SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is a wireless mobility group?
When each AP stands alone within the larger network.
Differentiated services code point
Because each frame is checked
A client can roam to any WLC as long as it stays in a mobility group
2. What if RSTP BDPUs aren't received?
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
Access
Only when a nonedge port transitions to forwarding
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
3. What happens when switches receive a configuration BDPU?
FE and GE
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
From the DHCP snooping database or from static entries
All L2 connectivity should be contained within the access layer.
4. How do you configure DAI for statically configured IP addresses?
By an ARP access list that defines the permitted bindings
Isl - dot1q - negotiate (default)
Disabled - init - listen - speak - standby - active
No
5. What are the 5 STP states?
When the AP uplinks to an Ethernet network.
Priority (class 1)
Disabled - blocking - listening - learning - forwarding
From the DHCP snooping database or from static entries
6. RSTP root port
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
Port with best root path cost
Arp for local subnet - if on different subnet - will arp for dgw
7. How does DAI work?
They disguise the origin of an attack
On the left as you face the connector
All ARP packets that arrive on untrusted ports are inspected.
Matching SSID - compatible data rate - authentication credentials
8. What is the STP forwarding state?
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
Another router must have a higher HSRP priority and have preemt set up
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
9. What are the 3 trunk switchport modes?
Trunk - dynamic auto - dynamic desireable (default)
Isl - dot1q - negotiate (default)
2 strand MMF with MT-RJ or SC connectors
One that can be detected on a switch interface (ie. Up/down)
10. Where is loop guard enabled?
By an ARP access list that defines the permitted bindings
Cisco recommends only on the root bridge
All nondesignated ports - but ok for all ports
Distributed coordinion function - the use of timers to prevent wireless collisions
11. what must be done on an SVI before it is activated?
Yes to both
Between interfaces that are assigned to L2 VLANs or L2 trunks
No shut
When a client roams between Aps in different subnets
12. What does the minimum keyword do in HSRP?
Critical...used most often for IPT
Forces the router to wait for a period of time before attempting overthrow
Edge - root - and point to point
Configure non-silent submode
13. What is UDLD normal mode?
Once the CCM gives them the parameters - they use RTP
A packet can't be switched in hardware with the FIB and must go to the L3 engine
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
FE - GE - and aggregated FE/GE Etherchannels
14. What are the 3 ways GLBP load-balances?
Round robin - weighted - or host-dependent
It's a router that maintains routes (static or dynamic) - and populates the FIB
Group (0-1023) priority (1-255 higher better def 100)
Turn on port security
15. What is a direct topology change?
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
When a wireless station transmits a frame - the receiving one must send an ack
One that can be detected on a switch interface (ie. Up/down)
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
16. Whan is a 10GE WAN PHY?
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
Connects with SONET or SDH
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
The distribution layer should have only L3 links
17. How do you configure LACP standby links?
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
The campus network's backbone
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
LACP port priority
18. What are the two etherchannel negotiation protocols?
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
The DCF interframe space- the random backoff time before a wireless set can transmit
Switchpotrt nonegotiate
PAgP (Cisco proprietary) and LACP (standards-based)
19. How many tunnels exist between the LAP and WLC?
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Collision domain
2 - one for control messages and one for data
Checks the source MAC in the header against the sender MAC in the ARP reply
20. What is an SVI?
300 sec
Configuration and TCN
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
21. What does UDLD do?
1-1005 (1 and 1002-1005 are reserved)
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Sends a voltage across the receive pairs to detect a 25k ohm resistance
By configuring every switch port to have an expected and controlled behavior
22. What is a proxy arp?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
23. How does every HSRP config command begin?
0-255
The time that a port spends in both listening and learning states . Default 15 seconds
Switch(config-if)# standby xx where x= group number
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
24. Does VTP pass private VLAN configuration?
Data and voice over native vlan - no QOS but still uses 802.1p trunk
Another router must have a higher HSRP priority and have preemt set up
Port is forced to never authorize any connected client
No
25. WPA2 encryption
Sends a voltage across the receive pairs to detect a 25k ohm resistance
It can't
Needs hardware upgrade over WEP - uses AES encryption
FE and GE
26. Where are security and QoS ACLs stored?
Effectively stops STP on filtered ports
802.1w
After forwarding delay - port can learn new MAC addresses
TCAM
27. What is BDPU Guard?
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
Half because transmitting and receiving stations use the same frequency
Hashing algorithm
If any BDUP is received on a port - it puts the port into the errdisable state
28. What is a root link query (RLQ)?
Turn on port security
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
Reboots and searches for a new WLC
The number of times the CEF table has bee flushed and regenerated as a whole
29. What is the portr ID?
RPR - RPR+ - and SSO
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
16 bits (8b port priority - 8b port number)
Interim solution - uses same hardware as WEP - but uses TKIP encryption
30. How much overlap should a wireless repeater have?
Option 43
Roughly 50%
Only when a nonedge port transitions to forwarding
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
31. What are the characteristics of the distribution layer?
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
TCAM
Can hear only BDPUs
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
32. What is the format of the VRRP virtual MAC?
The same as a standby group in HSRP
0000.5e00.01xx
Distribution layer
On by default
33. What is an isolated secondary VLAN?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. What is an untrusted port under dhcp snooping?
Root - designated - blocking - alternate - forwarding (host)
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
35. How does HSRP port tracking work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. What cabling do GBICs use?
SC fiber or RJ-45
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
BGP - EIGRP - OSPF - and IS-IS.
4
37. What does the rewrite engine do?
Packets are discarded due to an ACL or policy action
Distributed coordinion function - the use of timers to prevent wireless collisions
L2
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
38. What is the default MTU?
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
Globally or per-port
1500B
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
39. What are the PAgP negotiation modes
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
2 - one for control messages and one for data
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
Bridge priority and MAC
40. What does MSTP do?
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
Based on priority (0-255). Default is 100. Highest IP is tie breaker
Roughly 50%
Used when there are 1 or more VLANs mapped to a single STP instance
41. What does the src-mac option do when checking ARP replies
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
Checks the source MAC in the header against the sender MAC in the ARP reply
Interim solution - uses same hardware as WEP - but uses TKIP encryption
42. If one end of an Etherchannel (either type) is set to on and the channel doesn't form - what should you check?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. How are frames forwarded across a specific link?
Will trunk if asked
Hashing algorithm
2 seconds
Manually
44. What is a baby giant frame?
Frames that barely exceed 1518B or 1622B due to headers
Differentiated services code point
A single broadcast domain
Time between BDPUs sent by root bridge. Default of 2 seconds
45. How does UDLD work?
Distribution layer
802.1D
All ports where root isn't expected
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
46. 802.11a
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
Incoming frames are dropped (combination of disabled - blocking - and listening)
The total delay from start to finish
47. How does a WLC hand off a client's association to another WLC?
Using a mobility exchange message
Using a single WAP to centralize access and control over a group of wireless devices.
Incoming frames are dropped (combination of disabled - blocking - and listening)
Use the spanning-tree root macro
48. How does DSCP handle IP precedence?
All ports where root isn't expected
Port is forced to never authorize any connected client
5 classes with 3 drop precedences
To a VLAN and not to a VLAN interface (SVI)
49. What happens during HSRP failover?
Edge - root - and point to point
Incoming frames are dropped (combination of disabled - blocking - and listening)
The standby becomes active and stays active by default. Preemption can be configured
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
50. What are the characteristics of the core layer
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
1500B
Configure and enable DHCP snooping