SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the traditional MLS view of switching?
Route once - switch many
Reboots and searches for a new WLC
No
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
2. What does the epoch number indicate when looking at cef entries?
2 strand MMF with MT-RJ or SC connectors
The number of times the CEF table has bee flushed and regenerated as a whole
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
Each frame transmits its expected duration time
3. What is an IST instance?
If any BDUP is received on a port - it puts the port into the errdisable state
4
Each frame transmits its expected duration time
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
4. How does adding option-82 to DHCP snooping affect things?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. What is a community secondary VLAN?
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
Forces the router to wait for a period of time before attempting overthrow
No
1 IP subnet
6. What does the skinny protocol do?
Discarding - learning - forwarding
1 second. Backup routers can learn the interval from the master
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
Transmits keystrokes from phone and commands from CCM
7. Where is root guard enabled?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
8. What is a punt adjacency?
Packets must be sent to the L3 engine for further processing
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
One that can be detected on a switch interface (ie. Up/down)
Globally
9. How do you configure a DHCP gateway?
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
10-15%
By using a trunk link
10. What can cause a wireless client to switch between Aps?
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
Switch(config-if)# standby xx where x= group number
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
11. How is the HSRP MAC address configured?
Only a single host connects . If one BDPU is received - it is no longer an edge port
0000.0c07.acxx where xx is the group number as a 2-digit hex value
L2
1 second. Backup routers can learn the interval from the master
12. How does an LAP bind with a WLC?
With portfast
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
By brining up a tunnel between them to carry 802.11 related messages and client data.
Both layer 2 switching and IVR
13. How is Root Guard used?
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
2 seconds
Disabled - blocking - listening - learning - forwarding
On ports where you never expect to find a root bridge for a VLAN
14. How does ISL handle COS?
To a VLAN and not to a VLAN interface (SVI)
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
15. One vlan should =
Matching SSID - compatible data rate - authentication credentials
FIB
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
1 IP subnet
16. WPA encryption
300 sec by default
Switch(config-if)# glbp xx where xx = group number
Interim solution - uses same hardware as WEP - but uses TKIP encryption
Both layer 2 switching and IVR
17. What is route caching?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. What types of link can an etherchannel be?
Access or trunk
802.1x with EAP over LAN (EAPOL)
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
Automatically using DTP and CDP
19. How is an RSTP edge port configured
Manages addition - deletion and renaming VLANs across the network
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
The port is forced to always authorize any connected client with no authentication necessary (default)
With portfast
20. What can the Etherchannel hash use?
Trunk
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Distribution layer
21. What is the size of ISL encapsulation?
On ports where you never expect to find a root bridge for a VLAN
The configureable UDLD interval must be less than max age plus two intervals of forward delay
26-byte header - 4-byte trailer with CRC
0-255
22. How does HSRP port tracking work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
23. What is the default VTP state?
1-1005 (1 and 1002-1005 are reserved)
Some unused bits are used to allow a port to identify its role and state. Also the BDPUs state that they are V2 BDPUs
VTP server for domain null with no password or secure mode
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
24. What is the default mode of load balancing?
Enables portfast - sets the port to access and disables PAgP
802.1D
Src-dst-ip
Only for trusted Cisco gear - especially phones
25. can root guard and bdpu guard be used together?
802.1D
No
Lowest cumulative cost to root
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
26. What does Root Guard do?
A point to point port type
Switches make an effort to move packets as quickly as possible
Controls where candidate root bridges can be connected and found on a network
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
27. What does uplinkfast do?
A client can roam to any WLC as long as it stays in a mobility group
Trusted ports
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Cisco recommends only on the root bridge
28. where does L2 switching occur?
L2
Group (0-1023) priority (1-255 higher better def 100)
Between interfaces that are assigned to L2 VLANs or L2 trunks
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
29. What is a vlan?
MST attributes must be manually entereed on each switch in the region. They don' t propagate like VTP.
As a VLAN access map
RADIUS
A single broadcast domain
30. How are multiple VLANs mapped to multiple SSIDs?
Arp for local subnet - if on different subnet - will arp for dgw
Controls where candidate root bridges can be connected and found on a network
By using a trunk link
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
31. What is UDLD normal mode?
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
Src-dst-ip
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
32. How does the VRRP master router handle the VIP?
The number of times the CEF table has bee flushed and regenerated as a whole
L2
1 IP subnet
The master router can share the VIP
33. What is an MST instance?
Bridge priority and MAC
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
The MST instance (MSTI) runs alongside the IST and represents an STP instance
The active router. All other routers are in backup state
34. What are the caveats for HSRP port tracking?
Another router must have a higher HSRP priority and have preemt set up
Globally or per-port
Arp for local subnet - if on different subnet - will arp for dgw
Flash (class 3)
35. RSTP discarding state
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
The number of times the entry has been updated since the table was generated
Incoming frames are dropped (combination of disabled - blocking - and listening)
36. How does a Cisco IP phone connect upstream?
Via an 802.1Q trunk or a single VLAN access port
Embeds the tag within the frame
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
Used to switch packets destined for the null interface
37. By default - what submode does PAgP operate in with the desirable and auto modes?
Silent
Data and voice over native vlan no QOS and no 802.1p trunk
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
38. How is UDLD configured?
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
Connects with SONET or SDH
The ASIC
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
39. What is the core block?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
40. What is the GLBP redirect timer?
Determines when the AVG will stop using the old VMAC in ARP replies
0-255
The L3 forwarding engine can't forward the packet in hardware because there is no L2 next-hop address - so the packet is sent to the L3 engine to generate the ARP response
Yes
41. What is portfast?
802.1D
Almost eliminates listening and learning states for single hosts on an access link
When each AP stands alone within the larger network.
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
42. What are the RSTP port states?
By short-circuiting the max age timer
Dynamic WEP keys that change periodically
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
Discarding - learning - forwarding
43. What is the GLBP group and priority range
Half-duplex
Group (0-1023) priority (1-255 higher better def 100)
Data and voice over native vlan - no QOS but still uses 802.1p trunk
L2
44. What are the characteristics of the core layer
By using a trunk link
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
802.1D
Each frame transmits its expected duration time
45. What does the static keyword do when applying an arp ACL?
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
When the size of a cell is intentionally reduced
Virtual Router Redundancy Protocol - pretty much the same as HSRP
Prevents the dhcp binding DB from being checked.
46. How does RSTP converge?
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
A private VLAN can be logically associated with a special secondary vlan
No
On by default
47. How does 802.3af do power discovery?
Cisco recommends only on the root bridge
Sends a voltage across the receive pairs to detect a 25k ohm resistance
A group of wireless devices that share a common SSID
All L2 connectivity should be contained within the access layer.
48. What are the 3 RSTP port types?
Data and voice over native vlan - no QOS but still uses 802.1p trunk
By brining up a tunnel between them to carry 802.11 related messages and client data.
Edge - root - and point to point
Can hear only BDPUs
49. How are GLBP timers used?
Used to switch packets destined for the null interface
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
Root
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
50. Where is bdpu guard enabled?
Needs hardware upgrade over WEP - uses AES encryption
All user ports that have portfast enabled
No
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state