SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How many MST instances can be in a region?
Effectively stops STP on filtered ports
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
Controls where candidate root bridges can be connected and found on a network
2. What is dhcp snooping rate limiting?
If any BDUP is received on a port - it puts the port into the errdisable state
CEF is distributed completely among multiple L3 forwarding engines.
Limits the number if dhcp requests on a port
Needs hardware upgrade over WEP - uses AES encryption
3. What criteria are used to size a switch block?
Roughly 2000
Packets are discarded due to an ACL or policy action
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
Admin down
4. What does the switchport host macro do?
Enables portfast - sets the port to access and disables PAgP
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
Differentiated services
Local only
5. How much BW does a voip connection use?
Every switch and router in a network must be configured with appropriate QoS features and policies
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
12 kbps with headers and compression
6. What happens if both 802.1D and RSTP BDPUs are received?
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
It is enabled by default on all CEF capable switches
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
7. If one end of an Etherchannel (either type) is set to on and the channel doesn't form - what should you check?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
8. What is a cell?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
9. How is an RSTP edge port configured
After forwarding delay - port can learn new MAC addresses
Frames are forwarded
With portfast
Show standby
10. What duplex setting does 802.11 use and why?
Half because transmitting and receiving stations use the same frequency
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
11. What types of link can an etherchannel be?
Used to switch packets destined for the null interface
The port asks the other end to trunk
1 to 64
Access or trunk
12. How much BW does a PSTN connection use?
A point to point port type
Port stays up - packets from violating MACs dropped - no logging
By short-circuiting the max age timer
63 kbps
13. What are the port channel load balancing methods?
Used when there are 1 or more VLANs mapped to a single STP instance
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
Once the CCM gives them the parameters - they use RTP
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
14. What does the minimum keyword do in HSRP?
Port stays up - packets from violating MACs dropped - no logging
Controls where candidate root bridges can be connected and found on a network
19
Forces the router to wait for a period of time before attempting overthrow
15. What do you need to determine to use MSTP?
Local only
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
If the switch or the powered device doesn't suport power class discovery
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
16. What are the 5 steps a LAP uses to establish communication with a WLC?
Yes
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
Two distribution switches that aggregate one or more access switches
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
17. What does the static keyword do when applying an arp ACL?
Prevents the dhcp binding DB from being checked.
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Use sh interface on the interface and look for error counts > 10
18. What is the STP learning state?
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
Two distribution switches that aggregate one or more access switches
After forwarding delay - port can learn new MAC addresses
Virtual Router Redundancy Protocol - pretty much the same as HSRP
19. What is the FM?
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
Switchpotrt nonegotiate
The campus network's backbone
20. What are the 5 steps to manualy configure STP?
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
They disguise the origin of an attack
All nondesignated ports - but ok for all ports
21. What is an indirect topology change?
Enables portfast - sets the port to access and disables PAgP
The link status stays up - but something between them has failed or is filtering traffic
Access
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
22. What are the 6 HSRP states?
Disabled - init - listen - speak - standby - active
5 (0-4 with 4 being the highest)
The total delay from start to finish
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
23. What method of QOS does voice traffic use most frequently?
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
Differentiated services
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
24. What is 802.1x force-unauthorized?
If the switch or the powered device doesn't suport power class discovery
Port is forced to never authorize any connected client
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
25. What is the DIFS?
With the skinny protocol
The DCF interframe space- the random backoff time before a wireless set can transmit
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
26. What is a root link query (RLQ)?
L2
Trunk - dynamic auto - dynamic desireable (default)
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
27. What does DTP do?
When a port moves into forwarding or from fowarding or learning to blocking.
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
Automatically negotiates a common trunk mode between switches
28. What is DSCP?
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
Differentiated services code point
Using a single WAP to centralize access and control over a group of wireless devices.
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
29. WPA encryption
Interim solution - uses same hardware as WEP - but uses TKIP encryption
When each AP stands alone within the larger network.
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
30. How does HSRP port tracking work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
31. What is a CEF glean?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. How does a Cisco IP phone connect upstream?
Admin down
Via an 802.1Q trunk or a single VLAN access port
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
Forces the router to wait for a period of time before attempting overthrow
33. What are the 5 STP states?
Disabled - blocking - listening - learning - forwarding
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
Limits the number if dhcp requests on a port
Auto mode
34. Of what significance are private VLANs
Local only
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
All ports where root isn't expected
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
35. Whan is a 10GE WAN PHY?
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
Trunk
From the DHCP snooping database or from static entries
Connects with SONET or SDH
36. What is layer 3 roaming?
Priority (class 1)
A point to point port type
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
When a client roams between Aps in different subnets
37. Where does layer switching occur?
When each AP stands alone within the larger network.
Between any type of interface as long as the interface can have an L3 address assigned
They disguise the origin of an attack
Roughly 50%
38. What are the 6 steps to configure 802.1x for port security?
63 kbps
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
TCAM
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
39. RSTP learning state
Port with alternative path to root less desirable than root
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Incoming frames dropped - but MACs learned
Configure and enable DHCP snooping
40. What does Root Guard do?
Frames that barely exceed 1518B or 1622B due to headers
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
Controls where candidate root bridges can be connected and found on a network
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
41. What is step 1 of enabling IP source guard?
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
Configure and enable DHCP snooping
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
All ARP packets that arrive on untrusted ports are inspected.
42. What does the reload keyword do in HSRP?
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
43. How do VRRP routers handle preemption?
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
5 (0-4 with 4 being the highest)
On by default
44. What is the GLBP AVG?
Trunk
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
Group (0-1023) priority (1-255 higher better def 100)
Isolated and community
45. What's the easiest way to configure GLBP timers?
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
Etherchannel ports have inconsistent config
Configure the timer on the AVG and let it propagate
63 kbps
46. How do you implement MST?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
47. What are the 5 STP port roles?
Root - designated - blocking - alternate - forwarding (host)
2 - one for control messages and one for data
0-255
An ac adaptor that plugs into a wall outlet.
48. On what scope is DAI enabled?
Weak key rotation
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
Per VLAN
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
49. What are the 3 ways GLBP load-balances?
Automatically using DTP and CDP
Round robin - weighted - or host-dependent
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Completed dhcp bindings - mac addresses - IP addresses - etc.
50. How does Root Guard work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183