SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the STP blocking state?
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
5 classes with 3 drop precedences
Can hear only BDPUs
Globally
2. How often are CAM table entries aged?
1500B
300 sec
LACP port priority
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
3. What is an end to end vlan?
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
A VLAN that spans the entire fabric
No shut
4. What does Loop Guard do?
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
80% of the user traffic should stay in the VLAN
26-byte header - 4-byte trailer with CRC
5. What is a proxy arp?
6. What is the 80/20 rule?
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
Admin down
80% of the user traffic should stay in the VLAN
Distributed coordinion function - the use of timers to prevent wireless collisions
7. What happens when switches receive a configuration BDPU?
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
1-1005 (1 and 1002-1005 are reserved)
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
8. What 2 tunnelling mechanisms do the LAP and WLC use to communicate?
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
FE - GE - and aggregated FE/GE Etherchannels
Collision domain
Two distribution switches that aggregate one or more access switches
9. How many links can be used in an EtherChannel?
Using a mobility exchange message
2-8 FE - GE - or 10GE are bundled.
Edge - root - and point to point
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
10. What is the format of the VRRP virtual MAC?
Group (0-1023) priority (1-255 higher better def 100)
Differentiated services code point
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
0000.5e00.01xx
11. Automatically configure STP timers
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
Use the spanning-tree root macro
To a VLAN and not to a VLAN interface (SVI)
12. Where is UDLD enabled?
That they aren't using the same frequencies.
Priority (class 1)
All fiber-optic links between switches (must be enabled on both ends)
Will trunk if asked
13. How many potential links can LACP define?
134 bits
Disabled - init - listen - speak - standby - active
16 - of which up to 8 are active. The others are in standby
Priority (class 1)
14. Where is the QoS trust boundary usually configured on an IP phone?
Usually QoS from VOIP but not PC dataa
2 seconds (def)
Manually
Almost eliminates listening and learning states for single hosts on an access link
15. Each switch port is a _____ ______
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
After forwarding delay - port can learn new MAC addresses
Collision domain
2 seconds (def)
16. How does IPT behave when the voice VLAN is in vlan-id mode?
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
1-1005 (1 and 1002-1005 are reserved)
17. How does loop guard block ports?
The port asks the other end to trunk
Only for the offending VLAN on the port
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
Change in trunk encap
18. What types of links can be trunked?
It's a router that maintains routes (static or dynamic) - and populates the FIB
FE - GE - and aggregated FE/GE Etherchannels
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
19. How should UDLD be configured?
Collision domain
Dynamic WEP keys that change periodically
When the size of a cell is intentionally reduced
The configureable UDLD interval must be less than max age plus two intervals of forward delay
20. What can cause a wireless client to switch between Aps?
802.1x with EAP over LAN (EAPOL)
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
21. How does a DAI enabled switch gather trusted ARP info?
By using a trunk link
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
1 IP subnet
From the DHCP snooping database or from static entries
22. What's the easiest way to configure GLBP timers?
Configure the timer on the AVG and let it propagate
Untrusted
Using digital certificates
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
23. Of what significance are private VLANs
A group of wireless devices that share a common SSID
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
Local only
24. What is a drop adjacency?
25. How far chould a VLAN extend?
Port is forced to never authorize any connected client
Distribution layer
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
An AP's coverage area
26. What scope is 802.1x enabled?
Globally
No because they only participate if asked
1/2 and 3/6
RADIUS
27. If a wireless station needs to transmit and no other device is transmitting - what happens?
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
Effectively stops STP on filtered ports
No
The station can transmit immediately and wait for an ack
28. 802.11g
Distributed coordinion function - the use of timers to prevent wireless collisions
1-1005 (1 and 1002-1005 are reserved)
Frames that barely exceed 1518B or 1622B due to headers
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
29. What is the IEEE standard for STP?
2 seconds
802.1D
Isl - dot1q - negotiate (default)
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
30. What is a CEF punt?
31. What is an indirect topology change?
Disabled - blocking - listening - learning - forwarding
Checks the source MAC in the header against the sender MAC in the ARP reply
26-byte header - 4-byte trailer with CRC
The link status stays up - but something between them has failed or is filtering traffic
32. What is 802.1x force-authorized?
Data and voice over native vlan no QOS and no 802.1p trunk
Once the CCM gives them the parameters - they use RTP
With the skinny protocol
The port is forced to always authorize any connected client with no authentication necessary (default)
33. What does the SP do?
L2
No because they only participate if asked
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
Configuration and TCN
34. What functions does a LAP perform?
Switch(config-if)# glbp xx where xx = group number
Determines when the AVG will stop using the old VMAC in ARP replies
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
Round robin - weighted - or host-dependent
35. Where is root guard enabled?
36. What is the RSTP default hello interval?
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
2 seconds
Flash override (class 4)
2-8 FE - GE - or 10GE are bundled.
37. If you want IP source guard to detect spoofed MAC addresses - what must you do?
Turn on port security
802.1D
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
On ports where you never expect to find a root bridge for a VLAN
38. What are the 3 RSTP port types?
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
7 switches from root bridge
Edge - root - and point to point
A point to point port type but the neighboring device runs traditional 802.1D STP
39. Where is loop guard enabled?
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
802.1w
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
All nondesignated ports - but ok for all ports
40. What is topology-basec caching?
Almost eliminates listening and learning states for single hosts on an access link
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
Distribution layer
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
41. How does RSTP converge?
Plain text or md5
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Group (0-1023) priority (1-255 higher better def 100)
42. What happens when an ARP reply is received on an untrusted port?
43. EAP encryption
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
Globally or per-port
Dynamic WEP keys that change periodically
44. FE connectors use...
12 kbps with headers and compression
A point to point port type
2 strand MMF with MT-RJ or SC connectors
Option 43
45. How does VRRP do tracking?
46. What must be supported for port-based security to occur?
All fiber-optic links between switches (must be enabled on both ends)
By using a trunk link
802.1x with EAP over LAN (EAPOL)
Embeds the tag within the frame
47. What is the DIFS?
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
The DCF interframe space- the random backoff time before a wireless set can transmit
Using a mobility exchange message
Distribution layer
48. What is RPR?
No
The L3 forwarding engine can't forward the packet in hardware because there is no L2 next-hop address - so the packet is sent to the L3 engine to generate the ARP response
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
A group of wireless devices that share a common SSID
49. What is dynamic auto?
Will trunk if asked
Enables portfast - sets the port to access and disables PAgP
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
By using an Ether-IP tunnel
50. How does HSRP gateway addressing work
FE - GE - and aggregated FE/GE Etherchannels
Globally or per-port
Control functions
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP