SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are the RSTP port roles?
The wireless clients communicate directly with no other means of connectivity such as a WAP
1 per segment
Root - designated - alternate - and backup
Checks the source MAC in the header against the sender MAC in the ARP reply
2. What is an SVI?
Receives the first packet of a traffic flow and routes it
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
Effectively stops STP on filtered ports
Silent
3. What does MSTP consist of?
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
RPR - RPR+ - and SSO
A group of wireless devices that share a common SSID
Regions and instances
4. How are VACLs configured?
Needs hardware upgrade over WEP - uses AES encryption
Multicast to 01-80-c2-00-00-00
As a VLAN access map
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
5. By default - what submode does PAgP operate in with the desirable and auto modes?
BGP - EIGRP - OSPF - and IS-IS.
By short-circuiting the max age timer
Frames are forwarded
Silent
6. What is latency?
The total delay from start to finish
The L3 forwarding engine can't forward the packet in hardware because there is no L2 next-hop address - so the packet is sent to the L3 engine to generate the ARP response
The port asks the other end to trunk
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
7. What is the PVLAN host mode?
Data and voice over native vlan - no QOS but still uses 802.1p trunk
Between any type of interface as long as the interface can have an L3 address assigned
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
The port asks the other end to trunk
8. What does the switchport host macro do?
Gateway load balancing protocol - cisco proprietary
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
Time between BDPUs sent by root bridge. Default of 2 seconds
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
9. What is the default 802.3af power class and its use?
10. How many virtual MACs can GLBP have?
When the AP uplinks to an Ethernet network.
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
Trusted or untrusted
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
11. What does the SP do?
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
Globally
Each network device handles packets individually with no advance reservations
One that can be detected on a switch interface (ie. Up/down)
12. What do you need to determine to use MSTP?
Option 43
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
By an ARP access list that defines the permitted bindings
FE - GE - and aggregated FE/GE Etherchannels
13. What are the 6 steps to configure 802.1x for port security?
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
2-8 FE - GE - or 10GE are bundled.
14. How many MST instances can be in a region?
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
Switch(config-if)# glbp xx where xx = group number
Control functions
15. What is an end to end vlan?
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
300 sec by default
A VLAN that spans the entire fabric
Controls where candidate root bridges can be connected and found on a network
16. How is DHCP snooping enabled (scope)?
MAC of the end device
Root - designated - blocking - alternate - forwarding (host)
Regions and instances
Globally
17. What is PVST plus (PVST+)?
Between any type of interface as long as the interface can have an L3 address assigned
FE - GE - and aggregated FE/GE Etherchannels
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
Immediate (class 2)
18. What are TCAM entries composed of?
Value - mask - and result (VMR) combinations
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
Yes
19. How should the switch port to which an autonomous AP be configured?
Local only
Trunk
L2
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
20. How does a LAP and a WLC authenticate between each other?
Using digital certificates
Root
Configure non-silent submode
Roughly 2000
21. What is a drop adjacency?
22. What 2 conditions does IP source guard check for?
Configuration and TCN
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
23. 802.11g
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
Completed dhcp bindings - mac addresses - IP addresses - etc.
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
24. unknown unicast flooding
All L2 connectivity should be contained within the access layer.
Discarding - learning - forwarding
Because each frame is checked
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
25. What is the STP hello timer?
802.1x with EAP over LAN (EAPOL)
A private VLAN can be logically associated with a special secondary vlan
Time between BDPUs sent by root bridge. Default of 2 seconds
Configure non-silent submode
26. If there are 2 ports with same root cost - how is the tie broken for designated port?
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
The distribution layer should have only L3 links
The port asks the other end to trunk
VTP server for domain null with no password or secure mode
27. How does IPT behave when the voice VLAN is in untagged mode?
Data and voice over native vlan - no QOS but still uses 802.1p trunk
1500B
They disguise the origin of an attack
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
28. What is the size of ISL encapsulation?
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
Reboots and searches for a new WLC
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
26-byte header - 4-byte trailer with CRC
29. What happens when an ARP reply is received on an untrusted port?
30. What is RPVST+?
An instance of RSTP running for each VLAN on the switch. Changing from PVST to RPVST+ is disruptive
Use sh interface on the interface and look for error counts > 10
Another router must have a higher HSRP priority and have preemt set up
Turn on port security
31. What is a BSS?
Using a single WAP to centralize access and control over a group of wireless devices.
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
Per VLAN
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
32. What does the skinny protocol do?
Turn on port security
Transmits keystrokes from phone and commands from CCM
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
33. Can ARP replies be checked
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
Trunk
1500B
Yes
34. What is RPR+?
35. What is DSCP codepoint AF31(26)?
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
Flash (class 3)
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
By creating a static IP binding
36. Where does VRRP send advertisements?
Multicasts to 224.0.0.18 (VRRP)
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
0-255
When a client roams between Aps in different subnets
37. Which 4 things must be agreeable to trunk?
Yes
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
When the AP uplinks to an Ethernet network.
1-1005 (1 and 1002-1005 are reserved)
38. What is route caching?
39. How does HSRP plain text authentication work?
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
A key string of up to 8 characters is sent. Default is cisco.
Transmits keystrokes from phone and commands from CCM
40. At what layer should the WLC be connected?
Collision domain
Distribution
Globally or per-port
Auto mode
41. How long are TCAM masks?
Transmits keystrokes from phone and commands from CCM
Enables portfast - sets the port to access and disables PAgP
2
134 bits
42. How can BDPU Guard be configured?
Full duplex
A point to point port type
Globally or per-port
Bridge priority and MAC
43. What are the 2 power over ethernet methods?
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
16 - of which up to 8 are active. The others are in standby
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
Cisco ILP and 802.3af
44. What are the steps to configure a PAgP port channel?
5 (0-4 with 4 being the highest)
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
Lowest cumulative cost to root
Because each frame is checked
45. What is the STP forwarding state?
Almost eliminates listening and learning states for single hosts on an access link
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
No
Can hear only BDPUs
46. What is errdisable dtp-flap?
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
Change in trunk encap
802.11
47. How does GLBP work?
Checks the destination MAC in the header against the target MAC in the ARP reply
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
Routers are assigned to common GLBP group. All routers can be active and can load balance
48. Where should you change the network diameter value?
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
The total delay from start to finish
Cisco recommends only on the root bridge
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
49. What does the dst-mac option do when checking ARP replies
Distribution layer
Checks the destination MAC in the header against the target MAC in the ARP reply
TCAM
1 IP subnet
50. EAP encryption
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
63 kbps
Best effort delivery - integrated services model - and differentiated services model
Dynamic WEP keys that change periodically