhcp requests on a port
Both ends should be on because on modes doesn't send PAgP or LACP packets
Differentiated services
When the size of a cell is intentionally reduced
21. What is the DIFS?
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
The DCF interframe space- the random backoff time before a wireless set can transmit
Used when there are 1 or more VLANs mapped to a single STP instance
When the size of a cell is intentionally reduced
22. What happens when switches receive a configuration BDPU?
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
Port stays up - packets from violating MACs dropped - no logging
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
Yes
23. What is an IST instance?
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
Show standby
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
24. What can the Etherchannel hash use?
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
1-1005 (1 and 1002-1005 are reserved)
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Show standby
25. What is step 1 of enabling IP source guard?
7 switches from root bridge
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Switching Database Manager - configures and prunes TCAM partitions
Configure and enable DHCP snooping
26. How does NSF work?
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
No
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
7 switches from root bridge
27. What is unique about HSRP group numbers?
Flash (class 3)
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
1-65535 (def 32768) lower priority - higher probability
Src-dst-ip
28. What is the size of a TCAM value?
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
Local only
FE and GE
29. How are multiple VLANs mapped to multiple SSIDs?
4
Weak key rotation
By using a trunk link
Either desirable or auto mode
30. Which ports should you consider trusted for DAI?
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
Those that connect to other switches
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
By configuring every switch port to have an expected and controlled behavior
31. What is the LACP priority range?
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
1-65535 (def 32768) lower priority - higher probability
To the virtual port-channel interface
No shut
32. How does 802.3af do power discovery?
A host port goes up or down
Sends a voltage across the receive pairs to detect a 25k ohm resistance
The wireless clients communicate directly with no other means of connectivity such as a WAP
Disabled - init - listen - speak - standby - active
33. How does UDLD work?
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
From the DHCP snooping database or from static entries
80% of the user traffic should stay in the VLAN
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
34. What are the characteristics of the distribution layer?
4
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
The link status stays up - but something between them has failed or is filtering traffic
Two distribution switches that aggregate one or more access switches
35. How do Cisco IP phones communicate with the CCM?
With the skinny protocol
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
0-255
36. What are the 6 HSRP states?
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
No
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
Disabled - init - listen - speak - standby - active
37. What does a LAP do if it loses communication with it's WLC?
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
Virtual Router Redundancy Protocol - pretty much the same as HSRP
No because they only participate if asked
Reboots and searches for a new WLC
38. What does the version number indicate when looking at CEF entries?
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
The number of times the entry has been updated since the table was generated
Admin down
39. What does the static keyword do when applying an arp ACL?
The distribution layer should have only L3 links
Differentiated services
Prevents the dhcp binding DB from being checked.
Data and voice over native vlan - no QOS but still uses 802.1p trunk
40. What is PVST plus (PVST+)?
On ports where you never expect to find a root bridge for a VLAN
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
PAgP (Cisco proprietary) and LACP (standards-based)
41. What is 802.1x force-unauthorized?
Port is forced to never authorize any connected client
VTP server for domain null with no password or secure mode
Full duplex
Access or trunk
42. How do you enable CEF?
12 kbps with headers and compression
5 classes with 3 drop precedences
A private VLAN can be logically associated with a special secondary vlan
It is enabled by default on all CEF capable switches
43. What is the 80/20 rule?
By using a trunk link
80% of the user traffic should stay in the VLAN
L2
All ARP packets that arrive on untrusted ports are inspected.
44. What are the steps of RSTP convergence?
On ports where you never expect to find a root bridge for a VLAN
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
Collision domain
45. what I s distributed CEF (dCEF)?
1 per segment
Another router must have a higher HSRP priority and have preemt set up
Hashing algorithm
CEF is distributed completely among multiple L3 forwarding engines.
46. How does DAI work?
On the left as you face the connector
A point to point port type but the neighboring device runs traditional 802.1D STP
All ARP packets that arrive on untrusted ports are inspected.
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
47. What is the port number range?
Root - designated - blocking - alternate - forwarding (host)
Receives the first packet of a traffic flow and routes it
0-255
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
48. How are errdisable triggers tuned?
2 seconds
Globally
The DCF interframe space- the random backoff time before a wireless set can transmit
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
49. How does a DHCP server send WLC addresses?
1 per segment
By sending a gratuitous ARP
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
Option 43
50. What does the src-mac option do when checking ARP replies
Checks the source MAC in the header against the sender MAC in the ARP reply
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
The port asks the other end to trunk
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks